mthcht(@mthcht) 's Twitter Profile Photo

🔥ThreatHunting-keywords April update🔥
35380 detection patterns
152 tools updated github.com/mthcht/ThreatH…
WebSite: mthcht.github.io/ThreatHunting-…
Individual Tool Lists: github.com/mthcht/ThreatH…
Yara Rules: github.com/mthcht/ThreatH…
Specific Artifact Lists Updated: github.com/mthcht/awesome…

🔥ThreatHunting-keywords April update🔥
35380 detection patterns
152 tools updated github.com/mthcht/ThreatH…
WebSite: mthcht.github.io/ThreatHunting-…
Individual Tool Lists: github.com/mthcht/ThreatH…
Yara Rules: github.com/mthcht/ThreatH…
Specific Artifact Lists Updated: github.com/mthcht/awesome…
account_circle
ACE Responder(@ACEResponder) 's Twitter Profile Photo

We've added argument decoders for CertServerRequest to the Extended Telemetry fork of RPC Firewall. This can reveal AD CS abuse in real time with:

• source user/IP
• the requested certificate template
• subject alt names

github.com/ACE-Responder/…

We've added argument decoders for CertServerRequest to the Extended Telemetry fork of RPC Firewall. This can reveal AD CS abuse in real time with:

• source user/IP
• the requested certificate template
• subject alt names

github.com/ACE-Responder/…

#ThreatHunting #DFIR
account_circle
Cyber 5W(@cyber5w) 's Twitter Profile Photo

As a DFIR Engineer, you should notice something suspicious going on here!!
But how many techniques do you know that an attacker can use to hide this easy detection from you?!

As a DFIR Engineer, you should notice something suspicious going on here!!
But how many techniques do you know that an attacker can use to hide this easy detection from you?!
#C5W #DFIR #Malware #ThreatHunting #Cybersecurity
account_circle
ACE Responder(@ACEResponder) 's Twitter Profile Photo

Extended telemetry for RPC Firewall decodes RPC call parameters. The context gives a single authoritative event for:

• Lateral movement
• Forced authentication
• Remote enumeration

github.com/ACE-Responder/…

Extended telemetry for RPC Firewall decodes RPC call parameters. The context gives a single authoritative event for:

• Lateral movement
• Forced authentication
• Remote enumeration

github.com/ACE-Responder/…

#ThreatHunting #DFIR
account_circle
Edgewater Federal Solutions(@EdgewaterFed) 's Twitter Profile Photo

Learn how 's team of experts works together to review the data, share insights, and develop strategies for improving our Federal client's security posture. edgewaterit.com/2024/05/02/thr…
Cyber

Learn how #Edgewater's team of experts works together to review the data, share insights, and develop strategies for improving our Federal client's security posture. edgewaterit.com/2024/05/02/thr…
#EFS #EdgewaterCyber #ThreatHunting #MidnightBlizzard #ATPs #Cybersecurity #CyberDefense
account_circle
Andre Carraretto(@AndreCarraretto) 's Twitter Profile Photo

In the latest episode of the Adversary Universe podcast, CrowdStrike's Andrew Munchbach breaks down the concept of OODA in .

1️⃣ Observe what's happening
2️⃣ Orient yourself around what's happening
3️⃣ Decide
4️⃣ Act

🎧 Full episode on Spotify: crwdstr.ke/6018jrWwj

account_circle
Eliza Zaharia(@ZahariaEliza) 's Twitter Profile Photo

In the latest episode of the Adversary Universe podcast, CrowdStrike's Andrew Munchbach breaks down the concept of OODA in .

1️⃣ Observe what's happening
2️⃣ Orient yourself around what's happening
3️⃣ Decide
4️⃣ Act

🎧 Full episode on Spotify: crwdstr.ke/6014bNYem

account_circle
Laura Naumann(@lauranaumann) 's Twitter Profile Photo

In the latest episode of the Adversary Universe podcast, CrowdStrike's Andrew Munchbach breaks down the concept of OODA in .

1️⃣ Observe what's happening
2️⃣ Orient yourself around what's happening
3️⃣ Decide
4️⃣ Act

🎧 Full episode on Spotify: crwdstr.ke/6012b0aRm

account_circle
Laura Naumann(@lauranaumann) 's Twitter Profile Photo

In the latest episode of the Adversary Universe podcast, CrowdStrike's Andrew Munchbach breaks down the concept of OODA in .

1️⃣ Observe what's happening
2️⃣ Orient yourself around what's happening
3️⃣ Decide
4️⃣ Act

🎧 Full episode on Spotify: crwdstr.ke/6016b0aM8

account_circle
Alexander Kriechbaum(@alexkbaum) 's Twitter Profile Photo

In the latest episode of the Adversary Universe podcast, CrowdStrike's Andrew Munchbach breaks down the concept of OODA in .

1️⃣ Observe what's happening
2️⃣ Orient yourself around what's happening
3️⃣ Decide
4️⃣ Act

🎧 Full episode on Spotify: crwdstr.ke/6012bauwI

account_circle
Matthew Crowson(@matthew_cr98922) 's Twitter Profile Photo

In the latest episode of the Adversary Universe podcast, CrowdStrike's Andrew Munchbach breaks down the concept of OODA in .

1️⃣ Observe what's happening
2️⃣ Orient yourself around what's happening
3️⃣ Decide
4️⃣ Act

🎧 Full episode on Spotify: crwdstr.ke/6010jHPcY

account_circle
mrunmayi patil(@PatilMrunmayi1) 's Twitter Profile Photo

In the latest episode of the Adversary Universe podcast, CrowdStrike's Andrew Munchbach breaks down the concept of OODA in .

1️⃣ Observe what's happening
2️⃣ Orient yourself around what's happening
3️⃣ Decide
4️⃣ Act

🎧 Full episode on Spotify: crwdstr.ke/6010jDoCa

account_circle
mrunmayi patil(@PatilMrunmayi1) 's Twitter Profile Photo

In the latest episode of the Adversary Universe podcast, CrowdStrike's Andrew Munchbach breaks down the concept of OODA in .

1️⃣ Observe what's happening
2️⃣ Orient yourself around what's happening
3️⃣ Decide
4️⃣ Act

🎧 Full episode on Spotify: crwdstr.ke/6010jBTfi

account_circle
/ˈziːf-kɒn/(@x33fcon) 's Twitter Profile Photo

Dive deep into with our hands-on by 0xbad53c and Thomas Eugène! Join red and blue teams in live attack-defense exercises against simulated APT 0x00. Learn , , and techniques 🛡️
x33fcon.com/#!t/DennisVanE…

Dive deep into #cybersecurity with our hands-on #training by @0xbad53c and Thomas Eugène! Join red and blue teams in live attack-defense exercises against simulated APT 0x00. Learn #ThreatHunting, #DetectionEngineering, and #IncidentResponse techniques 🛡️
x33fcon.com/#!t/DennisVanE…
account_circle