Artem Sychev (@sychev_a_k) 's Twitter Profile
Artem Sychev

@sychev_a_k

#cybersecurity expert, #datascience interesting #threatintelligence #threathunting #soc #malware #DFIR #machinelearning

ID: 1891419330

calendar_today21-09-2013 20:57:24

2,2K Tweet

74 Takipçi

712 Takip Edilen

Ram Shankar Siva Kumar (@ram_ssk) 's Twitter Profile Photo

📢📢Frank Nagle and I wrote a piece for Harvard Business Review - hbr.org/2020/04/the-ca… exploring Adversarial Machine Learning's impact to businesses Our question: Given the uptick of attacks on ML can businesses insure their ML systems? Do existing cyber insurance cover this? 1/

Frank Boldewin (@r3c0nst) 's Twitter Profile Photo

Why a mature SIEM environment is critical for SOAR implementation #DFIR #Threathunting #SOAR #SIEM correlatedsecurity.com/soar-critical-…

Why a mature SIEM environment is critical for SOAR implementation #DFIR #Threathunting #SOAR #SIEM correlatedsecurity.com/soar-critical-…
Scott Coull (@drscottcoull) 's Twitter Profile Photo

Are you applying machine learning techniques to interesting binary analysis problems? Consider submitting to the Machine Learning for Binary Analysis Workshop, colocated with IJCAI! Code similarity, GCNs, NLP on binaries...all in scope! sites.google.com/view/mlba2020/

Graylog (@graylog2) 's Twitter Profile Photo

Learn how to aggregate, analyze & alert on VPN & firewall logs in this Tech Talk recording. Find out the benefits of monitoring these logs & best practices for setting this up in Graylog. bit.ly/2KLjOVx #infosec #cybersecurity

Learn how to aggregate, analyze & alert on VPN & firewall logs in this Tech Talk recording. Find out the benefits of monitoring these logs & best practices for setting this up in Graylog.
bit.ly/2KLjOVx
#infosec #cybersecurity
Roberto Rodriguez 🇵🇪 (@cyb3rward0g) 's Twitter Profile Photo

🚨💥 Registration for the first community Infosec Jupyterthon is open! Also, check the current talks & speakers that would love share their knowledge with you 💜 🍻 🗓️ Current Agenda: infosecjupyterthon.com/agenda.html 📒 Registration Form: bit.ly/InfosecJupyter… See you on Friday 5/8

Alexandre Borges (@ale_sp_brazil) 's Twitter Profile Photo

Malwoverview 3.0.0 is available! github.com/alexandreborge… This version includes information gathering by IP from VT and Polyswarm, Yara information from Malshare, searching for URL and payload by tag from URLHaus and searching for domain/URL from Polyswarm. #ThreatHunting

Malwoverview 3.0.0 is available! 

github.com/alexandreborge…

This version includes information gathering by IP from VT and Polyswarm, Yara information from Malshare, searching for URL and payload by tag from URLHaus and searching for domain/URL from Polyswarm.

#ThreatHunting
Jonny Johnson (@jsecurity101) 's Twitter Profile Photo

Have you ever been curious what type of data will fire when a domain user logs into a use (interactively)? I drew out some mind maps with the correlating data 🙂 What is interesting is how the data changes per the number of times a user has logged in within the domain 🤔

Have you ever been curious what type of data will fire when a domain user logs into a use (interactively)? 

I drew out some mind maps with the correlating data 🙂

What is interesting is how the data changes per the number of times a user has logged in within the domain 🤔
Teru Yamazaki (@4n6ist) 's Twitter Profile Photo

Wow, DCode v5 has been released! It looks modern UI, but I have to install it...no more portable version? #dfir digital-detective.net/dcode/

Ring3API 🇺🇦 (@ntlmrelay) 's Twitter Profile Photo

📌ATTACK MAPPING WITH #BLOODHOUND: 📕#AD Attack #2 – Local Admin Mapping blog.stealthbits.com/local-admin-ma… #ThreatHunting #BlueTeam #redteam #windows #activedirectory

Elastic (@elastic) 's Twitter Profile Photo

Cybersecurity: stronger when open. In this blog post, we show you how to use Filebeat to collect data from the CrowdStrike Falcon platform, with an ingest pipeline converting the relevant fields to Elastic Common Schema. Check it out. go.es.io/2WckD0f

ATT&CK (@mitreattack) 's Twitter Profile Photo

Subs have launched! After 3 months in beta, ATT&CK with Sub-Techniques (with some small fixes) has become... ATT&CK (attack.mitre.org/resources/upda…). We've published a new blog post (medium.com/mitre-attack/a…) that includes updates to our crosswalk format and describes what's changed.

Blue Team Labs Online (@bluelabsonline) 's Twitter Profile Photo

💰GIVEAWAY!💰 From forensics to hunting, incident response to security ops, are you ready for our labs? 🥇= 6 Months PRO 🥈= 3 Months PRO 🥉= 1 Month PRO 1)👋 Follow Us 2)🔄 Retweet This 3)📢 Winners Announced @ Launch #dfir #blueteam #soc #infosec #cybersecurity #labs

💰GIVEAWAY!💰 From forensics to hunting, incident response to security ops, are you ready for our labs?

🥇= 6 Months PRO
🥈= 3 Months PRO
🥉= 1 Month PRO

1)👋 Follow Us
2)🔄 Retweet This
3)📢 Winners Announced @ Launch

#dfir #blueteam #soc #infosec #cybersecurity #labs
siLLyDaddy (@sillydadddy) 's Twitter Profile Photo

🎉🎉🎉Giving away one PentesterLab subscription valid for 🔥🔥 3 months 🔥🔥 Will select a random person from the retweets . Thanks to the person who gave it to me to share with the community 🙏