Caroline (@kirbytypes) 's Twitter Profile
Caroline

@kirbytypes

Incident Response & Threat Hunting at TrustedSec. Striving cloud nerd. Recovering scene kid. Opinions are my own.

ID: 1567915167173967873

calendar_today08-09-2022 16:38:18

79 Tweet

94 Takipçi

360 Takip Edilen

Caroline (@kirbytypes) 's Twitter Profile Photo

The absolute cesspool of assumptions surrounding MGM/Caesars is mind boggling. You'd think at least the cyber community would be able to spot an ACTUAL source of confirmation.

Caroline (@kirbytypes) 's Twitter Profile Photo

I was on another lil episode of ShadowTalk :) talking MFA bypass, Microsoft storage leak & ALPHV/Scattered Spider: open.spotify.com/episode/0vxZ9C…

Matt Zorich (@reprise_99) 's Twitter Profile Photo

🎉Happy International Enable Sysmon and 4688 Auditing Day🎉grab yourself a slice of cake, chat to a colleague about it, bring it up at your all hands company meeting, talk to your kids about the most exciting day in the cyber calendar - github.com/reprise99/4688…

🎉Happy International Enable Sysmon and 4688 Auditing Day🎉grab yourself a slice of cake, chat to a colleague about it, bring it up at your all hands company meeting, talk to your kids about the most exciting day in the cyber calendar - github.com/reprise99/4688…
Caroline (@kirbytypes) 's Twitter Profile Photo

Was offline for 3 days for personal stuff, wtf is "Xmail", why is LE cosplaying as a TA, why does Optum seemingly touch everything, and what in god's name is going on with U.S. mobile carriers????

The DFIR Report (@thedfirreport) 's Twitter Profile Photo

🚀DFIR Labs CTF🚀 Our next CTF will be July 6, 16:00 – 20:00 UTC. ➡️Only $9.99 to join! ➡️Choose Elastic or Splunk as your SIEM ➡️Join our DFIR Labs CTF Discord Server ➡️Top 3 players win free swag! Register: the-dfir-report-store.myshopify.com/products/dfir-… More info: thedfirreport.com/services/dfir-…

TrustedSec (@trustedsec) 's Twitter Profile Photo

A massive data breach at AT&T exposed the data of "nearly all" of its customers. Incident Response Practice Lead Tyler Hudak spoke with Scripps News about what type of data could have been compromised and steps you can take to protect yourself. Watch now! hubs.la/Q02GnMfF0

Caroline (@kirbytypes) 's Twitter Profile Photo

I don't post on here much, but figured since this is my "professional" account, I would share that I'm thrilled to have joined the TrustedSec DFIR & Threat Hunting team back in May! It's been a great couple months so far, with lots of learning ahead of me. Truly thankful!

Caroline (@kirbytypes) 's Twitter Profile Photo

Surely nothing bad can come from publicly posting a monetary reward email pertaining to one of the biggest IT outages in history, right?

TrustedSec (@trustedsec) 's Twitter Profile Photo

Business Email Compromise (BEC) can threaten an organization's security at any level. During our next webinar, our experts will cover how pinpoint critical logs and artifacts essential for detecting suspicious BEC activities. Register now! hubs.la/Q02Q6WFv0

Business Email Compromise (BEC) can threaten an organization's security at any level. During our next webinar, our experts will cover how pinpoint critical logs and artifacts essential for detecting suspicious BEC activities. Register now! hubs.la/Q02Q6WFv0