Miriam Wiesner

@MiriamXyra

Security Program Manager at for (formerly ) 😻🦄, Passionate about , and , tweets are my own

Vrijeme pridruživanja: ožujak 2015.

Tweetovi

Blokirali ste korisnika/cu @MiriamXyra

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @MiriamXyra

  1. Prikvačeni tweet
    10. lip 2019.

    Have you ever wondered how to combine Security Baselines, and SIEM queries? Yes?! Oh, you will love my newly released

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    1. velj

    presents a demo of EventList at - an open-source tool that helps match Windows Event Log IDs with the MITRE ATT&CK framework (and vice-versa) and offers methods to simplify the detection in corporate environments worldwide.

    Poništi
  3. proslijedio/la je Tweet
    30. sij

    Overview of security certifications

    Poništi
  4. proslijedio/la je Tweet
    29. sij

    Need a SOC Reference Architecture? Check out this one we put together to show how Microsoft technology integrates into a SOC. Slide 73 of Azure Security Compass -

    Poništi
  5. proslijedio/la je Tweet
    24. sij
    Poništi
  6. proslijedio/la je Tweet
    17. sij

    If I add real world examples of data breaches to my book, such as the British Airways supply chain attack or the Ashley Madison data breach being the first example of a breach resulting in death, do you feel these examples will age well? Is this a good idea for a book?

    Poništi
  7. 1. sij

    Happy new year everybody! 😘

    Poništi
  8. proslijedio/la je Tweet
    24. pro 2019.

    Merry Christmas everybody! Got a little Christmas present for all folks out there: A small PowerShell module bringing the string operators to the pipeline as cmdlets. (Also: It comes with no strings/dependencies attached!* 😏)

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    21. pro 2019.

    Reverse Engineering a real world 249 bytes backdoor!

    Poništi
  10. proslijedio/la je Tweet
    19. pro 2019.

    I just published a blog post about 's CI pipeline Pixi-CRS ( ) 🎉

    Poništi
  11. 17. pro 2019.

    I love it when colleagues know how to answer to “SYN/ACK” after they have initiated the conversation

    Poništi
  12. proslijedio/la je Tweet
    15. pro 2019.
    Poništi
  13. proslijedio/la je Tweet

    Almost 9 months post attack, Norsk Hydro reveal they called in Microsoft to aid response. There’s a TON of information in this, I think cybersecurity history will look back at Norsk as a bellwether for good crisis management.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet

    ***Gewinnspiel*** Ihr findet den toll und würdet ihn gerne euer Eigen nennen? Wir verlosen einen davon an euch! Kommentiert bis morgen um 18 Uhr, warum der Sweater bei euch einziehen muss. Wir sind gespannt auf eure kreativen Antworten. 🎁

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    16. pro 2019.

    We put a lot of effort in the creation of anomaly detection rules for our scanner Example: 1. Report mentions adversary exfiltrating ntds.dit in RAR archive 2. Create such an archive 3. Open in hex editor 4. Write YARA rule I'll put this one in the signature-base repo for LOKI

    Prikaži ovu nit
    Poništi
  16. 16. pro 2019.

    When the part of your personality is showing that you always tried to hide 🧟‍♀️🤪🤣 me visiting London today

    Poništi
  17. proslijedio/la je Tweet
    15. pro 2019.
    , , i još njih 4
    Poništi
  18. proslijedio/la je Tweet

    just blogged about the activity group - read the details and how Microsoft Defender ATP offers protections against their methods.

    Poništi
  19. proslijedio/la je Tweet
    12. pro 2019.

    The video for my, and ’s talk from 2019 is now available to watch here:

    Poništi
  20. proslijedio/la je Tweet

    Last chance to submit to the Arsenal Call for Tools for (closes 23:59 Pacific on 12/13). Review the guidelines and submit before the deadline for the opportunity to demo your tool in Singapore

    Poništi
  21. proslijedio/la je Tweet

    Microsoft Threat Intelligence Center (MSTIC) published details on the methodology and indicators related to the group GALLIUM, which targets telecommunications providers. The security community is encouraged to use this information to implement defenses.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·