本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。
PRESENTATIONS/PODCASTS
Adversary Universe Podcast
Download856The days of automated cyberattacks are dwindling: last year CrowdStrike saw a 60% jump in interactive intrusions, a type of attack in which a human is on the other side, working to break in and navigating their target environment as soon as they gain access. Most (75% of) attacks in 2023 didn’t involve malware at all — in nearly all cases, the adversary relied on identity-related techniques or exploited an unmanaged device. The threat landscape is constantly evolving as adversaries ex...
Black Hat
YouTube video
YouTube video
Black Hills Information Security
YouTube video
YouTube video
BlueMonkey 4n6
YouTube video
Breaking Badness
Cellebrite
YouTube video
YouTube video
Cyber from the Frontlines
YouTube video
CYBERWOX
YouTube video
Desi at Hardly Adequate
YouTube video
Digital Forensic Survival Podcast
Hardly Adequate
My Blog • Discord • Socials LinkedIn Twitter • Youtube • Podcasts Hardly Adequate Forensic Focus • CTF • Shop Meet the Team Desi currently works for Dragos and believes in the mission to protect civilisation. He is also a podcast host, educator, student, mentor, ctf player & designer. All his spare time is taken up by fitness, gaming, and of course his dogs. Moxie loves humans and will always take out your shins for a pat. She is on the fence about soft toys but is a firm believer that squeakers...
InfoSec_Bret
YouTube video
Intel471
Feb 21, 2024 Starting a cyber threat intelligence program (CTI) prompts many questions: What intelligence is most useful? Where are the data sources? How can you satisfy stakeholders? And ultimately, how you demonstrate that a CTI program prevented security incidents? John Fokker, head of threat intelligence at Trellix, says that it is possible to build effective CTI programs with smaller teams, but stakeholder buy-in is important. In this episode of Studio 471, we also discuss the Cyber Threat ...
Jai Minton
- Is this MALWARE? Using static and dynamic MALWARE ANALYSIS to examine Agent Tesla from an AutoIT EXE
YouTube video
John Hammond
YouTube video
Karsten Hahn at Malware Analysis For Hedgehogs
YouTube video
Koen Van Impe
Posted on February 24, 2024 in open source, security Tweet Leave a reply I did a presentation on the MISP playbooks at Jupyterthon. Have a look at the recording at //www.youtube.com/watch?v=2lqbH1m9yKo&t=7193s Don’t hesitate to provide your feedback on the playbooks, or suggest extra additions with the GitHub issue tracker. Leave a Reply Cancel replyYour email address will not be published. Required fields are marked *Comment * Name * Email * Website Save my name, email, and website in this brow...
Lee Whitfield at MacAdemia
YouTube video
YouTube video
YouTube video
Magnet Forensics
Magnet RESPONSE lets investigators and non-technical users easily collect and preserve critical data relevant to incident response investigations from local endpoints. But what happens when you need to collect from dozens of endpoints? That’s where the CLI (Command Line Interface) functionality of Magnet RESPONSE and comes into play. Join Security Forensics Consultant, Doug Metz, to learn how to collect from dozens of endpoints with Magnet RESPONSE and PowerShell and collect just the artifacts y...
Digital forensics labs around the world are recognizing the benefits of automation, helping them to accelerate their investigations, improve investigation quality, and reduce burden on their staff. With Magnet AUTOMATE’s Essentials tier, you’ve now got a way to automate your workflows faster, easier, and more cost effectively than ever. Join Magnet Forensics’ Trey Amick, Brian Fitch, and Jonathan Evans for a walkthrough of AUTOMATE’s Essentials offering and see how you can get started automating...
Elisa Lippincott at ‘Microsoft Security Experts’
MSAB
YouTube video
YouTube video
MyDFIR
YouTube video
YouTube video
Paraben Corporation
YouTube video
Sandfly Security
YouTube video
SANS
YouTube video
The CyberWire
SubscribeApple PodcastsApple PodcastsSpotifyOvercastOvercastAmazon MusicRSSShow NotesOn this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Stella Aghakian and Holly Burmaster. They explore the intrigue of watching threat actors and their techniques and walk through these techniques and how they are educational and critical in threat intelligence work. They also discuss their experiences at Microsoft Ignite, insights into the cyber threat actor Octo Te...