-
Microsoft launches new bug bounty program & offers $100,000 for finding bugs in it's identity program: https://buff.ly/2Lfh5pv
#NEWS#CyberSecurity#bugs#infosec#Security#threathunting pic.twitter.com/4lF8G1DjwB
-
How does your enterprise do
#ThreatHunting ?#SIEM#cybersecurity http://bit.ly/2LpXmDo pic.twitter.com/hu5EyBKgMi
-
This video perfectly captures how working in
#infosec#ThreatHunting can be sometimes, even more so for#incidentresponse#blueteam - also lol poor Granpic.twitter.com/fmiWCU3ZI1 -
Check out all the training we're having for
#AugustaCyberWeek 2018@LaNMaSteR53#PWAPT Class@chrissanders88 Practical Packet Analysis class and@securityonion 4-Day Basic Course#AugustaGA#python#packetAnalysis#NSM#BlueTeam#DFIR#ThreatHunting http://bsidesaugusta.org/training/ pic.twitter.com/9rbb4WGN1X
-
Dissecting Smoke Loader malware (aka Dofoil) by CERT Polska
@CERT_Polska_en (#Malware#Infosec#BlueTeam#ThreatHunting#DFIR#Windows) https://www.cert.pl/en/news/single/dissecting-smoke-loader/ …pic.twitter.com/gPdn4YmCnk
-
Go hunting w/ the NEW Hunt Evil Poster http://www.sans.org/u/EfO | Dive into
#ThreatHunting &#IncidentResponse with@mbromileyDFIR in#VirginiaBeach 8/20-31 | http://www.sans.org/u/Fip#DFIR#FOR508pic.twitter.com/WfXwYnme8s
-
Looking for useful technical
#infosec resources, scripts and#threathunting how-tos? Check out our free-to-access guides for#security pros - including decompiling#python binaries, retrieving#Meterpreter C2 from memory, and hunting for malicious#SDBs | https://www.countercept.com/our-thinking/ pic.twitter.com/nEKARf7fm8
-
Members of our Threat Operations team
@DragosInc have released an open source#threathunting analysis tool for windows event they developed in house.#python#elk#Securityhttps://twitter.com/dan_gunter/status/1019265771577409536 … -
.
@SubtleThreat and I open sourced the python module we've been using at@DragosInc to scale our ELK based#DFIR and#threathunting analysis of pre-collected windows event logs. More info here: https://dragos.com/blog/20180717EvtxToElk.html … … and grab the evtxtoelk module from pip!#Python#elk -
Our latest release, codename: Summer Cocktail, brings cool analytics to assess risks to your files! Building The File Threat Intelligence platform. https://www.vulnex.com/en/binsecsweeper.html …
#BigData#ThreatIntelligence#ThreatHunting#infosec#appsec#malware#Cybersecurity pic.twitter.com/jNewFpo6tl
-
Hunt Evil with the BRAND NEW poster! Get it FREE here http://www.sans.org/u/EfO | Explore
#ThreatHunting &#IncidentResponse with@mikepilkington in#Chicago 8/20-25 | http://www.sans.org/u/Fif#DFIR#FOR508pic.twitter.com/4gIRLFXZI9
-
Remembering the excitement I felt when I gave this talk last year doesn't hold a candle to how far this project has come... Come check it out
@BlueTeamVillage and practice#DFIR &#ThreatHunting on open source tools! https://youtu.be/S4WguNB8s-4 -
You can teach people how to do threat hunting but that does not make them threat hunters. threat hunting is a mindset
#dfir#threathunting -
Learn how Incident Response
#automationtools can provide Security Operations Center (SOC) team members with additional time that can be leveraged in a more focused, threat hunting role within the#SOC environment http://j.mp/2NLafqd#soar#threathunting#incidentresponsepic.twitter.com/IW6Pshh4kG
-
Wouldn’t it be cool, if your
#IDS could start hunting automatically.. simply by paying attention to your#ops channel?#ThreatHunting#ThreatIntel#CSIRTGhttps://csirtgadgets.com/commits/2018/7/13/developing-threat-intel-with-slack … -
Fake
@WhatsApp install hosted on brazilian government site: hxxp://cmicapui.ce.gov.br/backup/img/WhatsAppSetup.exe https://app.any.run/tasks/7ea04c66-5fd2-4cfa-988c-0e1d8a1ede8b …#ThreatHunting#malware@anyrun_apppic.twitter.com/XQPM72ZEUG
-
#Survey | Deep Packet Inspection for#ThreatHunting http://ow.ly/c8y630kU8ZL#Cybersecurity#Technologypic.twitter.com/1Fy2ItmakC
-
Hawkeye Keylogger – Reborn v8: An in-depth campaign analysis by Microsoft Secure
@msftsecurity (#Malware#Keylogger#Infosec#BlueTeam#ThreatHunting#DFIR#Windows) https://cloudblogs.microsoft.com/microsoftsecure/2018/07/11/hawkeye-keylogger-reborn-v8-an-in-depth-campaign-analysis/ …pic.twitter.com/2geFQoNeud
-
Categorizing and Enriching Security Events in an ELK with the Help of Sysmon and ATT&CK by Roberto Rodriguez
@Cyb3rWard0g (#BlueTeam#ELK#Sysmon#DFIR#ThreatHunting@MITREattack) https://cyberwardog.blogspot.com/2018/07/categorizing-and-enriching-security.html …pic.twitter.com/TaGJStiZT3
লোড হতে বেশ কিছুক্ষণ সময় নিচ্ছে।
টুইটার তার ক্ষমতার বাইরে চলে গেছে বা কোনো সাময়িক সমস্যার সম্মুখীন হয়েছে আবার চেষ্টা করুন বা আরও তথ্যের জন্য টুইটারের স্থিতি দেখুন।