Ron Woolery
@TechRonick
DFIR history, moved into Cyber Threat Intelligence. GCTI, GCFA, GCIA
Was dir gefallen könnte
Okta is a symptom of a larger issue: too many orgs have outsourced their root of trust to a third party and have NO MECHANISM to detect abuse. Be real: the only reason we know about this one is because the threat actor targeted top tier orgs who caught them, not because Okta did
You should be aware of the term "harvest now, decrypt later". At some point, the encryption we use today will be easily crackable. Don't rely too heavily on it. Better to be very protective of where your data ends up, even if it's encrypted.
Here comes a new blog, In this one I've uncovered a new underground info stealer type malware "KrakenKeylogger". The blog will cover the Phishing campaign alongside with the execution chain, loader and injection process and overview of the malware capabilities (with some quick…
I’ve been laid off! I’d be a great fit for the following roles: 🔥CTI Analyst 🔥Hunt 🔥CTI Manager 8 GIAC Certs + MBA IT Management + DSc Cybersecurity 5 + years of CTI/Hunt experience Thank you!
So much of vendor selection is being able to articulate value proposition in absolutes ("I've done it before, it's simple with X"). The first vendor in a category to give free advanced training on their products will own their market inside of 36 months. 2/2
A fund raiser my wife is doing. gofundme.com/f/supplies-out…
gofundme.com
Donate to Supplies outreach to 50 needy kids, organized by Odilia Woolery
Hello everyone, we are going to visit my family in Granada, Nicaragua next month. I'… Odilia Woolery needs your support for Supplies outreach to 50 needy kids
Elon To Stay As Twitter CEO After Counting Mail-In Votes babylonbee.com/news/elon-to-s…
Insert commas into your password so when your credentials are dumped into a CSV it breaks it
This is quite... something.
regarding #log4jrce, this is a great site for an affected software list. Does anyone know who is responsible for the website, and running it? log4j.mwni.io
You may not think CVE-2021-42292 can be detected at the network level, but our @Corelight_inc Labs team (big shout-out to @keithjjones @alexgkirk @ynadji @benreardon) shows you how on the blog today: corelight.com/blog/detecting… #CyberSecurity #DFIR #ThreatHunting #OpenNDR
A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation github.com/corelight/CVE-…
New #MacOS #ZeroDay, this one is bad, and no working patch forthcoming… bleepingcomputer.com/news/apple/new…
bleepingcomputer.com
New macOS zero-day bug lets attackers run commands remotely
Security researchers disclosed today a new vulnerability in Apple's macOS Finder, which makes it possible for attackers to run commands on Macs running any macOS version up to the latest release, Big...
FBI had the #REvil decryption key for weeks - after accessing their servers - before sharing it with anyone. #ransomware washingtonpost.com/national-secur…
washingtonpost.com
FBI held back ransomware decryption key from businesses to run operation targeting hackers
The delay in unlocking computers may have cost the affected enterprises millions.
United States Trends
- 1. Raiders 83.4K posts
- 2. #WWERaw 180K posts
- 3. Cowboys 52.6K posts
- 4. #GMMTV2026 374K posts
- 5. #Dragula N/A
- 6. #WickedForGood 8,612 posts
- 7. Pickens 21.9K posts
- 8. Grok 4.1 34.3K posts
- 9. Alpha Points 1,650 posts
- 10. Chip Kelly 2,466 posts
- 11. Gunther 22.6K posts
- 12. Jlexis 8,801 posts
- 13. Geno 16K posts
- 14. Sigourney N/A
- 15. Pete Carroll 3,678 posts
- 16. Jeanty 7,242 posts
- 17. Roman 76.5K posts
- 18. Quiet Piggy 4,494 posts
- 19. Mark Davis 1,586 posts
- 20. Ceedee 11.4K posts
Something went wrong.
Something went wrong.