解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 26 – 2024 - MISCELLANEOUS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

MISCELLANEOUS

Sergiy Pasyuta at Atola

Published by Sergiy Pasyuta on June 27, 2024 At last! The newest version of TaskForce firmware introduces an improved RAID module with support for Synology NAS systems, Btrfs, and LVM (Logical Volume Manager), along with other top-shelf features such as the ability to group ports in Express mode and assign different imaging settings for each group. Also, we’ve added built-in user hints and an offline help system to ease your learning curve and provide instant advice. Let’s take a closer look at ...

Forensic Focus

Magnet Forensics

When your word can make or break a case, your credibility is vital. Without a way to demonstrate your competence, it can be harder to defend your findings and present them with full confidence. Magnet Graykey users have traditionally been able to showcase their knowledge by becoming a Magnet Certified Graykey Examiner (MCGE). But for those using Graykey along with other solutions for analysis (and are not interested in taking the prerequisite courses), we’re pleased to offer a new qualification:...

Matt Linton

Michael Coppola

Jun 24, 2024 This piece refers to an incident involving Google TAG and Project Zero dating back to 2020 and 2021. At the time, these events stirred a small public debate primarily in favor of Google’s actions. However, in private these events were deeply unsettling to myself and a considerable number of colleagues in the security research community. After spending some time collecting my thoughts on the topic, I finally felt ready to share them publicly. The views and opinions expressed in this ...

Microsoft Security

Skip to main contentMicrosoftMicrosoft 365TeamsCopilotWindowsSurfaceXboxDealsSmall BusinessSupportMoreAll MicrosoftOfficeWindowsSurfaceXboxDealsSupportSoftwareWindows AppsOneDriveOutlookSkypeOneNoteMicrosoft TeamsMicrosoft EdgePCs & Devices ComputersShop XboxAccessoriesVR & mixed realityPhonesEntertainmentXbox Game Pass UltimateXbox Live GoldXbox gamesPC gamesWindows digital gamesMovies & TVBusinessMicrosoft AzureMicrosoft Dynamics 365Microsoft 365Microsoft IndustryData platformMicrosoft Adverti...

Salvation DATA

Crime Cases 2024-06-25 What is forensic investigation? People working in this field look for evidence in digital environments through organized research. Given how quickly things change in this field, those who want to do well must stay on top of the fast progress in digital forensics. The latest ideas and tactics for forensic detectives are given in this piece to help them do their jobs better. Understanding and implementing the latest tools and techniques, including essential dfir tools, is pi...

Yana Dudar at UnderDefense

Table of Contents Introduction About SOC team functions Key SOC team roles and responsibilities Best practices of SOC team organization Conclusion Introduction The escalating frequency and sophistication of cyberattacks have made it critical for organizations to build robust SOC teams. A well-structured SOC team acts as the first line of defense, continuously monitoring and responding to potential security incidents to minimize the impact of cyber attacks. As we reflect on our years of experienc...