Wes Connell

@wesleyraptor

Detection Engineering . Passionate about dramatically improving data hunting tradecraft within the cyber security domain.

Vrijeme pridruživanja: listopad 2015.

Tweetovi

Blokirali ste korisnika/cu @wesleyraptor

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @wesleyraptor

  1. Prikvačeni tweet
    1. svi 2018.

    Officially releasing StreamingPhish, a Python-based utility that uses supervised machine learning to rapidly detect phishing domains from the Certificate Transparency log network. Available on Github here:

    Poništi
  2. proslijedio/la je Tweet

    I think wrote the best summary of my “monitor first” philosophy, which I believe are the best words ever written by back in 2001.

    Poništi
  3. proslijedio/la je Tweet
    4. lis 2019.

    The Stress and Joy of Security Jobs. A thread. A few months ago there was this whole thing about the stress of security roles, CISOs self-medicating, and a whole range of burn-out talk. Ok, yes, security is a tough job. A very tough job. 1/14

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    16. ruj 2019.

    Stop measuring the value of Threat Detection by how many alerts are generated and how many incidents they catch. A mouse trap won't catch mice if there are no mice to catch. But you need a mouse trap to know if there are mice. Waiting until you find poop everywhere is too late.

    Poništi
  5. proslijedio/la je Tweet
    Poništi
  6. proslijedio/la je Tweet
    20. kol 2019.

    Security Monitoring Wisdom: Realtime alerts do only make sense if you plan to also react in realtime. (e.g. fw block, disconnect systems) Otherwise the cost is too high. Better schedule a query that runs every 5 mins on the log data of the last 5 mins.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    26. srp 2019.

    Wish I had found that earlier, very good primer for classifying phishing domains from (2018), employing certstream, phishing_catcher and with shoutouts to a few other folks on Twitter:

    Poništi
  8. proslijedio/la je Tweet
    10. srp 2019.

    Please RT for visibility. Anyone doing 3rd party/vendor security work ever done a retro on vendors that you passed through review successfully and then discovered had suffered breaches? Curious as to numbers/rate correlated with efficacy of 3rd party risk management program.

    Poništi
  9. proslijedio/la je Tweet

    Awhile ago and I wrote a paper on the four types of threat detection. I see discussions of IOCs and TTPs and want to note: all four types of threat detection have value. Some are better in use cases like detection but better != all use-cases.

    Poništi
  10. proslijedio/la je Tweet
    23. lip 2019.

    threat detection planning (the process of planning the tasks needed to properly operationalize threat intelligence) is hard and most orgs barely think about it. if i had to do this from scratch, here’s how i might approach it.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet

    Sysmon with DNS query logging and original file name reporting will publish on Tuesday.

    Poništi
  12. proslijedio/la je Tweet
    20. svi 2019.

    Soooooo our entire team got laid off with no notice, on a monday- and they didn't even reach out to let us know it was coming. So there are some great people today looking for pentesting work. I'm among them, and looking to work with a skilled team. Retweets are appreciated.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    17. svi 2019.

    If you had a breach today, what data source would you want for the investigation that you don't have now? Follow up question, what's stopping you from adding it now?

    Poništi
  14. proslijedio/la je Tweet
    17. svi 2019.

    GDPR took away email whois records which challenges investigation but why not: 1) provide one anonymized id per acct to allow correlation 2) implement transparency logs similar to cert stream 3) require SLA for abuse reports & publish common reporting api

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    10. svi 2019.
    Poništi
  16. proslijedio/la je Tweet
    7. svi 2019.

    Just heard about a customer service exploit where the person called up multiple times and corrected a single character "misspelling" until the entire account was in his name.

    Poništi
  17. proslijedio/la je Tweet
    5. svi 2019.

    Security Data Science Learning Resources << feedback welcome

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet

    Sysmon update coming soon with DNS query logging and executable's original file name version field in process and image log entries...

    Poništi
  19. proslijedio/la je Tweet
    21. ožu 2019.

    my presentation from was uploaded this week, check it out if you're interested in detecting adversaries via large scale file analysis

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    20. tra 2019.
    Poništi
  21. proslijedio/la je Tweet
    20. tra 2019.

    v3 of the strelka gRPC beta was released this week, anticipating one more beta round before it takes over as master. grab it here if you’re interested:

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·