Ben

@thebluetoob

DFIR/OSINT guy; wannabe malware analyst; perpetual noob. Opinions are mine, probably wrong.

Vrijeme pridruživanja: rujan 2011.

Tweetovi

Blokirali ste korisnika/cu @thebluetoob

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @thebluetoob

  1. 25. sij

    Despite my best efforts with running little CTF workshops at this thread hits very close to home. I absolutely need to do better in 2020.

    Poništi
  2. proslijedio/la je Tweet
    16. sij

    BSides Melbourne will be donating 100% of our ticket revenue for this year’s conference to the Victorian Bushfire Appeal. This appeal by the Victorian Government and Red Cross will see all the funds go directly to communities in need.

    Poništi
  3. proslijedio/la je Tweet
    5. sij

    So in you'll come across lots (and lots) of timestamps. Let's take a quick dive into this weird and wonderful world....(1/x)

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    5. pro 2019.

    needs our help. Take 5 mins to share your views on Volunteering. Celebrate by sharing your volunteer experience! We want to know how this impacts your career, skill development & how your employer supports you

    Poništi
  5. proslijedio/la je Tweet
    29. stu 2019.

    Training Registration open THIS Monday at 1pm AEDT. Two fantastic educational classes on offer: - Introduction to Incident Response - Windows Driver Exploitation for Newbies Sign ups available Monday and don't miss out 👇

    Poništi
  6. proslijedio/la je Tweet
    24. stu 2019.

    Policy + training won't convince people to care about infosec. So influence specialists at some of oz's biggest biz have collaborated to produce a detailed guide on how all orgs can win staff hearts and minds. Digital released under creative commons on 💛

    Poništi
  7. proslijedio/la je Tweet
    14. stu 2019.

    Ransomware is often talked about with the same ‘superpower’ and malware focused narrative APTs are. Both are humans usually using psexec, GPOs, and stolen credentials to move laterally and deploy malware. Mitigations exist and networks can be hardened:

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    15. stu 2019.

    would like to welcome our newest silver ✨ sponsor , the first place you think of when you need real estate 🏡 Thankyou for supporting our community event and our participants 👏👏 🙏

    Poništi
  9. 10. stu 2019.

    It's taken me years to get back on the blogging train but I've finally started writing up Boot2Root VMs in a place other than cherrytree. Hopefully be able to keep up the momentum!

    Poništi
  10. proslijedio/la je Tweet
    17. lis 2019.

    Many of you have seen in the wild and in sandboxs, but I've seen few who've had the malware move toward full domain compromise in a lab environment. Take a read and make sure your powershell detection is ready.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    14. lis 2019.

    If you are using it's time to look for an alternative provider: from November they will charge you $1 per RSVP of a FREE event, so if you have 1000 attendees RSVP-ing to your FREE meetup you as the organiser will be charged $1000 per meetup

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    10. lis 2019.

    Thinking of submitting to the Call for Paper and unsure where to begin. The team will be hosting a CFP how-to Webinar on Wed 23/10/2019 👏 Let us know what time suits you AEST - get your votes in 🗳

    Poništi
  13. proslijedio/la je Tweet
    4. lis 2019.

    2020 Career Village is shaping up to be awesome. Huge 🙏 to 4 supporting our vision & sponsorship, we have great sessions planned: - career track - career workshops - profile headshots 🙏 - wristband networking hr 🙏

    Poništi
  14. proslijedio/la je Tweet
    2. sij 2019.
    Odgovor korisniku/ci

    If you want a playbook for how to defend your network against infection and lateral movement by a sophisticated attacker, detect and defend against Emotet. The mitigation and investigation techniques line up across multiple adversary sets and have remarkable Return on Investment.

    Poništi
  15. proslijedio/la je Tweet

    shall we clicks the malwares?

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    17. ruj 2019.
    Odgovor korisniku/ci

    Ryuk infections cost some companies $1m and they started with Emotet.

    Poništi
  17. proslijedio/la je Tweet
    17. ruj 2019.

    When everyone in .corp is going on about APTthis and APTthat and your “what do you do about things like Emotet and Trickbot?” is met by blank stares. Which doesn’t invalidate worrying about APT, but if you can’t root out Emotet you have slim chance against APT. Baby steps.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    25. kol 2019.

    Call for Papers is now open introducing a general, rookie/n00b and career track. The mentoring program is back 👏and stay turned for our CFP webinar and how to help you prepare your submission. Lots of exciting announcements coming...

    Poništi
  19. proslijedio/la je Tweet
    Odgovor korisniku/ci

    Posting it to you is secure, as it's illegal to open someone else's mail. ^JGS

    Poništi
  20. 17. kol 2019.

    Considering last year I got all the way to level two before I got stuck I'm going to bask in my 15 seconds of being in the top 100 this year while I can.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·