Tweetovi

Blokirali ste korisnika/cu @cvandeplas

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @cvandeplas

  1. proslijedio/la je Tweet
    14. sij

    "Het is tijd dat de woordenschat van onze verslaggeving uitbreidt zodat mensen niet alleen correct geïnformeerd worden, maar ook iets bijleren."

    Poništi
  2. 13. sij

    Contact me if you want to try out (beta) ATT&CK - in using remote transforms. No local python install needed.

    Poništi
  3. 1. sij

    For those playing with binaries and . Did you know there are FLIRT signatures for it? And even the tool to generate them yourself!

    Poništi
  4. proslijedio/la je Tweet
    24. pro 2019.

    I would love to see more of the energy currently dedicated to this debate directed to a constructive effort like this. Sigma is underrated. Projects like provide easy means to share sigma/yara/snort sigs alongside contextual information

    Poništi
  5. 17. pro 2019.

    More goodness in -Maltego v1.4: Pivoting on is now easier with more choice: expand MISPGalaxy to all or only to Threat Actor, Attack Technique or Software/Malware.

    Poništi
  6. proslijedio/la je Tweet
    6. pro 2019.

    Visualizing ATT&CK Data In Maltego - Christophe Vandeplas

    Poništi
  7. proslijedio/la je Tweet
    29. lis 2019.

    MISP - Malware Information Sharing Platform and Threat Sharing - The Open Source Threat Intelligence Platform Best in the marketplace. User driven. Broad coverage. And the right price

    Poništi
  8. proslijedio/la je Tweet
    25. lis 2019.

    Thank you for a wonderful ->inclusive<- conference. The program was stellar 👌🏻 Thx also to & the team for giving room to new ideas & experiments such as the Call for Failure. I think it was far from a fail ;-). I truly hope you’ll keep it in future editions!

    Poništi
  9. proslijedio/la je Tweet
    28. lis 2019.
    Poništi
  10. 14. lip 2019.

    The art of information sharing is to share more, smarter and faster with your friends and allies than your adversaries do.

    Poništi
  11. 22. svi 2019.

    pip3 install MISP-maltego && canari create-profile MISP-maltego && echo "import the .mtz file and have fun!"

    Poništi
  12. proslijedio/la je Tweet

    Microsoft Defender ATP now easily integrated with ⁦⁩ for your critical threat intelligence. See our new blog to learn how

    Poništi
  13. proslijedio/la je Tweet
    4. svi 2019.

    Don't hesitate to submit papers/presentations at MISP Threat Intelligence Summit related to MISP integration, success or failure, improvements, ongoing contribution, open source threat intelligence and information sharing at large.

    Poništi
  14. 2. svi 2019.

    ATT&CK browsing within can give much better insight in your data.

    Poništi
  15. 2. svi 2019.

    Find your Galaxy Entity using keyword search in and pivot on it.

    Poništi
  16. 30. tra 2019.

    ATT&CK continues to grow. already supports the latest version thanks to the and the !

    Poništi
  17. proslijedio/la je Tweet
    21. ožu 2019.

    We ( and X-ISAC) published "Guidelines to setting up an information sharing community such as an ISAC or ISAO" to support and promote the creation of new ISACs and sharing communities.

    Korisnici , i
    Poništi
  18. proslijedio/la je Tweet
    16. ožu 2019.

    We had a lot of requests for the MISP training (usage and administration) and we just open up a new slot the Monday, 25 March 2019 given by at .

    Poništi
  19. 16. ožu 2019.

    Updated icon set in -maltego for MISP Threat Sharing and ATT&CK visualisation of relationships.

    Poništi
  20. 4. velj 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·