Poppaea
@0xpoppaea
security research @ stacklok - into detection engineering, data science, physics, lego, cats 👩🏼💻👾 ex- countercept
ID: 1277946327838703616
http://poppysec.github.io 30-06-2020 12:45:40
37 Tweet
50 Followers
96 Following
Parent/child proc relationships are key to detecting Microsoft OneNote phishing. ezpz #ThreatHunting #DFIR
First ever conference talk done!! Thanks to The Diana Initiative and WithSecure™ for the opportunity 💗
Really excited for my first talk at a security conference! I’ll be speaking Blue Team Con about the journey to security consultancy and how organisations can benefit from hiring from outside the norm! See you on the 26th! 🔊
It was my first time attending The Diana Initiative this year! Such a nice vibe and incredibly inclusive. Poppaea and @goldb3rry represented from the WithSecure™ team, and absolutely smashed their talk on Hunt-Focused Purple Teaming 💜
On 8/29, we found malicious code in Python Package Index package "invokehttp." This package raised red flags due to inconsistencies in its metadata and the absence of any verified connection to its claimed GitHub repository. Full analysis here: stacklok.com/blog/cross-pla… #cybersecurity #malware