本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。
PRESENTATIONS/PODCASTS
Adversary Universe Podcast
Download1.2KToday’s conversation explores a common question around adversary activity: Why does attribution matter? When a cyberattack hits, why go to the trouble of learning who is behind it? Each attempt at an intrusion can reveal a lot about an adversary — who they are, what they’re doing and what their motivations may be. This information can not only inform your response to an attack but how you strengthen your security architecture against future attacks. In this episode, Adam and Cristian...
Alexis Brignoni
YouTube video
Anuj Soni
YouTube video
Black Hat
YouTube video
YouTube video
YouTube video
Black Hills Information Security
YouTube video
Breaking Badness
Cellebrite
YouTube video
Cyber Social Hub
YouTube video
YouTube video
Hardly Adequate
My Blog • Discord • Socials LinkedIn Twitter • Youtube • Podcasts Hardly Adequate Forensic Focus • CTF • Shop Meet the Team Desi currently works for Dragos and believes in the mission to protect civilisation. He is also a podcast host, educator, student, mentor, ctf player & designer. All his spare time is taken up by fitness, gaming, and of course his dogs. Moxie loves humans and will always take out your shins for a pat. She is on the fence about soft toys but is a firm believer that squeakers...
Huntress
YouTube video
InfoSec_Bret
YouTube video
Jai Minton
YouTube video
John Hammond
YouTube video
YouTube video
JPCERT/CC
中村 恭脩(kyosuke Nakamura) April 11, 2024 JSAC2024 -Workshop & Lightning talk- JSAC Email We continue to introduce the talks at JSAC2024. This third issue covers workshops and lightning talks. Workshop Introduction to Investigation of Unauthorised Access to Cloud Speakers: Hayate Hazuru and Takahiro Yamamoto (ITOCHU Cyber & Intelligence Inc.), Norihide Saito (Flatt Security Inc.), Daisuke Miyashita (Sterra Security Co.,Ltd.) Hayate, Takahiro, Norihide, and Daisuke explained how the cloud works and ...
亀井 智矢 April 11, 2024 JSAC2024 -Day 2- JSAC Email This second blog post features the Main Track talks on the Day 2 of JSAC. XFiles: Large-Scale Analysis of Malicious MSIX/APPX Speakers: Kazuya Nomura, Teruki Yoshikawa, Masaya Motoda (NTT Security Japan) Slides (Japanese) The speakers discussed Microsoft’s new packaged files, MSIX and APPX, which have been exploited in recent years in attack campaigns. They explained the points to focus on when analyzing the structure, operation mechanisms, and ch...
LaurieWired
YouTube video
Magnet Forensics
YouTube video
YouTube video
YouTube video
YouTube video
The use of Mac computers for business applications continues to grow steadily, now up to 23% of computers according to IDC*. However, recent security updates from Apple have introduced challenges in data collection from Mac endpoints. Join us for an exciting webinar, co-presented with Jamf, where we’ll address the unique needs of digital forensic examiners who need to investigate Mac endpoints. Dean Carlson, Senior Product Manager at Magnet Forensics, and Alec Quinn, Systems Engineer – Developer...
Mostafa Yahia
YouTube video
MSAB
YouTube video
YouTube video
YouTube video
YouTube video
MyDFIR
YouTube video
Off By One Security
YouTube video
YouTube video
Palo Alto Networks Unit 42
YouTube video
Prodaft
YouTube video
YouTube video
Sandfly Security
YouTube video
SANS
YouTube video
SANS Cyber Defense
YouTube video
The Cyber Mentor
YouTube video
The Defender’s Advantage Podcast
The DFIR Report podcast
DFIR Discussions: From OneNote to RansomNote: An Ice Cold Intrusion - Part 1ReportsApr 09, 2024Share00:0025:51DFIR Discussions: From OneNote to RansomNote: An Ice Cold Intrusion - Part 1We discuss our latest report From OneNote to RansomNote: An Ice Cold Intrusion Host: @Kostastsale Analysts: @iiamaleks, @IrishD34TH, & @Miixxedup Special Guest: @techspence Report: //thedfirreport.com/2024/04/01/from-onenote-to-ransomnote-an-ice-cold-intrusion/ Contact Us: //thedfirreport.com/contact/ Servi...