|
Termella š¦
@
fierytermite
Ciudad Autónoma de Buenos Aire
|
|
@ThreatLibrary Team Member at Deloitte AR š #ThreatLibraryTeam
|
|
|
551
Tweetovi
|
365
Pratim
|
614
Osobe koje vas prate
|
| Tweetovi |
| Termella š¦ proslijedio/la je tweet | ||
|
Olaf Hartong
@olafhartong
|
17 h |
|
Iām super happy to see all great research and meticulous work of ā¦@Carlos_Perezā©, the DarkDocumentor, out in the public. This is a amazing resource for everyone using or planning to use #Sysmon #BlueTeam github.com/trustedsec/Sysā¦
|
||
|
|
||
| Termella š¦ proslijedio/la je tweet | ||
|
Selena
@selenalarson
|
18 h |
|
great paper by @jfslowik on the limits of malware analysis in threat intel
"while malware analysis offers significant benefits for generating threat intelligence ...malware analysis on its own imposes certain limitations on contextuality and purpose"
dragos.com/resource/threaā¦
|
||
|
|
||
|
Termella š¦
@fierytermite
|
5. velj |
|
|
||
| Termella š¦ proslijedio/la je tweet | ||
|
ekoparty
@ekoparty
|
4. velj |
|
š¢ SUPER NOVEDAD: La #eko16 va a durar ””CUATRO DĆAS!! šØšØ MiĆ©rcoles a SĆBADO, porque nos lo merecemos como comunidad.
Se vienen cosas muy buenas, esto es solo el comienzo šš¼
.
BREAKING NEWS: #eko16 will last FOUR DAYS šØšØ Great things are coming, this is just the beginning šš¼ pic.twitter.com/jGDujsdkpN
|
||
|
|
||
| Termella š¦ proslijedio/la je tweet | ||
|
Elliot Alderson
@fs0c131y
|
3. velj |
|
You have to live dangerously: donāt do your search on Google, do it on the Google search of the NSA š
š¤Ŗš¤ pic.twitter.com/DrXi4TvZYD
|
||
|
|
||
| Termella š¦ proslijedio/la je tweet | ||
|
Mark Simos
@MarkSimos
|
2. velj |
|
Need a #ZeroTrust Reference Architecture? Check out this one showing how @Microsoft technology enables this strategy/access model.
Slide 14 of CISO Workshop Module 3
@ajohnsocyber @MalwareJake @_sarahyo @RavivTamir @JohnLaTwC #Cybersecurity
docs.microsoft.com/en-us/microsof⦠pic.twitter.com/t2eChLzW8r
|
||
|
|
||
| Termella š¦ proslijedio/la je tweet | ||
|
@mikko
@mikko
|
3. velj |
|
1/ Practically every startup ends up writing code, even if technology wouldn't be the main focus of the company. Hereās a checklist I made to help you and your hot new startup avoid the most common infosec pitfalls. [thread]
|
||
|
|
||
| Termella š¦ proslijedio/la je tweet | ||
|
Roberto Rodriguez
@Cyb3rWard0g
|
31. sij |
|
Has anyone (boss, client, student, etc) ever asked you in what Windows event log can you find a process, IP address, InterfaceUuid, etc? Very helpful to identify providers that you might need to start collecting data from. @OSSEM_Project is using online interactive #notebooks twitter.com/OSSEM_Project/ā¦
|
||
|
|
||
| Termella š¦ proslijedio/la je tweet | ||
|
_Veronica_
@verovaleros
|
30. sij |
|
My coworker just shared the best thing:
Oh Shit, Git!?! ohshitgit.com
|
||
|
|
||
|
Termella š¦
@fierytermite
|
29. sij |
|
š¢ ā¼ļøā¼ļø If you are considering to assit to a BlackHat trainning this year, you cannot miss this one by @UnaPibaGeek & @encodedwitch šš» twitter.com/UnaPibaGeek/stā¦
|
||
|
|
||
| Termella š¦ proslijedio/la je tweet | ||
|
Christopher Glyer
@cglyer
|
28. sij |
|
We've all received emails with no attachment and assume it's "safe" to open in a mail client (as long as we don't explicitly click on any URLs). Right?
Not so much...
|
||
|
|
||
| Termella š¦ proslijedio/la je tweet | ||
|
Red Canary
@redcanaryco
|
28. sij |
|
From the folks that brought you Atomic Red Team, Chain Reactor is a new open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints. redcanary.com/blog/chain-rea⦠pic.twitter.com/fkOISDk9YK
|
||
|
|
||
| Termella š¦ proslijedio/la je tweet | ||
|
⢠Aye ā¢
@TorelloAyelen
|
27. sij |
|
Our talk "Catch me if you can! Detecting Sandbox Evasion Techniques" at @enigmaconf presented by @OutrageousLynx ⨠Be smarter than adversaries and make your Sandbox Systems stronger šŖ pic.twitter.com/hsVCbgvyjo
|
||
|
|
||
| Termella š¦ proslijedio/la je tweet | ||
|
ailĆn
@AiluCastellucci
|
27. sij |
|
"This is why the need of defining the Environment Awareness technique,which defines all methods and maneuvers malware use in order to detect a Sandboxing Environment,a VM or the presence of Forensic Tools based on the characteristics of the environment"@OutrageousLynx #enigma2020 pic.twitter.com/DAjq75ZTbg
|
||
|
|
||
| Termella š¦ proslijedio/la je tweet | ||
|
ailĆn
@AiluCastellucci
|
27. sij |
|
"During the research of Enviromnet Awareness we were able to define 5 different categories and the categories within each one that can range in a wide spectrum of complexity" - @OutrageousLynx @ #enigma2020 pic.twitter.com/45EMb8EbXy
|
||
|
|
||
| Termella š¦ proslijedio/la je tweet | ||
|
Threat Library Team
@ThreatLibrary
|
27. sij |
|
|
||
| Termella š¦ proslijedio/la je tweet | ||
|
Kenn White
@kennwhite
|
27. sij |
|
In the current arms race with malware, adversaries are only getting smarter. @OutrageousLynx is briefing on the myriad anti-forensic evasion techniques and system fingerprinting, including "Was this machine just booted up?" #Enigma2020 pic.twitter.com/18rlJDxkv3
|
||
|
|
||
| Termella š¦ proslijedio/la je tweet | ||
|
Ben Adida
@benadida
|
27. sij |
|
First afternoon session #enigma2020, starting with @OutrageousLynx talking about sandbox evasion detection.
|
||
|
|
||
| Termella š¦ proslijedio/la je tweet | ||
|
Daniela Seabra Oliveira
@dseabraoliveira
|
27. sij |
|
ā¦@OutrageousLynxā© coming all the way from Argentina š¦š· talks about sandbox evasion techniques ā¦@enigmaconfā© #enigma2020 pic.twitter.com/885i6NNUJS
|
||
|
|
||
| Termella š¦ proslijedio/la je tweet | ||
|
ailĆn
@AiluCastellucci
|
27. sij |
|
At #enigma2020 Catch me if you can! Detecting sandbox evasion techniques by @OutrageousLynx pic.twitter.com/5Kmw9t3C2H
|
||
|
|
||