Nick Carr(@ItsReallyNick) 's Twitter Profileg
Nick Carr

@ItsReallyNick

Lead, Cyber Crime Intelligence @Microsoft ☠🏛️ Former Incident Response + Threat Research @Mandiant 🦅 Former Chief Technical Analyst @CISAgov 🛡️

ID:73195179

linkhttp://linkedin.com/in/itsreallynick calendar_today10-09-2009 19:15:18

12,1K Tweets

38,4K Followers

3,5K Following

Nick Carr(@ItsReallyNick) 's Twitter Profile Photo

i loved this band in high school
finally got to see them live tonight

please prove my wife wrong and tell me you know who they are

account_circle
Kostas(@Kostastsale) 's Twitter Profile Photo

This is awesome! Incredibly useful for IR and beats my handmade notes 😆

Thank you to the folks that made this guide public 🙏 🙏

Get the PDF directly from here 🔗 cdn-dynmedia-1.microsoft.com/is/content/mic…

This is awesome! Incredibly useful for IR and beats my handmade notes 😆 Thank you to the folks that made this guide public 🙏 🙏 Get the PDF directly from here 🔗 cdn-dynmedia-1.microsoft.com/is/content/mic…
account_circle
Daniel Bohannon(@danielhbohannon) 's Twitter Profile Photo

It's LIVE - Permiso Security's has now been released by Andi Ahmeti & myself at Black Hat here in beautiful Singapore.

Andi Ahmeti - Gëzuar miku! 1st conference in the bag :)

Tool: github.com/Permiso-io-too…
Blog: permiso.io/blog/introduci…

It's LIVE - @permisosecurity's #CloudConsoleCartographer has now been released by @SecEagleAnd1 & myself at @BlackHatEvents #BHASIA here in beautiful Singapore. @SecEagleAnd1 - Gëzuar miku! 1st conference in the bag :) Tool: github.com/Permiso-io-too… Blog: permiso.io/blog/introduci…
account_circle
Permiso Security(@permisosecurity) 's Twitter Profile Photo

We are kicking off a series of blog posts that will walk through some of MITRE's ATT&CK Matrix, diving deep into cloud-based techniques. In our first post in this series, we will cover Cloud Administration Command permiso.io/blog/an-advers…

account_circle
Thomas Roccia 🤘(@fr0gger_) 's Twitter Profile Photo

🤯 The level of sophistication of the XZ attack is very impressive! I tried to make sense of the analysis in a single page (which was quite complicated)!

I hope it helps to make sense of the information out there. Please treat the information 'as is' while the analysis

🤯 The level of sophistication of the XZ attack is very impressive! I tried to make sense of the analysis in a single page (which was quite complicated)! I hope it helps to make sense of the information out there. Please treat the information 'as is' while the analysis
account_circle
Andres Freund (Tech)(@AndresFreundTec) 's Twitter Profile Photo

Binni Shah FWIW, I didn't actually start looking due to the 500ms - I started looking when I saw failing ssh logins (by the usual automated attempts trying random user/password combinations) using a substantial amount of CPU. Only after that I noticed the slower logins.

account_circle
Matt Zorich(@reprise_99) 's Twitter Profile Photo

I often read posts on Reddit, here and other social media about adversary in the middle (AiTM) token / cookie theft, and I think people are confused about the security controls available to them to combat it. Let's take a step back, what is AiTM?

account_circle
Nick Carr(@ItsReallyNick) 's Twitter Profile Photo

There are hints and carefully-chosen words here.
Hopefully some more chances coming soon to join us in making the news vs simply reading it. Be an intelligence factory not a warehouse.

account_circle
Nick Carr(@ItsReallyNick) 's Twitter Profile Photo

When you’re reading about cyber crime disruptions & law enforcement operations, don’t make the mistake of assuming all caught threat actors are “sloppy” or have poor OPSEC.
They have no idea how they’re actually being identified. Or how many are truly known and watched/waited on.

account_circle