DrunkBinary's profile picture. Principal Adversary Hunter @dragosinc, Army Veteran (3rd ACR, 1/10CAV, CYBERCOM),  Cocktail Scientist, Threat Researcher/Analyst | #FSD

Drunk Binary

@DrunkBinary

Principal Adversary Hunter @dragosinc, Army Veteran (3rd ACR, 1/10CAV, CYBERCOM), Cocktail Scientist, Threat Researcher/Analyst | #FSD

Drunk Binary reposted

when your ai girlfriend was on aws us east 1

netcapgirl's tweet image. when your ai girlfriend was on aws us east 1

Tech CEO who never had "low velocity" 7.62 shot at them.

I am of the strong opinion that NATO standards and norms around helmets and body armor should reflect the weapons that define modern warfare - airburst munitions, drone attacks, etc. Optimizing for low-velocity 7.62 rifle threats made sense once upon a time, but no longer.



Drunk Binary reposted

PE Import Anatomy #ThreatHunting #DFIR #Windows

ACEResponder's tweet image. PE Import Anatomy

#ThreatHunting #DFIR #Windows

Drunk Binary reposted

"vibeyness"™️ may soon become a malware classification metric.

jamieantisocial's tweet image. "vibeyness"™️ may soon become a malware classification metric.

Drunk Binary reposted

How the diamond ticket attack works. #ThreatHunting #DFIR


Drunk Binary reposted

How to spot a penetration tester #ThreatHunting #DFIR

ACEResponder's tweet image. How to spot a penetration tester

#ThreatHunting #DFIR

Drunk Binary reposted

How Windows security descriptors work. #Windows #ThreatHunting #DFIR

ACEResponder's tweet image. How Windows security descriptors work.

#Windows #ThreatHunting #DFIR

Drunk Binary reposted

A buffer overflow attack visualized. #ThreatHunting #DFIR #redteam


Drunk Binary reposted

✅The UAC Bypasses module is now available in the instant SIEM! Practice investigating a diverse set of UAC bypasses with Kusto Query Language (KQL)! #ThreatHunting #DFIR aceresponder.com/learn/uac-bypa…


Drunk Binary reposted

Fuck it. Entire "Mama I'm Coming Home" from Ozzy's final set.


Drunk Binary reposted

How cross-trust Kerberos authentication works #ThreatHunting #DFIR


Drunk Binary reposted

At this point, maybe North Korea should just start selling bootcamps for how to break into cybersecurity. They seem to have really figured that shit out.


Drunk Binary reposted

This talk from @JohnLaTwC is indeed very good and is taunting me with doing math at work 😒 Srsly tho I’d love to take a class on applied algebra for anomaly detection from him because he explains it so clearly 🤩

Great talk by @JohnLaTwC on ways you can turn security data into graphs: youtube.com/watch?v=cXhX3s…. Especially the vector part is great: so many tools have built in support for embeddings (e.g. BigQuery ML.GENERATE_EMBEDDING and VECTOR_SEARCH), defenders should be using them more!

anttitikkanen's tweet card. John Lambert | Building Attack Graphs & the Algebras of Defense |...

youtube.com

YouTube

John Lambert | Building Attack Graphs & the Algebras of Defense |...



Drunk Binary reposted

Great talk by @JohnLaTwC on ways you can turn security data into graphs: youtube.com/watch?v=cXhX3s…. Especially the vector part is great: so many tools have built in support for embeddings (e.g. BigQuery ML.GENERATE_EMBEDDING and VECTOR_SEARCH), defenders should be using them more!

anttitikkanen's tweet card. John Lambert | Building Attack Graphs & the Algebras of Defense |...

youtube.com

YouTube

John Lambert | Building Attack Graphs & the Algebras of Defense |...


Drunk Binary reposted

How password spraying works


Drunk Binary reposted

SIEM/SOAR platforms can empower network defenders to uncover cyber threats and protect your data from malicious actors. Cybersecurity executives and practitioners should review our new joint guidance to ensure proper implementation and security. nsa.gov/Press-Room/Pre…

NSACyber's tweet image. SIEM/SOAR platforms can empower network defenders to uncover cyber threats and protect your data from malicious actors. Cybersecurity executives and practitioners should review our new joint guidance to ensure proper implementation and security. nsa.gov/Press-Room/Pre…

Drunk Binary reposted

🚨Kroger cybersecurity is hiring! Check out the postings here: linkedin.com/posts/activity… #cyberjobs #hiring


Drunk Binary reposted

New e-crime insights: TA4557, known for distributing More_eggs malware, notably expanded to an int'l audience in recent campaigns. Per our data, the recruiter-focused TA was seen targeting orgs in France, England & Ireland, in addition to typical North America-targeted threats.


Drunk Binary reposted

Nice report from Proofpoint on TA4557! I noticed that you can hunt for Resume Profiles dropping More_Eggs backdoor: http.title:"Resume" HTTP/1.1 200 OK Date: GMT Server: Apache/2.4.58 (Ubuntu) Vary: Accept-Encoding Content-Length: Content-Type: text/html; charset=UTF-8 Happy…

TLP_R3D's tweet image. Nice report from Proofpoint on TA4557!

I noticed that you can hunt for Resume Profiles dropping More_Eggs backdoor:

http.title:"Resume" HTTP/1.1 200 OK Date: GMT Server: Apache/2.4.58 (Ubuntu) Vary: Accept-Encoding Content-Length: Content-Type: text/html; charset=UTF-8
 
Happy…

New e-crime insights: TA4557, known for distributing More_eggs malware, notably expanded to an int'l audience in recent campaigns. Per our data, the recruiter-focused TA was seen targeting orgs in France, England & Ireland, in addition to typical North America-targeted threats.



Loading...

Something went wrong.


Something went wrong.