Adam Greenberg (@writingadam) 's Twitter Profile
Adam Greenberg

@writingadam

what does a scanner see?

ID: 800981756

calendar_today03-09-2012 18:46:57

182 Tweet

973 Followers

179 Following

Steve YARA Synapse Miller (@stvemillertime) 's Twitter Profile Photo

The TRITON origin story is a still mystery with lots of missing pieces. Evan Reese and I did some poking and found some overlaps with legit Triconex DLLs. Nothing mind blowing, but still cool: fireeye.com/blog/threat-re… #tristation #triton #tubular

Willi Ballenthin (@williballenthin) 's Twitter Profile Photo

Stymied by my own #flareon5 challenge, so I developed idawasm: An IDA Pro loader and processor for WebAssembly. details: fireeye.com/blog/threat-re…

Nathan Brubaker (@nathanbrubaker) 's Twitter Profile Photo

In our new @FireEye blog post we analyze some of the most frequent ICS security risks observed in the field during Mandiant (part of Google Cloud) ICS Healthcheck assessments. It is good to have some on-the-ground data to test commonly cited areas of ICS risk. fireeye.com/blog/threat-re…

Nathan Brubaker (@nathanbrubaker) 's Twitter Profile Photo

HOT OFF THE PRESS: Read our (not) FireEye_Intel #TRITON attribution blogpost tying TRITON actors to CNIIHM, a Russian Government-Owned research institute. fireeye.com/blog/threat-re…

Matthew Dunwoody (@matthewdunwoody) 's Twitter Profile Photo

New post is up! We pick apart the latest probable #APT29 phishing campaign and the nuance involved in dealing with, and attributing to, deceptive attackers. Written with Follow @anthomsec instead., @itsreallynick, Michael 🆘, @jonleathery. Credit to @barryv for the title. fireeye.com/blog/threat-re…

New post is up! We pick apart the latest probable #APT29 phishing campaign and the nuance involved in dealing with, and attributing to, deceptive attackers. Written with <a href="/QW5kcmV3/">Follow @anthomsec instead.</a>, @itsreallynick, <a href="/matonis/">Michael 🆘</a>, @jonleathery. Credit to @barryv for the title. fireeye.com/blog/threat-re…
Kimberly (@tiskimber) 's Twitter Profile Photo

Well covered that Ryuk ❌ NK in blogs by Kryptos Logic McAfee Labs Malwarebytes CrowdStrike. Here we share an example of an initial infection vector, more details on how Ryuk has been deployed, and some info on the observed TrickBot gtags fireeye.com/blog/threat-re…

b33f | 🇺🇦✊ (@fuzzysec) 's Twitter Profile Photo

SilkETW is now available ✍️🧐💡! Check out my short introduction post here => fireeye.com/blog/threat-re…, you can find the code on the @FireEye GitHub => github.com/fireeye/SilkETW

SilkETW is now available ✍️🧐💡! Check out my short introduction post here =&gt; fireeye.com/blog/threat-re…, you can find the code on the @FireEye GitHub =&gt; github.com/fireeye/SilkETW
Bryce (@bryceabdo) 's Twitter Profile Photo

🚨📝 New #FIN7 threat research blog, "Power Hour", published today by Mandiant (part of Google Cloud). Please enjoy 🌶🌶 mandiant.com/resources/evol… Blog includes: - FIN7 archaeology & evolution ⛏ - #POWERPLANT deep dive - BIRDWATCH (~#JssLoader) - Supply chain (😱) neat stuff in thread 🧵⤵️

Jake Valletta (@jake_valletta) 's Twitter Profile Photo

Finally made it on the #FireEye blog! Check out my technical analysis of the recently patched CVE-2016-2060! fireeye.com/blog/threat-re…

Matthew Dunwoody (@matthewdunwoody) 's Twitter Profile Photo

I wrote up the #APT29 TOR/meek domain fronting backdoor that we first discussed during our #noeasybreach talk. fireeye.com/blog/threat-re…

Christopher Glyer (@cglyer) 's Twitter Profile Photo

Breaking: Mandiant (part of Google Cloud) releases details on malware targeting critical infrastructure fireeye.com/blog/threat-re… TLDR: -Unknown nation state threat actor -Attacker caused shutdown of operations -First (public) incident targeting safety systems (that prevent further physical damage)

Daniel Bohannon (@danielhbohannon) 's Twitter Profile Photo

After 9 months Invoke-DOSfuscation is finally released!! There is a lot of information for detection in the white paper, and the Invoke-DosTestHarness function is exactly what I used for detection dev & tuning. Code: github.com/danielbohannon… White paper: fireeye.com/blog/threat-re…

Doug Bienstock (@doughsec) 's Twitter Profile Photo

Check out my blog post and tool release on OAuth Abuse! OAuth abuse is a social engineering technique that's managed to stay relatively under the radar until now. fireeye.com/blog/threat-re…