root

@33root

Team Lead at Deloitte 🇦🇷. Systems Information Engineer (UTN FRBA). Opinions are my own 👽.

Ciudad Autónoma de Buenos Aire
Vrijeme pridruživanja: studeni 2015.

Tweetovi

Blokirali ste korisnika/cu @33root

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @33root

  1. Prikvačeni tweet
    7. sij

    recommendation to defend US critical Infrastructure includes consuming relevant , monitor and alert for TTPs of Iranian groups

    Poništi
  2. proslijedio/la je Tweet
    31. sij

    Subió la participación de personas que se identifican como mujeres y otros géneros en la pero todavía estamos a tiempo de que haya aún más !

    , , i još njih 7
    Poništi
  3. proslijedio/la je Tweet
    31. sij

    🚨🚨 ATENCIÓN: El lunes vamos a hacer un anuncio MUY IMPORTANTE sobre la . ¿Qué te imaginás que es? 🔥 . 🚨🚨 ATTENTION: On Monday, we'll make a VERY IMPORTANT announcement about . What do you think it will be? 🔥

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    30. sij

    Attention Students: There’s still time to apply for a scholarship to attend Black Hat Asia Briefings for free. Deadline for applications is February 28, and all details may be found here:

    Poništi
  5. 30. sij
    Poništi
  6. proslijedio/la je Tweet
    27. sij

    Our talk "Catch me if you can! Detecting Sandbox Evasion Techniques" at presented by ✨ Be smarter than adversaries and make your Sandbox Systems stronger 💪

    Poništi
  7. proslijedio/la je Tweet
    27. sij

    At Catch me if you can! Detecting sandbox evasion techniques by

    Poništi
  8. proslijedio/la je Tweet
    27. sij

    Securing the software at Thank you for the opportunity 🙌🏻

    Poništi
  9. proslijedio/la je Tweet
    21. sij

    Rob’s talking about why all CTI sources can be problematic for attribution by themselves. First mention of today for the BINGO card (talking about by TTPS are bad for attribution due to proliferation).

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    22. sij

    The IoT23 is released! The first dataset with IoT network traffic: containing malicious and benign scenarios. It was captured in the Aposemat laboratory. Aposemat is a joint project between and Take a look at it!

    Poništi
  11. proslijedio/la je Tweet
    22. sij

    Thank you for having us in this 2020 edition! I couldn't be happier 😁 Vegas here we go 😈

    Poništi
  12. proslijedio/la je Tweet
    17. sij

    Want to make service removal really fun? Create a service with a unicode name. The service will run but won't show in sc.exe, services.msc, or taskmgr.exe and will sometimes cause a critical error while trying to find it with PowerShell/WMI. Unicode wins again.🤦‍♂️

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    18. sij

    Today I updated the Zeek Anomaly Detection created by to use ZAT (Zeek Analysis Tools) instead of Brothon. This simple tool does a basic anomaly detection using PCA on the Zeek's conn.log. Now it's faster and more memory efficient. Code:

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    19. sij

    I want to make something very clear to the community. Just because you aren't deeply technical, a pentester, a red teamer, a forensics expert, or RE wiz doesn't mean that you can't teach people things. Everyone's life experiences are different and the more we 1/4

    Prikaži ovu nit
    Poništi
  15. 15. sij

    I'm so proud 💟 don't miss it ir you're around!!

    Poništi
  16. proslijedio/la je Tweet
    7. sij

    Unpopular option: we have more than enough ex Feds in infosec, it’s time to start recruiting humanities and science people again. Diversity of experience has always been a strength.

    Poništi
  17. proslijedio/la je Tweet

    With increased tension with Iran and its proxies, facility and network defenders should consider and assess the possible impacts and threats to their organization. Today’s new CISA Insights has information and precautionary measures for your organization.

    Poništi
  18. 4. sij

    If you want to start using ATT&CK for CTI, this workshop is for you!🤓 Thanks and for sharing! 💗

    Poništi
  19. proslijedio/la je Tweet
    1. sij

    Looking for anything to do while you wait for 2020 🎉? I just created a Jupyter Book for the ! You can now explore mordor datasets w/ via BinderHub 🌎 Pre activities for 2020 🍻🤣! New Site:

    Poništi
  20. proslijedio/la je Tweet
    31. pro 2019.

    Se termina el año 🎉 y nosotras también queremos hacer un balance de lo que hicimos este 2019 y lo resumimos con estos hitos: (Hilo 👇)

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    28. pro 2019.

    If you're getting into a career as an analyst/engineer at an infosec vendor, I recommend exploring/practicing with the following detection tech: Yara Snort/Sur Bro/Zeek Cuckoo ClamAV Though there are others, these are most prevalent and secretly power lots of detection techs.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·