St0pp3r (@_st0pp3r_) 's Twitter Profile
St0pp3r

@_st0pp3r_

Detection Engineering · Threat Hunting · Incident Response

ID: 1042452014981107712

linkhttps://github.com/st0pp3r calendar_today19-09-2018 16:35:02

141 Tweet

162 Followers

247 Following

NVISO Labs (@nviso_labs) 's Twitter Profile Photo

Has your company ever been affected by a compromised business email? Read 0xSe7eN latest blog post, "How to Hunt & Defend Against Business Email Compromise" here 👇 blog.nviso.eu/2025/03/21/how…

DEATHCon (@deathcon2025) 's Twitter Profile Photo

The DEATHCon 2025 Call for Workshops is now open! If you have a great idea for teaching people how to do #detectionengineering or #threathunting or an adjacent skill through hands-on experience in our lab, we'd love to hear it! deathcon.io/cfp.html Submit before June 1

Agapios Tsolakis (@kwaleetea) 's Twitter Profile Photo

🚨 BLOG ALERT 🚨 I dove into maintenance in #DetectionEngineering - why it matters so much and the paradox that won’t let me sleep at night. This is the first post in a new series:

vas (@vasumanmoza) 's Twitter Profile Photo

Claude 4 just refactored my entire codebase in one call. 25 tool invocations. 3,000+ new lines. 12 brand new files. It modularized everything. Broke up monoliths. Cleaned up spaghetti. None of it worked. But boy was it beautiful.

Claude 4 just refactored my entire codebase in one call.

25 tool invocations. 3,000+ new lines. 12 brand new files.

It modularized everything. Broke up monoliths. Cleaned up spaghetti.

None of it worked.
But boy was it beautiful.
DEATHCon (@deathcon2025) 's Twitter Profile Photo

Great list of resources for anyone getting started in #detectionengineering (h/t to Richard Akroyd for creating this list) github.com/rfackroyd/dete…

NVISO Labs (@nviso_labs) 's Twitter Profile Photo

Detection-as-Code: From Concept to Practice 👇 Check out St0pp3r latest blog series, where he unpacks the fundamentals of #DetectionEngineering and takes a closer look at the game-changing concept of #DetectionAsCode. blog.nviso.eu/2025/07/08/det…

Detection-as-Code: From Concept to Practice 👇

Check out <a href="/_st0pp3r_/">St0pp3r</a> latest blog series, where he unpacks the fundamentals of #DetectionEngineering and takes a closer look at the game-changing concept of #DetectionAsCode.
blog.nviso.eu/2025/07/08/det…
St0pp3r (@_st0pp3r_) 's Twitter Profile Photo

Check out part 2 of our #DetectionEngineering - Practicing #DetectionAsCode series is out! This part is all about laying the groundwork for a scalable and efficient detection repository.

ᴍɪᴄʜᴀʟɪs ᴍɪᴄʜᴀʟᴏs (@cyb3rmik3) 's Twitter Profile Photo

📢 New blog post 📢 𝐁𝐫𝐞𝐚𝐤𝐢𝐧𝐠 𝐝𝐨𝐰𝐧 𝐭𝐡𝐞 𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭 𝐃𝐞𝐟𝐞𝐧𝐝𝐞𝐫 𝐄𝐱𝐭𝐞𝐫𝐧𝐚𝐥 𝐀𝐭𝐭𝐚𝐜𝐤 𝐒𝐮𝐫𝐟𝐚𝐜𝐞 𝐌𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭 𝐨𝐩𝐩𝐨𝐫𝐭𝐮𝐧𝐢𝐭𝐢𝐞𝐬 𝐟𝐨𝐫 𝐪𝐮𝐞𝐫𝐢𝐞𝐬 𝐢𝐧 𝐀𝐝𝐯𝐚𝐧𝐜𝐞𝐝 𝐇𝐮𝐧𝐭𝐢𝐧𝐠 & 𝐋𝐨𝐠 𝐀𝐧𝐚𝐥𝐲𝐭𝐢𝐜𝐬

NVISO Labs (@nviso_labs) 's Twitter Profile Photo

Ever wondered what a "middleman" can do for your security? In the world of software development, one of the biggest hidden dangers is #HardcodedCredentials. Read our latest blog post on #CyberArk’s Central Credential Provider (CCP) here 👇 blog.nviso.eu/2025/08/01/sto…