Justin Ibarra(@br0k3ns0und) 's Twitter Profileg
Justin Ibarra

@br0k3ns0und

threat research & detection engineering lead @elastic by way of @endgameinc | compulsive heavy iron displacer | I always like my own tweets

ID:3305197544

linkhttps://br0k3nlab.com/ calendar_today03-08-2015 13:54:56

712 Tweets

1,3K Followers

808 Following

Jared Atkinson(@jaredcatkinson) 's Twitter Profile Photo

My On Detection series is back! In this edition I explore how the same behavior (operation chain) can be implemented using several different execution modalities and the implications of this for detection engineers.
posts.specterops.io/behavior-vs-ex…

account_circle
James Kettle(@albinowax) 's Twitter Profile Photo

XSS in PDF.js! I think this is going to cause some chaos both client-side and server-side... really nice finding by Codean
codeanlabs.com/blog/research/…

account_circle
Denny Fischer(@df_sec) 's Twitter Profile Photo

LoFP by Justin Ibarra: Autogenerated collection of false positives from popular rule sets, categorized with ATT&CK techniques, rule & data sources. Aids red teams to blend in & blue teams in identifying detection weak spots.
br0k3nlab.com/LoFP/

account_circle
Samir(@SBousseaden) 's Twitter Profile Photo

some related detection for this dwm exploit:

unusual dwm.exe childproc github.com/elastic/protec…

unsigned dll loaded by MS system process (e.g. winlogon.exe) github.com/elastic/protec…

account_circle
Ruben Groenewoud(@RFGroenewoud) 's Twitter Profile Photo

Ebury is some fascinating and sophisticated malware! Props to ESET Research for their extensive threat research report. Happy to see our coverage at Elastic is on point. 🔍👏

Ebury is some fascinating and sophisticated malware! Props to @ESETresearch for their extensive threat research report. Happy to see our coverage at @elastic is on point. 🔍👏 #ebury #ElasticSecurityLabs #elastic
account_circle
AJ King(@ajkingio) 's Twitter Profile Photo

🎉Good news!🎉
🎉Amazon Updates S3 Billing🎉
Yesterday, AWS started deploying new billing changes for S3. Now you won't get charged for requests or bandwidth due to requests that return the following error codes -- as long as they were initiated outside of your AWS account or AWS

account_circle
Justin Ibarra(@br0k3ns0und) 's Twitter Profile Photo

Too true! Or pretending that some feature is not critically dependent on the upkeep of detection rules upstream.

You know what they say: never waste a good meme opportunity!

Too true! Or pretending that some feature is not critically dependent on the upkeep of detection rules upstream. You know what they say: never waste a good meme opportunity!
account_circle
BertJanCyber(@BertJanCyber) 's Twitter Profile Photo

🛡 New Blog: Investigating Microsoft Graph Activity Logs
In April Microsoft announced GA of the Graph activity logs, this new log source opens opportunities for defenders. The blog explains how the data can be effectively analyzed and enriched with .
kqlquery.com/posts/graphact…

account_circle
Cloud Village(@cloudvillage_dc) 's Twitter Profile Photo

🔒 Gear up, hackers! 🔒

CTF BSidesSF is just an hour away⏰

Join the cyber showdown and prove your skills!

Register now at ctf.cloud-village.org and prep your tools for battle! 💻🛡️

account_circle
Frank McGovern(@FrankMcG) 's Twitter Profile Photo

I want to see more Security Architect, Security Engineer, and Security Analyst panels.

People are pretty tired of hearing from CISO’s only. Especially when many of them are just people leaders. It also puts one role on a pedestal. All are valuable.

Please, submit them!

account_circle
Will Harris(@parityzero) 's Twitter Profile Photo

I published a step by step guide on using Windows event logs to hunt for malware trying to steal sensitive data from browsers e.g. cookies, passwords etc. security.googleblog.com/2024/04/detect… Hope it's useful!

I published a step by step guide on using Windows event logs to hunt for malware trying to steal sensitive data from browsers e.g. cookies, passwords etc. security.googleblog.com/2024/04/detect… #DFIR Hope it's useful!
account_circle
Justin Ibarra(@br0k3ns0und) 's Twitter Profile Photo

Prompt injection basically serves as a proxy (on steroids) for any web injection style attacks for all web app or web-based services running LLMs to serve up information.

account_circle
丂卄ㄖᗪ卂几 - 👋 crack fingers(@therealshodan) 's Twitter Profile Photo

code[.]microsoft[.]com became pretty interesting to the community over the weekend.

Blog post about what we use it for and what we’ve been seeing. Crucially why it had to say goodbye.

techcommunity.microsoft.com/t5/microsoft-s…

account_circle
Elastic Security Labs(@elasticseclabs) 's Twitter Profile Photo

Interested in securing the lifecycle of your LLM? The newest article from Mika Ayenson details his research into native protections against the OWASP® Foundation Top Ten with ES|QL. Check it out: go.es.io/3Qht7i9

account_circle
Kaspersky(@kaspersky) 's Twitter Profile Photo

Our experts have released part two of our analysis on the .

The findings reveal a dual-layered strategy used by the attackers, combining social engineering with sophisticated technical exploitation to breach XZ Utils' integrity.

More ⇒ kas.pr/w27p

Our experts have released part two of our analysis on the #XZbackdoor. The findings reveal a dual-layered strategy used by the attackers, combining social engineering with sophisticated technical exploitation to breach XZ Utils' integrity. More ⇒ kas.pr/w27p
account_circle