I had the feeling to assist an "historic" moment. Last time I had this feeling was in eBPF related discussions at the early stage of this technology.
After #HW, let's dive into our #DFIR/TI session🥰:
- @tomchop will introduce you #OpenRelik a new collaborative IR invest portal 🚀
- @udgover & Matt Muir will introduce us to their e2e malwares process workflow using FLOSS ✊
- and we'll be able to learn & practice #MISP as analysts with @C00kie_two & @wr during their dedicated workshop 🛠️
🎟️GO & book your (free) seat: https://pretix.eu/passthesalt/2025/
📔program: https://cfp.pass-the-salt.org/pts2025/schedule/
📅July 1 to 3, 2025
📍Lille, FR
Relays appreciated 🙏
1️⃣ Enable ContainerCheckpoint gate in your cluster
2️⃣ Run CRI-O 1.25 and start with --enable-criu-support=true (containerd not supported yet)
3️⃣ curl -X POST "https://localhost:10250/checkpoint/namespace/podId/container"
More ⬇️
https://kubernetes.io/blog/2022/12/05/forensic-container-checkpointing-alpha/
Authors: Adrian Reber (Red Hat) Forensic container checkpointing is based on Checkpoint/Restore In Userspace (CRIU) and allows the creation of stateful copies of a running container without the container knowing that it is being checkpointed. The copy of the container can be analyzed and restored in a sandbox environment multiple times without the original container being aware of it. Forensic container checkpointing was introduced as an alpha feature in Kubernetes v1.
You can now officially send your cowrie logs to your Datadog instance!
My favourite conference is @botconf - I didn't miss a single edition, it's run by wonderful people and the talks are always very interesting. Their call for papers is open until Dec 10. Submit your research!
Call for papers for Botconf 2023, 10th edition of the Botnet and Malware Ecosystems Fighting Conference. Please read the following CFP carefully before submitting. Important dates 10th December 2022 – Deadline for conference paper and workshop submissions 15th January 2023 – Notification t
We just released a new open-source tool to identify malicious PyPI packages, using Semgrep rules and package metadata analysis!
Bonus: an analysis of malicious packages we found in the wild, and a corpus of 140+ at your disposal to play with.
Finding malicious PyPI packages through static code analysis: Meet GuardDog
Try it out and let me know what you think! https://github.com/datadog/guarddog/