Twitter | Search | |
This is the legacy version of twitter.com. We will be shutting it down on 15 December 2020. Please switch to a supported browser or device. You can see a list of supported browsers in our Help Center.
Search Refresh
Gage 10h
exploiting -2017-11882 to drop what appears to be MRKRFQPD-1682020.xlsx cb57e8bab6e835b5c8a41db0429fb9d4 pars-science[.]ir INTERIORRAWFILE.exe 3fb45dffb8a667262be92cee09cf5311
Reply Retweet Like
Samir 11h
Example of how to detect remote scheduled tasks creation using on the target host in a resilient and enriched way (capturing all necessary details such as SrcIP, Task details etc.)
Reply Retweet Like
Blue Team News 22h
Linux.Ngioweb botnet, now it is going after IoT devices - Ngioweb V2 samples, involving x86(32/64), ARM(32/64), MIPS(MIPS32/MIPS-III) As well as PPC, Hitachi SH, IBM S/390 and other CPU architectures
Reply Retweet Like
@DanCimpean Nov 15
Adversarial Emulation Tools : MITRE Calderra Red Canary ATOMIC Red Team Mordor Re-play Adversarial Techniques MITRE Caltack Plugin APTSimulator FlightSim
Reply Retweet Like
Blue Team News Nov 18
Reply Retweet Like
Blue Team News Nov 20
New Version of the Microsoft Research Security Update Guide adds CVSS! Didn’t take that long... also, adds Dark-mode (more importantly)
Reply Retweet Like
Blue Team News Nov 19
Decrypting OpenSSH sessions for fun and profit
Reply Retweet Like
vinware Nov 21
Questions for my family. What sites do you use regularly for the newest IOCs out on the interwebs?
Reply Retweet Like
SecurityWeek Nov 18
Live workshop today at 12:15PM ET.
Reply Retweet Like
Ring3API Nov 20
Reply Retweet Like
Christophe G Nov 16
Teach smarter decision-making ... shares how to get your game on the smart way with on
Reply Retweet Like
SOC Prime 17h
Explore rules repository mirror - In a few clicks you can find and translate available rules to detection content for your security platform; no registration required.
Reply Retweet Like
Blue Team News Nov 16
Reply Retweet Like
Blue Team News Nov 18
Back to the Future: Inside the Kimsuky KGH Spyware Suite
Reply Retweet Like
h0rxh Nov 15
A really good read! if you're into Threat Hunting and Incident Response. SecureBug©️
Reply Retweet Like
Gigasheet Nov 18
Looking to get started with ? It's easier than you think! Check out latest blog: 3 Threat Hunting Myths
Reply Retweet Like
Cyber Dolphin Nov 18
It was awesome!!! Thank you for your insight into threat intelligence in
Reply Retweet Like
Israel 9h
: Next week we're pairing up with on December 2nd to present a : How Binary Defense Threat Hunters use AT&T Cybersecurity USM Anywhere to detect and respond to threats. Sign up now!
Reply Retweet Like
Blue Team News Nov 18
Deploying and Managing Azure Sentinel - Ninja style
Reply Retweet Like
SOC Prime Nov 18
Reduce the stress and save time for the Analysts and engineers with the best threat detection content and context to use it.
Reply Retweet Like