Browsing the "free computer forensics" Tag

Securing Your Future in DFIR

May 1st, 2020 📆 | 5666 Views ⚑

One of the most popular questions posed in the field of DFIR is, “how do I get into the field?”

Tagged with:

Jupyter Notebooks and Pre-recorded Datasets for Threat Hunting – SANS THIR Summit 2019

February 27th, 2020 📆 | 5756 Views ⚑

How many times have you thought about a more efficient, intuitive, or creative way to analyze the security events your

Tagged with:

My “Aha!” Moment – Methods, Tips, & Lessons Learned in Threat Hunting – SANS THIR Summit 2019

February 26th, 2020 📆 | 8584 Views ⚑

This presentation is designed as a personal journey through threat hunting to inspire others to embrace certain methods, tips, and

Tagged with:

From Tool Building to Scalable Automation – SANS DFIR Summit 2019 Keynote

February 10th, 2020 📆 | 6112 Views ⚑

There are many reasons to write forensics tools, from making it open source, to being free from a vendor for

Tagged with:

Cyber Threat Intelligence Summit 2020

November 7th, 2019 📆 | 8158 Views ⚑

2020 CTI Summit: Summit: January 20-21 | Courses: January 22-27 The Cyber Threat Intelligence Summit & Training brings together

Tagged with:

Distributed Evidence Collection and Analysis with Velociraptor – SANS DFIR Summit 2019

October 7th, 2019 📆 | 3185 Views ⚑

Distributed Evidence Collection and Analysis with Velociraptor: Fast, Surgical, at Scale…and Free! Having the ability to rapidly collect and examine

Tagged with:

Introduction to Arsenal Image Mounter

August 27th, 2019 📆 | 3771 Views ⚑

As a continuation of the 13Cubed “Introduction to Windows Forensics” series, this episode covers a powerful image mounting tool called

Tagged with:

Schroedinger’s Backslash: Tracking the Chinese APT Goblin Panda with RTF Metadata – SANS CTI Summit

July 23rd, 2019 📆 | 2633 Views ⚑

The APT Group Goblin Panda (aka, Conimes and China 1937CN Team) is an active threat to government and diplomatic organizations

Tagged with:

How to Get Promoted: Developing Metrics to Show How Threat Intel Works – SANS CTI Summit 2019

July 16th, 2019 📆 | 4784 Views ⚑

Many organizations have operationalized threat intelligence as part of a well-rounded security program, but we often struggle to show the

Tagged with:

Threat Hunting & Incident Response Summit & Training 2019 – Sneak Peek

June 7th, 2019 📆 | 4179 Views ⚑

Will you be the hunter or the prey? — Learn how to become an elite threat hunter. The two-day Summit

Tagged with:

Privacy vs. Security: It’s a Log Story – SANS CTI 2019 Keynote

May 30th, 2019 📆 | 4162 Views ⚑

Privacy and security are often lumped together as one subject with similar objectives. But as many security professionals know, these

Tagged with:

Analytic Tradecraft in the Real World – SANS CTI Summit 2019

May 23rd, 2019 📆 | 8361 Views ⚑

Cyber threat intelligence is built on a traditional intelligence framework. Often, information security focuses on scientific concepts that entail a

Tagged with:

Language and Culture in Threat Intelligence – SANS CTI Summit 2019

May 9th, 2019 📆 | 6015 Views ⚑

Language serves as the required medium for every form of communication, whether it be via email, a phone call, or

Tagged with:

Meet Me in the Middle: Threat Indications and Warning in Principle & Practice – SANS CTI Summit 2019

May 2nd, 2019 📆 | 4061 Views ⚑

Discussions on threat intelligence often get bogged down between “machine speed” ingestion of atomic indicators and in-depth analysis of activity

Tagged with:

Unsolved Mysteries – Revisiting the APT Cold Case Files – SANS CTI Summit 2019

April 25th, 2019 📆 | 8030 Views ⚑

No matter how fascinating the advanced persistent threats (APTs) we discover, we often find that there’s never enough time for

Tagged with:

Lean Hunting – SANS Threat Hunting Summit 2018

February 27th, 2019 📆 | 3823 Views ⚑

(Threat) Hunting has been around long enough that most agree it should be part of any comprehensive information security program.

Tagged with:

Leveraging Data Science to Discover Persistent Threats – SANS Threat Hunting Summit 2018

February 6th, 2019 📆 | 4156 Views ⚑

Viewing the Nodes in the Noise: Leveraging Data Science to Discover Persistent Threats CenturyLink has been working on three algorithms

Tagged with:

Quantify Your Hunt: Not Your Parents’ Red Team – SANS Threat Hunting Summit 2018

January 16th, 2019 📆 | 8263 Views ⚑

The security marketplace is saturated with product claims of detection coverage that have been almost impossible to evaluate, all while

Tagged with: