🛡️ B i f f ³

20.6K posts

🛡️ B i f f  ³ banner
🛡️ B i f f  ³

🛡️ B i f f ³

@biffbiffbiff

father, cybersecurity generalist, wearer of hats, outdoor junky, nap taker.

internet Katılım Aralık 2008
593 Takip Edilen841 Takipçiler
🛡️ B i f f  ³
🛡️ B i f f ³@biffbiffbiff·
@SwiftOnSecurity Am I the only one who uses twitter in following > recents exclusively? I want the raw firehose in realtime without curation 🤠
English
1
0
2
83
SwiftOnSecurity
SwiftOnSecurity@SwiftOnSecurity·
People thought I was being a needy attention hole when I said something weird was happening with my post visibility 🤷‍♀️
koumdros@koumdros

@SwiftOnSecurity For some reason I am regularly seeing again posts from you, after at least 15-20 months where I doubt I saw a single one. The algorithm gods have blessed you again

English
10
0
121
13.3K
Proton Pass
Proton Pass@Proton_Pass·
@lamacodes No-one is daily driving Tor browser; in fact, that's a bad idea.
English
13
9
387
11.8K
Lama
Lama@lamacodes·
Average internet user: Chrome Browser 🤡 Smart user: Brave Browser 🔥 Final boss: Tor Browser 💀 Brave protects your privacy. Tor protects your soul.
Lama tweet media
English
64
36
379
13K
🛡️ B i f f  ³
🛡️ B i f f ³@biffbiffbiff·
@DarkWebInformer Spotify looks to be up. Though they did have an outage for a little bit according to down detector 🧐
English
2
0
5
2.8K
Dark Web Informer
Dark Web Informer@DarkWebInformer·
‼️🇺🇸 313 Team is claiming to target Spotify
Dark Web Informer tweet media
English
4
19
88
28.3K
EZ
EZ@IAMERICAbooted·
As long as context windows are a limiting factor, AI will never be able to replace people. Otherwise, its just programming with basic conditional structures. Even THE BEST MODELS cant get Microsoft licensing right or do overall architecture analysis
English
6
0
26
1.4K
🛡️ B i f f  ³
🛡️ B i f f ³@biffbiffbiff·
@UK_Daniel_Card Couldn't get into that one but dark forces 2 was 🔥 and still remember most of the cheat codes 😂
English
1
0
1
23
🛡️ B i f f ³ retweetledi
Kostas
Kostas@Kostastsale·
RMM hunting is one of those areas where defenders get stuck because the answer is rarely “just block it.” On a day-to-day basis, from the intrusions we see, 𝗦𝗰𝗿𝗲𝗲𝗻𝗖𝗼𝗻𝗻𝗲𝗰𝘁, 𝗦𝗽𝗹𝗮𝘀𝗵𝘁𝗼𝗽, 𝗔𝗻𝘆𝗗𝗲𝘀𝗸, and 𝗥𝘂𝘀𝘁𝗗𝗲𝘀𝗸 are some of the most abused RMMs. All of these can be legitimate. All of these are also regularly abused. That makes them annoying to detect, especially if you work in an MSSP or an environment where remote admin tooling is everywhere. But there is a useful hunting angle here. ScreenConnect is still one of the most common by far. A pattern I’ve noticed recently is threat actors installing multiple ScreenConnect clients on the same host with different profile configurations, each connecting to different domains. That looks a lot like access staging or access resale. The interesting part is that this creates artifacts defenders can hunt for. 𝘐𝘯 𝘵𝘩𝘦 𝘧𝘪𝘳𝘴𝘵 𝘴𝘤𝘳𝘦𝘦𝘯𝘴𝘩𝘰𝘵, 𝘺𝘰𝘶 𝘤𝘢𝘯 𝘴𝘦𝘦 𝘩𝘰𝘸 𝘥𝘪𝘧𝘧𝘦𝘳𝘦𝘯𝘵 𝘚𝘤𝘳𝘦𝘦𝘯𝘊𝘰𝘯𝘯𝘦𝘤𝘵 𝘪𝘯𝘴𝘵𝘢𝘭𝘭𝘢𝘵𝘪𝘰𝘯 𝘱𝘳𝘰𝘧𝘪𝘭𝘦𝘴 𝘸𝘰𝘶𝘭𝘥 𝘭𝘰𝘰𝘬. 𝘐𝘯 𝘵𝘩𝘪𝘴 𝘤𝘢𝘴𝘦, 𝘵𝘩𝘦 𝘱𝘢𝘵𝘵𝘦𝘳𝘯 𝘪𝘴 𝘣𝘢𝘴𝘪𝘤𝘢𝘭𝘭𝘺 𝙎𝙘𝙧𝙚𝙚𝙣𝘾𝙤𝙣𝙣𝙚𝙘𝙩 𝘾𝙡𝙞𝙚𝙣𝙩 𝘧𝘰𝘭𝘭𝘰𝘸𝘦𝘥 𝘣𝘺 𝘢 𝘳𝘢𝘯𝘥𝘰𝘮 𝘶𝘯𝘪𝘲𝘶𝘦 16-𝘤𝘩𝘢𝘳𝘢𝘤𝘵𝘦𝘳 𝘢𝘭𝘱𝘩𝘢𝘯𝘶𝘮𝘦𝘳𝘪𝘤 𝘷𝘢𝘭𝘶𝘦. That is a very useful hunting signal. Red flags: - Multiple ScreenConnect profiles on one host - Multiple ScreenConnect installations - Installs under both 𝗖:\𝗣𝗿𝗼𝗴𝗿𝗮𝗺 𝗙𝗶𝗹𝗲𝘀*\ and 𝗔𝗽𝗽𝗗𝗮𝘁𝗮 - Different configured remote domains - Suspicious or unexpected 𝘀𝘆𝘀𝘁𝗲𝗺.𝗰𝗼𝗻𝗳𝗶𝗴 files The 𝘀𝘆𝘀𝘁𝗲𝗺.𝗰𝗼𝗻𝗳𝗶𝗴 file is especially useful. It exists inside the ScreenConnect installation directory and can expose the domain and certificate information used by the client to connect back to the remote server. This is the main point: Don’t hunt only for the presence of RMM, hunt for RMM drift. Unexpected profiles -> Unexpected paths -> Unexpected domains. Unexpected configs. That is where RMM abuse starts becoming visible.
Kostas tweet mediaKostas tweet media
English
8
64
235
27K
🛡️ B i f f ³ retweetledi
Brian in Pittsburgh
Brian in Pittsburgh@arekfurt·
Huh. Am I the only one who didn't know that Microsoft makes a tool called EventLogExpert that is supposed to be an improved version of event viewer for IT/helpdesk people? github.com/microsoft/Even…
Brian in Pittsburgh tweet media
English
15
183
892
49.3K
Igor Os
Igor Os@igor_os777·
Igor Os tweet media
ZXX
7
0
17
445
🛡️ B i f f  ³
🛡️ B i f f ³@biffbiffbiff·
@SwiftOnSecurity I mean have you seen the guy who's currently ruling us. Idk the machines are looking pretty good these days 😅
English
0
0
0
3
SwiftOnSecurity
SwiftOnSecurity@SwiftOnSecurity·
The machines will rule us because we will ask them to.
English
29
245
1.1K
0
🛡️ B i f f  ³
🛡️ B i f f ³@biffbiffbiff·
@3CX This is probably the worst vendor notice I've ever seen for something security related. What customers are impacted? Is there a vuln? Any IOCs? Any workarounds? Could you be more vague??? 3cx.com/blog/news/ip-s…
English
0
0
0
47
🛡️ B i f f  ³
🛡️ B i f f ³@biffbiffbiff·
@cheddar420yolo Moving tweetdeck to a higher level paid plan has caused frustration. We used to be a proper country.
English
0
0
1
118
Felipe Lourenço
Felipe Lourenço@felipelourenco·
Just saw a bright green meteor streak across the sky here in Palo Alto. Wild. Anyone else caught that? In just the past week, at least 2 major meteor events were reported across the U.S., including a massive explosion over Ohio and another over Texas.
English
8
1
8
761
🛡️ B i f f ³ retweetledi
no context memes
no context memes@nocontextmemes·
no context memes tweet media
ZXX
50
7.3K
68.6K
597.3K