Excellent blog complete with details about the intrusion chain that preceded #HermeticWiper deployment. There are many detectable behaviors in that chain!
Excellent blog complete with details about the intrusion chain that preceded #HermeticWiper deployment. There are many detectable behaviors in that chain!
One of the most important characteristics of good investigative questions is that they are SPECIFIC. That means they point to evidence that you can use to answer them. Let's look at an example. 1/
New post on what we've seen from suspected Exchange exploitation and what to do about it. There are 3 sections for different needs. Our goal was to make the remediation advice as accessible as possible, since we know the average admin will likely have to help with this too.
New post on what we've seen from suspected Exchange exploitation and what to do about it. There are 3 sections for different needs. Our goal was to make the remediation advice as accessible as possible, since we know the average admin will likely have to help with this too. https://t.co/SUYhz98MPN
CTISummit Track 1: Eric Loui &
Sergei Frankoff, @CrowdStrike describe SPRITE SPIDER’s current modus operandi, focusing on the adversary’s advanced operational security and uncommon TTPs.
Google Chrome has been blocking Nmap downloads all day because their broken "Safe Browsing" system suddenly labeled a 10-year-old version of our Ncat software as a threat. We will get this resolved with Google, but wanted to let you know that your Nmap downloads are still safe!
We've been tracking reporting on the recent activity related to UNC2452/Solarigate with an eye to mapping it to ATT&CK and adding new techniques. We've posted and intend to keep up to date on the reports we're tracking but let us know what we're missing. medium.com/mitre-attack/i….
Timeline Explorer 1.3 released! All parsers are now plugins vs built-in. Added View | Messages window, Debug option when parsing, added View | Plugins, + lots of other polish.
Note that Layout names have changed, so delete any that do not start with TLEFile* after updating #DFIR
25 Followers 190 FollowingGet ready for an adventure and discover new worlds with our ExploreWorldNow blog. Pick up the breeze and go traveling with us!
794 Followers 2K FollowingInfoSec - DFIR - Internal Threats @Airbnb. Opinions are solely my own. I'm passionate about Technology, Security, Innovation and Human Decency. 🧠
13K Followers 10K FollowingMost companies only realise they are breached when informed by a 3rd party. This is a stupid problem! Thinkst Canary. Know. When it Matters.
4K Followers 393 FollowingDigital Forensics and incident response software for endpoint investigation. Built by @sleuthkitlabs and Brian Carrier (@carrier4n6).
109K Followers 2 FollowingMonitor your external network, search the Internet of Things and perform empirical market research. You can also find us on https://t.co/nPLFbFy8R5
18K Followers 801 FollowingThreat Intelligence Analyst |
See my Linktree for other socials |
In case I post false intel, contact me!
Support me: https://t.co/5WgDqr0K8p
🇪🇺🇩🇪🇺🇦🌈
7K Followers 778 FollowingFormer attorney, current IT & infosec consultant in the 'Burgh. Happy to talk about password spraying one minute and constitutional law the next. Son of #wvu.
37K Followers 2K Following20+ yrs in Infosec. Malware Influencer. I turn Malware into Art and Music. Art @MalwareArt. 4x Pwnie Nominee. 𝕍𝕏. GameDev. Autistic.
20K Followers 2K FollowingPrincipal Identity Security Researcher at Microsoft. Ex-Secureworks. (MSc, MEng, PhD, CITP, CCSK).
And yes, opinions are my own ;)
18K Followers 835 FollowingRansomware, Online Security, and Malware. Owner, Editor in Chief of @bleepincomputer.
DM on Signal: LawrenceA.11 * https://t.co/LXVRoICs8Z
145K Followers 215 FollowingWe are the Microsoft Security Response Center. To report security vulnerabilities or abuse in Microsoft products, visit https://t.co/kxEbdfMny1.