Recon InfoSec

@Recon_InfoSec

Managed Security Service Provider serving government, enterprise and critical infrastructure | Network Defense Range Training | Blue Team CTF

Austin, TX
Vrijeme pridruživanja: veljača 2016.

Tweetovi

Blokirali ste korisnika/cu @Recon_InfoSec

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Recon_InfoSec

  1. Prikvačeni tweet
    26. sij

    Looking for more information about our Network Defense Range course 2020? Check out our latest blog post!

    Poništi
  2. prije 21 sat

    CERT Vuln Alert: VU#261385: Cisco Discovery Protocol (CDP) enabled devices are vulnerable to denial-of-service and remote code execution

    Poništi
  3. prije 24 sata
    Poništi
  4. proslijedio/la je Tweet
    4. velj

    When a previous IR client decides not to implement the recommended mitigations in the after-action report...

    Poništi
  5. 5. velj
    Poništi
  6. proslijedio/la je Tweet
    3. velj

    What if you could mount TheHive as a remote filesystem? What if you could very simply access all files added to a case, as observables or attached to tasks from your investigation machine? TheHive 4.0-RC1. End of February 2020.…

    Poništi
  7. proslijedio/la je Tweet
    3. velj

    Drum Roll 🥁Announcing Graylog 3.2! Views, dashboards & search are unified for a more flexible & comprehensive approach to threat hunting! Reuse searches or combine them into a workflow. Alerts now utilize dynamic lists & alert against multiple conditions.

    Poništi
  8. 1. velj

    Like and ?! Then you’ll love our write up on how to integrate them.

    Poništi
  9. 31. sij

    CERT Vuln Alert: VU#390745: OpenSMTPD vulnerable to local privilege escalation and remote code execution

    Poništi
  10. 31. sij

    US-CERT Alert: AA20-031A: Detecting Citrix CVE-2019-19781

    Poništi
  11. 31. sij

    AA20-031A: Detecting Citrix CVE-2019-19781

    Poništi
  12. proslijedio/la je Tweet
    29. sij

    A defenders guide can be derived from a red teamers list of woes 😎

    Poništi
  13. proslijedio/la je Tweet
    29. sij
    Poništi
  14. proslijedio/la je Tweet
    27. sij

    Eric's perspective and experience made valuable to anyone who wants to understand what the real deal with being a SOC analyst . Thank you and

    Poništi
  15. 27. sij

    Interested in transitioning into the field of cyber security? Our CTO, , describes the life of an entry-level SOC Analyst in this interview with . Check out the entire series!

    Poništi
  16. 27. sij
    Poništi
  17. proslijedio/la je Tweet
    27. sij

    I’ve been privileged to attend BH training for few years now. Last year I’ve attended the NDR training and can’t recommend it enough to people that want to improve their hands on skills in the blue space. Not only the training was extremely valuable, but also great fun!

    Poništi
  18. proslijedio/la je Tweet
    26. sij

    It’s the new year - so, you’re probably thinking about training budgets. and I will be returning to to deliver a two-part, two-day NDR series! Live, hands-on experience - come join us! Just sayin’... More details here:

    Prikaži ovu nit
    Poništi
  19. 25. sij

    Use Graylog + Cylance? This guide describes how to ingest valuable EDR telemetry into your Graylog instance.

    Poništi
  20. proslijedio/la je Tweet
    23. sij

    Feeling cute, might delete later¹ __ ¹ 14 Racks of birds just took flight for a US-based customer

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·