TropChaud

529 posts

TropChaud banner
TropChaud

TropChaud

@IntelScott

Reluctant security & intelligence practitioner and tool developer. Mainly Tweets about aggregating and visualizing cyber threat & OSINT datasets

가입일 Eylül 2018
587 팔로잉1.4K 팔로워
고정된 트윗
TropChaud
TropChaud@IntelScott·
On its 1st anniversary, excited to announce the re-launch of MetaOSINT, the #OSINT tool & resource aggregator! v2 contains 900 new resources (5,700+ total) wrapped in an improved UI. The best news? A method for ongoing updates, so stay tuned for more ~weekly additions!
GIF
English
9
39
114
0
TropChaud
TropChaud@IntelScott·
I’ve tracked thousands of #OSINT resources over a half-decade via the MetaOSINT project. Here are my thoughts on how the dataset’s evolution might reflect broader trends & changes in the underlying info landscape during a time of major global disruption: metaosint.github.io/2023-osint-tre…
TropChaud tweet media
English
0
4
16
2.7K
TropChaud
TropChaud@IntelScott·
MetaOSINT v3.0 is live! The first major update in over a year brings 8,000 new resources to the tool, more than doubling the previous tally. But structured categories & citation counts still make it easy to surface popular, relevant #OSINT resources: metaosint.github.io
TropChaud tweet media
English
0
17
42
4.8K
TropChaud
TropChaud@IntelScott·
Long-overdue update (largest yet) to my #OSINT-focused project MetaOSINT coming soon! Adding a ton of new, timely resources to the database while maintaining its hallmark ease of use. Brush back up before the update lands in the coming days: metaosint.github.io
TropChaud tweet media
English
0
8
31
6K
TropChaud
TropChaud@IntelScott·
The rich detail in recent threat reporting is an extremely welcome trend. But the reality is that longer/denser reports can place more burden on teams, if they’re attempting to (or leadership expects them to) thoroughly process each one
English
1
0
0
222
TropChaud
TropChaud@IntelScott·
If you've felt like it's taking longer to get through a typical CTI report lately, you're not wrong
TropChaud tweet media
English
1
1
6
586
TropChaud 리트윗함
Tidal Cyber
Tidal Cyber@TidalCyber·
Meet us in Iowa at the 2023 @QCCornCON on 10/5-7. @advemuian will be presenting "Using ATT&CK for Threat Profiling, Defensive Stacks, and Coverage Maps" and "Mind the Gap: From CTI to Defensive Improvements." Use code "TID25" for 25% off! corncon.net #mitreattack
Tidal Cyber tweet media
English
0
2
6
648
J⩜⃝mie Williams
J⩜⃝mie Williams@jamieantisocial·
@IntelScott objective transparency & conciseness + usability are certainly tough to ⚖️😅 I'm curious to see what the current team does next
English
1
0
1
135
TropChaud
TropChaud@IntelScott·
Wholeheartedly believe that most in the #threatintel, #detectionengineering, and #adversaryemulation spaces can benefit by bookmarking this free-to-use tool as we push regular updates into the platform
Tidal Cyber@TidalCyber

We added tons of content across our free Community Edition this week, including #BlackCat/#ALPHV & #ScatteredSpider tool & TTP collections and updates to @elastic & Atomic Red Team capabilities in our Product Registry: app.tidalcyber.com #ThreatInformedDefense

English
0
0
3
438
TropChaud
TropChaud@IntelScott·
@Cyb3rMonk Important points worth remembering. It will always be reactive by nature, but we see a lot more timely, TTP-focused CTI these days, and we've started to capture it in our knowledge base to help address the recency gap (some good examples on our homepage: app.tidalcyber.com)
English
0
0
2
152
TropChaud 리트윗함
Josh++
Josh++@josh_murchie·
Josh++ tweet media
ZXX
4
14
84
10.7K
TropChaud
TropChaud@IntelScott·
The value here is organizing the exercise around a recent, prominent threat - recently enhanced Search in @TidalCyber Community Edition helps quickly surface relevant content, & pivoting on mapped @MITREattack techniques expands focus to include variations on observed procedures
English
0
1
4
164
TropChaud
TropChaud@IntelScott·
A set of mini purple team exercises involved a typical cast of characters including @redcanary #AtomicRedTeam tests + @sigma_hq rules run via Chainsaw on logs configured via @olafhartong's Sysmon-Modular config Ultimately we contributed a new test aligned with an existing rule
English
1
1
2
176