本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。
PRESENTATIONS/PODCASTS
Adversary Universe Podcast
Download1.2KOrganizations fear adversaries will attack. Threat hunters assume adversaries are already in the system — and their investigations seek unusual behavior that may indicate malicious activity is afoot. Andrew Munchbach, CrowdStrike’s Global VP, Field Engineering, joins Adam and Cristian in this week’s episode to explore what threat hunting is, how it works, and what makes a good threat hunting program. As CrowdStrike’s “Chief Reddit Officer”, Andrew also shares how he came to run Crowd...
Black Hills Information Security
YouTube video
BlueMonkey 4n6
YouTube video
Cellebrite
YouTube video
YouTube video
YouTube video
YouTube video
Cyber Social Hub
YouTube video
YouTube video
YouTube video
YouTube video
YouTube video
Cyborg Security
Happy Hunting, Library Video April 25, 2024 Join our newsletter Email CommentsThis field is for validation purposes and should be left unchanged. Follow Us Twitter Linkedin Youtube PrevPreviousHappy Hunting: BlackCat Ransomware Discover More! Happy Hunting Happy Hunting: BlackCat Ransomware Read More » 25 April 2024 Happy Hunting Happy Hunting: Indrik Spider Read More » 25 April 2024 Upcoming Podcast Episode 16 Read More » 25 April 2024 TECHNICAL WALKTHROUGH SEE THE POWER OF THREAT HUNTING IN YO...
Happy Hunting, Library Video April 25, 2024 Join our newsletter Email CommentsThis field is for validation purposes and should be left unchanged. Follow Us Twitter Linkedin Youtube PrevPreviousHappy Hunting: Indrik Spider NextHappy Hunting: Volt TyphoonNext Discover More! Happy Hunting Happy Hunting: Volt Typhoon Read More » 25 April 2024 Happy Hunting Happy Hunting: Indrik Spider Read More » 25 April 2024 Upcoming Podcast Episode 16 Read More » 25 April 2024 TECHNICAL WALKTHROUGH SEE THE POWER ...
Happy Hunting, Library Video April 25, 2024 Join our newsletter Email PhoneThis field is for validation purposes and should be left unchanged. Follow Us Twitter Linkedin Youtube PrevPreviousEpisode 16 NextHappy Hunting: BlackCat RansomwareNext Discover More! Happy Hunting Happy Hunting: Volt Typhoon Read More » 25 April 2024 Happy Hunting Happy Hunting: BlackCat Ransomware Read More » 25 April 2024 Upcoming Podcast Episode 16 Read More » 25 April 2024 TECHNICAL WALKTHROUGH SEE THE POWER OF THREA...
Gerald Auger at Simply Cyber
YouTube video
Hardly Adequate
My Blog • Discord • Socials LinkedIn Twitter • Youtube • Podcasts Hardly Adequate Forensic Focus • CTF • Shop Meet the Team Desi currently works for Dragos and believes in the mission to protect civilisation. He is also a podcast host, educator, student, mentor, ctf player & designer. All his spare time is taken up by fitness, gaming, and of course his dogs. Moxie loves humans and will always take out your shins for a pat. She is on the fence about soft toys but is a firm believer that squeakers...
InfoSec_Bret
YouTube video
John Hammond
YouTube video
YouTube video
YouTube video
Microsoft Threat Intelligence Podcast
SubscribeApple PodcastsApple PodcastsSpotifyOvercastOvercastAmazon MusicRSSShow NotesTranscriptOn this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by former VP of Cybersecurity Solutions at Target Paul Melson. Sherrod and Paul reflect on his experiences in incident response, highlighting the adrenaline rush of detecting and evicting adversaries before they cause harm. Their discussion includes a run down the rabbit hole of open-source intelligence and ...
MSAB
YouTube video
YouTube video
MyDFIR
YouTube video
Off By One Security
YouTube video
Palo Alto Networks Unit 42
YouTube video
YouTube video
YouTube video
RickCenOT
YouTube video
SANS
YouTube video
Securizame
SentinelOne
LABScon / April 23, 2024 Adam Rawnsley has spent the past decade reporting in-depth on Iran’s UAV industry and paying particular attention to the IRGC drone company Mado and its CEO Yousef Aboutalebi. One day in 2021, a self-professed “hacktivist” popped into Adam’s direct messages, told him his “group” had noticed Adam had done the most work on Mado, and dumped videos and documents allegedly hacked from the company’s network and CEO. The material—painstakingly verified with the help of colleagu...