Chris Beckett

741 posts

Chris Beckett banner
Chris Beckett

Chris Beckett

@cbecks_2

Infosec and the Green Bay Packers. Interested in all things DFIR, Detection Engineering, Purple, and CTI. Opinions are mine, certainly not those of my employer.

Katılım Kasım 2018
2.1K Takip Edilen811 Takipçiler
Chris Beckett retweetledi
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
. @mubix shared this on LinkedIn and thought some of you might find it useful: “A Practical Reprioritization Guide for CISOs Entering the AI Vulnerability Era” linkedin.com/posts/mubix_th…
Florian Roth ⚡️ tweet mediaFlorian Roth ⚡️ tweet mediaFlorian Roth ⚡️ tweet media
English
6
89
385
57.7K
Chris Beckett retweetledi
Fabian Bader
Fabian Bader@fabian_bader·
If you have a conditional access policy scoped to user action "Register security information" starting May 2026 the registration of Windows Hello for Business and macOS Platform SSO credentials will be in scope. #EntraID
Fabian Bader tweet media
English
2
27
117
8.2K
Fletcher Davis
Fletcher Davis@gymR4T·
@cbecks_2 One of my biggest gripes recently is around how many of these SaaS vendors are paywalling their security and audit data. Enterprise license requirements, additional charges, etc.
English
1
0
3
141
Chris Beckett
Chris Beckett@cbecks_2·
Friendly reminder that Docusign still charges you extra to stream/export logs from their platform.
English
1
0
8
988
Chris Beckett retweetledi
Peter Girnus 🦅
Peter Girnus 🦅@gothburz·
Last week our CISO asked me to present on “zero trust architecture.” I don’t know what that means. I make $340,000 a year. I haven’t touched a firewall since Obama’s first term. But I have a CISSP. I passed by memorizing acronyms. I still don’t know what half of them stand for. I opened my presentation with “assume breach.” Everyone nodded gravely. I said “defense in depth” three times. The board was captivated. Then a junior analyst raised her hand. She asked how we’d implement microsegmentation. I felt a cold sweat. I said, “Great question. Let’s take that offline.” She persisted. I said we should “leverage AI-driven solutions.” She asked which ones. I said, “The cloud-native ones.” She looked confused. I told her confusion was natural. I said, “Security is a journey, not a destination.” The CEO started clapping. I don’t know why. But others joined in. The analyst stopped asking questions. I ended with “security is everyone’s responsibility.” This meant it was no one’s responsibility. Especially not mine. We got breached two weeks later. I blamed the analyst for “creating a culture of doubt.” She got put on a PIP. I got promoted to VP. Resilience isn’t about preventing failure. It’s about surviving it. Preferably while others don’t.
English
192
706
6.1K
464.7K
Chris Beckett retweetledi
1aN0rmus
1aN0rmus@TekDefense·
This Salesloft incident is a doozy. Here’s a quick video breakdown of what’s known so far. Watch till the end for my Salesforce logging rant :)
English
2
8
28
4.2K
Chris Beckett retweetledi
Jared Wilson
Jared Wilson@JWilsonSecurity·
...and we're looking for one more sucker, I mean team manager, to join the league!! You'll get to trash talk with the best while also sharing security best practices 🤣 Be warned, we do have punishments... So bring your best.
Jared Wilson@JWilsonSecurity

We are back! The #SecureTheBall Cyber Security Fantasy Football league returns for its ***third year***! I expect this will be the most ice filled year yet. 🧊🧊🧊

English
1
2
2
2.9K
Chris Beckett
Chris Beckett@cbecks_2·
@SecurityAura Pouring one out for all my Detection Engineering homies who continue to find out just how terrible these logs are. For most I think it just makes sense to deploy a CSPM as an event logger and normalizer. I’d be curious if anyone has experiences to share from Wiz or other.
English
0
0
4
117
Aura
Aura@SecurityAura·
>enabling SSH on the ESXi hosts You ARE syslogging your ESXi hosts to a SIEM and alerting on this behavior aren't you? If not, you ARE alerting on the root account password being reset, right? Right? ... Right? Please say I'm right.
J⩜⃝mie Williams@jamieantisocial

this part is brutal.

English
7
21
189
19K
Will
Will@BushidoToken·
There’s various reports of cybercriminals abusing CrowdStrike RTR, the SentinelOne installer, and the Wazuh SIEM Agent. Seems we could do with a new @MITREattack TTP for this threat. Should be a concern for orgs running any of type of EDR/SIEM agents. (Sources linked below)
English
4
42
227
46.2K
1aN0rmus
1aN0rmus@TekDefense·
Last week I created Permiso Podcaster (automatic video podcast generator) and shared a sample. In this video I walk you through how I built it! - Pulls data from @permisosecurity MCP - Claude 3.5 writes a 2-host script - @elevenlabs generates audio - @runwayml clips FFMPEG stitches it all
English
1
1
8
457
Chris Beckett
Chris Beckett@cbecks_2·
@t3hpaul @anttitikkanen Hey All - Bumping this thread again in case anyone has learned anything. Slack search history was mentioned in the Rippling/Deel filing so figured I would ask. Thanks!
English
1
0
3
140
Chris Beckett
Chris Beckett@cbecks_2·
@t3hpaul @anttitikkanen We received a "less than stellar" response back when asking for this feature. They said that it can be requested retroactively in the event of a security incident but they do not plan to make the data readily available in an audit log or via API due to privacy concerns.
English
1
0
0
121
Chris Beckett
Chris Beckett@cbecks_2·
My fellow detection engineers: Is anyone aware of a way to get Search Query audit logging from Slack?
English
2
2
10
4K
Dustin Beaudoin
Dustin Beaudoin@thedbeaudoin·
@jsawadd honestly thought the part about the Information article and associated Slack searches was an underrated nominee for lowkey wildest part of the story. so blatant
Dustin Beaudoin tweet media
English
3
0
62
6.1K
Jonathan Awad
Jonathan Awad@jsawadd·
Because I know most people can’t or simply won’t read Parker’s actual tweet Rippling v Deel is almost unbelievable LEGIT honeypot use ??? READ THIS PART —>
Jonathan Awad tweet media
Parker Conrad@parkerconrad

Rippling sued @Deel today. Our lawsuit alleges Deel cultivated a spy at Rippling & orchestrated a long-running trade-secret theft. The spy searched “deel” in our systems 23 times per day on avg, letting him spy on Deel’s own customers who were considering a switch to Rippling.

English
42
55
1.6K
424.1K
Matt Johansen
Matt Johansen@mattjay·
This story is absolutely insane. And we don't usually get a front-row seat to insider threat investigations Spy got tricked by a honeypot and implicated the most senior leaders at the victim's biggest competitors. I go through it all here: youtu.be/tDG1WfbSZFo
YouTube video
YouTube
Matt Johansen tweet media
English
3
19
82
8.2K
Chris Beckett
Chris Beckett@cbecks_2·
This was new to me, so I hope it helps someone else. It looks like Enterprises can configure allowlists for VSCode extensions on Windows now. Looks like Mac is coming later: #_centrally-manage-allowed-extensions" target="_blank" rel="nofollow noopener">code.visualstudio.com/docs/setup/ent…
English
0
3
6
632
Chris Beckett retweetledi
Microsoft Threat Intelligence
Microsoft Threat Intelligence@MsftSecIntel·
Within the past 24 hours, we observed Storm-2372 shifting to using the specific client ID for Microsoft Authentication Broker in the device code sign-in flow of their device code phishing campaign. Get more details from our continuous tracking of this active threat: msft.it/6016Uqc2r
English
1
73
247
42.7K
Chris Beckett
Chris Beckett@cbecks_2·
@SpecterOps Do you all have any insight around where the shell commands for Azure Cloud Shell get logged?
English
1
0
0
89
SpecterOps
SpecterOps@SpecterOps·
New blog post alert! 🚨 Lance Cain shares insights from a recent security assessment about the attack surface of Single-Page Applications integrated w/ Azure and how to aid technology professionals in securing their Azure environment. ghst.ly/4gq8E5y
SpecterOps tweet media
English
1
53
146
19.6K
Chris Beckett retweetledi
The Haag™
The Haag™@M_haggis·
🔍💻 PowerShell Pro Tip! 💻🔍 Ever wondered what app opens specific file extensions on your Windows machine? 🤔 Sure, it’s not new, but it’s super handy! 💪 Use this PowerShell magic to find file extensions and their associated apps (like finding out `.rdp` opens with `mstsc.exe`)! 🚀 ``` $associations = @() $registryPaths = @( "HKLM:\Software\Classes", "HKCU:\Software\Classes" ) foreach ($path in $registryPaths) { Get-ChildItem $path | ForEach-Object { if ($_.PSChildName -like ".*") { $extension = $_.PSChildName $progId = (Get-ItemProperty -Path "$($_.PSPath)" -ErrorAction SilentlyContinue).'(Default)' if ($progId) { $commandPath = (Get-ItemProperty -Path "$path\$progId\shell\open\command" -ErrorAction SilentlyContinue).'(Default)' $associations += [PSCustomObject]@{ Extension = $extension ProgID = $progId AssociatedApp = $commandPath } } } } } $associations | Out-GridView -Title "File Extensions and Associated Applications" ``` gist.github.com/MHaggis/a5b0af… Hit enter & watch as the magic unfolds! 🎩✨ Explore the full list in a GUI to see extensions + their apps! Because sometimes… knowing is half the battle 🛡️💡 🖥️🐱‍💻
The Haag™ tweet media
English
4
32
166
19.7K