本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。
PRESENTATIONS/PODCASTS
Adversary Universe Podcast
Download1KThe rise of hacktivism — the use of hacking techniques to make a statement supporting a political or social cause — is often associated with the Occupy Wall Street movement and the Anonymous hacktivist collective. But the practice of hacking as a form of civil disobedience goes back to the 1990s. It has taken many forms in the years since, driven by a wide range of hacktivists around the world. In this episode, Adam and Cristian trace the history of hacktivism to its early days, dive i...
Black Hills Information Security
YouTube video
Cellebrite
YouTube video
Cloud Security Podcast by Google
Guest: Elie Bursztein, Google DeepMind Cybersecurity Research Lead, Google Topics: Artificial Intelligence 29:29 Subscribe at Spotify.Subscribe at Apple Podcasts.Subscribe at YouTube Topics covered: Given your experience, how afraid or nervous are you about the use of GenAI by the criminals (PoisonGPT, WormGPT and such)?What can a top-tier state-sponsored threat actor do better with LLM? Are there “extra scary” examples, real or hypothetical?Do we really have to care about this “dangerous capabi...
Cyber from the Frontlines
YouTube video
Cyberwox
YouTube video
Erik Hjelmvik at Netresec
In this video I take a look at a cryptojacking attack against a Kubernetes honeypot. The attackers were surprisingly quick to discover this unsecured Kubernetes deployment and use it to mine Monero for them. The analyzed capture files can be downloaded from//share.netresec.com/s/S5ZG2cDKB9AbqwS?path=%2Fk3s-443 This PCAP dataset was created by Noah Spahn, Nils Hanke, Thorsten Holz, Chris Kruegel, and Giovanni Vigna as part of their research for their Container Orchestration Honeypot: Observing At...
Gridware
YouTube video
Huntress
YouTube video
InfoSec_Bret
YouTube video
Jai Minton
YouTube video
John Hammond
YouTube video
Justin Tolman at AccessData
YouTube video
YouTube video
YouTube video
Magnet Forensics
Remote acquisition can be challenging whether it is because of the remote host goes offline or if the available bandwidth is limited. Tagging cyber incidents by “incident type” and creating acquisition profiles based on those categories can help DFIR/SOC analysts to get required artifacts quickly and efficiently. Even better, automating the process of the remote acquisition in the corporate environment can help you get those needed artifacts before they are deleted, or the host became unavailabl...
iOS introduced the Shortcuts function to help automate device tasks and make our lives easier. With the iPhone 15 Pro Series, they even gave us a hardware option to utilize them. However, with this ability came some interesting anti-forensic theories for those working with the mobile devices. In this Mobile Unpacked episode we will explore the function of iOS (and macOS) Shortcuts and their forensic implications. We’ll also demystify what they can and CANNOT do for us. Examiners everywhere shoul...
Microsoft Threat Intelligence Podcast
SubscribeApple PodcastsApple PodcastsSpotifyOvercastOvercastAmazon MusicRSSShow NotesOn this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Thomas Roccia and Andres Freund. Andres stumbled upon a security issue within SSH while investigating performance discrepancies. He discovered a sophisticated backdoor, skillfully concealed within the LZMA library, part of the XZ package. Sherrod, Thomas, and Andres discuss the importance of proactive security meas...
MSAB
YouTube video
MyDFIR
YouTube video
YouTube video
OALabs
YouTube video
Off By One Security
YouTube video
Securizame
SentinelOne
LABScon / May 8, 2024 In this unique talk, Proofpoint’s Greg Lesnewich takes us on a tour of recent North Korean APTs targeting macOS devices and offers researchers new techniques for hunting this increasingly active cluster through similarity analysis of Mach-O binaries and linked dynamic libraries. While many state-aligned threats have dipped their toes into macOS Malware, North Korea has invested serious time and effort into compromising Apple’s desktop operating system. Its operations in mac...