解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 15 – 2024 - UPCOMING EVENTS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

UPCOMING EVENTS

Black Hills Information Security

YouTube video

Cado Securtiy

Fireside Chat: Navigating the Cloud - Expert Insights on Emerging Cloud Threats and Complexities April 23, 2024 - 12:00PM ET / 5:00PM GMT Join James Campbell, Co-Founder and CEO of Cado Security, and Robert Wallace, Senior Director at Mandiant, for a fireside chat to delve into the evolution of cloud threats and the unique challenges posed by cloud environments when investigating and responding. In this webinar, James and Robert will discuss: The current state of cloud threats and their impact o...

KPMG

Each code contributor (internal or external) should be treated as a potential insider threat. Recently, a malicious backdoor was discovered in a widely used open-source utility called xz Utils. This compression tool is nearly ubiquitous in the Linux ecosystem, providing lossless data compression on various Unix-like operating systems. The backdoor was introduced in versions 5.6.0 and 5.6.1 of xz Utils. Although there are no known reports of these versions being incorporated into production relea...

Magnet Forensics

The Magnet Forensics Grant Assistance Program can bolster your agency’s digital forensic capabilities. Our team provides comprehensive grant writing and research support, helping US law enforcement agencies navigate the complex process of securing funding. In this session, we’ll guide you through identifying suitable grants, crafting compelling narratives, and formulating plans for data collection and performance measurements. You’ll benefit from professionals with extensive experience in both l...

Insider threats continue to pose a major risk to organizations. Organizations spent an average of $15.38 million in 2021 to deal with insider threats — up 34% from the $11.45 million in 2020. The number of insider incidents has increased by a staggering 44.3% in a single year, from 2020 to 2021. Data theft is the leading insider threat activity. Forty-two percent of insider threat events involved intellectual property (IP) or data theft. Digital forensic examiners inevitably are needed for insid...

Permiso

Learn the TTPs of This Threat Group In the Cloud and On-Premises Understand LUCR-3 (AKA Scattered Spider, UNC3944, Roasted Oktapus) and how they are infiltrating cloud environments of some of the largest Fortune 1000 enterprises in the world. In this threat briefing, Ian Ahl, SVP of P0 Labs, and Johnny Collins, Managing Director at KPMG, will walk through many of the Scattered Spider's TTPs in the cloud and in on prem environments. You'll also learn: How LUCR-3 executes extortion campaigns via d...

RecordedFuture

Thursday, April 18th, 10am ET / 3pm GMT On February 19, 2024, notorious ransomware group LockBit was disrupted by law enforcement. The disruption has thrown the ransomware landscape into disarray. Numerous ransomware groups have carried out high-profile attacks and grappled to fill the void. Meanwhile LockBit has announced their recovery and resumed their operations less than a week after being shut down. Coming off the heels of a disastrous 2023, where ransomware payments ballooned to $1.1 Bill...

Tim Conway at SANS

Tim Conway The Quest to Summit | SANS ICS Security Summit 2024 Register for the ICS Security Summit to be able to participate in The Quest to Summit and win big prizes. April 9, 2024 Embark on "The Quest to Summit," an enthralling scavenger hunt designed to challenge your skills and knowledge in the ICS cybersecurity realm. This unique adventure for ICS Security Summit registrants is composed of 5 distinct quests, each presenting a series of questions that participants must solve to advance. The...