解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 08 – 2024 - MISCELLANEOUS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

MISCELLANEOUS

Fabian Mendoza at AboutDFIR

AboutDFIR Site Content Update – 02/23/2024 By Fabian MendozaOn February 23, 2024February 23, 2024 Jobs – old entries cleaned up, new entries added – Arete, Contact Discovery Services LLC, Huntress, Mandiant (now part of Google Cloud), Palo Alto Networks Unit 42, Surefire Cyber, Thames Valley Police, UCLA Health Tools & Artifacts – AWS – new entry added – AWS Incident Response – How to be IR Prepared in AWS Tools & Artifacts – Google Cloud – new entry added – Google Cloud Incident Response – Goog...

Amped

Blake Sawyer February 20, 2024 Reading time: 3 min When picking the right subscription, having a guide can really help meet your budget. Discover which subscription is right for you and learn more about the licenses and the differences between our common subscription options. Hey Everyone! Back in September 2023, we announced that a new type of subscription was being added to our tools. Since then, we have been working hard to ensure that Amped Replay, DVRConv, FIVE, Authenticate, and even Amped...

Peter Sosic February 22, 2024 Reading time: 3 min We’re releasing the Amped FIVE Spanish video tutorials to support our Spanish-speaking followers and users to improve your investigative skills with Amped FIVE. Read on below to find out more about this insightful new series. We are thrilled to announce the launch of the Amped FIVE Spanish video tutorials. The first tutorial, focusing on Perspective Stabilization and Super Resolution filters, is available on our YouTube channel. Contents 1 Perspe...

Binary Defense

Cado Security

Oleg Afonin at Elcomsoft

February 20th, 2024 by Oleg AfoninCategory: «General» In the latest update, Elcomsoft Distributed Password Recovery introduced a new feature that allows managing the available computational resources. The new resource management capability allows administrators to manage and distribute the available computational resources across multiple jobs. The feature enables users to tap into a pool of available resources by requesting a certain number of recovery agents. The reserved recovery agents will ...

Forensic Focus

Magnet Forensics

Sadly, one of the common investigation types that forensic teams get the call to investigate is Child Sexual Abuse Material (CSAM). The latest development in Magnet OUTRIDER equips your team with the tools they need to identify newly created CSAM that has yet to be reported and hashed. The Challenge of First Gen CSAM The rapid development of media capturing, storage, and sharing technology has also increased criminals’ ability to create and distribute CSAM. Several organizations, like Child Resc...

Namit Ranjan

Salvation DATA

Knowledge 2024-02-19 Content Intro Magnet Forensics Tools Analysis User Reviews and Ratings Alternatives and Competitors Recent Developments and News Conclusion Content Intro Magnet Forensics Tools Analysis User Reviews and Ratings Alternatives and Competitors Recent Developments and News Conclusion Intro In the rapidly evolving landscape of digital forensics, a field where technology meets investigative work to uncover digital evidence, Magnet Forensics stands out as a pivotal player. This real...

Knowledge 2024-02-20 Content Introduction Step 1. Preliminary Documentation Step 2. Case Overview Step 3. Objectives Step 4. Evidence Collection Step 5. Forensic Analysis Step 6. Findings Step 7. Conclusion Step 8. Recommendations Content Introduction Step 1. Preliminary Documentation Step 2. Case Overview Step 3. Objectives Step 4. Evidence Collection Step 5. Forensic Analysis Step 6. Findings Step 7. Conclusion Step 8. Recommendations Introduction In the realm of digital security, DFIR (Digita...

Knowledge 2024-02-22 Content Introduction Intelligence Integration in Digital Forensics Tools and Practices for Digital Forensics Digital Forensics Process Conclusion Content Introduction Intelligence Integration in Digital Forensics Tools and Practices for Digital Forensics Digital Forensics Process Conclusion Introduction In the evolving landscape of digital forensics, intelligence solutions stand at the forefront, offering groundbreaking approaches to combat and analyze cyber threats. These s...

SANS

A Tale of the Three ishings: Part 1 – What is Phishing? Lance Spitzner A Tale of the Three ishings: Part 1 – What is Phishing? Phishing has been and will continue to be one of the primary attack methods used by cyber attackers today. February 20, 2024 For the past twenty years, those of us in the cybersecurity industry have focused on how to use technology to secure technology, and we are getting pretty good at it. Unfortunately, organizations have ignored the human factor and cyber attack...

Industrial Control Systems Offensive Operations By Skill Levels New to Cyber Essentials Advanced Expert Training Formats OnDemand In-Person Live Online Free Course Demos Training Roadmaps Skills Roadmap Focus Area Job Roles Cyber Defense Job Roles Offensive Operations Job Roles DFIR Job Roles Cloud Job Roles ICS Job Roles Leadership Job Roles NICE Framework Security Provisionals Operate and Maintain Oversee and Govern Protect and Defend Analyze Collect and Operate Investigate Industrial Control ...

homepage Open menu Contact Sales Go one level top Train and Certify Free Course Demos Free course demos allow you to see course content, watch world-class instructors in action, and evaluate course difficulty. Train and Certify Immediately apply the skills and techniques learned in SANS courses, ranges, and summits Learn More Overview Courses Overview Full Course List By Focus Areas Cloud Security Cyber Defense Cybersecurity and IT Essentials Cybersecurity Leadership DFIR Industrial Control Syst...