Izy (@izysec) 's Twitter Profile
Izy

@izysec

Learning to break, working to secure.

ID: 883200352740179968

calendar_today07-07-2017 05:45:47

475 Tweet

329 Takipçi

352 Takip Edilen

Alexandre Borges (@ale_sp_brazil) 's Twitter Profile Photo

So far I've written 559 pages to help the security community: 1. exploitreversing.com/2021/12/03/mal… 2. exploitreversing.com/2022/02/03/mal… 3. exploitreversing.com/2022/05/05/mal… 4. exploitreversing.com/2022/05/12/mal… 5. exploitreversing.com/2022/09/14/mal… 6. exploitreversing.com/2022/11/24/mal… 7. exploitreversing.com/2023/01/05/mal… 8. exploitreversing.com/2023/04/11/exp…

Jonny Johnson (@jsecurity101) 's Twitter Profile Photo

I recently was doing a bit of a deeper dive into ImpersonateNamedPipeClient which led me down a rabbit hole into file system drivers. I wrote a blog on some of the cool things I ran across below :) posts.specterops.io/exploring-impe…

Grzegorz Tworek (@0gtweet) 's Twitter Profile Photo

I'm super excited to announce the launch of my "Mastering Windows Internals" pilot program. The goal is to share my knowledge and experiences, along with offering practical insights on using the tools I've developed and continue to update.

aptwhatnow (@aptwhatnow) 's Twitter Profile Photo

mandiant.com/resources/blog… In March of this year we began seeing similar blending efforts that we saw DPRK do during the pandemic, then 3CX popped off giving us more insight, then Andariel’s ROCKHATCH malware popped off with fingerprints of two other APTs in it….

David das Neves (@david_das_neves) 's Twitter Profile Photo

Great overview table of accounts that belong to tier 0. #mustView for every Sec and AD specialist. [Repo] TierZeroTable specterops.github.io/TierZeroTable/ #CyberSecurity #Identity #SpecterOps #shiftavenue

Great overview table of accounts that belong to tier 0. #mustView for every Sec and AD specialist.
[Repo] TierZeroTable
specterops.github.io/TierZeroTable/ 

#CyberSecurity #Identity #SpecterOps #shiftavenue
Jared Atkinson (@jaredcatkinson) 's Twitter Profile Photo

I've just released the 9th part of my On Detection series. In this post I demonstrate that we see actions in cyberspace at the Operational level and what that means for detection engineers. posts.specterops.io/on-detection-t…

Jared Atkinson (@jaredcatkinson) 's Twitter Profile Photo

I've just released the next edition of the On Detection series. I investigate why detection rules based on Process Creation are often brittle or easily bypassed. I also provide a framework for discerning when it is appropriate and when it isn't. posts.specterops.io/on-detection-t…

Riccardo (@dottor_morte) 's Twitter Profile Photo

It's a bittersweet moment, but our series of "Attacking an EDR" has come to an end! Me and Her0 hope that you had as much fun reading it as we had writing it. riccardoancarani.github.io/2023-11-07-att…

SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

Wondering what telemetry an EDR collects? Wonder no more! Kostas and Alex Teixeira run an EDR Telemetry Project, covering all major EDRs: "The main goal of the EDR Telemetry project is to encourage EDR vendors to be more transparent about the telemetry they provide". Blog:

Wondering what telemetry an EDR collects?

Wonder no more! <a href="/Kostastsale/">Kostas</a> and <a href="/ateixei/">Alex Teixeira</a> run an EDR Telemetry Project, covering all major EDRs:

"The main goal of the EDR Telemetry project is to encourage EDR vendors to be more transparent about the telemetry they provide".

Blog:
Izy (@izysec) 's Twitter Profile Photo

A sister team of mine is hiring. They do hard core detection engineering. You will be analyzing things you won't see elsewhere and writing a variety of content to detect it. Super technical role alongside some great folk.

Izy (@izysec) 's Twitter Profile Photo

Having convertible detection content is great, no doubt. What I think is underrated is blueteam-focused tradecraft intel. Red teams share it all the time, we should too. A threat group recently showed creativity with a known technique. Here's how it worked cloud.google.com/blog/topics/th…

Steve YARA Synapse Miller (@stvemillertime) 's Twitter Profile Photo

1) I didn't know .RDP config files could be signed 2) RDP RemoteApps are crazy 3) I always appreciate a Fuzzy Snuggly Duck cloud.google.com/blog/topics/th…

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

Signed .rdp files are being used to trick users. GTIG observed a novel #phishing campaign targeting European government and military organizations, and has attributed it to a suspected Russia-nexus #espionage actor tracked as UNC5837. Read the details: bit.ly/4jrDcFD

Signed .rdp files are being used to trick users.

GTIG observed a novel #phishing campaign targeting European government and military organizations, and has attributed it to a suspected Russia-nexus #espionage actor tracked as UNC5837. 

Read the details: bit.ly/4jrDcFD