Gesamtlänge aller Episoden: 4 days 5 hours 19 minutes
podcast's link to fyyd.de
podcast's link to fyyd.de (short)
redirect to podcast's page (short)
Embed code for the latest episode (iframe)
This week is about how size up a reported vulnerability quickly.
episode's link to fyyd.de
episode's link to fyyd.de (short)
redirect to episode's page (short)
Embed code (iframe)
This week I tackle .NET. It is an ecosystem that is associated with malicious Powershell activity.
This week I revisited powershell from a process fast triage context.
This week is about the top threats to cloud computing.
This week I continue with the fast triage method for processes with a focus on historical records.
This week I cover threat modeling from a DFIR point-of-view. It provides a standard framework to classify and rate the severity of vulnerabilities discovered during investigations.
This week I run through a threat intel resource you may use for standardized attack information.
This week I revisit Svchost and the triage methods to apply.
This week is a case study that demonstrates the power behind IR fundamental methodology.