InQuest

2.6K posts

InQuest banner
InQuest

InQuest

@InQuest

InQuest mitigates end-user risk, reclaiming analyst time while maximizing security ROI with file-based security automation. Acquired by @OPSWAT.

United States Se unió Eylül 2017
581 Siguiendo4.5K Seguidores
InQuest retuiteado
OPSWAT
OPSWAT@OPSWAT·
Michael Arcamone, Chief Strategy Officer & VP Federal Sales at OPSWAT, emphasizes the need for advanced wireless detection & monitoring solutions to counter significant #securityrisks posed by personal electronic devices in secure government facilities. hubs.la/Q02LN38_0
English
0
1
3
642
InQuest retuiteado
OPSWAT
OPSWAT@OPSWAT·
We’re excited to work more closely than ever with Michael Arcamone, now Chief Strategy Officer and VP of Federal Sales at OPSWAT, and @pedramamini, now Chief Scientist, thanks to our recent acquisition of @InQuest. Learn more: securityreviewmag.com/?p=27031
English
0
2
6
617
InQuest retuiteado
techitup_me
techitup_me@Techitup_me·
@OPSWAT has acquired @InQuest, a leader in cybersecurity solutions renowned for its Deep File Inspection & RetroHunting technologies. This acquisition marks a significant milestone in strengthening OPSWAT’s capabilities in threat intelligence & prevention tinyurl.com/a9845ckt
techitup_me tweet media
English
0
2
4
281
InQuest retuiteado
Pedram Amini
Pedram Amini@pedramamini·
I'm excited to share a significant milestone in my decade-long journey with @InQuest. We're joining forces with @OPSWAT to accelerate our mission across critical infrastructure and enterprises globally: opswat.com/blog/opswat-ac… In my new role as Chief Scientist, I will focus on machine learning, threat intelligence, and driving innovation in the R&D behind a variety of security solutions. Our team is expanding, so if you're passionate about cybersecurity and interested in joining us, please reach out. A massive thank you to all my InQuest colleagues, past and present, who were instrumental in our journey. For those attending BlackHat today, join us in celebration at 5:30 pm at the Foundation Room on the top floor of Mandalay Bay. RSVP here: inquest.net/blackhat2024/ You can also find me and the team at the OPSWAT booth (#4640) over the next two-days.
Pedram Amini tweet media
English
2
3
28
2.3K
InQuest
InQuest@InQuest·
Kudos to the KnowBe4 team here for their transparency. This is a fascinating tactic and authorities have published a lot of information about it: 2022-05-16 Publication of North Korea Information Technology Workers Advisory ofac.treasury.gov/recent-actions… ofac.treasury.gov/media/923126/d… 2022-12-08 Advisory on the Democratic People’s Republic of Korea Information Technology Workers mofa.go.kr/eng/wpge/m_255… 2023-10-18 I-101823-PSA // Additional Guidance on the Democratic People's Republic of Korea Information Technology Workers ic3.gov/Media/Y2023/PS… 2023-10-31 Additional Guidance on the Democratic People's Republic of Korea Information Technology Workers mofa.go.kr/eng/brd/m_2552… 2024-05-16 justice.gov/usao-dc/pr/cha…
KnowBe4@KnowBe4

Want to know how a North Korean Fake IT Worker tried to infiltrate us? Learn all about this new story on the blog: bit.ly/3Ygk5Xz

English
0
0
2
298
Malware Utkonos
Malware Utkonos@MalwareUtkonos·
Malicious Word CS theme: 803727ccdf441e49096f3fd48107a5fe55c56c080f46773cd649c9e55ec1be61 New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docm Contains malicious VBS Next stage: hxxp[://]172[.]104[.]160[.]126:8099/payload2[.]txt Fake Cert with base64 PE
Malware Utkonos tweet mediaMalware Utkonos tweet mediaMalware Utkonos tweet media
English
3
11
33
9.7K
InQuest
InQuest@InQuest·
Join us on Wednesday the 7th from 5:30pm - 8:30pm for our sixth annual Blackhat Bash: inquest.net/blackhat2024/ Hosted with our long-time partners @ExodusIntel and @OPSWAT, at the Foundation Room on the top floor of the Mandalay Bay. Enjoy an open bar, relaxed conversation, and hors d'oeuvres. No projectors, nor presentations... a gathering of security veterans representing a blend of pillars in the industry.
InQuest tweet media
English
0
1
1
258
InQuest retuiteado
OPSWAT
OPSWAT@OPSWAT·
#Webinar tomorrow! Join OPSWAT and industry experts at 1 PM EDT for insights into AI’s disruption of #cybercrime and how #AI impacts both offensive and defensive strategies. hubs.la/Q02HkGZT0
OPSWAT tweet media
English
0
1
3
517
InQuest retuiteado
OPSWAT
OPSWAT@OPSWAT·
Join OPSWAT & industry experts from @InQuest and @DarkReading next week on July 23 at 1 PM EDT as they discuss how #AI has disrupted #cybercrime, & learn how AI impacts both offensive & defensive strategies. Register now: hubs.la/Q02GFlyT0
OPSWAT tweet media
English
0
1
1
252
InQuest
InQuest@InQuest·
research.checkpoint.com/2024/resurrect… Kudos to Check Point Research for continuing analysis and coverage of the malicious URL file ("Internet Shortcut File") space! We appreciate the reference to InQuest's January report on what is effectively non-stop abuse of this file format over the years: inquest.net/blog/shortcut-… It's worth considering the significant attack surface in mainstream operating systems. Adversaries are adept at identifying these hidden features directly, borrowing information from researchers, and leveraging it in their attack campaigns. We encourage administrators to apply proactive hardening and attack surface reduction (ASR) configurations in their environment wherever possible. InQuest offers a set of solutions that enable organizations to defend against complex file-based threats over common network entry paths like email, web, and file upload services. Increase your defensive posture by detecting and blocking suspicious files early, before they reach users and endpoints.
English
0
0
1
635