n8s3c's profile picture. Threat Intel Analyst. #CTI, GIFs, Meme's, and general dumpsterfires. Opinions mine, not my employers, don't blame my parents, yadayada. he/him

Nate ๐Ÿค“+๐Ÿ’ป=๐Ÿ•ต๏ธ

@n8s3c

Threat Intel Analyst. #CTI, GIFs, Meme's, and general dumpsterfires. Opinions mine, not my employers, don't blame my parents, yadayada. he/him

๊ณ ์ •๋œ ํŠธ์œ—

Anyone: (awkward small talk) So what about you... Me:

me after 1 sip of beer at the company party



I always thought ok was good and okay was like okaaaaayyy sarcastic like.

how do you text "okay" but in the rudest way possible



I too use Almond milk as a substitute for orange juice, cherry cola, and peanut oil.

(quietly) I support this

politicalmath's tweet image. (quietly) I support this


"Theย Halo effectย describes a curious phenomenon, whereby the way we perceive oneย character traitย of a person influences all subsequent judgements of other, even unrelated character traits of the same person".ย  psychologytoday.com/us/blog/stretcโ€ฆ

psychologytoday.com

The Halo Effect: What It Is and How to Beat It

Is the Halo effect clouding your judgement? A three-step strategy can help you overcome the dangerous influences of first impressions.


Nate ๐Ÿค“+๐Ÿ’ป=๐Ÿ•ต๏ธ ๋‹˜์ด ์žฌ๊ฒŒ์‹œํ•จ

Rest In Peace, David Lynch๐ŸŒน

musicboxtheatre's tweet image. Rest In Peace, David Lynch๐ŸŒน

Putting together last minute Intel Product/Presentation.

(quietly) I support this

politicalmath's tweet image. (quietly) I support this


Nate ๐Ÿค“+๐Ÿ’ป=๐Ÿ•ต๏ธ ๋‹˜์ด ์žฌ๊ฒŒ์‹œํ•จ

โš”๏ธ The threat landscape is a battleground. Your best weapon? Information. Catch @likethecoins LIVE Dec. 19th as she explores the most pressing developments in #cybersecurity. โฐ Click 'Attend' to set your reminder: buff.ly/4glXRcI #ThreatIntel #DFIR #ThreatIntelligence

sansforensics's tweet image. โš”๏ธ The threat landscape is a battleground. Your best weapon? Information.

Catch @likethecoins LIVE Dec. 19th as she explores the most pressing developments in #cybersecurity.

โฐ Click 'Attend' to set your reminder: buff.ly/4glXRcI

#ThreatIntel #DFIR #ThreatIntelligence

Nate ๐Ÿค“+๐Ÿ’ป=๐Ÿ•ต๏ธ ๋‹˜์ด ์žฌ๊ฒŒ์‹œํ•จ

1990: Clifford Stoll's book "The Cuckoo's Egg" was turned into an episode of NOVA entitled "The KGB, the Computer, and Me". To avoid spoiling it, let's say it's a story of how he tracked down a hacker who broke into his employer's computer. Watch for free! archive.org/details/The_KGโ€ฆ

todayininfosec's tweet image. 1990: Clifford Stoll's book "The Cuckoo's Egg" was turned into an episode of NOVA entitled "The KGB, the Computer, and Me". To avoid spoiling it, let's say it's a story of how he tracked down a hacker who broke into his employer's computer. Watch for free! archive.org/details/The_KGโ€ฆ

Where there's smoke .........there's threat adversaries looking to exploit you. Promises to leak deleted X posts related to P Diddy leads to Pysilon RAT darkreading.com/endpoint-securโ€ฆ


Nate ๐Ÿค“+๐Ÿ’ป=๐Ÿ•ต๏ธ ๋‹˜์ด ์žฌ๊ฒŒ์‹œํ•จ

I am happy to share another new resource I recently made called The Russian APT Tool Matrix ๐Ÿ‡ท๐Ÿ‡บ ๐Ÿ”— blog.bushidotoken.net/2024/09/the-ruโ€ฆ #CTI #ThreatHunting #ThreatIntel #Ransomware

BushidoToken's tweet image. I am happy to share another new resource I recently made called The Russian APT Tool Matrix ๐Ÿ‡ท๐Ÿ‡บ 

๐Ÿ”— blog.bushidotoken.net/2024/09/the-ruโ€ฆ

#CTI #ThreatHunting #ThreatIntel #Ransomware

Nate ๐Ÿค“+๐Ÿ’ป=๐Ÿ•ต๏ธ ๋‹˜์ด ์žฌ๊ฒŒ์‹œํ•จ

Thank you to @Synk.io for supporting #OWASP Global AppSec San Francisco as a silver exhibitor. We are looking forward to having you join us. sf.globalappsec.org #developer #appsec #cybersecurity #ai

owasp's tweet image. Thank you to @Synk.io for supporting #OWASP Global AppSec San Francisco as a silver exhibitor. We are looking forward to having you join us. sf.globalappsec.org #developer #appsec #cybersecurity #ai

Nate ๐Ÿค“+๐Ÿ’ป=๐Ÿ•ต๏ธ ๋‹˜์ด ์žฌ๊ฒŒ์‹œํ•จ

Today cybersecurity industry leaders launched the Cyber Threat Intelligence Capability Maturity Model @CTIcmm designed to support organizations of all sizes in CTI. ๐Ÿ“‘ Get your copy and start growing your program: hubs.la/Q02J_y990 ๐Ÿ”— Learn more: hubs.la/Q02J_yGW0

Intel471Inc's tweet image. Today cybersecurity industry leaders launched the Cyber Threat Intelligence Capability Maturity Model @CTIcmm designed to support organizations of all sizes in CTI. 

๐Ÿ“‘ Get your copy and start growing your program: hubs.la/Q02J_y990 
๐Ÿ”— Learn more: hubs.la/Q02J_yGW0

Worth a read and pivoting on the listed fake domains popping up with Crowdstrike in the naming scheme. There's also a Crowdstrike query that can be used to search. #socialengineering #Crowdstrike crowdstrike.com/blog/falcon-seโ€ฆ


Some of our Infosec "Leaders": I've set the arbitrary bar to be qualified up here..no up higher...nope you have to climb the gate first....nope you still suck. What newer and mid infosec folks looking to learn and grow see...


Nate ๐Ÿค“+๐Ÿ’ป=๐Ÿ•ต๏ธ ๋‹˜์ด ์žฌ๊ฒŒ์‹œํ•จ

This May, Michael Marriott and I will take a deep dive into the role of Cyber Threat Intelligence within Identity Threat Detection and Response, and how this might evolve over the coming years.I cannot wait to share this presentation with yโ€™all! Join us @RSAConference!

threathuntergrl's tweet image. This May, Michael Marriott and I will take a deep dive into the role of Cyber Threat Intelligence within Identity Threat Detection and Response, and how this might evolve over the coming years.I cannot wait to share this presentation with yโ€™all!

Join us @RSAConference!
threathuntergrl's tweet image. This May, Michael Marriott and I will take a deep dive into the role of Cyber Threat Intelligence within Identity Threat Detection and Response, and how this might evolve over the coming years.I cannot wait to share this presentation with yโ€™all!

Join us @RSAConference!
threathuntergrl's tweet image. This May, Michael Marriott and I will take a deep dive into the role of Cyber Threat Intelligence within Identity Threat Detection and Response, and how this might evolve over the coming years.I cannot wait to share this presentation with yโ€™all!

Join us @RSAConference!
threathuntergrl's tweet image. This May, Michael Marriott and I will take a deep dive into the role of Cyber Threat Intelligence within Identity Threat Detection and Response, and how this might evolve over the coming years.I cannot wait to share this presentation with yโ€™all!

Join us @RSAConference!

Nate ๐Ÿค“+๐Ÿ’ป=๐Ÿ•ต๏ธ ๋‹˜์ด ์žฌ๊ฒŒ์‹œํ•จ

Just don't read the comments and enjoy things


United States ํŠธ๋ Œ๋“œ

Loading...

Something went wrong.


Something went wrong.