OptimalStache's profile picture. Cyber Security/Digital Forensics and Incident Response professional based in Metro NYC.

Optimal Stache

@OptimalStache

Cyber Security/Digital Forensics and Incident Response professional based in Metro NYC.

Optimal Stache 님이 재게시함

2020 saw a significant change in the cyber threat landscape. Explore 5 threat trends we believe will continue to pose a risk this year -- including ransomware & supply chain risks -- and how you can respond: pwc.to/3qRVrJn

PwC's tweet image. 2020 saw a significant change in the cyber threat landscape. Explore 5 threat trends we believe will continue to pose a risk this year -- including ransomware & supply chain risks -- and how you can respond: pwc.to/3qRVrJn

Optimal Stache 님이 재게시함

If you're running an Exchange Server system that got xChanged in this recent mass-hack: By all means patch, get backdoors off there, but don't neglect to backup the server, email, etc & put that backup somewhere offline. The risk of ransomware groups pouncing on this is high.


Optimal Stache 님이 재게시함

No matter who you love, how you identify, or where you are in your journey – New Jersey loves you and stands with you. And, together, we’ll keep up the fight for full equality. #NationalComingOutDay

GovMurphy's tweet image. No matter who you love, how you identify, or where you are in your journey – New Jersey loves you and stands with you. And, together, we’ll keep up the fight for full equality. #NationalComingOutDay

Optimal Stache 님이 재게시함

Microsoft took action against the Trickbot botnet, disrupting one of the world’s most persistent malware operations. In this blog, we detail the evolution of Trickbot, associated tactics, recent campaigns, and dive into the anatomy of a specific attack. msft.it/6019TIb4l


Optimal Stache 님이 재게시함

A new info-stealing malware we first saw being sold in the cybercriminal underground in June is now actively distributed in the wild. The malware is called Anubis and uses code forked from Loki malware to steal system info, credentials, credit card details, cryptocurrency wallets

MsftSecIntel's tweet image. A new info-stealing malware we first saw being sold in the cybercriminal underground in June is now actively distributed in the wild. The malware is called Anubis and uses code forked from Loki malware to steal system info, credentials, credit card details, cryptocurrency wallets
MsftSecIntel's tweet image. A new info-stealing malware we first saw being sold in the cybercriminal underground in June is now actively distributed in the wild. The malware is called Anubis and uses code forked from Loki malware to steal system info, credentials, credit card details, cryptocurrency wallets
MsftSecIntel's tweet image. A new info-stealing malware we first saw being sold in the cybercriminal underground in June is now actively distributed in the wild. The malware is called Anubis and uses code forked from Loki malware to steal system info, credentials, credit card details, cryptocurrency wallets

Advanced Analytics and Incident Response


Locky Ransomware Campaign from August 28, 2017 which generated over 23 million emails. tinyurl.com/yby84e54


Volatility Memory Acquisitions and Forensics. n0where.net/volatile-memor…


Optimal Stache 님이 재게시함

Petya ransomware successful in spreading because it combines both a client-side attack (CVE-2017-0199) and a network based threat (MS17-010)


Scamming 101 - Online Course Teaches Scammers how to Scam... tinyurl.com/ybrxxhog


Loading...

Something went wrong.


Something went wrong.