Dominic Chell 👻 (@domchell) 's Twitter Profile
Dominic Chell 👻

@domchell

Just your friendly neighbourhood red teamer @MDSecLabs | Creator of /r/redteamsec | mdsec.co.uk | nighthawkc2.io

ID: 20015415

linkhttps://www.mdsec.co.uk calendar_today04-02-2009 00:02:39

15,15K Tweet

16,16K Followers

536 Following

Dominic Chell 👻 (@domchell) 's Twitter Profile Photo

Only a couple more weeks left on the early bird discount for our Black Hat training with myself, dylan and Tim - Lots of fresh new material for 2025. This course isn't just about tradecraft, the focus is on building capabilities that will help red teams succeed

Only a couple more weeks left on the early bird discount for our <a href="/BlackHatEvents/">Black Hat</a> training with myself, <a href="/_batsec_/">dylan</a> and <a href="/__invictus_/">Tim</a> - Lots of fresh new material for 2025. This course isn't just about tradecraft, the focus is on building capabilities that will help red teams succeed
dylan (@_batsec_) 's Twitter Profile Photo

We’re constantly updating this training with lessons learnt from our engagements and with TTPs coming through our R&D pipelines. You don’t wanna miss out.

XINTRA (@xintraorg) 's Twitter Profile Photo

New write-ups on our APT Labs 😍 Council of Tropical Affairs Mustang Panda Walkthrough by Chamindu Pushpika cham1ndux.github.io/posts/Mustand-…… Abu Jibal Lab APT34/OilRig Walkthrough medium.com/@QhtSec/xintra…

New write-ups on our APT Labs 😍

Council of Tropical Affairs Mustang Panda Walkthrough by <a href="/chamindu_x/">Chamindu Pushpika</a> 
cham1ndux.github.io/posts/Mustand-……

Abu Jibal Lab APT34/OilRig Walkthrough
medium.com/@QhtSec/xintra…
Arda Büyükkaya (@whichbufferarda) 's Twitter Profile Photo

Multiple Chinese 🇨🇳 nation-state APT groups have gained initial access to critical infrastructure networks through SAP NetWeaver intrusions, aiming to conduct cyber-enabled espionage and maintain persistent remote access. blog.eclecticiq.com/china-nexus-na…

Multiple Chinese 🇨🇳 nation-state APT groups have gained initial access to critical infrastructure networks through SAP NetWeaver intrusions, aiming to conduct cyber-enabled espionage and maintain persistent remote access. blog.eclecticiq.com/china-nexus-na…
Tim (@__invictus_) 's Twitter Profile Photo

This guy got his early bird ticket to our BlackHat training last year (photo from outside our room 🤣) There's only 3 days left until prices go up! We have a ton of revamped and updated content this year so don't miss out. blackhat.com/us-25/training… #redteam

This guy got his early bird ticket to our BlackHat training last year (photo from outside our room 🤣)

There's only 3 days left until prices go up! We have a ton of revamped and updated content this year so don't miss out.

blackhat.com/us-25/training…

#redteam
Dominic Chell 👻 (@domchell) 's Twitter Profile Photo

Help me with some research by answering a couple of quick polls. If you're a red or blue teamer, I'm interested in how often you've been detected or detected someone, courtesy one of the following c2 related IoCs. If you've voted, feel free to elaborate with comments - I'm

Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Microsoft has discovered worldwide cloud abuse activity by new Russia-affiliated threat actor Void Blizzard (LAUNDRY BEAR), whose cyberespionage activity targets gov't, defense, transportation, media, NGO, and healthcare in Europe and North America. msft.it/6011S9JpN

Virus Bulletin (@virusbtn) 's Twitter Profile Photo

Elastic Security Labs has uncovered a novel Rust-based infostealer distributed via Fake CAPTCHA campaigns that trick users into executing a malicious PowerShell script. EDDIESTEALER is hosted on multiple adversary-controlled web properties. elastic.co/security-labs/…

Elastic Security Labs has uncovered a novel Rust-based infostealer distributed via Fake CAPTCHA campaigns that trick users into executing a malicious PowerShell script. EDDIESTEALER is hosted on multiple adversary-controlled web properties.  elastic.co/security-labs/…
Cyber_OSINT (@cyber_o51nt) 's Twitter Profile Photo

Pakistan Telecommunication Company (PTCL) Targeted by Bitter APT During Heightened Regional Conflict blog.eclecticiq.com/pakistan-telec…