|
Emily
@
ladyofpython
|
|
DFIR | honeypots | blueteam | MiSec
|
|
|
527
Tweetovi
|
1.055
Pratim
|
286
Osobe koje vas prate
|
| Tweetovi |
| Emily proslijedio/la je tweet | ||
|
Richard Gold
@drshellface
|
28. sij |
|
1. Windows Defender 2. EDR 3. Automated defanging of documents 4. Disabling macros, OLE, DDE, etc. 5. Disabling Windows Script Hosting 6. Private VLANs 7. Application whitelisting 8. Users not being local admins 9. 2FA on everything 10. Up-to-date patching twitter.com/jhencinski/sta…
|
||
|
|
||
| Emily proslijedio/la je tweet | ||
|
alexia
@TypeErr0r
|
26. sij |
|
I don’t know who needs to hear this, but working on documentation IS NOT A WASTE OF TIME.
Quality documentation will help your project proceed efficiently now and in the future.
|
||
|
|
||
| Emily proslijedio/la je tweet | ||
|
................................................🥰
@InfoSystir
|
26. sij |
|
Come sign up for @cyborg00101 & I's training at @nola_con in May! Just think DnD mixed with tabletops. It's team vs team in who can survive the longest. You might end up in the CEO role to make some hard decisions! Follow @infosecroleplay for more nolacon.com/training/2020/…
|
||
|
|
||
| Emily proslijedio/la je tweet | ||
|
Teagan™
@TeagSec
|
25. sij |
|
If you're not retaining things like DHCP logs, DNS logs, RDP logs, some kind of internal network monitoring/visibility, you should do that. Trying to hunt through 2 month old traffic is hard when you can't correlate IP to Endpoint because DHCP. #infosec
|
||
|
|
||
| Emily proslijedio/la je tweet | ||
|
All Purpose Cultural Chat Girl Emily
@emilyst
|
24. sij |
|
The Western European medieval mind generally believed the world was coming to an immediate end and that they lived in the end times among the inscrutable ruins of a once-splendorous ancient world. And for this reason progress itself was not conceivable.
I think about this a lot.
|
||
|
|
||
| Emily proslijedio/la je tweet | ||
|
ARBSEC
@arbsec
|
24. sij |
|
Don't forget - both registration and the Call for Papers for A2Y.asm 2020 are *open*! CFP closes Feb 29. Also, we are looking for sponsors. Info/reg/CFP at arbsec.org/a2y.asm
|
||
|
|
||
| Emily proslijedio/la je tweet | ||
|
SpecterOps
@SpecterOps
|
22. sij |
|
Here is the link to the SpecterOps Adversary Tactics: PowerShell course material:
github.com/specterops/at-…
Enjoy!
For information about our current training offerings, information can be found here: specterops.io/how-we-help/tr…
(4/4)
|
||
|
|
||
| Emily proslijedio/la je tweet | ||
|
Br Br
@bryanbrake
|
22. sij |
|
So glad we got to spend some time w/ @lizthegrey & if you have a chance to see her speak, make the time. You'll learn something. Also, check out her #podcast heavybit.com/library/podcas… Also, Check out @InfoSystir on #misec podcast youtube.com/watch?v=Cj2IF0… w/ @kentgruber & @quantissIA
|
||
|
|
||
| Emily proslijedio/la je tweet | ||
|
Randy Olson
@randal_olson
|
11. sij |
|
The video game "VVVVVV" went #OpenSource today and someone discovered a several-hundred-case switch statement in the code. #programming
Beautiful. Disgusting.
Source: github.com/TerryCavanagh/… pic.twitter.com/jLznUpyBE7
|
||
|
|
||
| Emily proslijedio/la je tweet | ||
|
Ben Goerz
@bengoerz
|
4. sij |
|
Hey SIEM owners: How do you handle documentation & change control for your SIEM rule content?
|
||
|
|
||
| Emily proslijedio/la je tweet | ||
|
Picard Tips
@PicardTips
|
25. pro |
|
Picard holiday tip: Religion and commercialism will both fade over generations. Generosity and kindness, however, will endure.
|
||
|
|
||
| Emily proslijedio/la je tweet | ||
|
Amy Renee
@amyengineer
|
24. pro |
|
I, for one, welcome our festive Christmas tree overlords. 🎄🎄🎄😂 twitter.com/ZodiusInfuser/…
|
||
|
|
||
| Emily proslijedio/la je tweet | ||
|
Anton Nesterov
@AntNesterov
|
12. pro |
|
Seems like Rambler filled copyright claim to @isysoev regarding @nginx, nginx office under police raid (unconfirmed). Originally posted by @igorippolitov , but somebody asked him to remove his post. pic.twitter.com/76mBNtV31G
|
||
|
|
||
| Emily proslijedio/la je tweet | ||
|
Tinker
@TinkerSec
|
12. pro |
|
Him: Just grabbed the domain admin’s *user* password.
Me: Give it. Let’s see if they reused the pass for their DA account.
Him: Surely, they wouldn’t.
Me, looking at my access: They would. And don’t call me Shirley. pic.twitter.com/0BYBJWOp47
|
||
|
|
||
|
Emily
@ladyofpython
|
12. pro |
|
|
||
|
Emily
@ladyofpython
|
11. pro |
|
👋
|
||
|
|
||
| Emily proslijedio/la je tweet | ||
|
Jake Williams
@MalwareJake
|
10. pro |
|
The containment phase of incident response when you've got a worm in the network. pic.twitter.com/QrciPVnKRo
|
||
|
|
||
| Emily proslijedio/la je tweet | ||
|
Ian Anderson
@ian_infosec
|
7. pro |
|
Cool. This is something normal people know how to do with zero problems. twitter.com/PatrickCMiller…
|
||
|
|
||
| Emily proslijedio/la je tweet | ||
|
SwiftOnSecurity
@SwiftOnSecurity
|
5. pro |
|
Smooth user migration between computers is almost literally indistinguishable from ransomware defense.
|
||
|
|
||
| Emily proslijedio/la je tweet | ||
|
Joseph Cox
@josephfcox
|
4. pro |
|
if anyone has done forensics on prison butt phones my DMs are open if you want to talk about it (i'm not joking, that would be interesting) twitter.com/HeatherMahalik…
|
||
|
|
||