解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 09 – 2024 - PRESENTATIONS/PODCASTS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

PRESENTATIONS/PODCASTS

Alexis Brignoni

YouTube video

Anuj Soni

YouTube video

Black Hat

YouTube video

Black Hills Information Security

Initial Access Operations Part 1: The Windows Endpoint Defense Technology Landscape Initial Access Operations Part 2: Offensive DevOps Back to top Black Hills Information Security 890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447) © 2008-2023 About Us | BHIS Tribe of Companies | Privacy Policy | Contact Links Search the site

YouTube video

YouTube video

BlueMonkey 4n6

YouTube video

Breaking Badness

Cellebrite

YouTube video

CYBERWOX

YouTube video

Digital Forensic Survival Podcast

Hacker Valley Blue

YouTube video

Hardly Adequate

My Blog • Discord • Socials LinkedIn TwitterYoutube • Podcasts Hardly Adequate Forensic Focus • CTF • Shop Meet the Team Desi currently works for Dragos and believes in the mission to protect civilisation. He is also a podcast host, educator, student, mentor, ctf player & designer. All his spare time is taken up by fitness, gaming, and of course his dogs. Moxie loves humans and will always take out your shins for a pat. She is on the fence about soft toys but is a firm believer that squeakers...

Hasherezade

YouTube video

InfoSec_Bret

YouTube video

John Hammond

YouTube video

YouTube video

YouTube video

Lee Whitfield at MacAdemia

YouTube video

YouTube video

YouTube video

Magnet Forensics

YouTube video

YouTube video

YouTube video

YouTube video

Microsoft Threat Intelligence Podcast

SubscribeApple PodcastsApple PodcastsSpotifyOvercastOvercastAmazon MusicRSSShow NotesOn this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Stella Aghakian and Holly Burmaster. They explore the intrigue of watching threat actors and their techniques and walk through these techniques and how they are educational and critical in threat intelligence work. They also discuss their experiences at Microsoft Ignite, insights into the cyber threat actor Octo Te...

Mostafa Yahia

YouTube video

MSAB

YouTube video

MyDFIR

YouTube video

YouTube video

Paraben Corporation

YouTube video

YouTube video

Richard Davis at 13Cubed

YouTube video

SalvationData

YouTube video

Sandfly Security

YouTube video

SANS

YouTube video

YouTube video