b41s (@b41ss) 's Twitter Profile
b41s

@b41ss

🪼

ID: 926181809456582656

calendar_today02-11-2017 20:18:45

655 Tweet

27 Followers

123 Following

Matt Zorich (@reprise_99) 's Twitter Profile Photo

In case you missed it, our incident response team put together their very own ninja hub - a collection of all their blogs, articles, lessons from the field and much more, I promise you will find something worthy of your time in the list - aka.ms/MicrosoftIRNin…

Stephan Berger (@malmoeb) 's Twitter Profile Photo

Who actively monitors the Application Event Log for the Event ID 15457, containing the string xp_cmdshell? The screenshot below is from an Incident Response engagement this year from an exploited FortiClient EMS server (CVE-2023-48788). xp_cmdshell spawns a Windows command

Who actively monitors the Application Event Log for the Event ID 15457, containing the string xp_cmdshell?

The screenshot below is from an Incident Response engagement this year from an exploited FortiClient EMS server (CVE-2023-48788). 

xp_cmdshell spawns a Windows command
Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

**NEW** BHIS | Blog If you had to guess, how does BHIS compromise your networks and domains? Let's go Family Feud style with this one! The Top Ten List of Why You Got Hacked This Year by: Jordan Drysdale & Kent Ickler Published: 12/12/2024 Learn more: blackhillsinfosec.com/top-ten-list-o…

Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

The Elastic stack is a powerful tool for centralizing, visualizing, and searching your security data, but the learning curve for new analysts can be steep. However that shouldn't keep you from adding a tool to your arsenal. Earlier this year we were joined by Dave Hoff - SOC

The Elastic stack is a powerful tool for centralizing, visualizing, and searching your security data, but the learning curve for new analysts can be steep. However that shouldn't keep you from adding a tool to your arsenal.

Earlier this year we were joined by Dave Hoff - SOC
Stephan Berger (@malmoeb) 's Twitter Profile Photo

Excellent talk from Brandon Colley about various attacks against Active Directory and how to fix them. I highly recommend this short video for every IT administrator, CISO, CSO, etc., to at least understand the basics of how attackers can fully compromise networks within hours.

Excellent talk from Brandon Colley about various attacks against Active Directory and how to fix them. I highly recommend this short video for every IT administrator, CISO, CSO, etc., to at least understand the basics of how attackers can fully compromise networks within hours.
Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

Day 351 of 366 Days of Cyber! Explore Detecting Malware Beacons with Zeek and Rita with BHIS - blackhillsinfosec.com/detecting-malw… If you'd like more helpful educational content, check out the Infosec Survival Guide: GREEN BOOK - blackhillsinfosec.com/prompt-zine/pr…

Day 351 of 366 Days of Cyber!

Explore Detecting Malware Beacons with Zeek and Rita with BHIS - blackhillsinfosec.com/detecting-malw… 

If you'd like more helpful educational content, check out the Infosec Survival Guide: GREEN BOOK -  blackhillsinfosec.com/prompt-zine/pr…
Stephan Berger (@malmoeb) 's Twitter Profile Photo

New blog post: Today I Learned - setfacl dfir.ch/posts/today_i_… setfacl is a powerful tool for managing Access Control Lists (ACLs) on Linux/Unix systems, offering flexibility beyond traditional file permissions. By allowing granular control over file and directory access, it

New blog post: Today I Learned - setfacl
dfir.ch/posts/today_i_…

setfacl is a powerful tool for managing Access Control Lists (ACLs) on Linux/Unix systems, offering flexibility beyond traditional file permissions. By allowing granular control over file and directory access, it
Kostas (@kostastsale) 's Twitter Profile Photo

🐧 It’s finally here! šŸ” The Linux EDR Telemetry Project results are live! After months of testing and collaboration, we’re excited to share how well EDR solutions handle Linux visibility. Thank you to everyone who contributed, shared feedback, and supported the project! Your

🐧 It’s finally here! šŸ”
The Linux EDR Telemetry Project results are live! After months of testing and collaboration, we’re excited to share how well EDR solutions handle Linux visibility.

Thank you to everyone who contributed, shared feedback, and supported the project! Your
b41s (@b41ss) 's Twitter Profile Photo

Incident Response in Microsoft Entra ID (formerly Azure AD) - Compromised user account edition medium.com/@bastradamus/i… #azure #Microsoft365 #entraID #CyberSec #cyberattacks

Red Canary (@redcanary) 's Twitter Profile Photo

HijackLoader—a newcomer to our monthly top 10 list—is fond of renaming executables, which presents a detection opportunity. Learn more in this month's edition of Intelligence Insights. redcanary.com/blog/threat-in…

Unit 42 (@unit42_intel) 's Twitter Profile Photo

The role of #LDAP in managing directory services makes it an attractive avenue for attackers to access critical information. Using examples ranging from ransomware attacks to cyberespionage, we walk through identifying these attacks as well as solutions. bit.ly/4iE9LAy

The role of #LDAP in managing directory services makes it an attractive avenue for attackers to access critical information. Using examples ranging from ransomware attacks to cyberespionage, we walk through identifying these attacks as well as solutions. bit.ly/4iE9LAy
Stephan Berger (@malmoeb) 's Twitter Profile Photo

New blog post: Oh my .. ! - Suspicious network traffic detected including Ransomware dfir.ch/posts/suspicio… ConnectionAttempt vs. InboundConnectionAccepted vs. How can I be sure the attacker did not successfully log on to the host? šŸ¤” I spent some time researching this question

New blog post: Oh my .. ! - Suspicious network traffic detected including Ransomware
dfir.ch/posts/suspicio…

ConnectionAttempt vs. InboundConnectionAccepted vs. How can I be sure the attacker did not successfully log on to the host? šŸ¤” I spent some time researching this question
Matt Zorich (@reprise_99) 's Twitter Profile Photo

If you have developers in your organization using Dev Tunnels in VS Code there are now group policy controls to allow you to manage the configuration. You can disable Dev Tunnels, disable anonymous tunnels or lock down access to specific Entra tenants- techcommunity.microsoft.com/blog/azuredevc…

abuse.ch (@abuse_ch) 's Twitter Profile Photo

One of the many reasons why you should share active malware distribution sites on URLhaus ā¤µļø Some of the largest cloud-, hosting and CDN-providers use data from URLhaus for signaling, helping them to identify and quickly take down hostile content šŸ›‘šŸ’„ Join our community and do

Matt Zorich (@reprise_99) 's Twitter Profile Photo

A little while ago I wrote a long piece detailing some of the issues we commonly find in Active Directory during compromises. If you are defender, work in identity or manage AD in anyway hopefully you find something valuable in here - techcommunity.microsoft.com/blog/microsoft…

Joe Stocker (@itguysocal) 's Twitter Profile Photo

NEW: Measure your email security detection rate with this KQL Query github.com/EHLOBen/MDO-He… (run the above query here: security.microsoft.com/v2/advanced-hu…)

NEW: Measure your email security detection rate with this KQL Query 
github.com/EHLOBen/MDO-He…

(run the above query here: security.microsoft.com/v2/advanced-hu…)
b41s (@b41ss) 's Twitter Profile Photo

Detecting device code phishing attacks in Google Security Operations #entraid #secops bastradamus.com/detecting-devi…

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

We have reproduced "ToolShell", the unauthenticated exploit chain for CVE-2025-49706 + CVE-2025-49704 used by Khoa Dinh to pop SharePoint at #Pwn2Own Berlin 2025, it's really just one request! Kudos to Markus Wulftange

We have reproduced "ToolShell", the unauthenticated exploit chain for CVE-2025-49706 + CVE-2025-49704 used by <a href="/_l0gg/">Khoa Dinh</a> to pop SharePoint at #Pwn2Own Berlin 2025, it's really just one request! Kudos to <a href="/mwulftange/">Markus Wulftange</a>
b41s (@b41ss) 's Twitter Profile Photo

Critical Vulnerabilities in React and Next.js: Security Advisory + Shodan query bastradamus.com/critical-vulne…