Drunk Binary (@drunkbinary) 's Twitter Profile
Drunk Binary

@drunkbinary

Principal Adversary Hunter @dragosinc, Army Veteran (3rd ACR, 1/10CAV, CYBERCOM), Cocktail Scientist, Threat Researcher/Analyst | #FSD

ID: 4068173614

linkhttps://bsky.app/profile/drunkbinary.bsky.social calendar_today29-10-2015 13:43:50

10,10K Tweet

12,12K Takipçi

2,2K Takip Edilen

Threat Insight (@threatinsight) 's Twitter Profile Photo

New e-crime insights: TA4557, known for distributing More_eggs malware, notably expanded to an int'l audience in recent campaigns. Per our data, the recruiter-focused TA was seen targeting orgs in France, England & Ireland, in addition to typical North America-targeted threats.

Chris Duggan (@tlp_r3d) 's Twitter Profile Photo

Nice report from Proofpoint on TA4557! I noticed that you can hunt for Resume Profiles dropping More_Eggs backdoor: http.title:"Resume" HTTP/1.1 200 OK Date: GMT Server: Apache/2.4.58 (Ubuntu) Vary: Accept-Encoding Content-Length: Content-Type: text/html; charset=UTF-8 Happy

Nice report from Proofpoint on TA4557!

I noticed that you can hunt for Resume Profiles dropping More_Eggs backdoor:

http.title:"Resume" HTTP/1.1 200 OK Date: GMT Server: Apache/2.4.58 (Ubuntu) Vary: Accept-Encoding Content-Length: Content-Type: text/html; charset=UTF-8
 
Happy
NSA Cyber (@nsacyber) 's Twitter Profile Photo

SIEM/SOAR platforms can empower network defenders to uncover cyber threats and protect your data from malicious actors. Cybersecurity executives and practitioners should review our new joint guidance to ensure proper implementation and security. nsa.gov/Press-Room/Pre…

SIEM/SOAR platforms can empower network defenders to uncover cyber threats and protect your data from malicious actors. Cybersecurity executives and practitioners should review our new joint guidance to ensure proper implementation and security. nsa.gov/Press-Room/Pre…
Antti Tikkanen (@anttitikkanen) 's Twitter Profile Photo

Great talk by John Lambert on ways you can turn security data into graphs: youtube.com/watch?v=cXhX3s…. Especially the vector part is great: so many tools have built in support for embeddings (e.g. BigQuery ML.GENERATE_EMBEDDING and VECTOR_SEARCH), defenders should be using them more!

Greg Lesnewich (@greglesnewich) 's Twitter Profile Photo

This talk from John Lambert is indeed very good and is taunting me with doing math at work 😒 Srsly tho I’d love to take a class on applied algebra for anomaly detection from him because he explains it so clearly 🤩

Nick VanGilder (@nickvangilder) 's Twitter Profile Photo

At this point, maybe North Korea should just start selling bootcamps for how to break into cybersecurity. They seem to have really figured that shit out.

ACE Responder (@aceresponder) 's Twitter Profile Photo

✅The UAC Bypasses module is now available in the instant SIEM! Practice investigating a diverse set of UAC bypasses with Kusto Query Language (KQL)! #ThreatHunting #DFIR aceresponder.com/learn/uac-bypa…