๐’œ๐ต๐’Ÿ๐’ฐ๐ฟ๐ฟ๐’œ๐ป ๐ต๐’œ๐’ข๐ป๐’ฐ๐’ฏ๐ป

1.5K posts

๐’œ๐ต๐’Ÿ๐’ฐ๐ฟ๐ฟ๐’œ๐ป ๐ต๐’œ๐’ข๐ป๐’ฐ๐’ฏ๐ป banner
๐’œ๐ต๐’Ÿ๐’ฐ๐ฟ๐ฟ๐’œ๐ป ๐ต๐’œ๐’ข๐ป๐’ฐ๐’ฏ๐ป

๐’œ๐ต๐’Ÿ๐’ฐ๐ฟ๐ฟ๐’œ๐ป ๐ต๐’œ๐’ข๐ป๐’ฐ๐’ฏ๐ป

@0xCyberY

Cybersecurity Engineer @ COGNNA | Security Analyst | Penetration Tester | Purple Teamer

127.0.0.1 Katฤฑlฤฑm Kasฤฑm 2012
785 Takip Edilen896 Takipรงiler
๐’œ๐ต๐’Ÿ๐’ฐ๐ฟ๐ฟ๐’œ๐ป ๐ต๐’œ๐’ข๐ป๐’ฐ๐’ฏ๐ป
ุชุณุฑูŠุจ ุงู„ุจูŠุงู†ุงุชโ€ฆ ุฏุฑูˆุณ ู‚ุงุณูŠุฉ ู…ู† ุงู„ู…ุงุถูŠ ู„ุญู…ุงูŠุฉ ุงู„ู…ุณุชู‚ุจู„ haseen.leapat.org/blog/posts/datโ€ฆ #leapat
ุงู„ุนุฑุจูŠุฉ
0
0
0
303
๐’œ๐ต๐’Ÿ๐’ฐ๐ฟ๐ฟ๐’œ๐ป ๐ต๐’œ๐’ข๐ป๐’ฐ๐’ฏ๐ป retweetledi
blackorbird
blackorbird@blackorbirdยท
Supply Chain Poisoning of 7ZIP on the Microsoft App Store #APT ti.qianxin.com/blog/articles/โ€ฆ
English
1
33
81
13K
๐’œ๐ต๐’Ÿ๐’ฐ๐ฟ๐ฟ๐’œ๐ป ๐ต๐’œ๐’ข๐ป๐’ฐ๐’ฏ๐ป retweetledi
COGNNA
COGNNA@cognnaยท
Thank you for joining us #blackhatmea2023 ! It was an absolute pleasure meeting all of you in person, and we can't wait to welcome you at more exciting events in the future. Stay tuned for what's to come! #CognnaAtBlackHatMEA #ThankYou
COGNNA tweet media
English
0
3
2
3.5K
๐’œ๐ต๐’Ÿ๐’ฐ๐ฟ๐ฟ๐’œ๐ป ๐ต๐’œ๐’ข๐ป๐’ฐ๐’ฏ๐ป
I will be one of the exhibiter for @cognna at #blackhatmea. Visit us to explore our comprehensive range of threat management, threat detection, rapid response, and compliance assurance solutions to safeguard your organization against evolving cyber threats.
COGNNA@cognna

Great start to the first day of #BlackHatMEA2023! Looking forward to seeing you tomorrow for another exciting day! ุงู†ุทู„ุงู‚ุฉ ุฑุงุฆุนุฉ ู„ุฃูˆู„ ูŠูˆู… ููŠ ุจู„ุงูƒ ู‡ุงุช 2023 ู†ู†ุชุธุฑูƒู… ุจุดูˆู‚ ุบุฏุง ููŠ ูŠูˆู… ุฌุฏูŠุฏ

English
0
0
0
341
๐’œ๐ต๐’Ÿ๐’ฐ๐ฟ๐ฟ๐’œ๐ป ๐ต๐’œ๐’ข๐ป๐’ฐ๐’ฏ๐ป retweetledi
Florian Roth โšก๏ธ
Florian Roth โšก๏ธ@cyb3ropsยท
Introducing THOR-Cloud Lite ๐ŸŒฉ๏ธ: Seamless On-Demand Forensic Scanning Made Easy - apply YARA + Sigma + IOCs - it's free - many more features upcoming Blog ๐Ÿ“˜ nextron-systems.com/2023/10/30/intโ€ฆ Release Session ๐Ÿ“บ youtu.be/ApeXFnFkKZg Register for Free โšก๏ธ thorcloud-lite.nextron-systems.com/ui/register?utโ€ฆ
YouTube video
YouTube
Florian Roth โšก๏ธ tweet mediaFlorian Roth โšก๏ธ tweet mediaFlorian Roth โšก๏ธ tweet mediaFlorian Roth โšก๏ธ tweet media
English
8
163
525
153.2K
๐’œ๐ต๐’Ÿ๐’ฐ๐ฟ๐ฟ๐’œ๐ป ๐ต๐’œ๐’ข๐ป๐’ฐ๐’ฏ๐ป retweetledi
COGNNA
COGNNA@cognnaยท
COGNNA tweet media
ZXX
1
2
1
515
๐’œ๐ต๐’Ÿ๐’ฐ๐ฟ๐ฟ๐’œ๐ป ๐ต๐’œ๐’ข๐ป๐’ฐ๐’ฏ๐ป retweetledi
Cyber Security Club
Cyber Security Club@KSU_Cyberยท
ุจุงู„ุชุนุงูˆู† ู…ุน @cognna ูŠุฏุนูˆูƒู… ู†ุงุฏูŠ ุงู„ุฃู…ู† ุงู„ุณูŠุจุฑุงู†ูŠ ุจุฌุงู…ุนุฉ ุงู„ู…ู„ูƒ ุณุนูˆุฏ ู„ุญุถูˆุฑ ุงู„ู†ุฏูˆุฉ ุงู„ุณูŠุจุฑุงู†ูŠุฉ ุจุนู†ูˆุงู† : " Cybersecurity Career Path" ู…ุน ุงู„ู…ุฏูŠุฑ ุงู„ุชู‚ู†ูŠ ู„ุดุฑูƒุฉ ูƒูˆู‚ู†ุง ู….ุฒูŠุงุฏ ุงู„ุดู‡ุฑูŠ ูŠูˆู… ุงู„ุงุซู†ูŠู† 30 ุฃูƒุชูˆุจุฑ ุงู„ุณุงุนุฉ 7:30 ู…ุณุงุกู‹ุง ูŠูˆุฌุฏ ุดู‡ุงุฏุฉ ุญุถูˆุฑ๐ŸŒŸ ุฑุงุจุท ุงู„ุชุณุฌูŠู„ : forms.gle/vJ4ExwPGxBy3Crโ€ฆ
Cyber Security Club tweet media
ุงู„ุนุฑุจูŠุฉ
1
14
29
12.8K
๐’œ๐ต๐’Ÿ๐’ฐ๐ฟ๐ฟ๐’œ๐ป ๐ต๐’œ๐’ข๐ป๐’ฐ๐’ฏ๐ป retweetledi
COGNNA
COGNNA@cognnaยท
Once you've identified the top three common #cybersecurity attacks, the next natural question that may come to mind is: 'How do I mitigate them?' So, here's the answer. #AskCognna #CybersecurityAwarenessMonth
COGNNA tweet media
English
1
2
1
482
๐’œ๐ต๐’Ÿ๐’ฐ๐ฟ๐ฟ๐’œ๐ป ๐ต๐’œ๐’ข๐ป๐’ฐ๐’ฏ๐ป retweetledi
Florian Roth โšก๏ธ
Florian Roth โšก๏ธ@cyb3ropsยท
You can either hunt for it or check and apply our Sigma rules If you're unsure whether a detection idea is already covered by an existing rule, you can use the sigmasearchengine.com, which was developed by my team member @ph_t__ We've also integrated the API of that service into the Sigma VSCode extension
Florian Roth โšก๏ธ tweet mediaFlorian Roth โšก๏ธ tweet media
Threat Hunting@Mahdi_htm

Initial Access with Compiled HTML File (CHM) have been used by different TAs including APT37 and APT41. For hunting/detecting them you should check hh.exe spawning mshta.exe or any other related LOBINs in Event ID 1 of Sysmon or 4688 See the execution flow in the following pics

English
1
48
184
32.8K
๐’œ๐ต๐’Ÿ๐’ฐ๐ฟ๐ฟ๐’œ๐ป ๐ต๐’œ๐’ข๐ป๐’ฐ๐’ฏ๐ป
๐๐ข๐œ๐ก๐ž & ๐†๐ž๐ง๐ž๐ซ๐š๐ฅ ๐‚๐ฒ๐›๐ž๐ซ ๐ˆ๐ง๐œ๐ข๐๐ž๐ง๐ญ ๐ƒ๐š๐ญ๐š ๐’๐จ๐ฎ๐ซ๐œ๐ž๐ฌ - ransomwatch: [github.com/joshhighet/ranโ€ฆ] - MalwareBazaar: [bazaar.abuse.ch/browse/] - Verizon Data Breach Investigations Report (DBIR): [verizon.com/business/resouโ€ฆ]
English
1
0
0
175