As always, thanks to those who give a little back for their support!
FORENSIC ANALYSIS
- Akash Patel
- Cyber 5W
Guide to Mobile Forensics with ALEAPP - David Cowen at the ‘Hacking Exposed Computer Forensics’ blog
- Dr. Tristan Jenkinson at ‘The eDiscovery Channel’
Bellingcat Challenge – Week 4 Writeup - Oleg Afonin at Elcomsoft
Extraction Agent and Firewall: Software vs. Hardware - Forensafe
Investigating Android Wickr - Iram Jack
- Lionel Notari
watchOS Unified Logs – Introduction and Calls - M4shl3
The Challenge of Tracking SSH Connections Without System Logs - Oleg Skulkin at ‘Know Your Adversary’
- The DFIR Journal
File Carving: Encrypted Virtual Hard Disks
THREAT INTELLIGENCE/HUNTING
- Adam at Hexacorn
- Brad Duncan at Malware Traffic Analysis
2025-01-04: Four days of scans and probes and web traffic hitting my web server - Jeffrey at CatchingPhish
Yet Another Ransomware Assessment for 2025 - Tiffany Bergeron at Center for Threat-Informed Defense
Stacked Defense from the Hardware Up - CERT-AGID
Sintesi riepilogativa delle campagne malevole nella settimana del 28 dicembre – 3 gennaio - Check Point
- CTF导航
- Vasilis Orlof at Cyber Intelligence Insights
- Danny Zendejas
The Breaches of 2024 - Darktrace
- Detect FYI
- Disconinja
日本におけるC2サーバ調査(Week 52 2024) - Dzianis Skliar
- Flashpoint
United States Charges Dual Russian and Israeli National as Developer of LockBit Ransomware Group - Chris Hall at Fortinet
Catching “EC2 Grouper”- no indicators required! - Huntress
- Sunny Singh Verma at InfoSec Write-ups
Threat Hunting With YARA — Motion Graphics Writeup TryHackMe || Detailed Walkthrough || SuNnY - Intrinsec
CryptBot: Hunting for initial access vector - Kijo Girardi
Day 19 – Threat actor, discovery techniques - KQL Query
KQL Sources – 2025 Update - Brian Krebs at Krebs on Security
U.S. Army Soldier Arrested in AT&T, Verizon Extortions - Michalis Michalos
Automate IP enrichment in Microsoft Sentinel incidents with IP Quality Score (IPQS) - Nimantha Deshappriya
RATs on the island - Yongzhe Huang, Yang Ji, Wenjun Hu, Jay Chen, Akshata Rao and Danny Tsechansky at Palo Alto Networks
Bad Likert Judge: A Novel Multi-Turn Technique to Jailbreak LLMs by Misusing Their Evaluation Capability - Pulsedive
2024 In Review - SANS Internet Storm Center
- Sansec
Google services abused in skimming campaigns - SentinelOne
12 Months of Fighting Cybercrime & Defending Enterprises | SentinelLABS 2024 Review - Simone Kraus
- Socket
- SOCRadar
- US Department of State
Sanctioning PRC Cyber Company Involved in Malicious Botnet Operations - Valdin
Tycoon 2FA: Analyzing and Hunting Phishing-as-a-Service Domains
UPCOMING EVENTS
- Cellebrite
- Cyber 5W
Join Webinar #5: Scheduled Tasks and GhostTask Investigations - Cyber Triage
Cyber Triage 3.13 Release Highlights - Dr Josh Stroschein
Building Your Cyber Career with Gerald Auger - Gerald Auger at Simply Cyber
You’re Doing DFIR All Wrong!
PRESENTATIONS/PODCASTS
- Alexis Brignoni
Digital Forensics Now Podcast – S2 E7 - Cellebrite
Tip Tuesday: Troubleshooting Help in PA - Cyberwox
North Korean Hackers Are Your Next Coworkers: Shadow IT Workers & Insider Threats - InfoSec_Bret
No normal content this weekend, but check out The Instrusion Report… - John Hubbard at ‘The Blueprint podcast’
Success Simplified – The 3 Step Process for Hitting Your Career Goals in 2025 with John Hubbard - Karsten Hahn at Malware Analysis For Hedgehogs
Antivirus myths and how AVs actually work - MyDFIR
- Oxygen Forensics
- Sandfly Security
- SANS
Breaking Barriers with Helen Rabe - SANS Cloud Security
HANDS-ON WORKSHOP | Cloud Security Forensics & Incident Response: Aviata Chapter 9 - Lesley Carhart
A Fun Chat With Patrick Miller
MALWARE
- 0xdf hacks stuff
- 2024 SANS Holiday Hack Challenge: Snow-maggedon
- Holiday Hack 2024: Prologue
- Holiday Hack 2024: Elf Minder 9000
- Holiday Hack 2024: Elf Connect
- Holiday Hack 2024: Mobile Analysis
- Holiday Hack 2024: Act II
- Holiday Hack 2024: Hardware Hacking 101
- Holiday Hack 2024: Frosty Keypad
- Holiday Hack 2024: cURLing
- Holiday Hack 2024: Act I
- Dr Josh Stroschein
09 – Preventing Debugging by using SystemFunction40 (RtlEncryptMemory) on DbgUIRemoteBreakIn - Eli Salem
Green with Evil: Analyzing the new Lockbit 4 Green - KanakSasak at InfoSec Write-ups
Shellcode Analysis - Md. Abdullah Al Mamun
APT38 Attacks A CEO by MacOS Malware - Practical Security Analytics
Building a RuntimeInstaller Payload Pipeline to Evade AV Detection - Tony Lambert
Exploring VenomRAT Metadata and Encryption with YARA – #100DaysOfYara - TRAC Labs
Advancing Through the Cyberfront, LegionLoader Commander - Zhassulan Zhussupov
Malware and cryptography 38 – Encrypt/decrypt payload via Camellia cipher. S-box analyses examples. Simple C example.
MISCELLANEOUS
- Jessica Hyde at Hexordia
An Enormous Thank You to the Hexordia Team for an Incredible 2024! - Blu Raven Academy
Mastering Log Ingestion Delay in Detection Engineering - Brian Maloney
- Christopher Eng at Ogmini
- Fabian Mendoza at DFIR Dominican
DFIR Jobs Update – 12/30/24 - Dr. Neal Krawetz at ‘The Hacker Factor Blog’
Another Year Down - Forensic Focus
Embracing Change: Innovations In Digital Forensics You Need To Know - Kevin Pagano at Stark 4N6
Forensics StartMe Updates (1/1/2025) - Patrick Siewert at ‘The Philosophy of DFIR’
What Is “The Philosophy of DF/IR”? - ForwardingPlane
Building a host telemetry solution using Tailscale - Thomas Roccia at SecurityBreak
2024 Personal Rewind: What a Year!!
SOFTWARE UPDATES
- Digital Sleuth
winfor-salt v2025.0.1 - FalconForce
FalconHound v1.4.2 - Hasherezade
tiny_tracer 2.9.5 - IntelOwl
v6.2.0 - Oxygen Forensics
Oxygen Forensic® Detective 17.1 Release - Phil Harvey
ExifTool 13.11 - Serviço de Perícias em Informática
IPED Minor Release - Three Planet Software
Apple Cloud Notes Parser v0.22.1 - Xways
X-Ways Forensics 21.4 Preview 5
And that’s all for the week! If you think I’ve missed something, or want me to cover something specifically hit me up through the contact page or on the social pipes!