Isaac Dunham (@dunhamsec) 's Twitter Profile
Isaac Dunham

@dunhamsec

Cybersecurity!

ID: 1674036034915409926

calendar_today28-06-2023 12:44:37

289 Tweet

61 Followers

558 Following

13Cubed (@13cubeddfir) 's Twitter Profile Photo

🎉 Big news! Investigating macOS Endpoints is now live—plus our new *NIX Bundle and XPlat Bundle Complete (all 13Cubed courses in one package). Thanks for patiently waiting! Dive in now 👉 training.13cubed.com #DFIR #macOS #Linux

Isaac Dunham (@dunhamsec) 's Twitter Profile Photo

It is the year 2025. Microsoft is still using PowerShell scripts that run net commands to enumerate group membership. aka.ms/MSRD-Collect

It is the year 2025. Microsoft is still using PowerShell scripts that run net commands to enumerate group membership. 

aka.ms/MSRD-Collect
Isaac Dunham (@dunhamsec) 's Twitter Profile Photo

🚨 New blog post!🚨 In Security Operations, we spend a lot of time asking and answering questions as we try to solve the mysteries placed before us. I've assembled a list of my top ten investigative questions and how to best go about answering them. isaacdunham.github.io/posts/top-inve…

The DFIR Report (@thedfirreport) 's Twitter Profile Photo

🌟New report out today!🌟 Hide Your RDP: Password Spray Leads to RansomHub Deployment Analysis and reporting completed by [email protected], Aleks and UC2 🔊Audio: Available on Spotify, Apple, YouTube and more! thedfirreport.com/2025/06/30/hid…

Aura (@securityaura) 's Twitter Profile Photo

So I'll be doing a thing, my first thing ever in fact, at DEATHCon later this year for those interested. If you liked the #100DaysOfKQL challenge and want to learn how to get started in KQL and Defender XDR/Sentinel, this workshop is for you!

So I'll be doing a thing, my first thing ever in fact, at <a href="/DEATHCon2025/">DEATHCon</a> later this year for those interested.

If you liked the #100DaysOfKQL challenge and want to learn how to get started in KQL and Defender XDR/Sentinel, this workshop is for you!
Squiblydoo (@squiblydooblog) 's Twitter Profile Photo

Fake DBeaver signed by "LLC Vtorsintez" 🇷🇺 MD5: 4fa9f678df14a33e2e5480d63604f811 (Too big for MalwareBazaar) https://tria[.]ge/250711-n4tsnst1fs/behavioral1 Anti-analysis: wmic memorychip get Capacity -> exits h/t Who said what? JAMESWT

Fake DBeaver signed by "LLC Vtorsintez" 🇷🇺
MD5: 4fa9f678df14a33e2e5480d63604f811
(Too big for MalwareBazaar)

https://tria[.]ge/250711-n4tsnst1fs/behavioral1

Anti-analysis: wmic memorychip get Capacity -&gt; exits
h/t <a href="/g0njxa/">Who said what?</a> 
<a href="/JAMESWT_WT/">JAMESWT</a>
Aura (@securityaura) 's Twitter Profile Photo

If I ever go back to Corporate InfoSec, the first thing I implement is an automation that disable accounts that signs-in from an anonymizer (read: VPN) IP address from a non-compliant device. Call IT, prove your identity and submit written explanation as to what happened. FFS.

Matt Zorich (@reprise_99) 's Twitter Profile Photo

DFIR resource worth book marking, the cheat sheets from 13Cubed are a resource I constantly go back to, covering event logs, registry, browser artifacts and more. My favourite is definitely the RDP cheat sheet, which I have downloaded roughly 3500 times in the last few

DFIR resource worth book marking, the cheat sheets from <a href="/13CubedDFIR/">13Cubed</a> are a resource I constantly go back to, covering event logs, registry, browser artifacts and more. My favourite is definitely the RDP cheat sheet, which I have downloaded roughly 3500 times in the last few
Karsten Hahn (@struppigel) 's Twitter Profile Photo

Good news, the intermediate malware analysis course is almost finished. I have currently a test student working through the course to get rid of mistakes that I do not notice.

Karsten Hahn (@struppigel) 's Twitter Profile Photo

🦔 📹 New Video: There is more than Clean and Malicious ➡️ 7 file analysis verdicts and what they mean #MalwareAnalysisForHedgehogs #Verdicts youtube.com/watch?v=XwT23X…

Karsten Hahn (@struppigel) 's Twitter Profile Photo

🔍New Blog: JustAskJacky -- AI brings back classical trojan horse malware 🔗gdatasoftware.com/blog/2025/08/3… #GDATA G DATA Global #GDATATechblog

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

The "Malware Analysis – Intermediate Level" training by Karsten Hahn is 60% off right now Knowing the quality of his other content, I’d say this one’s definitely worth checking out …nalysis-for-hedgehogs.learnworlds.com/course/interme…

The "Malware Analysis – Intermediate Level" training by <a href="/struppigel/">Karsten Hahn</a> is 60% off right now

Knowing the quality of his other content, I’d say this one’s definitely worth checking out

…nalysis-for-hedgehogs.learnworlds.com/course/interme…
Karsten Hahn (@struppigel) 's Twitter Profile Photo

My intermediate level malware analysis course is there. 60% off for the next two weeks. …nalysis-for-hedgehogs.learnworlds.com/course/interme…

Nagli (@galnagli) 's Twitter Profile Photo

We found a way to access Max Verstappen's passport, driver's license, and personal information. Along with every other Formula1.com driver's sensitive data. It took us 10 minutes using one simple security flaw đź§µ

We found a way to access Max Verstappen's passport, driver's license, and personal information. Along with every other <a href="/Formula1/">Formula1.com</a> driver's sensitive data. 

It took us 10 minutes using one simple security flaw đź§µ
Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

New research shows Credential Guard can still leak creds By abusing Remote Credential Guard, attackers can request NTLMv1 challenge responses and recover NT hashes - even on fully patched Windows 11 with VBS and PPL - Microsoft confirmed and marked it “won’t fix.” - PoC called

New research shows Credential Guard can still leak creds

By abusing Remote Credential Guard, attackers can request NTLMv1 challenge responses and recover NT hashes - even on fully patched Windows 11 with VBS and PPL

- Microsoft confirmed and marked it “won’t fix.”
- PoC called
Isaac Dunham (@dunhamsec) 's Twitter Profile Photo

I wrote a blog post about dealing with "The Modern Phish" - an email from a legitimate email address, passing all SPF/DKIM/DMARC checks, returning no results from URL scanners, and generally originating from a compromised business email address. isaacdunham.github.io/posts/the-mode…

Isaac Dunham (@dunhamsec) 's Twitter Profile Photo

Risk-based alerting (only surfacing alerts that *truly* pose a risk to your organization) is all the rage in detection engineering. I threw together a guide to quickly getting started with RBA in Microsoft Sentinel. isaacdunham.github.io/posts/risk-bas… #DetectionEngineering #SIEM #Sentinel

Mark Cecchini, CFP® (@markcecchini) 's Twitter Profile Photo

COMMANDER: We’re fighting for freedom. And part of that freedom… is the freedom to retire with dignity. So we’re going to start accounts called 401(k)s. SOLDIER 1: What’s a 401(k)? COMMANDER: It’s a retirement account. You put money in, it grows tax-free, you take it out when

COMMANDER: We’re fighting for freedom. And part of that freedom… is the freedom to retire with dignity. So we’re going to start accounts called 401(k)s.

SOLDIER 1: What’s a 401(k)?

COMMANDER: It’s a retirement account. You put money in, it grows tax-free, you take it out when