#detectionengineering search results

Let's kick off this Tuesday with @_st0pp3r_ new blog series on the critical role of versioning in #DetectionEngineering, particularly within #DetectionAsCode. 👉blog.nviso.eu/2025/09/09/det… You'll learn to implement robust versioning strategies for better traceability and more!

NVISO_Labs's tweet image. Let's kick off this Tuesday with @_st0pp3r_ new blog series on the critical role of versioning in #DetectionEngineering, particularly within #DetectionAsCode. 👉blog.nviso.eu/2025/09/09/det…

You'll learn to implement robust versioning strategies for better traceability and more!

Discovered a proof-of-concept #exploit for CVE-2025-61882 affecting #Oracle E-Business Suite. ☣️d3bbb54a9e93f355f7830e298a99161d ☣️b296d3b3115762096286f225696a9bb1 ☣️23094d64721a279c0ce637584b87d6f1 The race has already begun #DetectionEngineering is evolving fast. #SOC #CERT

ShanHolo's tweet image. Discovered a proof-of-concept #exploit for CVE-2025-61882 affecting #Oracle E-Business Suite.

☣️d3bbb54a9e93f355f7830e298a99161d 
☣️b296d3b3115762096286f225696a9bb1
☣️23094d64721a279c0ce637584b87d6f1

The race has already begun #DetectionEngineering is evolving fast.
 #SOC #CERT
ShanHolo's tweet image. Discovered a proof-of-concept #exploit for CVE-2025-61882 affecting #Oracle E-Business Suite.

☣️d3bbb54a9e93f355f7830e298a99161d 
☣️b296d3b3115762096286f225696a9bb1
☣️23094d64721a279c0ce637584b87d6f1

The race has already begun #DetectionEngineering is evolving fast.
 #SOC #CERT

Another Monday, another #Vulnerability (9.8) this time is @Oracle E-Business Suite (CVE-2025-61882) "This vulnerability is remotely exploitable without authentication, If successfully exploited, this vulnerability may result in remote code execution. oracle.com/security-alert…



I'm thrilled to announce I'll be giving a *secret* macOS detection engineering talk at the 1st Spraw, a new NYC security meetup! Hope to see you there! 😄 📅 Date: 2 October 2025 🎟️ Registration: sprawl.nyc #InfoSec #NYC #DetectionEngineering

OliviaGalluccii's tweet image. I'm thrilled to announce I'll be giving a *secret* macOS detection engineering talk at the 1st Spraw, a new NYC security meetup! 

Hope to see you there! 😄

📅 Date: 2 October 2025 

🎟️ Registration: sprawl.nyc 

#InfoSec #NYC #DetectionEngineering

I’m excited to launch our latest online course, YARA for Security Analysts. We built this course for people who want to learn to write YARA rules for detection engineering, system triage, incident response, and threat intel research. #Yara #DetectionEngineering #DFIR #Malware

chrissanders88's tweet image. I’m excited to launch our latest online course, YARA for Security Analysts.

We built this course for people who want to learn to write YARA rules for detection engineering, system triage, incident response, and threat intel research.

#Yara #DetectionEngineering #DFIR #Malware

What people often overlook in #DetectionEngineering is that there’s no "one-size-fits-all" rule to detect a threat. It depends on your goals. How specific should the rule be? Are you tracking a threat actor, detecting the tool/malware, or focusing on the technique? Should it be…

cyb3rops's tweet image. What people often overlook in #DetectionEngineering is that there’s no "one-size-fits-all" rule to detect a threat. It depends on your goals. 

How specific should the rule be? Are you tracking a threat actor, detecting the tool/malware, or focusing on the technique? Should it be…

The lolol.farm continues to grow! Introducing a new project: LoFP - Living off the False Positive Where you can blend into the noise, or leverage it for triage and rule writing. 🎊🍻 br0k3nlab.com/LoFP/ #DetectionEngineering #Security

br0k3ns0und's tweet image. The lolol.farm continues to grow!

Introducing a new project:

LoFP - Living off the False Positive

Where you can blend into the noise, or leverage it for triage and rule writing.

🎊🍻

br0k3nlab.com/LoFP/

#DetectionEngineering #Security

Just updated lolol.farm with a few more entries Also, let me know if there are any others that should be added

br0k3ns0und's tweet image. Just updated lolol.farm with a few more entries

Also, let me know if there are any others that should be added


😵‍💫 Does your #CTI team get lost in the noise rather than driving action? This blog by Ondra Rojčík & Keith Swagler show how PIRs can become your “North Star,” guiding everything from #ThreatActor focus to #DetectionEngineering. 📖 Read the blog: buff.ly/x1eHewE

sansforensics's tweet image. 😵‍💫 Does your #CTI team get lost in the noise rather than driving action?  

This blog by Ondra Rojčík & Keith Swagler show how PIRs can become your “North Star,” guiding everything from #ThreatActor focus to #DetectionEngineering.

📖 Read the blog: buff.ly/x1eHewE

🚨Bad news for defenders, good news for red teamers: Linkable token identifiers in Entra ID are useful only in an AiTM scenario. Doesn't even cover Device Code Phishing. Blog soon. #ThreatHunting #DetectionEngineering #redteam

Cyb3rMonk's tweet image. 🚨Bad news for defenders, good news for red teamers:
Linkable token identifiers in Entra ID are useful only in an AiTM scenario. Doesn't even cover Device Code Phishing. Blog soon. 

#ThreatHunting #DetectionEngineering #redteam

🚨#Opendir #Malware🚨 🧵1 hxxps://tiger-checkout-draws-basketball.trycloudflare.com/ It's a nice time to learn how some TAs carry out their TTPs and at once invest time in #DetectionEngineering ☣️📸tp.bat➡️f136138d2e16aad30f27c6f30742dd7b Drops and execute a few runtimes⤵️

ShanHolo's tweet image. 🚨#Opendir #Malware🚨 🧵1

hxxps://tiger-checkout-draws-basketball.trycloudflare.com/

It's a nice time to learn how some TAs carry out their TTPs and at once invest time in #DetectionEngineering

☣️📸tp.bat➡️f136138d2e16aad30f27c6f30742dd7b
Drops and execute a few runtimes⤵️
ShanHolo's tweet image. 🚨#Opendir #Malware🚨 🧵1

hxxps://tiger-checkout-draws-basketball.trycloudflare.com/

It's a nice time to learn how some TAs carry out their TTPs and at once invest time in #DetectionEngineering

☣️📸tp.bat➡️f136138d2e16aad30f27c6f30742dd7b
Drops and execute a few runtimes⤵️

We are now developing @elastic threat hunting queries, alongside our detection rules, and openly sharing these as well! 🎉🎉 Can visually explore these with rulexplorer.io! 🔥🔥 #ThreatHunting #DetectionEngineering

br0k3ns0und's tweet image. We are now developing @elastic threat hunting queries, alongside our detection rules, and openly sharing these as well! 🎉🎉

Can visually explore these with rulexplorer.io! 🔥🔥

#ThreatHunting #DetectionEngineering
br0k3ns0und's tweet image. We are now developing @elastic threat hunting queries, alongside our detection rules, and openly sharing these as well! 🎉🎉

Can visually explore these with rulexplorer.io! 🔥🔥

#ThreatHunting #DetectionEngineering
br0k3ns0und's tweet image. We are now developing @elastic threat hunting queries, alongside our detection rules, and openly sharing these as well! 🎉🎉

Can visually explore these with rulexplorer.io! 🔥🔥

#ThreatHunting #DetectionEngineering

Threat hunting just got easier! This new repo of detection rules is crafted by our veteran detection engineers and powered by different Elastic query languages. Get the details of what’s included and see the future of this repo here: go.es.io/4h2JsTX #ElasticSecurityLabs



Cyber teams juggle threats, compliance & misconfigs daily. #DetectionEngineering ensures your tools catch gaps before attackers do. 👉 Learn more: hubs.ly/Q03M99rk0


Very excited to release PANIX, a highly flexible Linux persistence tool for security research and detection engineering. Test your security posture and learn about Linux persistence. github.com/Aegrah/PANIX #DetectionEngineering #SecurityResearch #Persistence #Linux #Security

RFGroenewoud's tweet image. Very excited to release PANIX, a highly flexible Linux persistence tool for security research and detection engineering. Test your security posture and learn about Linux persistence. 

github.com/Aegrah/PANIX

#DetectionEngineering #SecurityResearch #Persistence #Linux #Security
RFGroenewoud's tweet image. Very excited to release PANIX, a highly flexible Linux persistence tool for security research and detection engineering. Test your security posture and learn about Linux persistence. 

github.com/Aegrah/PANIX

#DetectionEngineering #SecurityResearch #Persistence #Linux #Security

This is something I have wanted to do for a very long time. Happy to share this new resource: The Zen of Security Rules br0k3nlab.com/resources/zen-… 🎉🎉 Thanks to @rw_access for the review and invaluable suggestions! #DetectionEngineering #SIEM #EDR #SecurityRules

br0k3ns0und's tweet image. This is something I have wanted to do for a very long time. 

Happy to share this new resource: 

The Zen of Security Rules

br0k3nlab.com/resources/zen-…

🎉🎉

Thanks to @rw_access for the review and invaluable suggestions!

#DetectionEngineering #SIEM #EDR #SecurityRules

For the curious observers, some things that _can_ make a detection rule bad: - non-performant - overscoped - underscoped - too brittle - too comprehensive - too atomic - too complex - non readable Basically need a zen of rule writing, similar to python



My book “Web Application Defender’s Cookbook” is in the @blackhat book store if folks are looking for web application #detectionengineering guidance 👍

ryancbarnett's tweet image. My book “Web Application Defender’s Cookbook” is in the @blackhat book store if folks are looking for web application #detectionengineering guidance 👍

This is the follow-up you've been waiting for: The #DetectionEngineering Blog Post Part 6 by @_st0pp3r_ blog.nviso.eu/2025/09/23/det… You'll gain insights on manual, release-based, automatic and multitenant deployments to optimize #ContinuousDeployment processes and more.

NVISO_Labs's tweet image. This is the follow-up you've been waiting for: The #DetectionEngineering Blog Post Part 6 by @_st0pp3r_ 
blog.nviso.eu/2025/09/23/det…

You'll gain insights on manual, release-based, automatic and multitenant deployments to optimize #ContinuousDeployment processes and more.

Documentation is key in #DetectionEngineering! Automate it with Jinja & Git for streamlined processes. Plus, generate changelogs to keep teams informed and improve collaboration. Discover more in @_st0pp3r_ latest blogpost 👉 blog.nviso.eu/2025/08/26/det…

NVISO_Labs's tweet image. Documentation is key in #DetectionEngineering! Automate it with Jinja & Git for streamlined processes. Plus, generate changelogs to keep teams informed and improve collaboration. Discover more in @_st0pp3r_ latest blogpost 👉 blog.nviso.eu/2025/08/26/det…

🚨Spoiler: You can't detect #BadSuccessor with default configuration on AD/DC. Blog is almost finished. #ThreatHunting #DetectionEngineering

Cyb3rMonk's tweet image. 🚨Spoiler: You can't detect #BadSuccessor with default configuration on AD/DC.

Blog is almost finished. 

#ThreatHunting #DetectionEngineering

Detection Engineering reframes SOC work: treat detections as products — ideation, data sourcing, logic (Sigma/KQL/SPL), automated testing with Atomic Red Team, and ongoing tuning to combat detection decay. #detectionengineering #Sigma #ATTACK medium.com/@7yr4n7/beyond…


Final call to register! Our Detection Engineering at Scale webinar is happening October 15 → hubs.ly/Q03M_Q230 Learn how SafeBreach Parsers make scalability simple. ⚡ Faster workflows ⚡ Fewer bottlenecks ⚡ Smarter coverage #DetectionEngineering #Webinar #SafeBreach


If you like #DetectionEngineering and #ThreatHunting, #DEATHcon is for you! 2 days of hands on workshops with other like minded professional. Come learn with your peers in #Montreal! See below for ticket information. 10 tickets left! (Please retweet for reach)

If you were thinking of waiting until the last moment to buy your #DEATHcon ticket for the in person event in #Montreal, right about now would be that time. In 1 week we close the Swag sale and October 31st is the last day to buy your tickets! eventbrite.ca/e/deathcon-mon…



Check out our latest post on #DetectionEngineering: Practicing #DetectionAsCode

@_st0pp3r_ and @CyberCatz0r latest blog post is your guide to transforming #DetectionEngineering maintenance through automation. Read part 7 of the series now 👉 blog.nviso.eu/2025/10/07/det…

NVISO_Labs's tweet image. @_st0pp3r_ and @CyberCatz0r latest blog post is your guide to transforming #DetectionEngineering maintenance through automation.
Read part 7 of the series now 👉 blog.nviso.eu/2025/10/07/det…


@_st0pp3r_ and @CyberCatz0r latest blog post is your guide to transforming #DetectionEngineering maintenance through automation. Read part 7 of the series now 👉 blog.nviso.eu/2025/10/07/det…

NVISO_Labs's tweet image. @_st0pp3r_ and @CyberCatz0r latest blog post is your guide to transforming #DetectionEngineering maintenance through automation.
Read part 7 of the series now 👉 blog.nviso.eu/2025/10/07/det…

@_st0pp3r_ and @CyberCatz0r latest blog post is your guide to transforming #DetectionEngineering maintenance through automation. Read part 7 of the series now 👉blog.nviso.eu/2025/10/07/det…

NVISO_Labs's tweet image. @_st0pp3r_ and @CyberCatz0r latest blog post is your guide to transforming #DetectionEngineering maintenance through automation.
Read part 7 of the series now 👉blog.nviso.eu/2025/10/07/det…

Discovered a proof-of-concept #exploit for CVE-2025-61882 affecting #Oracle E-Business Suite. ☣️d3bbb54a9e93f355f7830e298a99161d ☣️b296d3b3115762096286f225696a9bb1 ☣️23094d64721a279c0ce637584b87d6f1 The race has already begun #DetectionEngineering is evolving fast. #SOC #CERT

ShanHolo's tweet image. Discovered a proof-of-concept #exploit for CVE-2025-61882 affecting #Oracle E-Business Suite.

☣️d3bbb54a9e93f355f7830e298a99161d 
☣️b296d3b3115762096286f225696a9bb1
☣️23094d64721a279c0ce637584b87d6f1

The race has already begun #DetectionEngineering is evolving fast.
 #SOC #CERT
ShanHolo's tweet image. Discovered a proof-of-concept #exploit for CVE-2025-61882 affecting #Oracle E-Business Suite.

☣️d3bbb54a9e93f355f7830e298a99161d 
☣️b296d3b3115762096286f225696a9bb1
☣️23094d64721a279c0ce637584b87d6f1

The race has already begun #DetectionEngineering is evolving fast.
 #SOC #CERT

Another Monday, another #Vulnerability (9.8) this time is @Oracle E-Business Suite (CVE-2025-61882) "This vulnerability is remotely exploitable without authentication, If successfully exploited, this vulnerability may result in remote code execution. oracle.com/security-alert…



🚨#Opendir #Malware🚨 🧵1 hxxps://tiger-checkout-draws-basketball.trycloudflare.com/ It's a nice time to learn how some TAs carry out their TTPs and at once invest time in #DetectionEngineering ☣️📸tp.bat➡️f136138d2e16aad30f27c6f30742dd7b Drops and execute a few runtimes⤵️

ShanHolo's tweet image. 🚨#Opendir #Malware🚨 🧵1

hxxps://tiger-checkout-draws-basketball.trycloudflare.com/

It's a nice time to learn how some TAs carry out their TTPs and at once invest time in #DetectionEngineering

☣️📸tp.bat➡️f136138d2e16aad30f27c6f30742dd7b
Drops and execute a few runtimes⤵️
ShanHolo's tweet image. 🚨#Opendir #Malware🚨 🧵1

hxxps://tiger-checkout-draws-basketball.trycloudflare.com/

It's a nice time to learn how some TAs carry out their TTPs and at once invest time in #DetectionEngineering

☣️📸tp.bat➡️f136138d2e16aad30f27c6f30742dd7b
Drops and execute a few runtimes⤵️

Cyber teams juggle threats, compliance & misconfigs daily. #DetectionEngineering ensures your tools catch gaps before attackers do. 👉 Learn more: hubs.ly/Q03M99rk0


DetectionStream enables search, conversion and generation of detection rules across frameworks, streamlining detection engineering workflows. #tool #detectionengineering #threathunting detectionstream.com/framework/sigma


Check out my latest blog post of the series #DetectionEngineering: Practicing #DetectionAsCode for @NVISO_Labs. In this part we are exploring Continuous Delivery pipelines to deploy our detections to the target platform.

This is the follow-up you've been waiting for: The #DetectionEngineering Blog Post Part 6 by @_st0pp3r_ blog.nviso.eu/2025/09/23/det… You'll gain insights on manual, release-based, automatic and multitenant deployments to optimize #ContinuousDeployment processes and more.

NVISO_Labs's tweet image. This is the follow-up you've been waiting for: The #DetectionEngineering Blog Post Part 6 by @_st0pp3r_ 
blog.nviso.eu/2025/09/23/det…

You'll gain insights on manual, release-based, automatic and multitenant deployments to optimize #ContinuousDeployment processes and more.


This is the follow-up you've been waiting for: The #DetectionEngineering Blog Post Part 6 by @_st0pp3r_ blog.nviso.eu/2025/09/23/det… You'll gain insights on manual, release-based, automatic and multitenant deployments to optimize #ContinuousDeployment processes and more.

NVISO_Labs's tweet image. This is the follow-up you've been waiting for: The #DetectionEngineering Blog Post Part 6 by @_st0pp3r_ 
blog.nviso.eu/2025/09/23/det…

You'll gain insights on manual, release-based, automatic and multitenant deployments to optimize #ContinuousDeployment processes and more.

😵‍💫 Does your #CTI team get lost in the noise rather than driving action? This blog by Ondra Rojčík & Keith Swagler show how PIRs can become your “North Star,” guiding everything from #ThreatActor focus to #DetectionEngineering. 📖 Read the blog: buff.ly/x1eHewE

sansforensics's tweet image. 😵‍💫 Does your #CTI team get lost in the noise rather than driving action?  

This blog by Ondra Rojčík & Keith Swagler show how PIRs can become your “North Star,” guiding everything from #ThreatActor focus to #DetectionEngineering.

📖 Read the blog: buff.ly/x1eHewE

Hunting Threats in the Software Supply Chain: A Practical Guide Even a single unverified package can serve as an entry point for adversaries, turning trusted tools into powerful attack vectors. #threathunting #cyberdefense #detectionengineering infosecwriteups.com/hunting-threat…


Tired of inconsistent logs slowing your #DetectionEngineering? ⚡ Join our #webinar to see how SafeBreach Parsers turn raw logs into actionable data, streamline alert validation, and help your team scale detection engineering with ease. Register here: hubs.ly/Q03K7JPW0

safebreach's tweet image. Tired of inconsistent logs slowing your #DetectionEngineering? ⚡ Join our #webinar to see how SafeBreach Parsers turn raw logs into actionable data, streamline alert validation, and help your team scale detection engineering with ease. Register here: hubs.ly/Q03K7JPW0

I'm thrilled to announce I'll be giving a *secret* macOS detection engineering talk at the 1st Spraw, a new NYC security meetup! Hope to see you there! 😄 📅 Date: 2 October 2025 🎟️ Registration: sprawl.nyc #InfoSec #NYC #DetectionEngineering

OliviaGalluccii's tweet image. I'm thrilled to announce I'll be giving a *secret* macOS detection engineering talk at the 1st Spraw, a new NYC security meetup! 

Hope to see you there! 😄

📅 Date: 2 October 2025 

🎟️ Registration: sprawl.nyc 

#InfoSec #NYC #DetectionEngineering

SOC teams drowning in alerts? ⚠️ Too many rules. Too little context. Not enough time. AI agents can cut through the noise → less fatigue, faster detection, stronger defenses. Full blog: attackiq.com/2025/08/12/ai-… #DetectionEngineering #Validation #AgentDrivenDetection

AttackIQ's tweet image. SOC teams drowning in alerts? ⚠️
Too many rules. Too little context. Not enough time.

AI agents can cut through the noise → less fatigue, faster detection, stronger defenses.

Full blog: attackiq.com/2025/08/12/ai-…

#DetectionEngineering #Validation #AgentDrivenDetection
AttackIQ's tweet image. SOC teams drowning in alerts? ⚠️
Too many rules. Too little context. Not enough time.

AI agents can cut through the noise → less fatigue, faster detection, stronger defenses.

Full blog: attackiq.com/2025/08/12/ai-…

#DetectionEngineering #Validation #AgentDrivenDetection

Part 5 of the #DetectionEngineering #DetectionAsCode series is now available: blog.nviso.eu/2025/09/09/det… In this part we are exploring versioning schemes for the content packs and detections in the repository.

Let's kick off this Tuesday with @_st0pp3r_ new blog series on the critical role of versioning in #DetectionEngineering, particularly within #DetectionAsCode. 👉blog.nviso.eu/2025/09/09/det… You'll learn to implement robust versioning strategies for better traceability and more!

NVISO_Labs's tweet image. Let's kick off this Tuesday with @_st0pp3r_ new blog series on the critical role of versioning in #DetectionEngineering, particularly within #DetectionAsCode. 👉blog.nviso.eu/2025/09/09/det…

You'll learn to implement robust versioning strategies for better traceability and more!


Let's kick off this Tuesday with @_st0pp3r_ new blog series on the critical role of versioning in #DetectionEngineering, particularly within #DetectionAsCode. 👉blog.nviso.eu/2025/09/09/det… You'll learn to implement robust versioning strategies for better traceability and more!

NVISO_Labs's tweet image. Let's kick off this Tuesday with @_st0pp3r_ new blog series on the critical role of versioning in #DetectionEngineering, particularly within #DetectionAsCode. 👉blog.nviso.eu/2025/09/09/det…

You'll learn to implement robust versioning strategies for better traceability and more!

I’m excited to launch our latest online course, YARA for Security Analysts. We built this course for people who want to learn to write YARA rules for detection engineering, system triage, incident response, and threat intel research. #Yara #DetectionEngineering #DFIR #Malware

chrissanders88's tweet image. I’m excited to launch our latest online course, YARA for Security Analysts.

We built this course for people who want to learn to write YARA rules for detection engineering, system triage, incident response, and threat intel research.

#Yara #DetectionEngineering #DFIR #Malware

What people often overlook in #DetectionEngineering is that there’s no "one-size-fits-all" rule to detect a threat. It depends on your goals. How specific should the rule be? Are you tracking a threat actor, detecting the tool/malware, or focusing on the technique? Should it be…

cyb3rops's tweet image. What people often overlook in #DetectionEngineering is that there’s no "one-size-fits-all" rule to detect a threat. It depends on your goals. 

How specific should the rule be? Are you tracking a threat actor, detecting the tool/malware, or focusing on the technique? Should it be…

Very excited to release PANIX, a highly flexible Linux persistence tool for security research and detection engineering. Test your security posture and learn about Linux persistence. github.com/Aegrah/PANIX #DetectionEngineering #SecurityResearch #Persistence #Linux #Security

RFGroenewoud's tweet image. Very excited to release PANIX, a highly flexible Linux persistence tool for security research and detection engineering. Test your security posture and learn about Linux persistence. 

github.com/Aegrah/PANIX

#DetectionEngineering #SecurityResearch #Persistence #Linux #Security
RFGroenewoud's tweet image. Very excited to release PANIX, a highly flexible Linux persistence tool for security research and detection engineering. Test your security posture and learn about Linux persistence. 

github.com/Aegrah/PANIX

#DetectionEngineering #SecurityResearch #Persistence #Linux #Security

My book “Web Application Defender’s Cookbook” is in the @blackhat book store if folks are looking for web application #detectionengineering guidance 👍

ryancbarnett's tweet image. My book “Web Application Defender’s Cookbook” is in the @blackhat book store if folks are looking for web application #detectionengineering guidance 👍

The lolol.farm continues to grow! Introducing a new project: LoFP - Living off the False Positive Where you can blend into the noise, or leverage it for triage and rule writing. 🎊🍻 br0k3nlab.com/LoFP/ #DetectionEngineering #Security

br0k3ns0und's tweet image. The lolol.farm continues to grow!

Introducing a new project:

LoFP - Living off the False Positive

Where you can blend into the noise, or leverage it for triage and rule writing.

🎊🍻

br0k3nlab.com/LoFP/

#DetectionEngineering #Security

Just updated lolol.farm with a few more entries Also, let me know if there are any others that should be added

br0k3ns0und's tweet image. Just updated lolol.farm with a few more entries

Also, let me know if there are any others that should be added


This is something I have wanted to do for a very long time. Happy to share this new resource: The Zen of Security Rules br0k3nlab.com/resources/zen-… 🎉🎉 Thanks to @rw_access for the review and invaluable suggestions! #DetectionEngineering #SIEM #EDR #SecurityRules

br0k3ns0und's tweet image. This is something I have wanted to do for a very long time. 

Happy to share this new resource: 

The Zen of Security Rules

br0k3nlab.com/resources/zen-…

🎉🎉

Thanks to @rw_access for the review and invaluable suggestions!

#DetectionEngineering #SIEM #EDR #SecurityRules

For the curious observers, some things that _can_ make a detection rule bad: - non-performant - overscoped - underscoped - too brittle - too comprehensive - too atomic - too complex - non readable Basically need a zen of rule writing, similar to python



😵‍💫 Does your #CTI team get lost in the noise rather than driving action? This blog by Ondra Rojčík & Keith Swagler show how PIRs can become your “North Star,” guiding everything from #ThreatActor focus to #DetectionEngineering. 📖 Read the blog: buff.ly/x1eHewE

sansforensics's tweet image. 😵‍💫 Does your #CTI team get lost in the noise rather than driving action?  

This blog by Ondra Rojčík & Keith Swagler show how PIRs can become your “North Star,” guiding everything from #ThreatActor focus to #DetectionEngineering.

📖 Read the blog: buff.ly/x1eHewE

Documentation is key in #DetectionEngineering! Automate it with Jinja & Git for streamlined processes. Plus, generate changelogs to keep teams informed and improve collaboration. Discover more in @_st0pp3r_ latest blogpost 👉 blog.nviso.eu/2025/08/26/det…

NVISO_Labs's tweet image. Documentation is key in #DetectionEngineering! Automate it with Jinja & Git for streamlined processes. Plus, generate changelogs to keep teams informed and improve collaboration. Discover more in @_st0pp3r_ latest blogpost 👉 blog.nviso.eu/2025/08/26/det…

New module is up on aceresponder.com - UAC Bypasses! Gain valuable experience investigating a variety of UAC bypasses. Come level up with us! #ThreatHunting #DetectionEngineering

ACEResponder's tweet image. New module is up on aceresponder.com -  UAC Bypasses!

Gain valuable experience investigating a variety of UAC bypasses.

Come level up with us!

#ThreatHunting #DetectionEngineering

🚨New Module on ACEResponder.com! Want to get started with detection engineering? Why not jump in and build some?🕵️‍♂️🔎 In this module we cover the core principles and put them to use making kerberoasting detections. Let's do it! #DetectionEngineering #DFIR

ACEResponder's tweet image. 🚨New Module on ACEResponder.com!

Want to get started with detection engineering? Why not jump in and build some?🕵️‍♂️🔎

In this module we cover the core principles and put them to use making kerberoasting detections. Let's do it!

#DetectionEngineering #DFIR

🚨New Detection Engineering Challenge on ACEResponder.com You're tasked with creating a detection to uncover any residual presence following a high-impact intrusion. Can you build a performant detection for a stealthy Cobalt Strike beacon? #DetectionEngineering #DFIR

ACEResponder's tweet image. 🚨New Detection Engineering Challenge on ACEResponder.com

You're tasked with creating a detection to uncover any residual presence following a high-impact intrusion. Can you build a performant detection for a stealthy Cobalt Strike beacon?

#DetectionEngineering #DFIR

🚨 Detect C2 Beacons! New Microsoft Defender for Endpoint telemetry provides new opportunities for threat detection! 🔗 academy.bluraven.io/blog/beaconing… #ThreatHunting #DetectionEngineering #MDE

Cyb3rMonk's tweet image. 🚨 Detect C2 Beacons!

New Microsoft Defender for Endpoint telemetry provides new opportunities for threat detection!

🔗
academy.bluraven.io/blog/beaconing…

#ThreatHunting #DetectionEngineering #MDE

🚨Spoiler: You can't detect #BadSuccessor with default configuration on AD/DC. Blog is almost finished. #ThreatHunting #DetectionEngineering

Cyb3rMonk's tweet image. 🚨Spoiler: You can't detect #BadSuccessor with default configuration on AD/DC.

Blog is almost finished. 

#ThreatHunting #DetectionEngineering

Discovered a proof-of-concept #exploit for CVE-2025-61882 affecting #Oracle E-Business Suite. ☣️d3bbb54a9e93f355f7830e298a99161d ☣️b296d3b3115762096286f225696a9bb1 ☣️23094d64721a279c0ce637584b87d6f1 The race has already begun #DetectionEngineering is evolving fast. #SOC #CERT

ShanHolo's tweet image. Discovered a proof-of-concept #exploit for CVE-2025-61882 affecting #Oracle E-Business Suite.

☣️d3bbb54a9e93f355f7830e298a99161d 
☣️b296d3b3115762096286f225696a9bb1
☣️23094d64721a279c0ce637584b87d6f1

The race has already begun #DetectionEngineering is evolving fast.
 #SOC #CERT
ShanHolo's tweet image. Discovered a proof-of-concept #exploit for CVE-2025-61882 affecting #Oracle E-Business Suite.

☣️d3bbb54a9e93f355f7830e298a99161d 
☣️b296d3b3115762096286f225696a9bb1
☣️23094d64721a279c0ce637584b87d6f1

The race has already begun #DetectionEngineering is evolving fast.
 #SOC #CERT

Another Monday, another #Vulnerability (9.8) this time is @Oracle E-Business Suite (CVE-2025-61882) "This vulnerability is remotely exploitable without authentication, If successfully exploited, this vulnerability may result in remote code execution. oracle.com/security-alert…



I'm thrilled to announce I'll be giving a *secret* macOS detection engineering talk at the 1st Spraw, a new NYC security meetup! Hope to see you there! 😄 📅 Date: 2 October 2025 🎟️ Registration: sprawl.nyc #InfoSec #NYC #DetectionEngineering

OliviaGalluccii's tweet image. I'm thrilled to announce I'll be giving a *secret* macOS detection engineering talk at the 1st Spraw, a new NYC security meetup! 

Hope to see you there! 😄

📅 Date: 2 October 2025 

🎟️ Registration: sprawl.nyc 

#InfoSec #NYC #DetectionEngineering

We are now developing @elastic threat hunting queries, alongside our detection rules, and openly sharing these as well! 🎉🎉 Can visually explore these with rulexplorer.io! 🔥🔥 #ThreatHunting #DetectionEngineering

br0k3ns0und's tweet image. We are now developing @elastic threat hunting queries, alongside our detection rules, and openly sharing these as well! 🎉🎉

Can visually explore these with rulexplorer.io! 🔥🔥

#ThreatHunting #DetectionEngineering
br0k3ns0und's tweet image. We are now developing @elastic threat hunting queries, alongside our detection rules, and openly sharing these as well! 🎉🎉

Can visually explore these with rulexplorer.io! 🔥🔥

#ThreatHunting #DetectionEngineering
br0k3ns0und's tweet image. We are now developing @elastic threat hunting queries, alongside our detection rules, and openly sharing these as well! 🎉🎉

Can visually explore these with rulexplorer.io! 🔥🔥

#ThreatHunting #DetectionEngineering

Threat hunting just got easier! This new repo of detection rules is crafted by our veteran detection engineers and powered by different Elastic query languages. Get the details of what’s included and see the future of this repo here: go.es.io/4h2JsTX #ElasticSecurityLabs



Loading...

Something went wrong.


Something went wrong.


United States Trends