Memory forensics demo: SolarWinds breach and Sunburst malware | Cyber Work Podcast
Keatron Evans walks through how to conduct memory forensics around the Sunburst malware involved in the SolarWinds Orion supply chain breach. Follow along with this clip from his presentation on SolarWinds incident response and see if there are any indicators of compromise in your system.
– Watch the full episode: https://www.youtube.com/watch?v=5lc4HtmEYl4
– Learn cybersecurity with our FREE Cyber Work Applied training series: https://www.infosecinstitute.com/learn/
– View transcripts and additional episodes: https://www.infosecinstitute.com/podcast
Keatron Evans is regularly engaged in training, consulting, penetration testing and incident response for government, Fortune 50 and small businesses. In addition to being the lead author of the best selling book, Chained Exploits: Advanced Hacking Attacks from Start to Finish, you will see Keatron on major news outlets such as CNN, Fox News and others on a regular basis as a featured analyst concerning cybersecurity events and issues. For years, Keatron has worked regularly as both an employee and consultant for several intelligence community organizations on breaches and offensive cybersecurity and attack development. Keatron also provides world class training for the top training organizations in the industry, including Infosec Skills live boot camps and on-demand training.
About Infosec
Infosec believes knowledge is power when fighting cybercrime. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and privacy training to stay cyber-safe at work and home. It’s our mission to equip all organizations and individuals with the know-how and confidence to outsmart cybercrime. Learn more at infosecinstitute.com.
Видео Memory forensics demo: SolarWinds breach and Sunburst malware | Cyber Work Podcast канала Infosec
– Watch the full episode: https://www.youtube.com/watch?v=5lc4HtmEYl4
– Learn cybersecurity with our FREE Cyber Work Applied training series: https://www.infosecinstitute.com/learn/
– View transcripts and additional episodes: https://www.infosecinstitute.com/podcast
Keatron Evans is regularly engaged in training, consulting, penetration testing and incident response for government, Fortune 50 and small businesses. In addition to being the lead author of the best selling book, Chained Exploits: Advanced Hacking Attacks from Start to Finish, you will see Keatron on major news outlets such as CNN, Fox News and others on a regular basis as a featured analyst concerning cybersecurity events and issues. For years, Keatron has worked regularly as both an employee and consultant for several intelligence community organizations on breaches and offensive cybersecurity and attack development. Keatron also provides world class training for the top training organizations in the industry, including Infosec Skills live boot camps and on-demand training.
About Infosec
Infosec believes knowledge is power when fighting cybercrime. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and privacy training to stay cyber-safe at work and home. It’s our mission to equip all organizations and individuals with the know-how and confidence to outsmart cybercrime. Learn more at infosecinstitute.com.
Видео Memory forensics demo: SolarWinds breach and Sunburst malware | Cyber Work Podcast канала Infosec
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![What it takes to be a good Chief Technology Officer (CTO) | Cyber Work Podcast](https://i.ytimg.com/vi/UFNWOjh_pcU/default.jpg)
![Careers at Infosec | Join us in making the world more secure](https://i.ytimg.com/vi/Mmvy3YGbJ6s/default.jpg)
![How to carry out a watering hole attack | Free Cyber Work Applied series](https://i.ytimg.com/vi/JoPp4U5FowU/default.jpg)
![What skills are required to get hired on a security awareness team? | Cyber Work Podcast](https://i.ytimg.com/vi/7S3dQUv5E64/default.jpg)
![My best cybersecurity career advice: Debbie Reynolds | Cyber Work Podcast](https://i.ytimg.com/vi/wEJS1R46KN8/default.jpg)
![Upskilling to deepen employee engagement and retention | Infosec Inspire 2020](https://i.ytimg.com/vi/-ji5aLwXyGQ/default.jpg)
![How JPMorgan Chase uses the NICE Framework to build custom work roles | Cyber Work Podcast](https://i.ytimg.com/vi/kV5T1N_F5WY/default.jpg)
![How to improve cloud security | Cyber Work Podcast](https://i.ytimg.com/vi/fSMJbZWC16Q/default.jpg)
![Ethics in AI and machine learning | Cyber Work Podcast](https://i.ytimg.com/vi/RJZ0pxcZsSQ/default.jpg)
![Solidifying your company’s ransomware defenses | Cyber Work Podcast](https://i.ytimg.com/vi/23gB3bqSVbo/default.jpg)
![How to avoid fraud and identity theft | Cyber Work Podcast](https://i.ytimg.com/vi/bfHb7rXzKL4/default.jpg)
![The future of data storage | Cyber Work Podcast](https://i.ytimg.com/vi/SeisiGz3r1s/default.jpg)
![Showing cybersecurity aptitude without job experience | Cyber Work Podcast](https://i.ytimg.com/vi/1BRxn6GQOG4/default.jpg)
![Working as a privacy professional | Cyber Work Podcast](https://i.ytimg.com/vi/JkMoygtQ_wo/default.jpg)
![How to carry out a watering hole attack | New FREE training series — Cyber Work Applied](https://i.ytimg.com/vi/nNzUg_gW1tI/default.jpg)
![How to work in security awareness | Cyber Work Podcast](https://i.ytimg.com/vi/h71f_jKZTeo/default.jpg)
![How AI is being misused | Cyber Work Podcast](https://i.ytimg.com/vi/V1pLWhdffCs/default.jpg)
![Your Kubernetes security checklist | Cyber Work Podcast](https://i.ytimg.com/vi/Iyd7KzkGJbc/default.jpg)
![Inside the Pentagon's new zero-trust policy | Guest Steve Judd](https://i.ytimg.com/vi/jQxb6SmcDAo/default.jpg)
![How to conduct cross-industry collaboration in cybersecurity | Cyber Work Podcast](https://i.ytimg.com/vi/I-CYevdxSME/default.jpg)
![Secure coding is "worth its weight in gold" | Cyber Work Podcast | #shorts](https://i.ytimg.com/vi/FASdfHzg8mw/default.jpg)