ಟ್ವೀಟ್ಗಳು
- ಟ್ವೀಟ್ಗಳು
- ಟ್ವೀಟ್ಗಳು & ಪ್ರತಿಕ್ರಿಯೆಗಳು
- ಮಾಧ್ಯಮ
@jackcr ತಡೆಹಿಡಿಯಲಾಗಿದೆ
ನೀವು ಖಚಿತವಾಗಿಯೂ ಈ ಟ್ವೀಟ್ಗಳನ್ನು ನೋಡಲು ಬಯಸುವಿರಾ? ಟ್ವೀಟ್ಗಳನ್ನು ನೋಡುವುದು @jackcr ಅವರನ್ನು ತಡೆತೆರವುಗೊಳಿಸುವುದಿಲ್ಲ.
-
Wonder about the state of your detection when an attacker reaches KC7? Testing actions w/ this would be a good start https://gallery.technet.microsoft.com/Advanced-Threat-Analytics-8b0a86bc …
-
-
Also: sourcetype=*WinEventLog:Security EventCode=4656 Object_Type=SAM_DOMAIN Process_Name=*\\lsass.exe Access_Mask=0x705https://twitter.com/markrussinovich/status/830997478182785024 …
-
The Two Threat Hunter Personas defining hunt in the enterprise.
#ThreatHunting@InfocyteInc@ThreatHuntProjhttp://good-hunting.infocyte.com/2017/02/10/threat-hunter-personas/ … -
The Two Threat Hunter Personas: Threat intel analyst hunters and DFIR hunters: http://good-hunting.infocyte.com/2017/02/10/threat-hunter-personas/ … by
@gerritzc -
ICYMI: I wrote a blog post over the weekend related to Patterns of Behavior. https://findingbad.blogspot.com/2017/02/patterns-of-behavior.html …
#DFIR#ThreatHunting -
Read this thread and see how
@HenrikJohansen does real-time behavioral detection with correlation and automated reactive forensics.
https://twitter.com/HenrikJohansen/status/830692679411433472 … -
Overarching lesson: Don't ever assume that an attacker will be strictly channeled through the detections you've invested heavily in.
-
My end goal is the same as
@jackcr. I want a RT alert for each step of an intrusion. Batch Analysis and Threat Hunting will get me there. -
"A small team of A+ players can run circles around a giant team of B and C players." - Steve Jobs This holds true in infosec/security too.
-
I just published a new blog post, Patterns of Behavior. https://findingbad.blogspot.com/2017/02/patterns-of-behavior.html …
#DFIR#ThreatHunting -
My goal is to one day be able to piece together an entire intrusion simply based on the alerts I generate.
#DFIR -
Trying to to start writing again after a break. Hunting for backdoor beaconing on Linux using System Tap http://flightoftheunix.blogspot.com/2017/02/linux-hunting-for-beaconing-using.html …
#systemtap -
My
#BluehatIL talk on Cyber#security in a world of Cloud is public: Slides: http://www.microsoftrnd.co.il/Press%20Kit/BlueHat%20IL%20Decks/JohnLambert.pdf …, Video: https://youtu.be/F4_y9E5P10U pic.twitter.com/GjNJGAH89r
-
GE to Hire 20,000 women into technical roles by 2020.Proud to be part of a company that wants to
#BalanceTheEquationhttps://youtu.be/sQ6_fOX7ITQ -
#ThreatHunting is not only about finding active intrusions. IMO It's largely about identifying new methods that decrease the time to detect. -
Great talk, Matt! For those that have not seen this, it would be well worth your time.https://twitter.com/MSwannMSFT/status/828640647720558592 …
-
@jackcr@anton_chuvakin Or the one that people continue to use that they don't know isn't working? -
Want a free copy of Practical Packet Analysis 3? I’ll give one away to someone who retweets this in the next 30 mins https://www.nostarch.com/packetanalysis3 pic.twitter.com/EGQHVpT88N
ಲೋಡಿಂಗ್ ಸಮಯ ಸ್ವಲ್ಪ ತೆಗೆದುಕೊಳ್ಳುತ್ತಿರುವಂತೆನಿಸುತ್ತದೆ.
Twitter ಸಾಮರ್ಥ್ಯ ಮೀರಿರಬಹುದು ಅಥವಾ ಕ್ಷಣಿಕವಾದ ತೊಂದರೆಯನ್ನು ಅನುಭವಿಸುತ್ತಿರಬಹುದು. ಮತ್ತೆ ಪ್ರಯತ್ನಿಸಿ ಅಥವಾ ಹೆಚ್ಚಿನ ಮಾಹಿತಿಗೆ Twitter ಸ್ಥಿತಿಗೆ ಭೇಟಿ ನೀಡಿ.
Jack Crook
Chris Gerritz
Lenny Zeltser
Global Solutions
Matt Swann
Matt Graeber
Bamm Visscher
Casey Smith
Jaron Bradley
John Lambert
Chris Drumgoole
hogfly
Chris Sanders