本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。
PRESENTATIONS/PODCASTS
Black Hat
YouTube video
YouTube video
YouTube video
YouTube video
BlueMonkey 4n6
- Day in the Life of DFIR – interview with Professor Ali Hadi, Ph.D., Senior Cybersecurity Specialist.
YouTube video
Breaking Badness
CYBERWOX
YouTube video
Digital Forensic Survival Podcast
Hardly Adequate
My Blog • Discord • Socials LinkedIn Twitter • Youtube • Podcasts Hardly Adequate Forensic Focus • CTF • Shop Meet the Team Desi currently works for Dragos and believes in the mission to protect civilisation. He is also a podcast host, educator, student, mentor, ctf player & designer. All his spare time is taken up by fitness, gaming, and of course his dogs. Moxie loves humans and will always take out your shins for a pat. She is on the fence about soft toys but is a firm believer that squeakers...
Season 2, Ep. 6•Sunday, February 4, 2024We're catching up with Jo to learn more about her journey into cyber and all the things in between including a PhD, lunch with the (now) King Charles III, memes and lots of digressions.Show moreRSSMore episodesView all episodes7. Hardly a Week 5 February 5, 2024 07:23Season 2 is out now! Welcome to Hardly a Week 5 2024! Come along and listen to the new things in cyber, and Desi chat about what it takes to get into cybersecurity in 2024 each week.Want to wi...
Insane Forensics
YouTube video
Intel471
Feb 06, 2024 Over many years, a cybercriminal gang likely based in Russia built a huge network of interconnected, hacked computers. They did this one inbox at a time. They sent spam messages with fake documents and malicious links, tricking people into opening malicious software. The network of hacked computers was called Qakbot, or QBot. The botnet was used by cybercriminal gangs to infiltrate computers, steal their data, conduct financial crime and deploy ransomware. But in 2023, law enforceme...
Jai Minton
YouTube video
John Hammond
YouTube video
YouTube video
YouTube video
Lee Whitfield at MacAdemia
YouTube video
YouTube video
YouTube video
Magnet Forensics
Most cloud investigations focus around host or endpoint data but there is a wealth of additional information available to an investigation if responders know where to look. The first logical place is CloudTrail logs but if an organization uses AWS Config, it contains a wealth of information that can compliment an investigation that is often overlooked. In this talk, we’ll show how you can pull data from AWS Config and use it in your next incident. After viewing this webinar, you can download a c...
Microsoft Threat Intelligence Podcast
SubscribeApple PodcastsApple PodcastsOvercastOvercastSpotifyAmazon MusicRSSShow NotesOn this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Christine Fossaceca, Laurie Kirk, and Apurva Kumar. Today's discussion concerns a recent release from the Chaos Computer Congress, where researchers discovered and analyzed a zero-click attack on iPhones. The attack involves four zero-day vulnerabilities in iOS, requiring a malicious iMessage, a hardware bug, and a...
MSAB
YouTube video
Paraben Corporation
YouTube video