Andy (@andyp346) 's Twitter Profile
Andy

@andyp346

ID: 891396193

calendar_today19-10-2012 17:02:55

37 Tweet

22 Followers

150 Following

David Cannings (@edeca) 's Twitter Profile Photo

It was fun sharing a few thoughts with CREST on why I enjoy Incident Response #DFIR. A very rewarding career full of surprises!

Will Oram (@willoram) 's Twitter Profile Photo

1/ Human-operated ransomware attacks are a significant threat to organisations, and one of the most serious problems the cybersecurity industry needs to help solve. Gabriel Currie and I just spoke at SANS DFIR on the threat and how to defend against these attacks. THREAD👇

1/ Human-operated ransomware attacks are a significant threat to organisations, and one of the most serious problems the cybersecurity industry needs to help solve. <a href="/gabrielcurrie/">Gabriel Currie</a> and I just spoke at <a href="/sansforensics/">SANS DFIR</a> on the threat and how to defend against these attacks.

THREAD👇
Andy (@andyp346) 's Twitter Profile Photo

Ransomware operators are getting organised - and UK organisations need to take action to defend themselves against this growing threat. Download our new whitepaper to find out why this should be a board-level priority: pwc.to/34RAMeG #CyberSecMonth #CyberAware

Ransomware operators are getting organised - and UK organisations need to take action to defend themselves against this growing threat. Download our new whitepaper to find out why this should be a board-level priority: pwc.to/34RAMeG #CyberSecMonth #CyberAware
Wietze (@wietze) 's Twitter Profile Photo

Looking forward to seeing you all this Friday at the 6th EU MITRE ATT&CK Community workshops. I'll be talking about DLL Hijacking, covering the different types, research, and why detection is hard! attack-community.org/event/

Kevin Ellis CBE (@kevinjdellis) 's Twitter Profile Photo

In a time when it will be hard to come together to commemorate, PwC UK’s London office is lit up to honour those who have died in the line of duty #LestWeForget

In a time when it will be hard to come together to commemorate, <a href="/PwC_UK/">PwC UK</a>’s London office is lit up to honour those who have died in the line of duty #LestWeForget
Andy (@andyp346) 's Twitter Profile Photo

We’ve just launched new PwC UK research looking at #CyberSecurity as a strategic priority. We cover challenges, priorities and why organisations must make #CyberRisk an intrinsic part of every business decision: pwc.to/3ncpXeR

We’ve just launched new <a href="/PwC_UK/">PwC UK</a> research looking at #CyberSecurity as a strategic priority. We cover challenges, priorities and why organisations must make #CyberRisk an intrinsic part of every business decision: pwc.to/3ncpXeR
Europol (@europol) 's Twitter Profile Photo

Bye-bye botnets👋 Huge global operation brings down the world's most dangerous malware. Investigators have taken control of the Emotet botnet, the most resilient malware in the wild. Get the full story: europol.europa.eu/newsroom/news/…

Bye-bye botnets👋 Huge global operation brings down the world's most dangerous malware.

Investigators have taken control of the Emotet botnet, the most resilient malware in the wild. 

Get the full story: europol.europa.eu/newsroom/news/…
Curtis (@cybershtuff) 's Twitter Profile Photo

Some practical how-to on handling a #BEC from start to finish. This is handy for all #DFIR, #ThreatIntelligence and #infosec professionals. github.com/PwC-IR/Busines…

Myrtus (@myrtus0x0) 's Twitter Profile Photo

Just mapped #dridex affiliates to their loader C2s. Take what inferences you want from it. Red lines are C2s with more than 2 affiliates overlapping, orange is 2 and black is unique to the affiliate. Thanks Hatching for the data 🙏

Just mapped #dridex affiliates to their loader C2s. Take what inferences you want from it. Red lines are C2s with more than 2 affiliates overlapping, orange is 2 and black is unique to the affiliate. Thanks <a href="/hatching_io/">Hatching</a> for the data 🙏
Andy (@andyp346) 's Twitter Profile Photo

Really proud of the PwC UK #Threatintel team that produced the Cyber Threats 2020: Year in Retrospect report. You can check out the key cyber threats here: pwc.to/2ZPx7fo

Andy (@andyp346) 's Twitter Profile Photo

Our latest PwC UK #ThreatIntel article looks at 5 cyber threat trends you need to be aware of this year. We cover ransomware, supply chain attacks, social engineering and more, and suggest how you can respond: pwc.to/3qRVrJn

Our latest <a href="/PwC_UK/">PwC UK</a> #ThreatIntel article looks at 5 cyber threat trends you need to be aware of this year. We cover ransomware, supply chain attacks, social engineering and more, and suggest how you can respond: pwc.to/3qRVrJn
Robert M. Lee (@robertmlee) 's Twitter Profile Photo

To my cybersecurity colleagues - especially in infrastructure security - get some rest. No one knows what’s going to happen but nothing you’re doing over the weekend will help for next week if something were to happen. No one benefits from you being tired in a crisis.

Kris McConkey (@smoothimpact) 's Twitter Profile Photo

Since 2017, PwC's #threatintel team has produced an annual 'Year in Retrospect' consolidation of the most impactful threat activity and trends observed over the past year across our incident response, Managed Cyber Defence, and threat research services around the world.

Since 2017, PwC's #threatintel team has produced an annual 'Year in Retrospect' consolidation of the most impactful threat activity and trends observed over the past year across our incident response, Managed Cyber Defence, and threat research services around the world.
Andy (@andyp346) 's Twitter Profile Photo

Well done The Banshee Queen👑 for getting this year's monster Year in Retrospect report over the finish line. And what a year it has been. I'm especially proud to be a member of the awesome team that helped produce this.

Andrew Northern 𓅓 (@ex_raritas) 's Twitter Profile Photo

1. We (myself and my peers) have observed a change in the attack chain for SocGholish web deployment for S O M E of the stage_1 injected sites. To be clear, not all. Now seeing <script async src="https://BLAH[.]foo/jquery.js"> Where BLAH[.]foo would be stage_1.5