Twitter | Pretraživanje | |
Termella 🦟
Team Member at Deloitte AR šŸ––
551
Tweetovi
365
Pratim
614
Osobe koje vas prate
Tweetovi
Termella 🦟 proslijedio/la je tweet
Olaf Hartong 17 h
I’m super happy to see all great research and meticulous work of ⁦⁩, the DarkDocumentor, out in the public. This is a amazing resource for everyone using or planning to use
Reply Retweet Označi sa "sviđa mi se"
Termella 🦟 proslijedio/la je tweet
Selena 18 h
great paper by on the limits of malware analysis in threat intel "while malware analysis offers significant benefits for generating threat intelligence ...malware analysis on its own imposes certain limitations on contextuality and purpose"
Reply Retweet Označi sa "sviđa mi se"
Termella 🦟 5. velj
Reply Retweet Označi sa "sviđa mi se"
Termella 🦟 proslijedio/la je tweet
ekoparty 4. velj
šŸ“¢ SUPER NOVEDAD: La va a durar ””CUATRO DƍAS!! 🚨🚨 MiĆ©rcoles a SƁBADO, porque nos lo merecemos como comunidad. Se vienen cosas muy buenas, esto es solo el comienzo šŸ‘ŠšŸ¼ . BREAKING NEWS: will last FOUR DAYS 🚨🚨 Great things are coming, this is just the beginning šŸ‘ŠšŸ¼
Reply Retweet Označi sa "sviđa mi se"
Termella 🦟 proslijedio/la je tweet
Elliot Alderson 3. velj
You have to live dangerously: don’t do your search on Google, do it on the Google search of the NSA šŸ˜…šŸ¤ŖšŸ¤”
Reply Retweet Označi sa "sviđa mi se"
Termella 🦟 proslijedio/la je tweet
Mark Simos 2. velj
Need a Reference Architecture? Check out this one showing how technology enables this strategy/access model. Slide 14 of CISO Workshop Module 3
Reply Retweet Označi sa "sviđa mi se"
Termella 🦟 proslijedio/la je tweet
@mikko 3. velj
1/ Practically every startup ends up writing code, even if technology wouldn't be the main focus of the company. Here’s a checklist I made to help you and your hot new startup avoid the most common infosec pitfalls. [thread]
Reply Retweet Označi sa "sviđa mi se"
Termella 🦟 proslijedio/la je tweet
Roberto Rodriguez 31. sij
Has anyone (boss, client, student, etc) ever asked you in what Windows event log can you find a process, IP address, InterfaceUuid, etc? Very helpful to identify providers that you might need to start collecting data from. is using online interactive
Reply Retweet Označi sa "sviđa mi se"
Termella 🦟 proslijedio/la je tweet
_Veronica_ 30. sij
My coworker just shared the best thing: Oh Shit, Git!?!
Reply Retweet Označi sa "sviđa mi se"
Termella 🦟 29. sij
šŸ“¢ ā€¼ļøā€¼ļø If you are considering to assit to a BlackHat trainning this year, you cannot miss this one by & šŸ‘‡šŸ»
Reply Retweet Označi sa "sviđa mi se"
Termella 🦟 proslijedio/la je tweet
Christopher Glyer 28. sij
We've all received emails with no attachment and assume it's "safe" to open in a mail client (as long as we don't explicitly click on any URLs). Right? Not so much...
Reply Retweet Označi sa "sviđa mi se"
Termella 🦟 proslijedio/la je tweet
Red Canary 28. sij
From the folks that brought you Atomic Red Team, Chain Reactor is a new open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.
Reply Retweet Označi sa "sviđa mi se"
Termella 🦟 proslijedio/la je tweet
• Aye • 27. sij
Our talk "Catch me if you can! Detecting Sandbox Evasion Techniques" at presented by ✨ Be smarter than adversaries and make your Sandbox Systems stronger šŸ’Ŗ
Reply Retweet Označi sa "sviđa mi se"
Termella 🦟 proslijedio/la je tweet
ailĆ­n 27. sij
"This is why the need of defining the Environment Awareness technique,which defines all methods and maneuvers malware use in order to detect a Sandboxing Environment,a VM or the presence of Forensic Tools based on the characteristics of the environment"
Reply Retweet Označi sa "sviđa mi se"
Termella 🦟 proslijedio/la je tweet
ailĆ­n 27. sij
"During the research of Enviromnet Awareness we were able to define 5 different categories and the categories within each one that can range in a wide spectrum of complexity" - @
Reply Retweet Označi sa "sviđa mi se"
Termella 🦟 proslijedio/la je tweet
Threat Library Team 27. sij
Reply Retweet Označi sa "sviđa mi se"
Termella 🦟 proslijedio/la je tweet
Kenn White 27. sij
In the current arms race with malware, adversaries are only getting smarter. is briefing on the myriad anti-forensic evasion techniques and system fingerprinting, including "Was this machine just booted up?"
Reply Retweet Označi sa "sviđa mi se"
Termella 🦟 proslijedio/la je tweet
Ben Adida 27. sij
First afternoon session , starting with talking about sandbox evasion detection.
Reply Retweet Označi sa "sviđa mi se"
Termella 🦟 proslijedio/la je tweet
Daniela Seabra Oliveira 27. sij
⁦⁩ coming all the way from Argentina šŸ‡¦šŸ‡· talks about sandbox evasion techniques ⁦⁩
Reply Retweet Označi sa "sviđa mi se"
Termella 🦟 proslijedio/la je tweet
ailĆ­n 27. sij
At Catch me if you can! Detecting sandbox evasion techniques by
Reply Retweet Označi sa "sviđa mi se"