botlabsDev's profile picture.

botlabsDev

@botlabsDev

Awesome team! Can recommend to check it out!

Goooood morning everyone! Our team is looking for another Senior Technical Threat Researcher! So, check out our blog! Tell your friends and ping us if you awesome and interested! Check it out: dcso.de/job/senior-tec…



botlabsDev reposted

#ProgressUpdate The project now uses a staging system🥳. This prevents me from debugging in production and can be considered an invest into stability! The cat likes it! #ioc_one #cti

ioc_one_'s tweet image. #ProgressUpdate The project now uses a staging system🥳. This prevents me from debugging in production and can be considered an invest into stability! 

The cat likes it! 
#ioc_one #cti

botlabsDev reposted

The recent #XZBackdoor caused a lot of agitation in the Open Source Community. Today we publish a #ComprehensiveOverview what happened and how to check your system for affection. Read more at medium.com/@DCSO_CyTec/fb… #DCSO #DRIF #Cyber


I converted the new threat actor naming taxonomy from Microsoft (@MsftSecIntel) to json in case someone else needs the data in a machine readable format. gist.github.com/botlabsDev/e23… #threatintel #research #apt

We are announcing a new taxonomy that better reflects the complex tapestry of the threat ecosystem. Name mapping list and industry aka's:➡️ learn.microsoft.com/en-us/microsof… Read more: ⬇️⬇️⬇️

JohnLaTwC's tweet image. We are announcing a new taxonomy that better reflects the complex tapestry of the threat ecosystem.

Name mapping list and industry aka's:➡️ learn.microsoft.com/en-us/microsof…

Read more:
⬇️⬇️⬇️


#CLT2023 Thanks for listening 😊 See you next year @clt_news

This post is unavailable.

Working with @jaydinbas on our next #ShortAndMalicious post was a lot of fun as always 😁 Check it out below! #PikaBot #iPikaBot #DCSO #CyTec


Ok. Let's call it a day. The "new future" wants me to take a break.

botlabsDev's tweet image. Ok. Let's call it a day. The "new future" wants me to take a break.

botlabsDev reposted

Check out our new blog post! This time we analyse and follow HZ Rat. A previously undocumented malware delivered through malicious documents and self extracting archives. We tracked the campaign and identified a lot of C2 servers. medium.com/@DCSO_CyTec/50… #HZRat #DCSO #CyTec


botlabsDev reposted

Back to full talks with Axel Wauer @botlabsDev who presents HZ Rat Goes China: Following The Tail Of An Unknown Backdoor #CTI-Summit

Ministraitor's tweet image. Back to full talks with Axel Wauer @botlabsDev who presents HZ Rat Goes China: Following The Tail Of An Unknown Backdoor
#CTI-Summit

botlabsDev reposted

Part 2: Tracking down Maggie @DCSO_de's Incident Response Team (DIRT) provides insights on how to detect the novel MSSQL malware “Maggie” in your environment. #DFIR #threat_hunting #sigma #yara #mssql medium.com/@DCSO_CyTec/tr…


botlabsDev reposted

MSSQL, meet Maggie! In our latest blog post, we analyze 'Maggie', a novel backdoor for MSSQL servers, implemented as an Extended Stored Procedure and only controlled using SQL queries. medium.com/@DCSO_CyTec/89…


Thanks again @brucon for this awesome conference. I really enjoyed every single talk ❤️ #BruCon #BruCON0x0E 🍻

botlabsDev's tweet image. Thanks again @brucon for this awesome conference. I really enjoyed every single talk ❤️

#BruCon #BruCON0x0E 🍻

botlabsDev reposted

Today we published “404 — File still found”, where we can confirm #SideWinder attribution and established even more relations between samples. medium.com/@DCSO_CyTec/40…


Verifying myself: I am botlabsdev on Keybase.io. IHwuz4seAZ8yC1MeuCySRCFVRYexDIT_F06W / keybase.io/botlabsdev/sig…


Loading...

Something went wrong.


Something went wrong.