- 50
- 39 679
Cyber Triage
United States
เข้าร่วมเมื่อ 14 ธ.ค. 2021
Cyber Triage digital forensics tool makes your investigations more efficient using automated scoring and recommendations. If you are a SOC analyst, CISO, consultant, or law enforcement officer, Cyber Triage will maximize the artifacts per second that you process and ensure you get the attackers out quickly.
Cyber Triage Team User Experience
This video shows how Cyber Triage Team helps your cyber incident response team investigate faster.
2 key features:
1. Collaborative workspace that improves teamwork and accelerates investigations.
2. Centralized architecture that speeds up collection, data processing, and information sharing.
Contact us today if you're interested in Team: www.cybertriage.com/contact/
2 key features:
1. Collaborative workspace that improves teamwork and accelerates investigations.
2. Centralized architecture that speeds up collection, data processing, and information sharing.
Contact us today if you're interested in Team: www.cybertriage.com/contact/
มุมมอง: 57
วีดีโอ
3.12 Cyber Triage Release Overview (Data Exfil, USBs, DFIR Validation, and more)
มุมมอง 1482 หลายเดือนก่อน
Cyber Triage 3.12 (Oct 2024) added data exfiltration detection, USB device detection, more easy validation, server-side processing of disk images, and many more things. This video is from the webinar that highlighted those features. Cyber Triage is an automated digital forensics (DFIR) platform that helps incident responders more quickly conduct investigations, including account takeover and ra...
Ingest Linux UAC DFIR Artifacts into Cyber Triage for Automated Forensic Analysis
มุมมอง 2355 หลายเดือนก่อน
This video shows you how to ingest the output of the UAC #DFIR collection tool from a Linux into Cyber Triage to collect critical #DFIR artifacts. This video is part of the Cyber Triage Basics course. Cyber Triage is an automated cyber investigation platform that makes investigations faster by ingesting data from multiple sources and using powerful analytics to highlight what data is relevant. ...
Ingest Memory Images into Cyber Triage for Automated Forensic Analysis Using Volatility 2
มุมมอง 905 หลายเดือนก่อน
This video shows you how to import memory images into Cyber Triage Collector to collect critical #DFIR artifacts. Cyber Triage uses Volatility 2 to parse memory images. This video is part of the Cyber Triage Basics course. Cyber Triage is an automated cyber investigation platform that makes investigations faster by ingesting data from multiple sources and using powerful analytics to highlight w...
Ingest Local Disks into Cyber Triage for Automated Forensic Analysis
มุมมอง 465 หลายเดือนก่อน
This video shows you how to ingest a local disk (such as E: Drive) to collect critical #DFIR artifacts. This scenario happens when you end up mounting a disk image as a local drive. This video is part of the Cyber Triage Basics course. Cyber Triage is an automated cyber investigation platform that makes investigations faster by ingesting data from multiple sources and using powerful analytics t...
Ingest KAPE DFIR Artifacts into Cyber Triage for Automated Forensic Analysis
มุมมอง 1685 หลายเดือนก่อน
This video shows you how to ingest KAPE data into Cyber Triage to investigate critical #DFIR artifacts. Cyber Triage can ingest data from multiple sources, including KAPE. This video is part of the Cyber Triage Basics course. Cyber Triage is an automated cyber investigation platform that makes investigations faster by ingesting data from multiple sources and using powerful analytics to highligh...
Ingest Logical Files Into Cyber Triage to Investigate #DFIR Artifacts
มุมมอง 305 หลายเดือนก่อน
This video shows you how to import a logical file set (i.e. a folder of files) into Cyber Triage Collector so that you can extract and focus on critical #DFIR artifacts. This video is part of the Cyber Triage Basics course. Cyber Triage is an automated cyber investigation platform that makes investigations faster by ingesting data from multiple sources and using powerful analytics to highlight ...
Ingest Disk Images Into Cyber Triage to Identify Critical DFIR Artifacts
มุมมอง 735 หลายเดือนก่อน
This video shows you how to import disk images into Cyber Triage to investigate cyber intrusions. This process focuses on critical #DFIR artifacts. This video is part of the Cyber Triage Basics course. Cyber Triage is an automated cyber investigation platform that makes investigations faster by ingesting data from multiple sources and using powerful analytics to highlight what data is relevant....
Collect DFIR Artifacts Using Cyber Triage Collector to Send to a Server and Manually Launch
มุมมอง 965 หลายเดือนก่อน
This video shows you how to use the Cyber Triage Collector to collect critical #DFIR artifacts and send them to a server. This is part of the Cyber Triage Basics course. The Cyber Triage Collector is a powerful and adaptive DFIR collection tool that saves critical artifacts that are important for a digital forensic investigation. There are many ways to run the Cyber Triage Collector and this vi...
Collect DFIR Artifacts Using PsExec and the Cyber Triage Collector
มุมมอง 1735 หลายเดือนก่อน
This video shows you how to deploy the Cyber Triage Collector to a live host using PsExec. The #DFIR artifacts will be sent back to a waiting Cyber Triage server. This is part of the Cyber Triage Basics course. The Cyber Triage Collector is a powerful and adaptive DFIR collection tool that saves critical artifacts that are important for a digital forensic investigation. There are many ways to r...
Collect DFIR Artifacts To a File Using Cyber Triage CLI Collector
มุมมอง 1285 หลายเดือนก่อน
This video shows you how to use the command line version of Cyber Triage Collector to collect critical #DFIR artifacts and save them to a file. This is part of the Cyber Triage Basics course. The Cyber Triage Collector is a powerful and adaptive DFIR collection tool that saves critical artifacts that are important for a digital forensic investigation. There are many ways to run the Cyber Triage...
Collect DFIR Artifacts To a File Using Cyber Triage GUI Collector
มุมมอง 1565 หลายเดือนก่อน
This video shows you how to use the GUI version of Cyber Triage Collector to collect critical #DFIR artifacts and save them to a file. This is part of the Cyber Triage Basics course. The Cyber Triage Collector is a powerful and adaptive DFIR collection tool that saves critical artifacts that are important for a digital forensic investigation. There are many ways to run the Cyber Triage Collecto...
Cyber Triage 3 11 Release Highlights
มุมมอง 845 หลายเดือนก่อน
Our release webinar that focused on new Cyber Triage #DFIR features in 3.11. A big theme of this release was disk images and this video covers BitLocker, VHDX, new file explorer view, and expanded access to more files. Watch to see these new features in action. www.cybertriage.com/blog/new-features/access-more-bitlocker-new-file-explorer-and-export-all-files-3-11-release/ #digitalforensics #DFI...
Backdoor Digital Forensics - Detecting Remote Access to Suspect's Computer - Trojan Defense
มุมมอง 1217 หลายเดือนก่อน
This video shows you how to look for three types of remote access into a computer: * Malicious Remote Access Tools (RATS) * Commercial Remote Management Software * Windows Authentications Cyber Triage can quickly look for these with no user interaction so that you can easily determine if the evidence is most likely from a local user. Detecting remote access is important to ensure: * Someone did...
Cyber Triage 3.10 Release Webinar
มุมมอง 1757 หลายเดือนก่อน
We’re super excited to announce the massive 3.10 release and all of its new features, including: • Analyzing Linux systems • Analyzing domain controllers for account take over • Fuzzy malware scanning with ImpHash • Labels and an Excel Report Read more here: www.cybertriage.com/blog/releases/3-10-adds-linux-domain-controllers-and-fuzzy-malware-scanning-for-dfir/ #CyberTriage #DIFR #IncidentResp...
Alternative Ways to Detect Mimikatz by Balazs Bucsay
มุมมอง 435ปีที่แล้ว
Alternative Ways to Detect Mimikatz by Balazs Bucsay
The Crisis Management Stack or Why You Get Told to do Stupid Things During a Response by Kall Loper
มุมมอง 117ปีที่แล้ว
The Crisis Management Stack or Why You Get Told to do Stupid Things During a Response by Kall Loper
Ransomware vs Other Breaches: Similarities & Key Differences by Devin Hill
มุมมอง 132ปีที่แล้ว
Ransomware vs Other Breaches: Similarities & Key Differences by Devin Hill
Successful DFIR From Preparation and Monitoring by Dennis Allen
มุมมอง 198ปีที่แล้ว
Successful DFIR From Preparation and Monitoring by Dennis Allen
Tracking Ransomware Operator Lateral Movement and Recovering Deleted Files by Ryan Chapman
มุมมอง 881ปีที่แล้ว
Tracking Ransomware Operator Lateral Movement and Recovering Deleted Files by Ryan Chapman
Host-Based Ransomware Indicators by Dan Iannotti
มุมมอง 159ปีที่แล้ว
Host-Based Ransomware Indicators by Dan Iannotti
When Ransomware Attacks a School District, You Get Detention by Dennis Labossiere
มุมมอง 3982 ปีที่แล้ว
When Ransomware Attacks a School District, You Get Detention by Dennis Labossiere
How Law Enforcement Gets Involved With Ransomware Cases. Panel with FBI, USSS, and Portland Police.
มุมมอง 1532 ปีที่แล้ว
How Law Enforcement Gets Involved With Ransomware Cases. Panel with FBI, USSS, and Portland Police.
Malware Forensics for Uncommon Payloads: LNK Files and the Ransomware Ecosystem by Joseph Edwards
มุมมอง 4172 ปีที่แล้ว
Malware Forensics for Uncommon Payloads: LNK Files and the Ransomware Ecosystem by Joseph Edwards
Lovely tools for incident response
Not usefull without malware checking that is offered in free 7 days version
Sir i am a computer engineering student and i want to get into DFIR field. I am working really hard for it.....learning all the basics.....artifacts, networking, and all other basics related to DFIR......can i become a DFIR engineer even though i don't have a professional a proper forensics degree for it??.....Please guide me
great walk through and very clear path through the compromise and what to look for if you have the miss fortune to need to do this after a compromise
Nice talk Harlan. Really liked the collaborative and engaging conversation.
Following this presentation, I learned that BITS jobs can be run against UNC paths, so the discussion about the web server and BITS modules is irrelevant. The comments about the BITS jobs was not part of the planned presentation, and were based off of comments from Brian's presentation from just prior to my presentation.
promosm ✔️
how can I consult you MR carreir ? I need your help in something related to data recovery
would this software help in retrieving old deleted emails from macbook drive
Cyber Triage does not work with IOS at the moment.