"SANS Threat Hunting and Incident Response Summit 2019 Call for Speakers - Deadline 5/6"

“SANS Threat Hunting and Incident Response Summit 2019 Call for Speakers – Deadline 5/6”

|
Summit Dates: September 30 & October 1, 2019 Call for Presentations Closes on Monday, May 6, 2019 at 5 p.m. CST Submit your presentation here The Threat Hunting & Incident Response Summit will focus on specific hunting and incident response technique and capabilities that can be used to identify, contain, ... Read More
Getting Started with the SIFT Workstation Webcast with Rob Lee

“Investigate and fight cyberattacks with SIFT Workstation”

|
  Digital forensics and incident response (DFIR) has hit a tipping point. No longer just for law enforcement solving cybercrimes, DFIR tools and practices are a necessary component of any organization's cybersecurity. After all, attacks are increasing daily and getting more sophisticated - exposing millions of people's personal data, hijacking ... Read More
"Gamble? Not with your future"

“Gamble? Not with your future”

|
  By Lee Whitfield Honestly, I've never been big into gambling. The closest I've come is buying a lottery ticket when I was 18. While I understand the excitement, the science, and compulsion, it has just never been a huge draw for me personally. There are many things that fall ... Read More
"Go Big with Bootcamp for Advanced Memory Forensics and Threat Detection"

“Go Big with Bootcamp for Advanced Memory Forensics and Threat Detection”

|
  Sometimes, to tackle tough challenges or overcome particularly obstinate obstacles, you've got to go big. No run-of-the-mill efforts or ordinary endeavors will do. It's time for determined, extraordinary work. It's time for bootcamp. And that's exactly what SANS is offering with its relaunch ofFOR526 Advanced Memory Forensics and Threat ... Read More
"DFIR Summit 2019 Call for Presentations (CFP) Now Open"

“DFIR Summit 2019 Call for Presentations (CFP) Now Open”

|
    The 2019 DFIR Summit CFP is now open through 5 pm CST on Monday, March 4th. The 12th annual SANS Digital Forensics & Incident Response (DFIR) Summit is the most comprehensive DFIR event of the year, bringing together an influential group of experts, immersion-style training, and industry networking ... Read More
Smartphone Forensics Investigations: Using HashCat to Crack an Encrypted iTunes Backup

“SANS FOR585 Q&A: Smartphone Forensics – Questions answered”

|
    Learning doesn't stop when you leave the SANS classroom. Instructors Domenica "Lee" Crognale, Heather Mahalik and Terrance Maguire answer some of the most common questions from FOR585 Smartphone Forensics course students in these short videos: 1) Using Hashcat to Crack an Encrypted iTunes Backup:Acquiring a locked iOS can ... Read More
"The new version of SOF-ELK is here. Download, turn on, and get going on forensics analysis."

“The new version of SOF-ELK is here. Download, turn on, and get going on forensics analysis.”

|
  We are excited to announce the release of an all-new version of the free SOF-ELK®, or Security Operation and Forensics ELK virtual machine. Now based on the new version of the Elastic Stack, SOF-ELK is a complete rebuild that is faster and more effortless than its predecessors, making forensic ... Read More
Shortcuts for Understanding Malicious Scripts

“Shortcuts for Understanding Malicious Scripts”

|
You are being exposed to malicious scripts in one form or another every day, whether it be in email, malicious documents, or malicious websites. Many malicious scripts at first glance appear to be impossible to understand. However, with a few tips and some simple utility scripts, you can deobfuscate them ... Read More
"How to build an Android application testing toolbox"

“How to build an Android application testing toolbox”

|
Mobile devices hold a trove a data that could be crucial to criminal cases, and they also can play a key role in accident reconstructions, IP theft investigations and more. It's not just investigators who care about examining a mobile device - so do those interested in application research and ... Read More
"Tune in: How to build an Android application testing toolbox"

“Tune in: How to build an Android application testing toolbox”

|
Mobile devices hold a trove a data that could be crucial to criminal cases, and they also can play a key role in accident reconstructions, IP theft investigations and more. It's not just investigators who care about examining a mobile device - so do those interested in application research and ... Read More