DefSecSentinel

574 posts

DefSecSentinel banner
DefSecSentinel

DefSecSentinel

@DefSecSentinel

Senior Security Research Engineer, Threat Research and Detection Development @Elastic, 179CPT Cyber Operations Technician 170A @MOARNG

Joined Nisan 2017
1.1K Following1.6K Followers
DefSecSentinel retweeted
Elastic Security Labs
Elastic Security Labs@elasticseclabs·
Jamf Protect + Elastic Security = macOS XDR done right. Ingest Jamf Protect telemetry, normalize it to ECS, and investigate with AI — all without leaving Elastic. What's included: - Prebuilt Jamf Protect detection rules - AI Assistant for alert explainability & response plans - Timeline & Analyzer for full attack reconstruction See how it works go.es.io/4bjFOnF
Elastic Security Labs tweet media
English
0
2
35
2K
DefSecSentinel retweeted
Ruben Groenewoud
Ruben Groenewoud@RFGroenewoud·
New blog: Hooked on Linux — Rootkit Taxonomy, Hooking Techniques and Tradecraft Part 1 of our Linux rootkit series exploring kernel & userland rootkits and the hooking techniques they use (syscall/function hooks, ftrace, eBPF, inline patching). 🔗elastic.co/security-labs/…
English
1
27
75
8K
DefSecSentinel retweeted
Melvin langvik
Melvin langvik@Flangvik·
**OFFICIAL** EDR Tier List for 2026! Based on nothing but the people in chat, vibes, guests, opinions and limited experience. Thanks to @EmericNasi @ShitSecure @_JohnHammond and @domchell for jumping in a guests to help me out this time around!
Melvin langvik tweet media
English
32
104
679
267.1K
DefSecSentinel retweeted
L0Psec
L0Psec@L0Psec·
My new site for learning macOS malware reverse engineering: l0psec.github.io/Malware_RE_Blo… I got my start in RE by using @patrickwardle's awesome blog. I would download samples and follow along. So I created this to complement that with dives into specific code from recent samples.
English
8
90
401
23.8K
DefSecSentinel retweeted
Elastic Security Labs
Elastic Security Labs@elasticseclabs·
New from the developer of #FINALDRAFT: Meet #NANOREMOTE, a newly-discovered Windows backdoor that leverages the Google Drive API for data theft and payload staging. Get the full analysis and defense strategies: ela.st/nanoremote
English
0
27
56
14.6K
DefSecSentinel retweeted
Objective-See Foundation
Objective-See Foundation@objective_see·
The #OBTS community is simply incredible!! 😍 From trainers & speakers to students & attendees, you made this the best #OBTS yet 🙏🏽 Photos, recordings & slides coming soon!
Objective-See Foundation tweet mediaObjective-See Foundation tweet mediaObjective-See Foundation tweet mediaObjective-See Foundation tweet media
English
2
12
51
7.1K
DefSecSentinel
DefSecSentinel@DefSecSentinel·
Another awesome #OBTS 🌴🏖️☀️in the books. It was an honor to speak again this year and share my research with this incredible community 🍎. Such a blast spending time with newcomers and old friends. There is truly no other conference like it. Huge shout out and thank you to both @andyrozen and @patrickwardle for all the hard work you put in ❤️.
English
1
8
28
3.8K
xiu
xiu@osint_barbie·
@DefSecSentinel Looking forward to seeing you irl!
English
1
0
1
183
DefSecSentinel
DefSecSentinel@DefSecSentinel·
Heading to my 3rd #OBTS 🌴☀️🌊today! Best conference out there. Honored to be speaking again this year alongside so many other incredible #Apple 🍎 security researchers. It’s gonna be a blast, can’t wait to see everyone! Pumped to get to share my research into using and abusing containers as payloads in “BYOB: Bring your own Blackbox - Isolated Defense Evasion on MacOS” 💪
English
2
6
31
4.4K
DefSecSentinel retweeted
Ruben Groenewoud
Ruben Groenewoud@RFGroenewoud·
Research & PoC: FlipSwitch Rootkit A syscall-table hooking technique that works on modern Linux (6.9+), researched for and presented at @virusbtn by @rsprooten and me. Revives syscall hooking by patching x64_sys_call call sites instead of table entries. elastic.co/security-labs/…
English
3
23
58
5.6K
DefSecSentinel retweeted
John Hammond
John Hammond@_JohnHammond·
A chat and demo with James Spiteri to see just how easy it is now to spin up Elastic -- and with several options completely free! youtu.be/7Z2zObdhN-Q
YouTube video
YouTube
John Hammond tweet media
English
1
14
57
9K
DefSecSentinel retweeted
Samir
Samir@SBousseaden·
nice technique! #Elastic EDR (Elastic Defend) is not affected + we do have an existing behavior protection rule that will terminate WerFaultSecure.exe (to protect other processes) #L9" target="_blank" rel="nofollow noopener">github.com/elastic/protec…
Samir tweet mediaSamir tweet media
Two Seven One Three@TwoSevenOneT

We can exploit the #securityvulnerability of Windows Error Reporting to put EDRs and #antimalware into a coma-like state. By using the EDR-Freeze #redteam tool: Github: TwoSevenOneT/EDR-Freeze

English
3
34
165
18.9K
DefSecSentinel retweeted
Patrick Wardle
Patrick Wardle@patrickwardle·
macOS Tahoe ships with a 0day ...based on a bug disclosed 8(!) years ago at #OBTS v1.0 🫣 New post: "From Spotlight to Apple Intelligence: Abusing an 0day to steal the data that fuels macOS AI": objective-see.org/blog/blog_0x81… ...with open-source PoC! Takeaway? Always attend #OBTS 😄
English
8
106
338
36.6K
DefSecSentinel retweeted
Ferdous Saljooki
Ferdous Saljooki@malwarezoo·
Excited to share our research on ChillyHell, a modular macOS backdoor targeting officials in Ukraine. Check out our write-up for more details. jamf.com/blog/chillyhel…
English
2
10
32
4.8K