解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 12 – 2024 - MISCELLANEOUS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

MISCELLANEOUS

Fabian Mendoza at AboutDFIR

AboutDFIR Site Content Update – 03/22/2024 By Fabian MendozaOn March 22, 2024March 21, 2024 Jobs – old entries cleaned up, new entries added – Arete, CrowdStrike, Kivu Consulting, Kroll, Mandiant (now part of Google Cloud), Palo Alto Networks Unit 42, Salesforce, Surefire Cyber, Trustwave Tools & Artifacts – Android – new entry added – WhatsApp – Android WhatsApp Forensics. Part II: Analysis Tools & Artifacts – File Systems – new entry added – NTFSNTFS Artifacts Tools & Artifacts – iOS – new ...

Brett Shavers

Cellebrite

Craig Ball at ‘Ball in your Court’

  • F1TYM1 Pingback: Week 12 – 2024 – This Week In 4n6 Leave a comment Cancel reply Δ Follow Ball in your Court on WordPress.com E-mail me the posts! Enter your email address to subscribe to this blog and receive notifications of new posts by email. Email Address: Sign me up! Join 4,944 other subscribers Recent Posts ESI Protocols: How Do I Get Out of a Bad Deal? March 19, 2024 Lessons from Lousy Lexical Search (and Tips to Do Better) February 26, 2024 Surviving a Registration Bomb Attack February...

Dragos

Karl Scheuerman Share This LinkedIn Twitter Facebook Email RSS Welcome to “The Hunt,” a blog series focused on the critical role of threat hunting within operational technology (OT) environments. These environments are vital to our critical infrastructure, requiring not just defensive measures but proactive strategies to identify and mitigate cyber threats before they negatively impact operations. Throughout this series, we will explore the complexities of OT cybersecurity, dissect the character...

Elan at DFIR Diva

Posted on March 22, 2024 by DFIR Diva Events 0 I’m happy to be partnering with Wicked6 for their upcoming Conference and Cyber Games on March 29-30, 2024! This is a 24-hour virtual global conference and cyber games event for women. The registration fee is $35. To get $5 off registration, use code: ROBIN This event benefits the Women’s Society of Cyberjutsu, a non-profit focused on empowering women to succeed in the cybersecurity industry. They host several events and training opportunities throu...

Forensic Focus

HackTheBox

JOIN NOW Hacker 13 min read A step-by-step guide to writing incident response reports (free template inside) Discover how to write an incident response report, including an incident reporting template, and a step-by-step reporting process for analysts. sebh24, Mar 22 2024 Table of Contents What is an incident response report? Incident response report template (+ example) Sample incident report template 👇 Why are incident response reports important? Incident identification and categorization Inci...

Magnet Forensics

Hi, all! This is Jessica Hyde, and I am so excited to share the winners from the Magnet Virtual Summit 2024 Capture The Flag event, along with the challenges, community write-ups, and the next challenge. The Magnet Virtual Summit 2024 CTF was another exciting competition! We had over 1350 people register for the CTF and 491 folks solved at least one question. We’re happy to announce the winners: First place: Madi Brumbelow Second Place: Allan Third Place: Robert Greavu Figure 1: Scoreboard showi...

Oxygen Forensics

. To import, locate the Warrant return section under Import on our Home page, and then select the service. Supported Warrant Returns Below you will find more information on the supported Warrant Returns. Facebook and Instagram Warrant Returns might include: Account information Account information List of contacts Messages Screenshots Snapchat Warrant Returns might include: Information about the user account Login history Private chats, including sent and received media Group chats, including sen...

SentinelOne

March 20, 2024 by Drea London Petter PDF Experiencing a breach? Call us immediately at 1-855-868-3733. If you would like to discuss your organization’s security posture, contact us here and our team will be in touch shortly. Data breaches have been all over the news lately. Understanding how to prevent them—and what to do when they happen—is essential to every organization’s operational success. A well-prepared enterprise has an incident response plan (IRP) ready to deploy in the event of a brea...