d3m0sth3n3s (@_d3m0sth3n3s) 's Twitter Profile
d3m0sth3n3s

@_d3m0sth3n3s

cyber-physical DFIR/CTI. infrastructure is more than the grid. PCAP or it didn’t happen. she/her.

ID: 1016286851328507905

calendar_today09-07-2018 11:44:01

489 Tweet

660 Followers

874 Following

Joe Słowik 🌻 (@jfslowik) 's Twitter Profile Photo

This is probably being too generous on the MacOS and mobile front but seems a reasonable approximation for org #forensic capability in #infosec

This is probably being too generous on the MacOS and mobile front but seems a reasonable approximation for org #forensic capability in #infosec
d3m0sth3n3s (@_d3m0sth3n3s) 's Twitter Profile Photo

Have come across this article before and have always wondered what the real story was - anyone who actually worked it remember?

Mark Kelly (@markkelly0x) 's Twitter Profile Photo

The iSOON leaks will make a great case study in the continuum of attribution (e.g. Joe Słowik 🌻 paper: domaintools.com/wp-content/upl…). Specifically how multiple seemingly distinct behavioural clusters can ultimately map to same entity/organisations and how to best deconflict this.

Brian in Pittsburgh (@arekfurt) 's Twitter Profile Photo

An interesting exercise: Look at this list of 40 commonly exploited vulnerabilities the Five Eyes agencies saw in 2022 and estimate how many could not have occurred if memory safe languages were used in all the products. My very rough count: Five or fewer. cisa.gov/news-events/cy…

Brian in Pittsburgh (@arekfurt) 's Twitter Profile Photo

Alright, here is what critical infrastructure organizations actually need to hear & understand about this Volt Typhoon stuff: 1. You should assume there is at least a moderate degree of likelihood that the PRC will launch a military operation against Taiwan in the next 6 years.

Greg Lesnewich (@greglesnewich) 's Twitter Profile Photo

As always, excellent work from the gang at Lumen This time on Cuttlefish, a modular malware family popping SOHO routers for hijacking and packet sniffing blog.lumen.com/eight-arms-to-…

As always, excellent work from the gang at Lumen

This time on Cuttlefish, a modular malware family popping SOHO routers for hijacking and packet sniffing 

blog.lumen.com/eight-arms-to-…
alden (@birchb0y) 's Twitter Profile Photo

this week on love island cybercrime! 🔥 🫦 a hot new access broker enters the villa, 😱 stealer logs are leaked on telegram, 💔 and a ransom affiliate is found CHEATING with another group!

this week on love island cybercrime! 🔥 

🫦 a hot new access broker enters the villa, 😱 stealer logs are leaked on telegram, 💔 and a ransom affiliate is found CHEATING with another group!
State of Statecraft Conference (@what_is_sos) 's Twitter Profile Photo

State of Statecraft (SOS) is a new security and intelligence conference purposed to bring together observers of espionage, sabotage, influence, and other unique forms of covert statecraft to share their work with a community hyper-focused on tackling state-sponsored ops.

State of Statecraft (SOS) is a new security and intelligence conference purposed to bring together observers of espionage, sabotage, influence, and other unique forms of covert statecraft to share their work with a community hyper-focused on tackling state-sponsored ops.
Brian in Pittsburgh (@arekfurt) 's Twitter Profile Photo

In all honesty, I'm sure there are organizations who have today adopted "Zero Trust Network Access" and diverse cloud services who were actually more practically secure back when they had all remote users authenticating via certificates to a tunneling VPN and on-prem servers.