解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 08 – 2024 - PRESENTATIONS/PODCASTS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

PRESENTATIONS/PODCASTS

Adversary Universe Podcast

Download856The days of automated cyberattacks are dwindling: last year CrowdStrike saw a 60% jump in interactive intrusions, a type of attack in which a human is on the other side, working to break in and navigating their target environment as soon as they gain access. Most (75% of) attacks in 2023 didn’t involve malware at all — in nearly all cases, the adversary relied on identity-related techniques or exploited an unmanaged device. The threat landscape is constantly evolving as adversaries ex...

Black Hat

YouTube video

YouTube video

Black Hills Information Security

YouTube video

YouTube video

BlueMonkey 4n6

YouTube video

Breaking Badness

Cellebrite

YouTube video

YouTube video

Cyber from the Frontlines

YouTube video

CYBERWOX

YouTube video

Desi at Hardly Adequate

YouTube video

Digital Forensic Survival Podcast

Hardly Adequate

My Blog • Discord • Socials LinkedIn TwitterYoutube • Podcasts Hardly Adequate Forensic Focus • CTF • Shop Meet the Team Desi currently works for Dragos and believes in the mission to protect civilisation. He is also a podcast host, educator, student, mentor, ctf player & designer. All his spare time is taken up by fitness, gaming, and of course his dogs. Moxie loves humans and will always take out your shins for a pat. She is on the fence about soft toys but is a firm believer that squeakers...

InfoSec_Bret

YouTube video

Intel471

Feb 21, 2024 Starting a cyber threat intelligence program (CTI) prompts many questions: What intelligence is most useful? Where are the data sources? How can you satisfy stakeholders? And ultimately, how you demonstrate that a CTI program prevented security incidents? John Fokker, head of threat intelligence at Trellix, says that it is possible to build effective CTI programs with smaller teams, but stakeholder buy-in is important. In this episode of Studio 471, we also discuss the Cyber Threat ...

Jai Minton

YouTube video

John Hammond

YouTube video

Karsten Hahn at Malware Analysis For Hedgehogs

YouTube video

Koen Van Impe

Posted on February 24, 2024 in open source, security Tweet Leave a reply I did a presentation on the MISP playbooks at Jupyterthon. Have a look at the recording at //www.youtube.com/watch?v=2lqbH1m9yKo&t=7193s Don’t hesitate to provide your feedback on the playbooks, or suggest extra additions with the GitHub issue tracker. Leave a Reply Cancel replyYour email address will not be published. Required fields are marked *Comment * Name * Email * Website Save my name, email, and website in this brow...

Lee Whitfield at MacAdemia

YouTube video

YouTube video

YouTube video

Magnet Forensics

Magnet RESPONSE lets investigators and non-technical users easily collect and preserve critical data relevant to incident response investigations from local endpoints. But what happens when you need to collect from dozens of endpoints? That’s where the CLI (Command Line Interface) functionality of Magnet RESPONSE and comes into play. Join Security Forensics Consultant, Doug Metz, to learn how to collect from dozens of endpoints with Magnet RESPONSE and PowerShell and collect just the artifacts y...

Digital forensics labs around the world are recognizing the benefits of automation, helping them to accelerate their investigations, improve investigation quality, and reduce burden on their staff. With Magnet AUTOMATE’s Essentials tier, you’ve now got a way to automate your workflows faster, easier, and more cost effectively than ever. Join Magnet Forensics’ Trey Amick, Brian Fitch, and Jonathan Evans for a walkthrough of AUTOMATE’s Essentials offering and see how you can get started automating...

Elisa Lippincott at ‘Microsoft Security Experts’

MSAB

YouTube video

YouTube video

MyDFIR

YouTube video

YouTube video

Paraben Corporation

YouTube video

Sandfly Security

YouTube video

SANS

YouTube video

The CyberWire

SubscribeApple PodcastsApple PodcastsSpotifyOvercastOvercastAmazon MusicRSSShow NotesOn this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Stella Aghakian and Holly Burmaster. They explore the intrigue of watching threat actors and their techniques and walk through these techniques and how they are educational and critical in threat intelligence work. They also discuss their experiences at Microsoft Ignite, insights into the cyber threat actor Octo Te...