Jack Crook

@jackcr

Principal Incident Responder for GE-CIRT and finder of bad guys - Former US Army Infantryman. Desert Storm and Somalia Veteran.

Richmond, VA, USA
Vrijeme pridruživanja: veljača 2009.

Tweetovi

Blokirali ste korisnika/cu @jackcr

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @jackcr

  1. proslijedio/la je Tweet
    1. velj

    Anyone know a Sr. level IDM architect focused on AAD looking for a gig? Send them my way.

    Poništi
  2. 2. velj

    Raytheon engineer arrested for taking US missile defense data to China | ZDNet

    Poništi
  3. proslijedio/la je Tweet

    Harvard University Professor and Two Chinese Nationals Charged in Three Separate China Related Cases

    Poništi
  4. 5. sij

    +1. Also pay attention to what the threat name indicates, file path, machine type (server/workstation) and role. Correlating with additional events on a machine may help highlight criticality. AV logs should definitely be consumed and alerted on where appropriate.

    Poništi
  5. proslijedio/la je Tweet
    30. pro 2019.
    Poništi
  6. proslijedio/la je Tweet
    30. pro 2019.

    New: WSJ investigation into China’s Cloud Hopper cyber espionage campaign finds a scope of victims broader than known, as service providers struggled to kick out hackers. U.S. officials over time grew panicked about federal agency exposure. W/

    Poništi
  7. 30. pro 2019.

    Here's a good talk from the 2019 Cyber Defense Summit. @ ~33:50 are some additional areas to consider developing detection around.

    Poništi
  8. 30. pro 2019.

    From external actors to the recruitment of insiders, don't be surprised if drastic change occurs. Study your past. Detect and hunt in the present. Prepare for the future. Never feel satisfied. (2/2)

    Prikaži ovu nit
    Poništi
  9. 30. pro 2019.

    2020 will mark 10 years that I've been with GE-CIRT. Something I've witnessed over time is that you can force change when it comes to the persistent targeting of data. Your ability to detect and stop an actor, time after time, will force this change. (1/2)

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    28. pro 2019.

    CTI teams need to work just as closely with IR as any other function. Sadly, they have no interaction in a lot of shops. Intel shouldn't exist to write "Russia bad" reports or pump a server full of IOCs.

    Poništi
  11. 24. pro 2019.

    This should be a sign to put twitter down and go enjoy the holidays.

    Poništi
  12. 22. pro 2019.

    For a SOC, your analysts pane of glass should not be the biggest learning curve they’re presented with. Strive to make data easily accessible, searchable, retainable and correlatable.

    Poništi
  13. proslijedio/la je Tweet
    22. pro 2019.
    Odgovor korisniku/ci

    I’ll always point to the “M” in SIEM as the problem. Most products were/are hyper-focused on the management of the info/events/alerts, never addressing the biggest need: Providing analysts with a platform/data/context to effeciently analyze and investigate potential incidents.

    Poništi
  14. proslijedio/la je Tweet

    Russian National Charged w/ Decade-Long Series of Hacking, Bank Fraud Offenses Resulting in Tens of Millions in Losses; 2nd Russian National Charged w/ Involvement in Deployment of “Bugat” Malware. Announced w/ , , , ,

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet

    This is confused. Defenders never talk to "real attackers." How would that happen? DT is mistaking red teams for "real attackers." Of course blue and red should talk. However, defenders who counter in-the-wild attackers, not red teams, are learning from real life, not exercises.

    Poništi
  16. proslijedio/la je Tweet
    24. stu 2019.

    Important piece by on the defector to Australia, especially about the background of Wang and the PRC "charges" against him. "Defections are messy and we may never know the full story" via

    Poništi
  17. proslijedio/la je Tweet
    22. stu 2019.

    A Chinese spy has risked his life to defect to Australia and reveal a trove of unprecedented inside intelligence on how China conducts its interference operations abroad. | Investigation

    Poništi
  18. proslijedio/la je Tweet
    22. stu 2019.

    I created a feature request on the user feedback portal. Feel free to vote for it if you agree this is an important feature for cyber security professionals.

    Poništi
  19. 22. stu 2019.

    "Within a year of being selected as a Talent Plan recruit, he quit his job, bought a one-way ticket to China" Look for commonalities as well as anomalies.

    Poništi
  20. proslijedio/la je Tweet

    Chinese National Who Worked at Monsanto Indicted on Economic Espionage Charges

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·