Security_Badger (@security_badger) 's Twitter Profile
Security_Badger

@security_badger

I just push buttons, sometimes things happen #dfir #misec

ID: 868876332024967168

calendar_today28-05-2017 17:07:15

809 Tweet

311 Followers

1,1K Following

Nasreddine Bencherchali (@nas_bench) 's Twitter Profile Photo

I believe communicating and understanding the intention of a detection rule is key to avoiding a lot of unnecessary pain during triage, tunning and bypass discussions. By design every detection is set to detect something. It's the responsibility of the author of said detection /1

rootsecdev (@rootsecdev) 's Twitter Profile Photo

The NSA has a free Ghidra debugging class if anyone is interested 👇 ghidra/GhidraDocs/GhidraClass/Debugger at master · NationalSecurityAgency/ghidra · GitHub github.com/NationalSecuri…

Jake Williams (@malwarejake) 's Twitter Profile Photo

If you have a few minutes before leaving work today, pick just one system and review logs for that system. If you don't know what the logs are telling you, research it. If you do, document it for the next analyst (who may not). Happy hunting!

Chris Sanders 🔎 🧠 (@chrissanders88) 's Twitter Profile Photo

Thanks to Nathan Swift and Microsoft for referencing my Intrusion Detection Honeypots book as an inspiration for their recent article on best practices for identity-based honeytokens. It's neat to see what people are doing with these concepts. techcommunity.microsoft.com/t5/microsoft-3…

rootsecdev (@rootsecdev) 's Twitter Profile Photo

Free workshop everyone Hands-On Workshop: Building Better Detections | Azure Edition | SANS Institute sans.org/webcasts/build…

Security_Badger (@security_badger) 's Twitter Profile Photo

What are five topics you can talk about for 30 minutes with zero prep? 1. Cybersecurity 2. Gardening 3. Star Wars 4. Anime 5. ADHD

Security_Badger (@security_badger) 's Twitter Profile Photo

Don’t think about it. Don’t try to be cool. Tell me; what was your favorite book when you were twelve? Off the top of my head:

Don’t think about it. Don’t try to be cool. Tell me; what was your favorite book when you were twelve?  

Off the top of my head:
Justin Elze (@hackinglz) 's Twitter Profile Photo

Many people, including myself, struggle with this as people rack up years in InfoSec. Remembering the behaviors that got you to where you are now might not be sustainable for 3,5,10,20+ years in your career, and that's ok. Many of us worked night and day on side projects,

Blue Team Con (@blueteamcon) 's Twitter Profile Photo

As part of our 2023 Call for Papers, we released a CFP Resources page. A page that helps those new to submitting to CFP's. We also released a form where you can submit your talk and get feedback before formally submitting! We have brought that back! See: blueteamcon.com/cfp-submission…

Nasreddine Bencherchali (@nas_bench) 's Twitter Profile Photo

I feel many people should actually work in the front line of defense. With broken SIEMs, unmanaged and underpaid teams, missing logs, broken workflows...etc. Many, and I mean many talk from their Ivory tower 6/7 figure job with the best, and taking one continent they live in or

Security_Badger (@security_badger) 's Twitter Profile Photo

My 2 cents on this, yeah it sucks having *your* stuff used in a way you didn't intend, but that is what hackers do. Our job as defenders is to make it more difficult and costly for attackers to operate in our environment. Detections rule, but aren't everything.

Chris Sanders 🔎 🧠 (@chrissanders88) 's Twitter Profile Photo

Evidence Insight 💾 - Internet Explorer/Edge WebCacheV DAT File Starting with IE 10, the WebCacheV*.dat file contains useful browser artifacts.