botlabsDev's profile picture.

botlabsDev

@botlabsDev

Awesome team! Can recommend to check it out!

Goooood morning everyone! Our team is looking for another Senior Technical Threat Researcher! So, check out our blog! Tell your friends and ping us if you awesome and interested! Check it out: dcso.de/job/senior-tec…



botlabsDev 님이 재게시함

#ProgressUpdate The project now uses a staging system🥳. This prevents me from debugging in production and can be considered an invest into stability! The cat likes it! #ioc_one #cti

ioc_one_'s tweet image. #ProgressUpdate The project now uses a staging system🥳. This prevents me from debugging in production and can be considered an invest into stability! 

The cat likes it! 
#ioc_one #cti

botlabsDev 님이 재게시함

The recent #XZBackdoor caused a lot of agitation in the Open Source Community. Today we publish a #ComprehensiveOverview what happened and how to check your system for affection. Read more at medium.com/@DCSO_CyTec/fb… #DCSO #DRIF #Cyber


I converted the new threat actor naming taxonomy from Microsoft (@MsftSecIntel) to json in case someone else needs the data in a machine readable format. gist.github.com/botlabsDev/e23… #threatintel #research #apt

We are announcing a new taxonomy that better reflects the complex tapestry of the threat ecosystem. Name mapping list and industry aka's:➡️ learn.microsoft.com/en-us/microsof… Read more: ⬇️⬇️⬇️

JohnLaTwC's tweet image. We are announcing a new taxonomy that better reflects the complex tapestry of the threat ecosystem.

Name mapping list and industry aka's:➡️ learn.microsoft.com/en-us/microsof…

Read more:
⬇️⬇️⬇️


#CLT2023 Thanks for listening 😊 See you next year @clt_news

이 트윗은 더 이상 사용할 수 없습니다.

Working with @jaydinbas on our next #ShortAndMalicious post was a lot of fun as always 😁 Check it out below! #PikaBot #iPikaBot #DCSO #CyTec


Ok. Let's call it a day. The "new future" wants me to take a break.

botlabsDev's tweet image. Ok. Let's call it a day. The "new future" wants me to take a break.

botlabsDev 님이 재게시함

Check out our new blog post! This time we analyse and follow HZ Rat. A previously undocumented malware delivered through malicious documents and self extracting archives. We tracked the campaign and identified a lot of C2 servers. medium.com/@DCSO_CyTec/50… #HZRat #DCSO #CyTec


botlabsDev 님이 재게시함

Back to full talks with Axel Wauer @botlabsDev who presents HZ Rat Goes China: Following The Tail Of An Unknown Backdoor #CTI-Summit

Ministraitor's tweet image. Back to full talks with Axel Wauer @botlabsDev who presents HZ Rat Goes China: Following The Tail Of An Unknown Backdoor
#CTI-Summit

botlabsDev 님이 재게시함

Part 2: Tracking down Maggie @DCSO_de's Incident Response Team (DIRT) provides insights on how to detect the novel MSSQL malware “Maggie” in your environment. #DFIR #threat_hunting #sigma #yara #mssql medium.com/@DCSO_CyTec/tr…


botlabsDev 님이 재게시함

MSSQL, meet Maggie! In our latest blog post, we analyze 'Maggie', a novel backdoor for MSSQL servers, implemented as an Extended Stored Procedure and only controlled using SQL queries. medium.com/@DCSO_CyTec/89…


Thanks again @brucon for this awesome conference. I really enjoyed every single talk ❤️ #BruCon #BruCON0x0E 🍻

botlabsDev's tweet image. Thanks again @brucon for this awesome conference. I really enjoyed every single talk ❤️

#BruCon #BruCON0x0E 🍻

botlabsDev 님이 재게시함

Today we published “404 — File still found”, where we can confirm #SideWinder attribution and established even more relations between samples. medium.com/@DCSO_CyTec/40…


Verifying myself: I am botlabsdev on Keybase.io. IHwuz4seAZ8yC1MeuCySRCFVRYexDIT_F06W / keybase.io/botlabsdev/sig…


Loading...

Something went wrong.


Something went wrong.