Jimmy Astle

@AstleJimmy

Dad. Security Professional. Brewer.

Vrijeme pridruživanja: kolovoz 2011.

Tweetovi

Blokirali ste korisnika/cu @AstleJimmy

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @AstleJimmy

  1. proslijedio/la je Tweet
    Poništi
  2. 29. sij

    Love seeing this get official: great work as always! Now get out there and start testing your defenses!

    Poništi
  3. proslijedio/la je Tweet
    21. sij

    Threat Analysis Unit (TAU) Technical Report: The Prospect of Iranian Cyber Retaliation - via -

    Poništi
  4. proslijedio/la je Tweet
    13. pro 2019.
    Poništi
  5. proslijedio/la je Tweet

    Manager shuts a perfectly running team-wide-required side-project benefitting everyone because - wants to send message to developers working on "non-approved" project. Have you experienced anything like this? Please retweet and share your stories so that I don't feel alone.

    Poništi
  6. proslijedio/la je Tweet
    13. stu 2019.

    While malicious use of systemd services isn’t necessarily new to Linux systems, there is little public research or documentation about how adversaries leverage it for persistence.

    Poništi
  7. 24. lis 2019.

    Excited to see this out in the wild finally: . Really enjoyed working on this way back when with

    Poništi
  8. proslijedio/la je Tweet
    4. lis 2019.

    Impeccable (& entirely coincidental) timing on this great write-up by about ! As it happens, & @CarbonBlack_Inc's will be discussing tests that emulate AMSI bypass attacks today at 11 am MT.

    Poništi
  9. proslijedio/la je Tweet
    4. lis 2019.
    Poništi
  10. proslijedio/la je Tweet
    2. lis 2019.

    In this edition of , and will explore 3 common techniques that adversaries use to bypass , and release and review several tests we have in to emulate these bypasses.

    Poništi
  11. proslijedio/la je Tweet
    30. ruj 2019.

    Join , of , and the community for a discussion on how adversaries bypass ’s Antimalware Scan Interface (AMSI) and how you can detect bypasses.

    Poništi
  12. 4. ruj 2019.

    Discovered this today while going down a rabbit hole: "Deploy-Application.EXE is a small EXE file which basically invokes the PowerShell script....."

    Poništi
  13. proslijedio/la je Tweet
    14. kol 2019.

    We found no consistency in a vendor or product line doing better or showing improvement. There was no evidence that anybody is making a concerted effort to address the safety hygiene of their products - Sarah Zatko Evaluating 15 years, 6000 updates

    Poništi
  14. proslijedio/la je Tweet
    6. kol 2019.

    The ATT&CK Evaluations team is happy to announce Round 2 participants: . The team looks forward to collaborating with these 21 vendors to show how their capabilities can be used to detect techniques inspired by APT29/COZY BEAR/The Dukes.

    Poništi
  15. proslijedio/la je Tweet

    Dear - we don't typically make song requests, but when we do we ask for Julius. Because reasons. 😉⚾️

    Poništi
  16. proslijedio/la je Tweet
    28. lip 2019.

    Canned hops vending machine from . Eight ounces of Citra to go at HomebrewCon. – mjesto: Rhode Island Convention Center

    Poništi
  17. proslijedio/la je Tweet
    27. lip 2019.

    "As defenders, we need to understand, enumerate, and evaluate what drivers are in our fleet," wrote and . "We need to understand how they arrived and what their intentions are."

    Poništi
  18. proslijedio/la je Tweet
    12. lip 2019.

    Nobody is giving out fucking style points in the “I defeated a ransomware attack” awards. Sometimes you gotta bust out a batch file.

    Prikaži ovu nit
    Poništi
  19. 1. lip 2019.

    Stoked to analyze the crap out of this book. Thanks so much for your hard work

    Poništi
  20. proslijedio/la je Tweet
    1. lip 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·