#detectionengineering 搜尋結果

I’m excited to launch our latest online course, YARA for Security Analysts. We built this course for people who want to learn to write YARA rules for detection engineering, system triage, incident response, and threat intel research. #Yara #DetectionEngineering #DFIR #Malware

chrissanders88's tweet image. I’m excited to launch our latest online course, YARA for Security Analysts.

We built this course for people who want to learn to write YARA rules for detection engineering, system triage, incident response, and threat intel research.

#Yara #DetectionEngineering #DFIR #Malware

What people often overlook in #DetectionEngineering is that there’s no "one-size-fits-all" rule to detect a threat. It depends on your goals. How specific should the rule be? Are you tracking a threat actor, detecting the tool/malware, or focusing on the technique? Should it be…

cyb3rops's tweet image. What people often overlook in #DetectionEngineering is that there’s no "one-size-fits-all" rule to detect a threat. It depends on your goals. 

How specific should the rule be? Are you tracking a threat actor, detecting the tool/malware, or focusing on the technique? Should it be…

I'm thrilled to announce I'll be giving a *secret* macOS detection engineering talk at the 1st Spraw, a new NYC security meetup! Hope to see you there! 😄 📅 Date: 2 October 2025 🎟️ Registration: sprawl.nyc #InfoSec #NYC #DetectionEngineering

OliviaGalluccii's tweet image. I'm thrilled to announce I'll be giving a *secret* macOS detection engineering talk at the 1st Spraw, a new NYC security meetup! 

Hope to see you there! 😄

📅 Date: 2 October 2025 

🎟️ Registration: sprawl.nyc 

#InfoSec #NYC #DetectionEngineering

🚨Bad news for defenders, good news for red teamers: Linkable token identifiers in Entra ID are useful only in an AiTM scenario. Doesn't even cover Device Code Phishing. Blog soon. #ThreatHunting #DetectionEngineering #redteam

Cyb3rMonk's tweet image. 🚨Bad news for defenders, good news for red teamers:
Linkable token identifiers in Entra ID are useful only in an AiTM scenario. Doesn't even cover Device Code Phishing. Blog soon. 

#ThreatHunting #DetectionEngineering #redteam

🚨 Detect Suspicious SPN logon from Workstations. The new Credential Dump technique that bypasses Credential Guard leaves an interesting artifact to hunt for. #KQL #ThreatHunting #DetectionEngineering

Cyb3rMonk's tweet image. 🚨 Detect Suspicious SPN logon from Workstations.

The new Credential Dump technique that bypasses Credential Guard leaves an interesting artifact to hunt for. 

#KQL #ThreatHunting #DetectionEngineering

🚨#Opendir #Malware🚨 🧵1 hxxps://tiger-checkout-draws-basketball.trycloudflare.com/ It's a nice time to learn how some TAs carry out their TTPs and at once invest time in #DetectionEngineering ☣️📸tp.bat➡️f136138d2e16aad30f27c6f30742dd7b Drops and execute a few runtimes⤵️

ShanHolo's tweet image. 🚨#Opendir #Malware🚨 🧵1

hxxps://tiger-checkout-draws-basketball.trycloudflare.com/

It's a nice time to learn how some TAs carry out their TTPs and at once invest time in #DetectionEngineering

☣️📸tp.bat➡️f136138d2e16aad30f27c6f30742dd7b
Drops and execute a few runtimes⤵️
ShanHolo's tweet image. 🚨#Opendir #Malware🚨 🧵1

hxxps://tiger-checkout-draws-basketball.trycloudflare.com/

It's a nice time to learn how some TAs carry out their TTPs and at once invest time in #DetectionEngineering

☣️📸tp.bat➡️f136138d2e16aad30f27c6f30742dd7b
Drops and execute a few runtimes⤵️

We are now developing @elastic threat hunting queries, alongside our detection rules, and openly sharing these as well! 🎉🎉 Can visually explore these with rulexplorer.io! 🔥🔥 #ThreatHunting #DetectionEngineering

br0k3ns0und's tweet image. We are now developing @elastic threat hunting queries, alongside our detection rules, and openly sharing these as well! 🎉🎉

Can visually explore these with rulexplorer.io! 🔥🔥

#ThreatHunting #DetectionEngineering
br0k3ns0und's tweet image. We are now developing @elastic threat hunting queries, alongside our detection rules, and openly sharing these as well! 🎉🎉

Can visually explore these with rulexplorer.io! 🔥🔥

#ThreatHunting #DetectionEngineering
br0k3ns0und's tweet image. We are now developing @elastic threat hunting queries, alongside our detection rules, and openly sharing these as well! 🎉🎉

Can visually explore these with rulexplorer.io! 🔥🔥

#ThreatHunting #DetectionEngineering

Threat hunting just got easier! This new repo of detection rules is crafted by our veteran detection engineers and powered by different Elastic query languages. Get the details of what’s included and see the future of this repo here: go.es.io/4h2JsTX #ElasticSecurityLabs



I do love #KQL, but not having support for features like complete window functions (over (partition by ...)) and allowing only equality-based joins are huge blockers, especially in the detection engineering field. #DetectionEngineering

Cyb3rMonk's tweet image. I do love #KQL, but not having support for features like complete window functions (over (partition by ...)) and allowing only equality-based joins are huge blockers, especially in the detection engineering field.

#DetectionEngineering

The lolol.farm continues to grow! Introducing a new project: LoFP - Living off the False Positive Where you can blend into the noise, or leverage it for triage and rule writing. 🎊🍻 br0k3nlab.com/LoFP/ #DetectionEngineering #Security

br0k3ns0und's tweet image. The lolol.farm continues to grow!

Introducing a new project:

LoFP - Living off the False Positive

Where you can blend into the noise, or leverage it for triage and rule writing.

🎊🍻

br0k3nlab.com/LoFP/

#DetectionEngineering #Security

Just updated lolol.farm with a few more entries Also, let me know if there are any others that should be added

br0k3ns0und's tweet image. Just updated lolol.farm with a few more entries

Also, let me know if there are any others that should be added


Highlights from the @MsftSecIntel and joint CSA reports animated. #ThreatHunting #DetectionEngineering


🚨Spoiler: You can't detect #BadSuccessor with default configuration on AD/DC. Blog is almost finished. #ThreatHunting #DetectionEngineering

Cyb3rMonk's tweet image. 🚨Spoiler: You can't detect #BadSuccessor with default configuration on AD/DC.

Blog is almost finished. 

#ThreatHunting #DetectionEngineering

I'm thrilled to announce that @DatadogHQ is hiring for two roles on our Threat Detection Engineering team! 🐶 - Security Engineer 2 in Paris: careers.datadoghq.com/detail/7379791… - Senior Security Engineer - Insider in NYC: careers.datadoghq.com/detail/7391209… #Datadog #DetectionEngineering #InfoSec


My book “Web Application Defender’s Cookbook” is in the @blackhat book store if folks are looking for web application #detectionengineering guidance 👍

ryancbarnett's tweet image. My book “Web Application Defender’s Cookbook” is in the @blackhat book store if folks are looking for web application #detectionengineering guidance 👍

Very excited to release PANIX, a highly flexible Linux persistence tool for security research and detection engineering. Test your security posture and learn about Linux persistence. github.com/Aegrah/PANIX #DetectionEngineering #SecurityResearch #Persistence #Linux #Security

RFGroenewoud's tweet image. Very excited to release PANIX, a highly flexible Linux persistence tool for security research and detection engineering. Test your security posture and learn about Linux persistence. 

github.com/Aegrah/PANIX

#DetectionEngineering #SecurityResearch #Persistence #Linux #Security
RFGroenewoud's tweet image. Very excited to release PANIX, a highly flexible Linux persistence tool for security research and detection engineering. Test your security posture and learn about Linux persistence. 

github.com/Aegrah/PANIX

#DetectionEngineering #SecurityResearch #Persistence #Linux #Security

We’re adding a new section to @elastic’s HackerOne Bounty Program! Today, we’re opening our SIEM and EDR rules for testing. We’re excited to have another way to thank our community for their efforts on our #detectionengineering. Get more details here: go.es.io/4hdKQCI


This is the follow-up you've been waiting for: The #DetectionEngineering Blog Post Part 6 by @_st0pp3r_ blog.nviso.eu/2025/09/23/det… You'll gain insights on manual, release-based, automatic and multitenant deployments to optimize #ContinuousDeployment processes and more.

NVISO_Labs's tweet image. This is the follow-up you've been waiting for: The #DetectionEngineering Blog Post Part 6 by @_st0pp3r_ 
blog.nviso.eu/2025/09/23/det…

You'll gain insights on manual, release-based, automatic and multitenant deployments to optimize #ContinuousDeployment processes and more.

Risk-based alerting (only surfacing alerts that *truly* pose a risk to your organization) is all the rage in detection engineering. I threw together a guide to quickly getting started with RBA in Microsoft Sentinel. isaacdunham.github.io/posts/risk-bas… #DetectionEngineering #SIEM #Sentinel


What happens when training goes beyond theory? You get stories like these. 🌐 Real SOC workflows ⚡ Ready-for-the-job skills 🔥 Performance that speaks for itself These aren’t testimonials. They’re real stories. #CybersecurityTraining #SOCAnalyst #DetectionEngineering

SecBlueTeam's tweet image. What happens when training goes beyond theory?
You get stories like these.

🌐 Real SOC workflows
⚡ Ready-for-the-job skills
🔥 Performance that speaks for itself

These aren’t testimonials. They’re real stories.

#CybersecurityTraining #SOCAnalyst #DetectionEngineering…
SecBlueTeam's tweet image. What happens when training goes beyond theory?
You get stories like these.

🌐 Real SOC workflows
⚡ Ready-for-the-job skills
🔥 Performance that speaks for itself

These aren’t testimonials. They’re real stories.

#CybersecurityTraining #SOCAnalyst #DetectionEngineering…
SecBlueTeam's tweet image. What happens when training goes beyond theory?
You get stories like these.

🌐 Real SOC workflows
⚡ Ready-for-the-job skills
🔥 Performance that speaks for itself

These aren’t testimonials. They’re real stories.

#CybersecurityTraining #SOCAnalyst #DetectionEngineering…
SecBlueTeam's tweet image. What happens when training goes beyond theory?
You get stories like these.

🌐 Real SOC workflows
⚡ Ready-for-the-job skills
🔥 Performance that speaks for itself

These aren’t testimonials. They’re real stories.

#CybersecurityTraining #SOCAnalyst #DetectionEngineering…

Back with a new blog post! #DetectionEngineering: Practicing #DetectionAsCode – Tuning - Part 8 👉 blog.nviso.eu/2025/11/25/det… If you missed the rest of the parts you can find them here: blog.nviso.eu/tag/detection-…


Result: •Total CPU stays artificially flat at 0–5 % •The line looks perfectly boring 😴 •No fan spin-up, no lag → 99.9 % of users never open the Details tab #SOC #DetectionEngineering


I'm thrilled to announce I'll be giving a *secret* macOS detection engineering talk at the 1st Spraw, a new NYC security meetup! Hope to see you there! 😄 📅 Date: 2 October 2025 🎟️ Registration: sprawl.nyc #InfoSec #NYC #DetectionEngineering

OliviaGalluccii's tweet image. I'm thrilled to announce I'll be giving a *secret* macOS detection engineering talk at the 1st Spraw, a new NYC security meetup! 

Hope to see you there! 😄

📅 Date: 2 October 2025 

🎟️ Registration: sprawl.nyc 

#InfoSec #NYC #DetectionEngineering

What people often overlook in #DetectionEngineering is that there’s no "one-size-fits-all" rule to detect a threat. It depends on your goals. How specific should the rule be? Are you tracking a threat actor, detecting the tool/malware, or focusing on the technique? Should it be…

cyb3rops's tweet image. What people often overlook in #DetectionEngineering is that there’s no "one-size-fits-all" rule to detect a threat. It depends on your goals. 

How specific should the rule be? Are you tracking a threat actor, detecting the tool/malware, or focusing on the technique? Should it be…

I’m excited to launch our latest online course, YARA for Security Analysts. We built this course for people who want to learn to write YARA rules for detection engineering, system triage, incident response, and threat intel research. #Yara #DetectionEngineering #DFIR #Malware

chrissanders88's tweet image. I’m excited to launch our latest online course, YARA for Security Analysts.

We built this course for people who want to learn to write YARA rules for detection engineering, system triage, incident response, and threat intel research.

#Yara #DetectionEngineering #DFIR #Malware

🚨Spoiler: You can't detect #BadSuccessor with default configuration on AD/DC. Blog is almost finished. #ThreatHunting #DetectionEngineering

Cyb3rMonk's tweet image. 🚨Spoiler: You can't detect #BadSuccessor with default configuration on AD/DC.

Blog is almost finished. 

#ThreatHunting #DetectionEngineering

🚨 Detect C2 Beacons! New Microsoft Defender for Endpoint telemetry provides new opportunities for threat detection! 🔗 academy.bluraven.io/blog/beaconing… #ThreatHunting #DetectionEngineering #MDE

Cyb3rMonk's tweet image. 🚨 Detect C2 Beacons!

New Microsoft Defender for Endpoint telemetry provides new opportunities for threat detection!

🔗
academy.bluraven.io/blog/beaconing…

#ThreatHunting #DetectionEngineering #MDE

🚨Bad news for defenders, good news for red teamers: Linkable token identifiers in Entra ID are useful only in an AiTM scenario. Doesn't even cover Device Code Phishing. Blog soon. #ThreatHunting #DetectionEngineering #redteam

Cyb3rMonk's tweet image. 🚨Bad news for defenders, good news for red teamers:
Linkable token identifiers in Entra ID are useful only in an AiTM scenario. Doesn't even cover Device Code Phishing. Blog soon. 

#ThreatHunting #DetectionEngineering #redteam

The lolol.farm continues to grow! Introducing a new project: LoFP - Living off the False Positive Where you can blend into the noise, or leverage it for triage and rule writing. 🎊🍻 br0k3nlab.com/LoFP/ #DetectionEngineering #Security

br0k3ns0und's tweet image. The lolol.farm continues to grow!

Introducing a new project:

LoFP - Living off the False Positive

Where you can blend into the noise, or leverage it for triage and rule writing.

🎊🍻

br0k3nlab.com/LoFP/

#DetectionEngineering #Security

Just updated lolol.farm with a few more entries Also, let me know if there are any others that should be added

br0k3ns0und's tweet image. Just updated lolol.farm with a few more entries

Also, let me know if there are any others that should be added


🚨 Detect Suspicious SPN logon from Workstations. The new Credential Dump technique that bypasses Credential Guard leaves an interesting artifact to hunt for. #KQL #ThreatHunting #DetectionEngineering

Cyb3rMonk's tweet image. 🚨 Detect Suspicious SPN logon from Workstations.

The new Credential Dump technique that bypasses Credential Guard leaves an interesting artifact to hunt for. 

#KQL #ThreatHunting #DetectionEngineering

You don't need SOC Agents or Copilots for automated/autonomous triage in most cases. This is pure #KQL in Workbooks. 40.000+ endpoints, just a few items to investigate. #ThreatHunting #DetectionEngineering

Cyb3rMonk's tweet image. You don't need SOC Agents or Copilots for automated/autonomous triage in most cases. This is pure #KQL in Workbooks. 40.000+ endpoints, just a few items to investigate.

#ThreatHunting #DetectionEngineering

New module is up on aceresponder.com - UAC Bypasses! Gain valuable experience investigating a variety of UAC bypasses. Come level up with us! #ThreatHunting #DetectionEngineering

ACEResponder's tweet image. New module is up on aceresponder.com -  UAC Bypasses!

Gain valuable experience investigating a variety of UAC bypasses.

Come level up with us!

#ThreatHunting #DetectionEngineering

🚨New Module on ACEResponder.com! Want to get started with detection engineering? Why not jump in and build some?🕵️‍♂️🔎 In this module we cover the core principles and put them to use making kerberoasting detections. Let's do it! #DetectionEngineering #DFIR

ACEResponder's tweet image. 🚨New Module on ACEResponder.com!

Want to get started with detection engineering? Why not jump in and build some?🕵️‍♂️🔎

In this module we cover the core principles and put them to use making kerberoasting detections. Let's do it!

#DetectionEngineering #DFIR

🚨New Detection Engineering Challenge on ACEResponder.com You're tasked with creating a detection to uncover any residual presence following a high-impact intrusion. Can you build a performant detection for a stealthy Cobalt Strike beacon? #DetectionEngineering #DFIR

ACEResponder's tweet image. 🚨New Detection Engineering Challenge on ACEResponder.com

You're tasked with creating a detection to uncover any residual presence following a high-impact intrusion. Can you build a performant detection for a stealthy Cobalt Strike beacon?

#DetectionEngineering #DFIR

It's @BluRavenSec's anniversary, which means discounts!🎁 Get 25% OFF Code: 4THYEARANN #KQL #ThreatHunting #DetectionEngineering #DFIR

Cyb3rMonk's tweet image. It's @BluRavenSec's anniversary, which means discounts!🎁
Get 25% OFF 
Code: 4THYEARANN

#KQL #ThreatHunting #DetectionEngineering #DFIR

😁So excited about the improvements and upgrades open-source projects like atomicredteam.io and sigmahq.io are going through to bring 🛡️#DetectionEngineering capabilities to everyone! @nas_bench and @cyb3rbuff your impact has been on 🔥

_josehelps's tweet image. 😁So excited about the improvements and upgrades open-source projects like atomicredteam.io and sigmahq.io are going through to bring 🛡️#DetectionEngineering capabilities to everyone! 
@nas_bench and @cyb3rbuff your impact has been on 🔥

In May, #ElasticSecurityLabs published 52 new rules! Take a look at the overview and learn how we manage these rulesets: go.es.io/45JHiVR #detectionengineering #SIEM #EDR

elasticseclabs's tweet image. In May, #ElasticSecurityLabs published 52 new rules! Take a look at the overview and learn how we manage these rulesets: go.es.io/45JHiVR

#detectionengineering #SIEM #EDR

In March, #ElasticSecurityLabs published 67 new rules! Take a look at the overview, or check out our entire library of protections here: go.es.io/42qPQhc #detectionengineering #SIEM #EDR

elasticseclabs's tweet image. In March, #ElasticSecurityLabs published 67 new rules! Take a look at the overview, or check out our entire library of protections here: go.es.io/42qPQhc 

#detectionengineering #SIEM #EDR

Loading...

Something went wrong.


Something went wrong.


United States Trends