解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 19 – 2024 - PRESENTATIONS/PODCASTS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

PRESENTATIONS/PODCASTS

Adversary Universe Podcast

Download1KThe rise of hacktivism — the use of hacking techniques to make a statement supporting a political or social cause — is often associated with the Occupy Wall Street movement and the Anonymous hacktivist collective. But the practice of hacking as a form of civil disobedience goes back to the 1990s. It has taken many forms in the years since, driven by a wide range of hacktivists around the world. In this episode, Adam and Cristian trace the history of hacktivism to its early days, dive i...

Black Hills Information Security

YouTube video

Cellebrite

YouTube video

Cloud Security Podcast by Google

Guest: Elie Bursztein, Google DeepMind Cybersecurity Research Lead, Google Topics: Artificial Intelligence 29:29 Subscribe at Spotify.Subscribe at Apple Podcasts.Subscribe at YouTube Topics covered: Given your experience, how afraid or nervous are you about the use of GenAI by the criminals (PoisonGPT, WormGPT and such)?What can a top-tier state-sponsored threat actor do better with LLM? Are there “extra scary” examples, real or hypothetical?Do we really have to care about this “dangerous capabi...

Cyber from the Frontlines

YouTube video

Cyberwox

YouTube video

Erik Hjelmvik at Netresec

In this video I take a look at a cryptojacking attack against a Kubernetes honeypot. The attackers were surprisingly quick to discover this unsecured Kubernetes deployment and use it to mine Monero for them. The analyzed capture files can be downloaded from//share.netresec.com/s/S5ZG2cDKB9AbqwS?path=%2Fk3s-443 This PCAP dataset was created by Noah Spahn, Nils Hanke, Thorsten Holz, Chris Kruegel, and Giovanni Vigna as part of their research for their Container Orchestration Honeypot: Observing At...

Gridware

YouTube video

Huntress

YouTube video

InfoSec_Bret

YouTube video

Jai Minton

YouTube video

John Hammond

YouTube video

Justin Tolman at AccessData

YouTube video

YouTube video

YouTube video

Magnet Forensics

Remote acquisition can be challenging whether it is because of the remote host goes offline or if the available bandwidth is limited. Tagging cyber incidents by “incident type” and creating acquisition profiles based on those categories can help DFIR/SOC analysts to get required artifacts quickly and efficiently. Even better, automating the process of the remote acquisition in the corporate environment can help you get those needed artifacts before they are deleted, or the host became unavailabl...

iOS introduced the Shortcuts function to help automate device tasks and make our lives easier. With the iPhone 15 Pro Series, they even gave us a hardware option to utilize them. However, with this ability came some interesting anti-forensic theories for those working with the mobile devices. In this Mobile Unpacked episode we will explore the function of iOS (and macOS) Shortcuts and their forensic implications. We’ll also demystify what they can and CANNOT do for us. Examiners everywhere shoul...

Microsoft Threat Intelligence Podcast

SubscribeApple PodcastsApple PodcastsSpotifyOvercastOvercastAmazon MusicRSSShow NotesOn this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Thomas Roccia and Andres Freund. Andres stumbled upon a security issue within SSH while investigating performance discrepancies. He discovered a sophisticated backdoor, skillfully concealed within the LZMA library, part of the XZ package. Sherrod, Thomas, and Andres discuss the importance of proactive security meas...

MSAB

YouTube video

MyDFIR

YouTube video

YouTube video

OALabs

YouTube video

Off By One Security

YouTube video

Securizame

SentinelOne

LABScon / May 8, 2024 In this unique talk, Proofpoint’s Greg Lesnewich takes us on a tour of recent North Korean APTs targeting macOS devices and offers researchers new techniques for hunting this increasingly active cluster through similarity analysis of Mach-O binaries and linked dynamic libraries. While many state-aligned threats have dipped their toes into macOS Malware, North Korea has invested serious time and effort into compromising Apple’s desktop operating system. Its operations in mac...