Ben Higgins(@bnjmnhggns) 's Twitter Profileg
Ben Higgins

@bnjmnhggns

@[email protected]

ID:12527762

calendar_today22-01-2008 08:31:41

3,5K Tweets

240 Followers

969 Following

Red Canary(@redcanary) 's Twitter Profile Photo

We're excited to announce that ExtraHop and Red Canary are partnering together to unleash a game-changing combination of ExtraHop’s Network Detection and Response and Red Canary’s security expertise.

redcanary.com/blog/extrahop-…

account_circle
Michael(@aelonius) 's Twitter Profile Photo

As a response to the 3 vulnerability, Fox-IT's RIFT team has publicly released signatures for Suricata to help detect attempts at exploiting these vulnerabilities in your network.

github.com/fox-it/spookys…

account_circle
GreyNoise(@GreyNoiseIO) 's Twitter Profile Photo

What happens to a brand-new sensor? Try a week-in-the-life of a newly deployed GreyNoise sensor to discover what kinds of benign activity it sees in boB Rudis 🇺🇦 🐘@[email protected]'s latest blog: greynoise.io/blog/new-senso…

account_circle
Ben Higgins(@bnjmnhggns) 's Twitter Profile Photo

Interesting research! As a sanity check, I took a look at one of our internal sensors. For ExtraHop users, just filter Kerberos Request records down to AS_REQ and group by Server Principal Name. Only krbtgt/[domain] or kadmin/changepw should show up.

Interesting research! As a sanity check, I took a look at one of our internal sensors. For ExtraHop users, just filter Kerberos Request records down to AS_REQ and group by Server Principal Name. Only krbtgt/[domain] or kadmin/changepw should show up.
account_circle
Ben Higgins(@bnjmnhggns) 's Twitter Profile Photo

Just to check on if we’d notice this traffic, a colleague tried this tool in our sandbox and this was the result. twitter.com/lkarlslund/sta…

Just to check on if we’d notice this traffic, a colleague tried this tool in our sandbox and this was the result. twitter.com/lkarlslund/sta…
account_circle
Ben Higgins(@bnjmnhggns) 's Twitter Profile Photo

After a new hire asked if there was a bug bounty on a component I wrote (after I'd made some bold claims about it!), I said I'd pay them $100 out of my pocket, though I was rather specific about the bug classes :-) I'll be happy regardless of the outcome, I suppose.

account_circle
Andy Robbins(@_wald0) 's Twitter Profile Photo

The hardest targets in the world know they will never make initial access impossible.

The hardest targets in the world work to make initial access matter less.

account_circle
Jeffrey Heer(@jeffrey_heer) 's Twitter Profile Photo

For a decade+, grammar-of-graphics approaches (ggplot, Tableau, , Vega/Altair) have been a leading way to make visualizations. Beyond chart templates & low-level programming, are there compelling alternatives? Or does the future lie in abstractions on top of these grammars?

account_circle
Dino A. Dai Zovi(@dinodaizovi) 's Twitter Profile Photo

He is spelling out quite clearly what his playbook is:

* scan the Internet for RCE vulns that they can exploit (e.g. in Fortinet, Sharepoint, Sonicwall)
* abuse Active Directory to spread across the network
* deploy randomware via Active Directory

Defend against that playbook.

account_circle
Halvar Flake(@halvarflake) 's Twitter Profile Photo

A bundle of individual cyber insurance policies sold to a reinsurer is actually very close to a 'collateralized technical debt obligation'.

account_circle
J. A. Guerrero-Saade(@juanandres_gs) 's Twitter Profile Photo

Apple's announcement of lockdown mode is (a) an acknowledgement that a consumer-level solution is necessary, (b) a declaration of security bankruptcy on the broader iOS ecosystem (facetime? iMessage?), (c) still a preference for ignorance with no verification or monitoring.

account_circle
Steve Syfuhs(@SteveSyfuhs) 's Twitter Profile Photo

Periodic reminder that if your attack requires that you first somehow acquire the secret key to something, you have not in fact created a new attack.

account_circle
James Forshaw(@tiraniddo) 's Twitter Profile Photo

The Apple 'Lockdown mode' does sound interesting. But what would really be a game changer would be system transparency so you could actually inspect your iOS device with jailbreaking it. After all how can you verify lockdown mode hasn't been tampered with?😐

account_circle
Dan Guido(@dguido) 's Twitter Profile Photo

Missing from iOS Lockdown Mode: new introspection or detection capabilities. If an attacker overcomes the attack surface reductions, you still won't know. i✌️erify, iTunes backups (MVT), or illicit copies of Cellebrite kit still your best, limited options.

account_circle