BC Security

@BCSecurity1

Providing cybersecurity assessments across a range of disciplines, we bring a strong understanding of compliance regulations and risk mitigation.

Vrijeme pridruživanja: lipanj 2019.

Tweetovi

Blokirali ste korisnika/cu @BCSecurity1

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @BCSecurity1

  1. Prikvačeni tweet
    23. pro 2019.
    Poništi
  2. proslijedio/la je Tweet
    31. sij

    Follow Friday edition comes with a big thank you to for supporting Empire and porting it to Python3. Issue acknowledged and closed in under a week. Things we track on

    Poništi
  3. proslijedio/la je Tweet
    23. sij

    Empire 3.0.5 testing in progress with Slingshot

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    22. sij

    Here is the link to the SpecterOps Adversary Tactics: PowerShell course material: Enjoy! For information about our current training offerings, information can be found here: (4/4)

    Prikaži ovu nit
    Poništi
  5. 21. sij

    Version 3.0.5 of Empire has been released. Fixes include binary file upload and python 3.8 compatibility updates.

    Poništi
  6. proslijedio/la je Tweet
    19. sij

    command-line MSBuild.exe detection's got your down? How about MSBuild without MSBuild.exe?

    Poništi
  7. 17. sij

    You can now install Empire in Kali by simply running: apt-get install powershell-empire Run it with: powershell-empire

    Poništi
  8. 16. sij
    Poništi
  9. 14. sij

    CVE-2020-0601 allows for the spoofing of certificates. Patch immediately

    Poništi
  10. 13. sij

    Version 3.0.3 is released with some minor bug fixes.

    Poništi
  11. proslijedio/la je Tweet
    10. sij

    Detection Engineering Tip: Try not to view detection logic as detecting a malicious technique. View it as a mechanism to identify events that meet your established criteria of how your target technique deviates from the baseline of activity.

    Prikaži ovu nit
    Poništi
  12. 9. sij

    PowerShell attacks are alive and well. Trickbot operators developed and are employing a custom PowerShell C2 framework.

    Poništi
  13. 7. sij
    Poništi
  14. proslijedio/la je Tweet
    7. sij

    We’re excited to announce the initial release of ATT&CK for ICS! You can find the ICS knowledge base at and a blog post by explaining what’s new and different here: . Thank you to everyone who helped us get here!

    Poništi
  15. proslijedio/la je Tweet
    4. sij

    AV should catch a capable red team at most once. Then they rework payloads and carry on. AV that catches a threat actor once completely jeopardizes their operation. Brittle AV signatures are cheap to build and _can_ be damn effective. Don't downplay the role they play.

    Poništi
  16. proslijedio/la je Tweet
    3. sij

    Red Teamers should be proposing adversary emulations of known Iranian threat actors. APT33 is a great start and then APT34. “potential Iranian retaliatory attacks, possibly including cyberattacks and terrorism, on American interests and allies.”

    Prikaži ovu nit
    Poništi
  17. 2. sij

    This article from last May provides an interesting on how an advanced APT continues to leverage Powershell for operations.

    Poništi
  18. 30. pro 2019.

    Thank you to everyone who helped with the bug-fixes. We appreciate the community feedback and hope you enjoy Empire 3.0.1.

    Poništi
  19. proslijedio/la je Tweet
    27. pro 2019.

    Lookie lookie what hooked me up with! Beta of SANS Slingshot with Empire 3.0 shhhh tell only your best friends Testing underway. Will perform a full of like we do in and report back

    Poništi
  20. 27. pro 2019.

    If you are having issues installing Empire 3.0, run a pip3 install on the requirements.txt and then run the install script again. We have also pushed some initial bug fixes to the 3.0-bug-fixes branch

    Poništi
  21. proslijedio/la je Tweet
    24. pro 2019.

    A lot of mud slinging on InfoSec twitter lately; I wanted to flip the script a bit and highlight the blogs, tools, talks etc that I keep coming back to on a regular basis, both as a defender and general InfoSec professional. Thread..

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·