解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 15 – 2024 - PRESENTATIONS/PODCASTS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

PRESENTATIONS/PODCASTS

Adversary Universe Podcast

Download1.2KToday’s conversation explores a common question around adversary activity: Why does attribution matter? When a cyberattack hits, why go to the trouble of learning who is behind it? Each attempt at an intrusion can reveal a lot about an adversary — who they are, what they’re doing and what their motivations may be. This information can not only inform your response to an attack but how you strengthen your security architecture against future attacks. In this episode, Adam and Cristian...

Alexis Brignoni

YouTube video

Anuj Soni

YouTube video

Black Hat

YouTube video

YouTube video

YouTube video

Black Hills Information Security

YouTube video

Breaking Badness

Cellebrite

YouTube video

Cyber Social Hub

YouTube video

YouTube video

Hardly Adequate

My Blog • Discord • Socials LinkedIn TwitterYoutube • Podcasts Hardly Adequate Forensic Focus • CTF • Shop Meet the Team Desi currently works for Dragos and believes in the mission to protect civilisation. He is also a podcast host, educator, student, mentor, ctf player & designer. All his spare time is taken up by fitness, gaming, and of course his dogs. Moxie loves humans and will always take out your shins for a pat. She is on the fence about soft toys but is a firm believer that squeakers...

Huntress

YouTube video

InfoSec_Bret

YouTube video

Jai Minton

YouTube video

John Hammond

YouTube video

YouTube video

JPCERT/CC

中村 恭脩(kyosuke Nakamura) April 11, 2024 JSAC2024 -Workshop & Lightning talk- JSAC Email We continue to introduce the talks at JSAC2024. This third issue covers workshops and lightning talks. Workshop Introduction to Investigation of Unauthorised Access to Cloud Speakers: Hayate Hazuru and Takahiro Yamamoto (ITOCHU Cyber & Intelligence Inc.), Norihide Saito (Flatt Security Inc.), Daisuke Miyashita (Sterra Security Co.,Ltd.) Hayate, Takahiro, Norihide, and Daisuke explained how the cloud works and ...

亀井 智矢 April 11, 2024 JSAC2024 -Day 2- JSAC Email This second blog post features the Main Track talks on the Day 2 of JSAC. XFiles: Large-Scale Analysis of Malicious MSIX/APPX Speakers: Kazuya Nomura, Teruki Yoshikawa, Masaya Motoda (NTT Security Japan) Slides (Japanese) The speakers discussed Microsoft’s new packaged files, MSIX and APPX, which have been exploited in recent years in attack campaigns. They explained the points to focus on when analyzing the structure, operation mechanisms, and ch...

LaurieWired

YouTube video

Magnet Forensics

YouTube video

YouTube video

YouTube video

YouTube video

The use of Mac computers for business applications continues to grow steadily, now up to 23% of computers according to IDC*. However, recent security updates from Apple have introduced challenges in data collection from Mac endpoints. Join us for an exciting webinar, co-presented with Jamf, where we’ll address the unique needs of digital forensic examiners who need to investigate Mac endpoints. Dean Carlson, Senior Product Manager at Magnet Forensics, and Alec Quinn, Systems Engineer – Developer...

Mostafa Yahia

YouTube video

MSAB

YouTube video

YouTube video

YouTube video

YouTube video

MyDFIR

YouTube video

Off By One Security

YouTube video

YouTube video

Palo Alto Networks Unit 42

YouTube video

Prodaft

YouTube video

YouTube video

Sandfly Security

YouTube video

SANS

YouTube video

SANS Cyber Defense

YouTube video

The Cyber Mentor

YouTube video

The Defender’s Advantage Podcast

The DFIR Report podcast

DFIR Discussions: From OneNote to RansomNote: An Ice Cold Intrusion - Part 1ReportsApr 09, 2024Share00:0025:51DFIR Discussions: From OneNote to RansomNote: An Ice Cold Intrusion - Part 1We discuss our latest report From OneNote to RansomNote: An Ice Cold Intrusion Host: ⁠@Kostastsale⁠ Analysts: ⁠@iiamaleks, @IrishD34TH, & @Miixxedup Special Guest: @techspence Report: ⁠//thedfirreport.com/2024/04/01/from-onenote-to-ransomnote-an-ice-cold-intrusion/ Contact Us: ⁠//thedfirreport.com/contact/⁠ Servi...