Simone Kraus(@simonekrausora1) 's Twitter Profile Photo


uncoder_io and @google chronicle - example of how fast you can do with and IOCs from the threat intelligence report WithSecure™ about the novel backdoor and translate it into SIEMs. Superfast!

#Kapeka #Backdoor #Malware #Sandworm #APT 
@Uncoder_IO and @google chronicle - example of how fast you can do #threathunting with #uncoderIO and IOCs from the threat intelligence report @WithSecure about the novel backdoor #Kapeka and translate it into SIEMs. Superfast!
account_circle
PIVOTcon(@pivot_con) 's Twitter Profile Photo

Feeling lost while 🔎and 🎯 for adversaries 🦹?
Come to and learn from the best threat researchers in our field (speakers and attendees).
You will have lots of opportunities to discuss

Feeling lost while #pivoting 🔎and #threathunting 🎯 for adversaries 🦹? 
Come to #PIVOTcon24 and learn from the best threat researchers in our field (speakers and attendees). 
You will have lots of opportunities to discuss #CTI #threatintel
account_circle
Nucleon Security(@NucleonSec) 's Twitter Profile Photo

🗓 SAVE THE DATE | TECH TALK SERIES
Episode 3 : Jeudi 25 Avril - 11h30 GMT+1

💡 Rejoignez-nous pour un webinaire exclusif où nous explorerons les capacités de pointe de Nucleon EDR pour le  .
👉 Inscrivez-vous pour réserver votre place : events.teams.microsoft.com/event/04575b39…

🗓 SAVE THE DATE | TECH TALK SERIES
Episode 3 : Jeudi 25 Avril - 11h30 GMT+1

💡 Rejoignez-nous pour un webinaire exclusif où nous explorerons les capacités de pointe de Nucleon EDR pour le #threathunting. 
👉 Inscrivez-vous pour réserver votre place : events.teams.microsoft.com/event/04575b39…
account_circle
SANS DFIR(@sansforensics) 's Twitter Profile Photo

teaches the skills to identify, analyze, & respond to attacks on platforms & how to use techniques to find stealthy attackers
Take it with Jim - #BlackLivesMatter 🌈 at SANS Institute Rocky Mountain in June
Register here: sans.org/u/1vgv

#FOR577 teaches the skills to identify, analyze, & respond to attacks on #Linux platforms & how to use #threathunting techniques to find stealthy attackers 
Take it with @jclausing  at @SANSInstitute  Rocky Mountain in June
Register here: sans.org/u/1vgv
account_circle
The Hacker Wire(@TheHackerWire) 's Twitter Profile Photo

You can use this Shodan search query http.html_hash:-1303565546 to find Palo Alto Networks GlobalProtect appliances that might be vulnerable to the recent CVE-2024-3400 RCE.

You can use this Shodan search query http.html_hash:-1303565546 to find Palo Alto Networks GlobalProtect appliances that might be vulnerable to the recent CVE-2024-3400 RCE.
 #PaloAltoNetworks #CVE20243400 #VulnerabilityScanning #ThreatHunting #InfoSec #Pentesting
account_circle
Cyborg Security(@CyborgSecInc) 's Twitter Profile Photo

In , we often overlook behaviors, focusing instead on IOCs and artifacts. Recognizing behaviors as starting points for investigations, not just confirmatory evidence, is a missed opportunity for teams. Learn more: huntwithcyb.org/3UwqI65

In #cybersecurity, we often overlook behaviors, focusing instead on IOCs and artifacts. Recognizing behaviors as starting points for investigations, not just confirmatory evidence, is a missed opportunity for #security teams. Learn more: huntwithcyb.org/3UwqI65

#threathunting
account_circle
WhoisXML API(@whoisxmlapi) 's Twitter Profile Photo

If you’re currently job hunting, then you may want to know all about . Find out why and what dangerous web properties may land you in hot water in: circleid.com/posts/20240322…

If you’re currently job hunting, then you may want to know all about #ResumeLooters. Find out why and what dangerous web properties may land you in hot water in: circleid.com/posts/20240322…

#cybersecurity #threatintelligence #threathunting
account_circle
David das Neves(@david_das_neves) 's Twitter Profile Photo

A good friend of mine, Deniz, put some nice Threat Hunting KQL queries out that you should not miss.

Follow the Breadcrumbs with Microsoft IR & MDI: Working Together to Fight Identity-based Attacks
buff.ly/3W2Bi5D

A good friend of mine, Deniz, put some nice Threat Hunting KQL queries out that you should not miss.

Follow the Breadcrumbs with Microsoft IR & MDI: Working Together to Fight Identity-based Attacks
buff.ly/3W2Bi5D

 #CyberSecurity #ThreatHunting
account_circle
securigeek👁️‍🗨️(@securigeek) 's Twitter Profile Photo

Dig into Chronicle's powerful investigation views to hunt for threats. Pivot between related entities, enrich IoCs with VirusTotal intelligence, and uncover the scope of incidents. The built-in visualizations help you connect the dots faster.

account_circle