Chris King (@[email protected])

1.3K posts

Chris King (@armengar@infosec.exchange)

Chris King (@[email protected])

@armengar

Recovering security researcher, vul disclosure nerd, DFIR, CTI, manager, loves hacking all the things. [email protected]

Katılım Şubat 2009
1.1K Takip Edilen336 Takipçiler
Chris King (@[email protected]) retweetledi
Chris King (@[email protected]) retweetledi
Andrew Morris (afk)
Andrew Morris (afk)@Andrew___Morris·
Today we're releasing details of how our AI, Sift, stole a 0day in an IP Camera and we reported it and got it fixed. To reiterate- we did not develop the vuln. 1st blood is overrated. I'm all about 2nd blood. Marketing blog here: greynoise.io/blog/greynoise… Grimoire blog below:
English
11
13
77
16.3K
Chris King (@[email protected]) retweetledi
CYBERWARCON
CYBERWARCON@CYBERWARCON·
We're excited to introduce Kyle O'Meara, a cybersecurity veteran with 18+ years in threat hunting & adversary tracking. 👏🏻 From the NSA to Dragos, Kyle has been at the forefront of critical cybersecurity efforts. 🙌🏻 See y’all soon at #CYBERWARCON! cyberwarcon.com
CYBERWARCON tweet media
English
0
3
10
943
Frank McGovern - INACTIVE
Frank McGovern - INACTIVE@FrankMcG·
Posted this across several socials and got roughly the same answers. There aren’t really many of these types of training. And this speaks heavily to why we have so many problems in this industry. Too much training on tactical, niche, technical things and not enough strategic.
Frank McGovern - INACTIVE@FrankMcG

Looking for training that is about security strategy or enterprise security or architecture or similar concepts. Not SANS or Black Hat pricing but similar to some courses they have. Where have you gone or heard of that is offering this type of classroom training?

English
9
4
31
5.6K
Chris King (@[email protected]) retweetledi
Steve Christey Coley, BS 🐀
25 years ago on Sep 29, 1999, MITRE announced the CVE Initiative. There's too much to say, so I'll be brief. CVE was not possible without a concerted, mostly-voluntary, community-wide effort. It's accomplished a lot, but it's daunting to see how much still needs to be done...
English
3
17
45
7.5K
Nicole Beckwith
Nicole Beckwith@NicoleBeckwith·
Yesterday myself and a dedicated community of CTI professionals from around the globe launched the new cyber threat intelligence capability maturity model (CTI-CMM). This is truly a labor of love from us because we care about the future of CTI as an anchor inside cybersecurity teams. This free resource is open for everyone at cti-cmm.org where you can download it. The individuals called out in the document gave countless hours to help make CTI more accessible and I had the honor of working with and getting to know more about. Go check it out and go follow @CTIcmm for content updates and releases.
English
11
51
181
16.9K
Chris King (@armengar@infosec.exchange)
If you are at BH on Thursday - be sure to watch my amazing teammates Rushank and Ryan present on how they broke Immutable Backups: #are-your-backups-still-immutable-even-though-you-cant-access-them-39135" target="_blank" rel="nofollow noopener">blackhat.com/us-24/briefing…
English
0
0
1
31
SwiftOnSecurity
SwiftOnSecurity@SwiftOnSecurity·
Do you have weird tricks on detecting malicious remote staff using residential proxy frontends?
English
22
5
70
37.2K
Chris King (@[email protected]) retweetledi
GreyNoise
GreyNoise@GreyNoiseIO·
🚨 We're tracking new 0-day RCE CVE-2024-3400 in Palo Alto Networks PAN-OS 10.2-11.1 allowing unauthenticated root access in certain configs, check out the blog for more details. greynoise.io/blog/cve-2024-…
English
5
53
146
17.7K
Gergely Orosz
Gergely Orosz@GergelyOrosz·
Learning about Zero Trust as a security model: and I really dig it. The idea is that you treat all users like they were external users. You don't grant additional privileges (or skip security checks) for internal users. Simple. Powerful! (The devil in the details of course!)
English
30
19
512
86.6K
Chris King (@[email protected]) retweetledi
SpecterOps
SpecterOps@SpecterOps·
In his latest blog, @harmj0y unpacks one specific use case for large language models in the security domain & announces RAGnarok, a proof-of-concept local chatbot frontend, for Nemesis. Check out the post to learn more! ghst.ly/4acetAw
English
0
20
61
6.3K
Chris King (@armengar@infosec.exchange)
@ImposeCost This is something we talked about at CERT/CC a few years ago. We had the benefit of being a non-profit and the thought was the donation of a vulnerability would be tax deductible based off the value. Lawyers didn’t think it would past muster in current law
English
0
0
0
48
Nasreddine Bencherchali
Nasreddine Bencherchali@nas_bench·
For detection engineers out there here is a question for you. If you see a new technique or tool how do you answer the following questions. Do i have coverage? If not, then do I need a rule or should I update an existing rule that claims that it covers such technique / procedure? Rules hygiene is one of my biggest concern in DE. One of the hardest things I learned by maintaining SigmaHQ is the answer to the above is very hard without a full overview of your rule base.
English
12
13
89
16.9K
Andrew Morris (afk)
Andrew Morris (afk)@Andrew___Morris·
now that I get to work with computers again I'm writing a new GN vuln API that gives our customers the ability to quickly grab the list of all the vulns we've observed being exploited in the wild and I have a whole new appreciation for how FUCKED vulnerability ontologies are
Andrew Morris (afk) tweet mediaAndrew Morris (afk) tweet media
English
8
4
88
8.3K