InfoSec Ninja ๐Ÿฅท๐Ÿป ๐Ÿ‡ฎ๐Ÿ‡ณ ๐Ÿ•‰๏ธ (@infosecmonk) 's Twitter Profile
InfoSec Ninja ๐Ÿฅท๐Ÿป ๐Ÿ‡ฎ๐Ÿ‡ณ ๐Ÿ•‰๏ธ

@infosecmonk

| Cyber Security Geek๐Ÿ‘จโ€๐Ÿ’ป | Sr. Security Consultant@Big4 | Microsoft/Google Security | Cloud Security | Sentinel Architect | Chronicle | Kusto(KQL) detective |

ID: 1331948577891909635

calendar_today26-11-2020 13:11:23

4,4K Tweet

1,1K Takipรงi

421 Takip Edilen

Matt Zorich (@reprise_99) 's Twitter Profile Photo

Want enriched information about things like IP address ownership, ASN information, geolocation data and more in Kusto? There is a great set of external data sources available here, including the KQL required to access them directly in your queries - firewalliplists.gypthecat.com/kusto-tables/

Krishna Agrawal (@krishnasagrawal) 's Twitter Profile Photo

Stop wasting hours trying to learn AI. ๐Ÿ“˜๐Ÿ“š I have already done it for you. With one list. Zero confusion. And no fluff ๐Ÿ“น Videos: 1. LLM Introduction: lnkd.in/dMqbaZdK 2. LLMs from Scratch: lnkd.in/dYYwEhYy 3. Agentic AI Overview (Stanford):

Stop wasting hours trying to learn AI. ๐Ÿ“˜๐Ÿ“š

I have already done it for you.

With one list. Zero confusion. And no fluff

๐Ÿ“น Videos:

1. LLM Introduction: lnkd.in/dMqbaZdK

2. LLMs from Scratch: lnkd.in/dYYwEhYy

3. Agentic AI Overview (Stanford):
Kaspersky (@kaspersky) 's Twitter Profile Photo

#Kaspersky researchers discovered preinstalled malware on certain models of tablets running Android โ€“ we called it Keenadu. It's a backdoor in ๐˜ญ๐˜ช๐˜ฃ๐˜ข๐˜ฏ๐˜ฅ๐˜ณ๐˜ฐ๐˜ช๐˜ฅ_๐˜ณ๐˜ถ๐˜ฏ๐˜ต๐˜ช๐˜ฎ๐˜ฆ.๐˜ด๐˜ฐ. More details are coming soon! #KasperskyGReAT #Research #Cybersecurity

#Kaspersky researchers discovered preinstalled malware on certain models of tablets running Android โ€“ we called it Keenadu.
It's a backdoor in ๐˜ญ๐˜ช๐˜ฃ๐˜ข๐˜ฏ๐˜ฅ๐˜ณ๐˜ฐ๐˜ช๐˜ฅ_๐˜ณ๐˜ถ๐˜ฏ๐˜ต๐˜ช๐˜ฎ๐˜ฆ.๐˜ด๐˜ฐ.
More details are coming soon!

#KasperskyGReAT #Research #Cybersecurity
InfoSec Ninja ๐Ÿฅท๐Ÿป ๐Ÿ‡ฎ๐Ÿ‡ณ ๐Ÿ•‰๏ธ (@infosecmonk) 's Twitter Profile Photo

Many of you asked about #SOC L1 #interview questions and real-world scenarios, and here we go.. Iโ€™ve compiled 100+ SOC L1 Interview Questions based on actual #SOC workflows, real #alerts, and what interviewers really expect from freshers and beginners: youtube.com/watch?v=p924hhโ€ฆ

Web Security Academy (@websecacademy) 's Twitter Profile Photo

Are you an aspiring hacker? Web Security Academy is the perfect place for you to kickstart your journey! And the best part is, itโ€™s TOTALLY FREE! Download your main tool here ๐Ÿ‘‡ portswigger.net/burp/releases/โ€ฆ Start learning here ๐Ÿ‘‡ portswigger.net/web-security/lโ€ฆ

Are you an aspiring hacker?

Web Security Academy is the perfect place for you to kickstart your journey! And the best part is, itโ€™s TOTALLY FREE!

Download your main tool here ๐Ÿ‘‡
portswigger.net/burp/releases/โ€ฆ

Start learning here ๐Ÿ‘‡
portswigger.net/web-security/lโ€ฆ
Het Mehta (@hetmehtaa) 's Twitter Profile Photo

Digital Forensics Lab - Interactive Labs - Linux-Centric Lab Environment - Visual Learning Support - Holistic Coverage - Open Source Tools github.com/frankwxu/digitโ€ฆ

Digital Forensics Lab 

- Interactive Labs 
- Linux-Centric Lab Environment 
- Visual Learning Support 
- Holistic Coverage 
- Open Source Tools  

github.com/frankwxu/digitโ€ฆ
The Hacker News (@thehackersnews) 's Twitter Profile Photo

๐Ÿ‡ฎ๐Ÿ‡ณ Indian government networks were targeted in two cyber campaigns linked to a Pakistan-based actor. Tracked by Zscaler as Gopher Strike and Sheet Attack, the key tactic was India-only malware delivery, filtered by IP and Windows systems to evade analysis. ๐Ÿ”— Attack chain and

๐Ÿ‡ฎ๐Ÿ‡ณ Indian government networks were targeted in two cyber campaigns linked to a Pakistan-based actor.

Tracked by Zscaler as Gopher Strike and Sheet Attack, the key tactic was India-only malware delivery, filtered by IP and Windows systems to evade analysis.

๐Ÿ”— Attack chain and