Jorge Orchilles(@jorgeorchilles) 's Twitter Profileg
Jorge Orchilles

@jorgeorchilles

SANS Principal Instructor & Author #SEC565 | #RedTeam | #PurpleTeam | #PenTest | #C2Matrix Creator | ATT&CK & Atomic Red Team Contributor | Published Author

ID:19165893

linkhttps://www.orchilles.com calendar_today19-01-2009 01:32:48

13,8K Tweets

11,1K Followers

468 Following

Jorge Orchilles(@jorgeorchilles) 's Twitter Profile Photo

We need to reset expectations. LLMs are not 'discovering' novel attacks or 0days. They are lowering the barrier for entry for all types of hackers. Embrace it, let it help you. Criminals already are: thehackernews.com/2024/04/micros…

account_circle
GJ(@gertjanbruggink) 's Twitter Profile Photo

Looking for effective ways to support the decision-making process of your stakeholders? My friend Aperture and Noise & I presented about this topic, specifically by utilizing 'attack trees', at this weeks FIRST CTI Conference.

Slides are now available via: github.com/gertjanbruggin…

Looking for effective ways to support the decision-making process of your stakeholders? My friend @aperturenoise & I presented about this topic, specifically by utilizing 'attack trees', at this weeks FIRST CTI Conference. Slides are now available via: github.com/gertjanbruggin…
account_circle
Alex Pinto(@alexcpsec) 's Twitter Profile Photo

I really cannot wait to share this one with you.

will be out on May 1st, just in time for no one to be able to update their marketing pitches for the RSA Conference.

account_circle
SANS Offensive Operations(@SANSOffensive) 's Twitter Profile Photo

Join us at on Thursday, April 25 when Jorge Orchilles & Tim Schulz will share strategies, tips, and quick wins for how to start building an Red Team.

➡️ Register for Free: sans.org/u/1uVn

Join us at #SANSAiForum on Thursday, April 25 when @jorgeorchilles & @teschulz will share strategies, tips, and quick wins for how to start building an #AI Red Team. ➡️ Register for Free: sans.org/u/1uVn #ReadTeam #PenTest
account_circle
Merill Fernando(@merill) 's Twitter Profile Photo

🥳 🎉 Folks, Fabian Bader, Thomas Naunheim & I are excited to launch Maester today after working on this over many long nights & weekends!

Maester is an open source, test framework that you can set up in minutes to test & continuously monitor your Microsoft security config

🧵⬇️

🥳 🎉 Folks, @fabian_bader, @Thomas_Live & I are excited to launch Maester today after working on this over many long nights & weekends! Maester is an open source, test framework that you can set up in minutes to test & continuously monitor your Microsoft security config 🧵⬇️
account_circle
Justin Elze(@HackingLZ) 's Twitter Profile Photo

If you were going to rank a bunch of C2s from an operators perspective what attributes would you use? Modularity? Built in opsec? Socks speed?

account_circle
Robᵉʳᵗ Graham 𝕏(@ErrataRob) 's Twitter Profile Photo

Cybersecurity is a field dominated by vendors selling what's often snakeoil. The reason is that purchasers are non-technical and are at the mercy of whatever vendors claim. You can't break out of the vendor-dominated scene unless you have technical management.

Cybersecurity is a field dominated by vendors selling what's often snakeoil. The reason is that purchasers are non-technical and are at the mercy of whatever vendors claim. You can't break out of the vendor-dominated scene unless you have technical management.
account_circle
Jorge Orchilles(@jorgeorchilles) 's Twitter Profile Photo

Spent the last year Verizon running the offensive security team (more accurately called Readiness and Proactive Security) One of the innovative things I got to do was build an AI Red Team with Tim Schulz We will share lessons learned and how to get started
sans.org/webcasts/sans-…

account_circle
Jorge Orchilles(@jorgeorchilles) 's Twitter Profile Photo

Anyone have an extra ticket for Wicys? I have a direct report that has booked flight and hotel but now needs a ticket. This will be her first time attending, please RT for reach.

account_circle
Christopher Peacock(@SecurePeacock) 's Twitter Profile Photo

These terms are often conflated and it seems like more people just lump any type of “hacking” activity into “red”.

Jorge Orchilles did a write-up explaining the difference: sans.org/blog/shifting-…

account_circle
Christopher Peacock(@SecurePeacock) 's Twitter Profile Photo

No, running atomic red team for TXXXX does’t mean you now detect APT-Y’s procedures for TXXXX.

Conducting analysis of your coverage for a threat group via ATT&CK Navigator on technique IDs alone is a reductionist view of procedure variations, and does not appropriately convey

account_circle
Justin Elze(@HackingLZ) 's Twitter Profile Photo

spencer I think people assume the goal is never getting caught at the expense of not adding value. At some point you have to balance both those things.

account_circle
Rob T. Lee(@robtlee) 's Twitter Profile Photo

I'm thrilled to let you know that the agenda for the SANS Faculty Led event is now available. Mick Douglas 🇺🇦🌻 david_hoelzer @[email protected] Jess Garcia sethmisenar Jorge Orchilles Looking forward to hosting these talks on the forum on April 25. Register now!

account_circle
Jorge Orchilles(@jorgeorchilles) 's Twitter Profile Photo

2nd race of the 2024 season in the books with Christopher Peacock taking P1. Paul Pols and I sharing the podium with him. Paul manages to hold on to the lead but a long way to go with 22 more races this season!

2nd race of the 2024 season in the books with @SecurePeacock taking P1. @paulpols and I sharing the podium with him. Paul manages to hold on to the lead but a long way to go with 22 more races this season! #InfoSecF1
account_circle