|
James Ellis
@
Avecto_James
Manchester, England
|
|
Product Development Analyst @Avecto. All views expressed are my own. #InfoSec #CyberSecurity #PrivilegeManagement #PAM
|
|
|
39
Tweetovi
|
288
Pratim
|
78
Osobe koje vas prate
|
| Tweetovi |
| James Ellis proslijedio/la je tweet | ||
|
Richie Cyrus
@rrcyrus
|
9. kol 2018. |
|
Excited and honored to speak at the first ever Objective by the Sea conference among amazing speakers in the MacOS community!! 💻🔒 twitter.com/objective_see/…
|
||
|
|
||
| James Ellis proslijedio/la je tweet | ||
|
Matt Graeber
@mattifestation
|
10. kol 2018. |
|
Code, slides, and whitepaper for the "Subverting Sysmon: Application of a Formalized Security Product Evasion Methodology" talk @tifkin_ and I gave at #BHUSA. github.com/mattifestation…
|
||
|
|
||
| James Ellis proslijedio/la je tweet | ||
|
Alex Ionescu
@aionescu
|
6. kol 2018. |
|
Just in time for #BlackHat, I've released the Ring 0 Army Knife (r0ak) at github.com/ionescu007/r0ak. Full driver-less, built-in, Windows 8+ Ring 0 arbitrary read/write/execute debugging tool for HVCI/Secure Boot/WDAG environments where local debugging is often impossible to set up. pic.twitter.com/bPlSDBVoRr
|
||
|
|
||
| James Ellis proslijedio/la je tweet | ||
|
Matt Graeber
@mattifestation
|
31. srp 2018. |
|
Here's a sampling of behavioral signatures that I find to be interesting. Odds are there's at least one technique in this list that you use regularly. pic.twitter.com/Dmiv7waMsx
|
||
|
|
||
| James Ellis proslijedio/la je tweet | ||
|
Matt Graeber
@mattifestation
|
31. srp 2018. |
|
Knowledge of what AV signatures exist should be in your OPSEC playbook. The "behavior" signatures should be studied the most. This one-liner will group all Defender sigs by category.
(Get-MpThreatCatalog).ThreatName | Group { $_.Split(':')[0] } | Sort Count -Descending pic.twitter.com/OPPJVSXXKy
|
||
|
|
||
| James Ellis proslijedio/la je tweet | ||
|
securityfreax
@securityfreax
|
29. srp 2018. |
|
Useful hardening baseline script by Microsoft. If you are running Windows 10 you should really apply this.
Hardening Baseline for Windows 10 (1803) | microsoft.com/en-us/download…
|
||
|
|
||
| James Ellis proslijedio/la je tweet | ||
|
hasherezade
@hasherezade
|
29. srp 2018. |
|
Improved #PESieve (github.com/hasherezade/pe…) and #HollowsHunter with new features (github.com/hasherezade/ho…) available! pic.twitter.com/8AwRMcRegG
|
||
|
|
||
| James Ellis proslijedio/la je tweet | ||
|
Neil Hughes
@NeilCHughes
|
24. srp 2018. |
|
I chat with @MJ_Austin and Paul Kenyon from @Avecto who reveal that Co-CEOs can be successful in tech and why they both believe that the most successful leaders find their opposite and learn from them every day. techblogwriter.co.uk/avecto/ #PrivilegeManagement #PAM #Cybersecurity pic.twitter.com/4V8aLD7f1x
|
||
|
|
||
|
James Ellis
@Avecto_James
|
23. srp 2018. |
|
Really looking forward to this talk on Password Vaults from @PyroTek3 next month #BlackHat #Defcon twitter.com/pyrotek3/statu…
|
||
|
|
||
| James Ellis proslijedio/la je tweet | ||
|
Ian Pitfield
@P17FLD
|
20. srp 2018. |
|
Crying into Binance charts twitter.com/vgcerf/status/…
|
||
|
|
||
|
James Ellis
@Avecto_James
|
21. srp 2018. |
|
Domain Penetration Testing: Using #BloodHound, #Crackmapexec, & #Mimikatz to get Domain Admin hausec.com/2017/10/21/dom… via @Haus3c
|
||
|
|
||
|
James Ellis
@Avecto_James
|
21. srp 2018. |
|
|
||
|
|
||
| James Ellis proslijedio/la je tweet | ||
|
Boston ABCD
@BostonABCD
|
19. srp 2018. |
|
Thx @Avecto for the #generous gift of super cool #bikes & helmets for #Boston #kids who r in great need! #ChildhoodMemories in the making. #Getpumped Thx @bestcorpevents pic.twitter.com/oYAbQyyuXv
|
||
|
|
||
| James Ellis proslijedio/la je tweet | ||
|
Proofpoint
@proofpoint
|
19. srp 2018. |
|
TA505 Abusing SettingContent-ms within PDF files to Distribute FlawedAmmyy RA. ow.ly/ISqR30l2aKB via @threatinsight research team. pic.twitter.com/c482Xoss6p
|
||
|
|
||
|
James Ellis
@Avecto_James
|
19. srp 2018. |
|
Stealthy #Malware Hidden in Images Takes to GoogleUserContent: threatpost.com/stealthy-malwa… via @threatpost
|
||
|
|
||
|
James Ellis
@Avecto_James
|
19. srp 2018. |
|
Mining off the Land: #Cryptomining Enabled by Native Windows Tools redcanary.com/blog/cryptomin… via @redcanaryco
|
||
|
|
||
|
James Ellis
@Avecto_James
|
19. srp 2018. |
|
Nice #Powershell alternative to using #PsExec from @mkellerman to escalate to SYSTEM with a Scheduled Task on a local or remote computer github.com/mkellerman/Inv…
|
||
|
|
||
| James Ellis proslijedio/la je tweet | ||
|
Avecto
@Avecto
|
18. srp 2018. |
|
Companies must focus on being competitive in the areas they are strongest in to attract customers." - @AndyAvanessian discusses 11 Approaches Tech Firms Can Use To Stand Out in @Forbes bit.ly/2urWSTJ #technology #tech #forbes pic.twitter.com/0Rj7PbDb4u
|
||
|
|
||
| James Ellis proslijedio/la je tweet | ||
|
BOMGAR
@Bomgar
|
18. srp 2018. |
|
What are the signs of a breach? Are you catching them all? Or do you have a false sense of security when it comes to all things cyber within your organization? More insight in @ITSPmagazine: ow.ly/WCJV30l0Tg7. @sean_martin #cybersecurity
|
||
|
|
||
| James Ellis proslijedio/la je tweet | ||
|
Avecto
@Avecto
|
22. velj 2018. |
|
88% of all Critical vulnerabilities reported by Microsoft over the last five years could have been mitigated by removing admin rights
|
||
|
|
||