Alejandro Chirivella (@alejandrochiri_) 's Twitter Profile
Alejandro Chirivella

@alejandrochiri_

DFIR Analyst | Cybersecurity Enthusiast 🔍💻 | Digital Forensics & Incident Response – finding answers in the chaos.
#DFIR #CyberSecurity #Infosec

ID: 1849132820817412096

calendar_today23-10-2024 16:56:47

29 Tweet

19 Takipçi

275 Takip Edilen

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

“We’ve been breached, and we have no idea how the attackers got in. We use an Ivanti VPN gateway, a Fortinet firewall, an IronPort mail gateway, and Citrix Netscaler ADCs for secure remote access. How could this possibly happen?”

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

I think the strong tendency toward imposter syndrome in cyber security stems from how many of us learned: through trial and error, self-study, and curiosity. Unlike structured learning from professors, we often taught ourselves with books, tools and weekends of experimentation.

Nithin Chenthur Prabhu (@azr43lkn1ght) 's Twitter Profile Photo

Introducing DFIR Labs: A 24-challenge series by internationally acclaimed CTF authors, tailored for professionals, researchers and students. Master DFIR, Malware Analysis and Threat Hunting through challenges designed to push your expertise to new heights github.com/Azr43lKn1ght/D…

Introducing DFIR Labs: A 24-challenge series by internationally acclaimed CTF authors, tailored for professionals, researchers and students. Master DFIR, Malware Analysis and Threat Hunting through challenges designed to push your expertise to new heights
github.com/Azr43lKn1ght/D…
Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

Google Ads 🙄 apparently allows ads to display fake URLs that mimic legitimate sites while actually redirecting to malicious ones

John Hammond (@_johnhammond) 's Twitter Profile Photo

The recent fake Google Ads Homebrew malware shenanigans in video form -- we track down the payload from Wayback Machine (and/or VirusTotal), crack it open it with Binary Ninja and uncover the AppleScript syntax to see the full AmosStealer payload 🙂 youtu.be/Nlnuk8W2A0Y

The recent fake Google Ads Homebrew malware shenanigans in video form -- we track down the payload from Wayback Machine (and/or VirusTotal), crack it open it with Binary Ninja and uncover the AppleScript syntax to see the full AmosStealer payload 🙂 youtu.be/Nlnuk8W2A0Y
ESET Research (@esetresearch) 's Twitter Profile Photo

#ESETresearch discovered and named 🇨🇳 China-aligned #APT group #PlushDaemon. It carried out a supply-chain compromise of a 🇰🇷South Korean #VPN provider, trojanizing its legitimate software installer with a Windows backdoor we named #SlowStepper. facundo Mz welivesecurity.com/en/eset-resear… 1/6

Jack Rhysider 🏴‍☠️ (@jackrhysider) 's Twitter Profile Photo

Saw a guy hunting for threat actors in the network today. No SIEM. No IDS. No EDR. He just sat there. Watching traffic in wireshark. Like a psychopath.

MyDFIR (@mydfir) 's Twitter Profile Photo

netstat -anob is one of the commands I use to quickly identify odd connections the moment someone mentions that their Windows PC is acting strange. Try it out yourself and see if there are any SYN_SENT or ESTABLISHED connections towards external IPs & odd ports. 👀👀

Antonio Sanz (@antoniosanzalc) 's Twitter Profile Photo

Ayer me alegraron el mes: a dos de mis compañeros del equipo de #DFIR de S2GRUPO (Buenaventura Salcedo y Alejandro Chirivella ) !!! les han aceptado su charla en la #RootedCON2025 !!! -> Wiiiiiiiiiiiiiiiiiiiiiiiiiiii 🥳🥳🥳🥳🥳🥳🥳 (1/2)

Ali Hadi | B!n@ry (@binaryz0ne) 's Twitter Profile Photo

Hey #DFIR community. Last month, we decided to open our Cyber 5W C5W-100 Intro to Digital Forensics course & make it FREE; yes completely FREE! Since then more than 1K of new learners joined & we hope more will too. Please share with anyone who wants to learn. #Cybersecurity

Hey #DFIR community. Last month, we decided to open our <a href="/cyber5w/">Cyber 5W</a> C5W-100 Intro to Digital Forensics course &amp; make it FREE; yes completely FREE! Since then more than 1K of new learners joined &amp; we hope more will too. Please share with anyone who wants to learn. #Cybersecurity
Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

(Scene: A shadowy room somewhere in North Korea. Reflective propaganda music playing in the background.) Operative 1: Comrade, how do we get the imperialist dogs to execute our code on their systems? (pauses, thinking deeply) Operative 2: What if… we simply give them a

/RootedCON (@rootedcon) 's Twitter Profile Photo

¡La espera ha terminado! 🎉 Presentamos la agenda oficial de #RootedCON2025, nuestro 15º aniversario, cargada de contenido imperdible para todos los apasionados de la ciberseguridad. Del 6 al 8 de marzo, en Kinépolis Madrid Ciudad de la Imagen, te esperan tres días intensos de

/RootedCON (@rootedcon) 's Twitter Profile Photo

🟠 Track ROOTEDCON: "Adquisiciones DFIR complejas: el diablo está en los detalles" con  Buenaventura Salcedo Santos-Olmo & Alejandro Chirivella Ciruelos de 14:00 a 15:00 en la Sala 17.  #RootedCON2025

/RootedCON (@rootedcon) 's Twitter Profile Photo

Sobre los acontecimientos recientes en España: Desde RootedCON, como principal comunidad de ciberseguridad en España, creemos fundamental ser prudentes y responsables en momentos como este. Queremos recordar que ante cualquier incidente tecnológico: 🔹 La calma es la primera

Antonio Sanz (@antoniosanzalc) 's Twitter Profile Photo

Aún queda alguna plaza suelta en la formación de #DFIR que voy a dar en la #rootedconVLC. Si tienes RAM suficiente para meterte un .tar.gz con conocimientos de respuesta ante incidentes ... !vente!

Justin Elze (@hackinglz) 's Twitter Profile Photo

Dwell time like this is definitely more interesting than talking about time to ransom. "In many cases, the average dwell time of 393 days exceeded log" re BRICKSTORM

spencer (@techspence) 's Twitter Profile Photo

More sysadmins need to know this… User logon restrictions are free. Create a GPO and call it “DC Logon Restrictions - Domain Admins Only” Configure User Rights Assignment for DA accounts to log on locally on domain controllers and deny log on locally on end-user workstations.

Stephan Berger (@malmoeb) 's Twitter Profile Photo

I was reading an older report from CrowdStrike the other day: "CrowdStrike was able to reconstruct the PowerShell script from the PowerShell Operational event log as the script’s execution was logged automatically due to the use of specific keywords." [1] Which reminded me of

I was reading an older report from CrowdStrike the other day:

"CrowdStrike was able to reconstruct the PowerShell script from the PowerShell Operational event log as the script’s execution was logged automatically due to the use of specific keywords." [1]

Which reminded me of