本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。
UPCOMING EVENTS
Archan Choudhury at BlackPerl
YouTube video
Belkasoft
Belkasoft team is happy to announce our fifth online DFIR conference. We invite you to share your expertise on digital forensics and incident response with your colleagues from all over the world. We welcome proposals from digital forensic experts, incident responders, students and examiners. Your presentation should focus on the current and challenging topics in the industry and should last about 15-20 minutes. The submission deadline is September 24, 2024. The conference starts on October 21. ...
Black Hills Information Security
YouTube video
Magnet Forensics
With both iOS and Android capturing amazing details on what applications are considered “In Focus” over time. These pattern of life artifacts are often highly sought after but can bring up a lot of additional questions. Can we tell what the user did inside that application? Can we tell how they got to that application and where they went next? In this Episode of Mobile Unpacked, we’ll break down the artifacts used to determine what applications are considered “In Focus” in iOS and Android and he...
Medex Forensics
Skip to Main Content Skip to Main Content Support English English Español Deutsch 简体中文 繁體中文 Français Português 日本語 Русский 한국어 Italiano Tiếng Việt Polski Türkçe Bahasa Indonesia Nederlands Svenska Copyright ©2024 Zoom Video Communications, Inc. All rights reserved. Privacy & Legal Policies Do Not Sell My Personal Information Cookie Preferences
Paraben Corporation
YouTube video
Recorded Future
Wednesday, August 28th, 1pm ET There are 1,000s of threat actors ranging from ransomware groups, initial access brokers, hacktivists, fraudsters and many more. Ensuring you have visibility into the threat actors showing an intent and capability to target your organization is essential for getting ahead of present and future threats. In this live demo Recorded Future experts will help you understand how Recorded Future can be used to provide a structured, repeatable method for identifying and pri...
Justin Vaicaro at TrustedSec
The Hunter’s Workshop: Mastering the Essentials of Threat Hunting August 22, 2024 The Hunter’s Workshop: Mastering the Essentials of Threat Hunting Written by Justin Vaicaro Threat Hunting As an incident unfolds, skilled threat hunters with a special talent for uncovering hidden threats stand at the ready. These hunters smoke jump into the chaos and meticulously sift through network logs and endpoint telemetry, hunting for elusive threat actors' digital fingerprints. With unwavering determinatio...