James D (@frantictyping) 's Twitter Profile
James D

@frantictyping

Threat Hunting | Detection Engineering | Defensive Automation (ex @Countercept, @mwrlabs)

ID: 14573968

linkhttp://blog.securehat.co.uk calendar_today28-04-2008 19:33:15

390 Tweet

821 Followers

446 Following

Dray Agha (@purp1ew0lf) 's Twitter Profile Photo

Let's quickly look at how Defenders can benefit from tools like Chainsaw, Sigma, docs from KAPE & Velociraptor, and Security Onion 🕵️‍♂️ We'll use real, shady data - fresh out the kitchen 🧑‍🍳 Along the way, I'll share some tips and shortcuts to cut faster through data and logs 🧵

RandomAccessMusings (@rndmaccssmsngs) 's Twitter Profile Photo

F-Secure is hiring my replacement, a new Head of Threat Intelligence, based in Europe. This is a genuinely exciting opportunity to grow a CTI capability from its infancy in to a mature function. The role has a lot of freedom to pursue as desired and.. emp.jobylon.com/jobs/120443-f-…

Kostas (@kostastsale) 's Twitter Profile Photo

I usually make short-form satirical videos for fun, but never share them with the world. This time tho, I thought I'd make one for the infosec community. Some might even find it educational 😅 If you're in #infosec and you feel a little down this week, this video is for you💙

Jimmy Vo (@jimmyvo) 's Twitter Profile Photo

I may be very late on this but I stumbled on 🦊 GitLab's handbook for transparency and I really enjoy reading through the reporting on their Security team's KPIs: about.gitlab.com/handbook/engin…

Patrick Wardle (@patrickwardle) 's Twitter Profile Photo

macOS malware often (ab)uses APIs such as NSCreateObjectFileImageFromMemory, NSLinkModule etc) to execute in-memory payloads. Apple has recently updated dyld3 (+these APIs), such that the in-memory payload is now first/always written out to disk 💾 See: github.com/apple-oss-dist…

macOS malware often (ab)uses APIs such as NSCreateObjectFileImageFromMemory, NSLinkModule etc) to execute in-memory payloads.

Apple has recently updated dyld3 (+these APIs), such that the in-memory payload is now first/always written out to disk 💾

See: github.com/apple-oss-dist…
Jared Atkinson (@jaredcatkinson) 's Twitter Profile Photo

Check out the first post in my new blog series "On Detection: From Tactical to Functional". The first post explores how we can leverage source code to discover which API Functions an attack tool is using which serves as a base for further investigation. posts.specterops.io/on-detection-t…

James D (@frantictyping) 's Twitter Profile Photo

Really cool to see this tool finally public! If you’re still viewing alert data in a jira ticket, I’d recommend checking out the approach DetectTree takes to visualise detections, it makes a massive difference.

Russ McRee (@holisticinfosec) 's Twitter Profile Photo

Hunt, search, and extract Windows event log records with Chainsaw, now in #toolsmith 148. Experiments with an old #DFIR malware case, as well as APT Simulator. The saw is the law! ⁦Alex Kornitzer⁩ ⁦James D sigmaFlorian Roth ⚡️⁩ ⁩ holisticinfosec.io/post/chainsaw/

Dray Agha (@purp1ew0lf) 's Twitter Profile Photo

Dude, you can wipe whatever WEVTXs you want 🪠 Huntress gon' find the user accounts, session times, machines, and method for your lateral movement 🕵️‍♀️ You'd be surprised what #RDP-related event logs can reveal ponderthebits.com/2018/02/window…

Dude, you can wipe whatever WEVTXs you want 🪠 

<a href="/HuntressLabs/">Huntress</a> gon' find the user accounts, session times, machines, and method for your lateral movement 🕵️‍♀️

You'd be surprised what #RDP-related event logs can reveal
ponderthebits.com/2018/02/window…
mark (@magerbomb) 's Twitter Profile Photo

Our team at Elastic has been developing this feature for almost six years and we are excited to share our work with the security research community. Thanks to Gabriel Landau William Burgess and many others who have contributed to this effort over the years!

James D (@frantictyping) 's Twitter Profile Photo

The first part of my blog series on how we’ve been scaling detection and response operations at Coinbase is live! Interested in speeding up your investigations, increasing the visibility of key data sources, and improving quality of life for analysts? coinbase.com/blog/scaling-d…

James D (@frantictyping) 's Twitter Profile Photo

Scaling detection and response operations at Coinbase part 2 & 3: 🔍 Driving context into detection logic with machine and user profiles 🔧 Codifying automatic remediation for high-risk detections 📫 Automating alert triage with employees via Slackbot coinbase.com/blog/scaling-d…

James D (@frantictyping) 's Twitter Profile Photo

My talk "Scaling Detection and Response Teams - Enabling Efficient Investigations" is at 3:45pm today at #BSidesLDN2023 on track 2! Come down and say hi if you're around 😀 pretalx.com/bsides-london-…