解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 07 – 2024 - PRESENTATIONS/PODCASTS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

PRESENTATIONS/PODCASTS

Adversary Universe Podcast

Download1KCrowdStrike has long said, “You don’t have a malware problem — you have an adversary problem.” Much like we analyze the malware and tools used in cyberattacks, we must also learn about the people who orchestrate them.Adam and Cristian are joined by Cameron Malin, a behavioral profiler who specializes in understanding adversaries and the “why” behind their activity. Cameron built the FBI’s Cyber Behavioral Analysis Unit, which works to understand the motivations for cybercrime across di...

Alexis Brignoni

YouTube video

Black Hat

YouTube video

YouTube video

YouTube video

Black Hills Information Security

YouTube video

YouTube video

Breaking Badness

CactusCon

YouTube video

YouTube video

YouTube video

YouTube video

YouTube video

YouTube video

YouTube video

Cellebrite

YouTube video

Digital Forensic Survival Podcast

Hardly Adequate

My Blog • Discord • Socials LinkedIn TwitterYoutube • Podcasts Hardly Adequate Forensic Focus • CTF • Shop Meet the Team Desi currently works for Dragos and believes in the mission to protect civilisation. He is also a podcast host, educator, student, mentor, ctf player & designer. All his spare time is taken up by fitness, gaming, and of course his dogs. Moxie loves humans and will always take out your shins for a pat. She is on the fence about soft toys but is a firm believer that squeakers...

Hyun Yi

Public Notifications Fork 0 Star 3 License MIT license 3 stars 0 forks Branches Tags Activity Star Notifications Code Issues 0 Pull requests 0 Actions Projects 0 Security Insights Additional navigation options Code Issues Pull requests Actions Projects Security Insights hyuunnn/forensic-study-2023winter This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository. mainBranchesTagsGo to fileCodeFolders and filesNameNameLast commit messageLast co...

Insane Forensics

YouTube video

Jai Minton

YouTube video

Justin Tolman at AccessData

YouTube video

LaurieWired

YouTube video

Lee Whitfield at MacAdemia

YouTube video

YouTube video

YouTube video

Magnet Forensics

YouTube video

Magnet Forensics

It’s not a question of if a data breach will happen, but when. According to Verizon’s Data Breach Investigations Report: system intrusions or data breaches typically involve numerous steps and the majority of these attacks involve Malware (70%), usually of the Ransomware variety Investigation of these breaches and obtaining Indicators of Compromise quickly is paramount to prevent further infections throughout a network. Join Magnet Forensics’ Steve Gemperle, currently Forensic Consultant—and for...

Malwarebytes

Posted: February 12, 2024 by Malwarebytes Labs Today on the Lock and Code podcast… If your IT and security teams think malware is bad, wait until they learn about everything else. In 2024, the modern cyberattack is a segmented, prolonged, and professional effort, in which specialists create strictly financial alliances to plant malware on unsuspecting employees, steal corporate credentials, slip into business networks, and, for a period of days if not weeks, simply sit and watch and test and pro...

Microsoft Security Insights Show

Microsoft Security Insights ShowSubscribeSign inShare this postMicrosoft Security Insights Show Episode 190 - Andre Camillosecurityinsights.substack.comCopy linkFacebookEmailNoteOtherThe Microsoft Security Insights ShowMicrosoft Security Insights Show Episode 190 - Andre Camillo5Share this postMicrosoft Security Insights Show Episode 190 - Andre Camillosecurityinsights.substack.comCopy linkFacebookEmailNoteOther1×0:00-1:00:14Audio playback is not supported on your browser. Please upgrade.Microso...

Microsoft Threat Intelligence Podcast

SubscribeApple PodcastsApple PodcastsSpotifyOvercastOvercastAmazon MusicRSSShow NotesOn this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Bryan Prior and Nirit Hinkis from the Microsoft Threat Analysis Center. Sherrod, Bryan, and Nirit discuss Iranian influence operations, distinguishing between influence and information operations. The conversation covers examples of cyber-enabled influence operations, focusing on Iran's actions related to the 2020 ...

MSAB

YouTube video

MyDFIR

YouTube video

Open Threat Research

YouTube video

YouTube video

Paraben Corporation

YouTube video

Sandfly Security

YouTube video

YouTube video

YouTube video