Twitter | Search | |
Search Refresh
Salva Jul 13
Some interesting Windows common operation artifacts
Reply Retweet Like
Andrew Sovern 17h
Replying to @SBousseaden
Going a step beyond this - since wscript.exe and cscript.exe can be renamed, it may be beneficial to couple this with an analytic leveraging the new OriginalFilename field in Sysmon keyed off the OriginalFilename for the two MS binaries.
Reply Retweet Like
🏴‍☠️ ÐΞΛТHS PłЯΛТΞ 3h
Just so I don't reinvent the wheel ... has anyone mapped OSSEC to Elastic Common Schema (ECS) yet?
Reply Retweet Like
Olaf Hartong Jul 9
Ever wanted to play with my app on but didn’t get to it? I’ll be hosting a 2h workshop at in the together with . Eventbrite opens this Friday. More details
Reply Retweet Like
Sajid Nawaz Khan 5h
Fingerprinting Malware Authors: An Introductory Case Study of a Chinese APT:
Reply Retweet Like
Evgeny Belenky Jul 10
Part 1 of 's great guide on using for
Reply Retweet Like
PolySwarm Jul 15
We're out here at the in Singapore. Visit us at the Early Stage Expo (Sand Grand Ballroom, Level 5) - We are demoing , showing how security experts can use as a better system for identifying & sharing malware, + use our ()
Reply Retweet Like
AgileResponseTechnologies Jul 10
is a major task that needs a team of investigators. Chronos 1.4.9 automates threat hunting processes with a simple wizard. Watch as Chronos does the legwork; review findings when it's done.
Reply Retweet Like
Sage Data Security Jul 12
Cyber Threat Hunting Guide Download! Learn how to defend your network from cyberattacks by going on the offensive! Download the Sage Advice Guide now!
Reply Retweet Like
SentinelOne 1h
Reply Retweet Like
Red Canary Jul 11
is fundamentally about pivoting and discovering new techniques or artifacts that you may have missed previously, which is precisely how we discovered some intriguing driver activity a few months back.
Reply Retweet Like
Sage Data Security Jul 15
An Introduction to Cyber Threat Hunting - It can make your organization more secure, but there are some challenges to proactively hunting threats on your network. Learn more! by
Reply Retweet Like
Ralph Neugebauer Jul 15
Really interesting to hear share a day in his life with an engaged crowd at during his TechTalk
Reply Retweet Like
Hicham Zac Ennaimi Jul 15
Need more netwprl visibility? See how Progress Residential leverages cloud-based to stay ahead of advanced threats
Reply Retweet Like
Countercept 6h
Outsmart your attackers with our Continuous Response methodology and catch them in the act, not after it. Download the whitepaper now to start building your playbook - |
Reply Retweet Like
Senseon 21h
Our Founder & CEO, introducing our community event tonight. Find out more about the Senseon community here:
Reply Retweet Like
MENASecurity Jul 15
Reply Retweet Like
NetEvert Jul 15
Hey ! I hope to meet as many of you as possible at ! I’ll be giving a talk at the alongside where we’ll take you through our journey of discovery and experimentation with Sentinel, and
Reply Retweet Like
Roberto Rodriguez Jul 14
Replying to @Cyb3rWard0g
Last weekend project: A basic tomahawk! 🔥🔥 I'm ready for the week now! 😊🍻 pre- activities 😂
Reply Retweet Like
Christopher Glyer Jul 13
When you open an .iqy file (internet query file format) it saves the .asp page downloaded by excel to c:\Program Files\Microsoft Office\Queries\
Reply Retweet Like