T.J. (@timdotzero) 's Twitter Profile
T.J.

@timdotzero

Elastic Platform Engineer @BHinfoSecurity | DFIR + Tech + Music + Coffee | @[email protected] (opinions expressed are my own)

ID: 1102920560357662720

calendar_today05-03-2019 13:15:27

938 Tweet

417 Followers

759 Following

Sysinternals (@sysinternals) 's Twitter Profile Photo

We're excited to announce the release of ProcDump 1.0 for Mac. ProcDump functionality is now available on Windows, Linux, and macOS. Get the tools at sysinternals.com. See what's new on the Sysinternals Blog: techcommunity.microsoft.com/blog/sysintern…

BSides Austin (@bsidesaustin) 's Twitter Profile Photo

Free workshop: “Advanced Email Threat Hunting w/ Detection as Code” by Michael Robertson Recon InfoSec Buy conference tix by EOD 11/22 to receive email when wksh reg opens—1st come, 1st served bsidesaustin.com/schedule Security BSides BSides San Antonio / BSidesSATX Austin ISSA Defcon 512 LASCON

Free workshop: “Advanced Email Threat Hunting w/ Detection as Code” by Michael Robertson <a href="/Recon_InfoSec/">Recon InfoSec</a> 
Buy conference tix by EOD 11/22 to receive email when wksh reg opens—1st come, 1st served
bsidesaustin.com/schedule
<a href="/SecurityBSides/">Security BSides</a> <a href="/BSidesSATX/">BSides San Antonio / BSidesSATX</a> <a href="/AustinISSA/">Austin ISSA</a> <a href="/dc512/">Defcon 512</a> <a href="/LASCONATX/">LASCON</a>
Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

What is SQL and why is it worth learning? Come join a former SQL-hater to learn the capabilities of the universal data query language and how you can use it for more than just databases. Join us for a free one-hour Black Hills Information Security (BHIS) webcast with Security

What is SQL and why is it worth learning?

Come join a former SQL-hater to learn the capabilities of the universal data query language and how you can use it for more than just databases.

Join us for a free one-hour Black Hills Information Security (BHIS) webcast with Security
Whitney Champion 🍪🚀 bluesky @whit.zip (@shortxstack) 's Twitter Profile Photo

listening to one of the sharpest minds in our space, Recon InfoSec's Andrew Cook, drop wisdom bombs at BSides Austin 🥹🔥🙌 "proactive defense: building effective threat hunts with AI and human expertise"

listening to one of the sharpest minds in our space, <a href="/Recon_InfoSec/">Recon InfoSec</a>'s <a href="/whoisAndrewCook/">Andrew Cook</a>, drop wisdom bombs at <a href="/BSidesAustin/">BSides Austin</a> 🥹🔥🙌

"proactive defense: building effective threat hunts with AI and human expertise"
strandjs - strandjs@bsky.social (@strandjs) 's Twitter Profile Photo

If you're an educator, please reach out to the Black Hill's team about sending you copies of the guide for free to help in your efforts to raise up the next generation of infosec professionals. blackhillsinfosec.com/contact-us/

Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

Day 347 of 366 Days of Cyber! Want to take what you learned from yesterday post further? Antisyphon Training has got you covered -antisyphontraining.com/course/securin… If you'd like more helpful educational content, check out the Infosec Survival Guide: GREEN BOOK - blackhillsinfosec.com/prompt-zine/pr…

Day 347 of 366 Days of Cyber!

Want to take what you learned from yesterday post further? Antisyphon Training has got you covered -antisyphontraining.com/course/securin…

If you'd like more helpful educational content, check out the Infosec Survival Guide: GREEN BOOK -  blackhillsinfosec.com/prompt-zine/pr…
Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

Blue teamers — sometimes we can lose sight of Active Directory. I mean, it just works in the background, right? Active Directory is crucial to Windows networks and a perfect target for bad actors. Dive into this article to learn common active directory pitfalls and how to avoid

Blue teamers — sometimes we can lose sight of Active Directory. I mean, it just works in the background, right? Active Directory is crucial to Windows networks and a perfect target for bad actors. Dive into this article to learn common active directory pitfalls and how to avoid
Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

"Did you learn the standard formula? Cyber risk = Threat x Vulnerability x Consequence" Read more: blackhillsinfosec.com/cyber-risk-les… Cyber Risk Lessons We Can Learn From Hurricane Preparedness by: Kelli Tarala Published: 11/14/2024

Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

"In addition to being common, access control vulnerabilities are often high impact when exploited..." Read more: blackhillsinfosec.com/finding-access… Finding Access Control Vulnerabilities with Autorize by: Craig Vincent Published: 11/21/2024

Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

Ever wanted to run Nuclei scans at scale without relying on Nuclei Cloud? Now you can! Ralph May joined us for a free one-hour BHIS webcast and taught us about the power of Nuclei scans and their incredible value for security teams. But that was just the beginning. Ralph

Ever wanted to run Nuclei scans at scale without relying on Nuclei Cloud? Now you can!

Ralph May joined us for a free one-hour BHIS webcast and taught us about the power of Nuclei scans and their incredible value for security teams. But that was just the beginning.

Ralph
Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

INFOSEC CONTENT CREATORS! Do you have a YouTube channel, Twitch stream, blog, magazine, or anything else where you share your knowledge and insights on cybersecurity, please drop the link in the comments. We want to help you find more people to help. We're all in this

Hayden (@kilobytethedust) 's Twitter Profile Photo

If you're looking to get into SOC work, specifically Detection Engineering, I'm running a Pay-What-You-Can Detection Engineering workshop on March 7th: antisyphontraining.com/course/worksho…

Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

It's dangerous to go alone, here... take this knowledge with you. Joseph joined us last week to share what he's discovered and learned about the Dark Web, so you never ever ever have to go there for yourself! No slide deck for this one so just sit back and enjoy -

It's dangerous to go alone, here... take this knowledge with you.

Joseph joined us last week to share what he's discovered and learned about the Dark Web, so you never ever ever have to go there for yourself! 

No slide deck for this one so just sit back and enjoy -
Antisyphon Training (@antisy_training) 's Twitter Profile Photo

Something to look forward to this Friday: Foundations of Network Forensics & Analysis with Troy Wojewoda! This workshop is 4 hours long and includes hands-on labs. It's the perfect way to fit a bit of training into your workweek. Registration & details: antisyphontraining.com/course/worksho…

Something to look forward to this Friday: Foundations of Network Forensics &amp; Analysis with Troy Wojewoda!

This workshop is 4 hours long and includes hands-on labs. It's the perfect way to fit a bit of training into your workweek.

Registration &amp; details: antisyphontraining.com/course/worksho…
Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

Hey folks! THURSDAY - BHIS Webcast Join us for a free one-hour webcast with the Black Hills Information Security (BHIS) ANTISOC Continuous Penetration Testing team. Learn how we test our client's security daily and take home tools and techniques to try yourself. Isn’t this

Hey folks!

THURSDAY - BHIS Webcast

Join us for a free one-hour webcast with the Black Hills Information Security (BHIS) ANTISOC Continuous Penetration Testing team.

Learn how we test our client's security daily and take home tools and techniques to try yourself.

Isn’t this
Antisyphon Training (@antisy_training) 's Twitter Profile Photo

Workshop happening THIS THURSDAY: ✔️ Pay What You Can ✔️ Collaborative interaction with instructor & fellow students ✔️ Access to course slides for future reference ✔️ Tips, tools, & techniques that can be applied immediately antisyphontraining.com/product/worksh…

Workshop happening THIS THURSDAY: 

✔️ Pay What You Can
✔️ Collaborative interaction with instructor &amp; fellow students
✔️ Access to course slides for future reference
✔️ Tips, tools, &amp; techniques that can be applied immediately

antisyphontraining.com/product/worksh…
strandjs - strandjs@bsky.social (@strandjs) 's Twitter Profile Photo

God I hate the fact that Threat + Hunting is being called "Thrunting." And we now have Threat + Hunters who are "Thrunters." This is all I can see when I see these terms...

Whitney Champion 🍪🚀 bluesky @whit.zip (@shortxstack) 's Twitter Profile Photo

i don't post much here these days, but this one feels worth sharing to the #DFIR community Eric Capuano - Bsky: @eric.zip has been working on this side project, almost at MVP 🌈 so if you work in forensics and want super timelines on macOS... THOON!

i don't post much here these days, but this one feels worth sharing to the #DFIR community 

<a href="/eric_capuano/">Eric Capuano - Bsky: @eric.zip</a> has been working on this side project, almost at MVP 🌈

so if you work in forensics and want super timelines on macOS... THOON!