InQuest

@InQuest

Layer-7 is the tip of the iceberg. InQuest Deep File Inspection (DFI) and RetroHunting empower analysts with new dimensions of data and time. Join the hunt.

Vrijeme pridruživanja: rujan 2017.

Tweetovi

Blokirali ste korisnika/cu @InQuest

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @InQuest

  1. Prikvačeni tweet
    13. kol 2019.

    We welcome feedback on our static dropper analyzer and data portal that we announced at Blackhat last week. Search a large corpus of file samples, aggregate reputation information, IOCs extracted from public sources. Augment YARA development with tooling.

    Poništi
  2. proslijedio/la je Tweet
    5. velj

    If you're at Rocky Mountain Cyberspace Symposium, drop by immixGroup's booths 24 & 25 featuring and !

    Poništi
  3. 31. sij

    Excited to be involved with the Rocky Mountain Cyber Symposium. Don't forget to stop by!

    Poništi
  4. 31. sij
    Poništi
  5. proslijedio/la je Tweet
    29. sij

    Released Mitaka v0.72.0. ✔︎Add DFI hash lookup. I'm sure that DFI helps your research on maldoc.

    Poništi
  6. 28. sij

    Great malware anchor... check out all these samples available for download via keyword pivot in the macro layer: there are other _OnConnecting() prefixes to explore as well.

    Poništi
  7. 24. sij

    An illustrative blog discussing the Pyramid of Pain and how it relates to the Iceberg of Inspection. Deep File Inspection can uncover TTPs and other indicators to supplement prevention, detection, and threat hunting within your network.

    Poništi
  8. 23. sij

    Our latest blog details a heartfelt retrospective from one of our cheekiest interns. Thank you for the good times and hard work!

    Poništi
  9. 21. sij

    Thanks for the contributions to ! Apologies for the delay in getting them merged.

    Poništi
  10. 14. sij

    Great atmosphere at Art into Science - 2020 in Austin, TX. The ops track had a abbreviated version of "Worm Charming: Harvesting Malware Lures for Fun and Profit".

    Poništi
  11. 13. sij

    If you're looking for a maintained list of 0day discoveries made from in-the-wild campaigns, look no further than this great Google Spreadsheet maintained by the team:

    Poništi
  12. 9. sij

    Added YARA rules Github repository to the Awesome-YARA project:

    Poništi
  13. 6. sij
    Poništi
  14. proslijedio/la je Tweet
    4. sij

    Created a 's ThreatIngestor configuration which focuses on malspam/phishing targeting Japan.

    Poništi
  15. 3. sij

    Exceptional technical reporting from breaking down a new ransomware variant called DeathRansom. Part II dives into attribution and similarities found in other campaigns and variants. Part I: Part II:

    Poništi
  16. 2. sij
    Poništi
  17. 30. pro 2019.

    The videos from Blackhat USA 2019 are up, check out our CTO 's talk on Worm Charming: Slide deck is available for download from Finally, the referenced data portal is available

    Poništi
  18. 26. pro 2019.

    Our new blog is out! Threat Hunting On Your Own Network With InQuest, goes over using InQuest ingestion, to analyze content, and discover threats within your network.

    Poništi
  19. 24. pro 2019.

    Our new blog is out! Ransomware in Your Stocking, describes the increasing danger of ransomware going into the future. There are sample hashes and a map that shows the nationally widespread hits on state and federal utilities.

    Poništi
  20. 16. pro 2019.

    InQuest is excited to announce that we are sponsoring (ISC)2 Tampa Bay Chapter 2019 Annual Winter Party at the AMC Theater Westshore . This year we are saying good bye to several things : DerbyCon, HackMiami, Mr. Robot, DefCon and now Star Wars. Tickets:

    Poništi
  21. 9. pro 2019.

    Good write-up from on Trickbot Spear Phishing technique: They list 7 document hashes at the bottom... by pivoting on the XMP ID embedded within the graphical asset, we can discover those 7 + 42 others:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·