Jack

1.1K posts

Jack banner
Jack

Jack

@malwareforme

Security researcher

Katılım Mart 2015
926 Takip Edilen6.3K Takipçiler
Sabitlenmiş Tweet
Jack
Jack@malwareforme·
Getting away from Twitter. You can find me on BlueSky while I rebuild followers and figure it out: malwareforme.bsky.social
English
0
0
1
216
Jack retweetledi
Matt Zorich
Matt Zorich@reprise_99·
We are looking for some interns to join our team here at Microsoft. If you are currently studying cyber security, computer science, mathematics or anything similar and based in Ireland or Cheltenham then we would love to hear from you - aka.ms/ghostjobs
English
2
40
58
10.1K
Jack retweetledi
Matt Zorich
Matt Zorich@reprise_99·
People often share full Kusto queries, which is awesome, but what about those handy one liners and tips you have picked up along the way? Here are some of my favourites, share yours below! Extend an additional column for your local time, example +5 UTC: | extend LocalTime = TimeGenerated +5h Find events only on weekends, cast a variable to make it easy to read: let Saturday = time(6.00:00:00); let Sunday = time(0.00:00:00); AuditLogs | where dayofweek(TimeGenerated) in (Saturday, Sunday) Find events during certain hours of the day: | where hourofday(TimeGenerated) !between (4 .. 23) Calculate the minutes (or hours or days etc) between two events: | extend ['Minutes Between Events']=datetime_diff("minute",Timestamp1,Timestamp2) Parse the details, including browser family and version etc of a user agent: | extend UserAgentDetail = todynamic(parse_user_agent(UserAgent, "browser")) Decode base64 encoded strings, useful for PowerShell: | extend DecodedCommand = base64_decode_tostring(EncodedCommand) Rename columns while using project: | project LogTime=TimeGenerated, SigninLocation=Location, IP=IPAddress, Agent=UserAgent
English
6
38
214
13.8K
Jack retweetledi
Matt Zorich
Matt Zorich@reprise_99·
If you're a guy in your early 20s, learn regex. Go into debt if you have to
English
26
18
313
24.1K
SwiftOnSecurity
SwiftOnSecurity@SwiftOnSecurity·
Pretend I'm an idiot, what is the best read on the background and motivation of China being a fucking expansionist dick to all its neighbors
English
67
17
463
77.9K
Jack retweetledi
William Metcalf
William Metcalf@node5·
Enjoy punching phish? Experience writing detections for phish, using regex, Yara, etc., and looking to grow as a researcher within an experienced team? Join me and the rest of the Splunk Attack Analyzer Misfits of Detection Science. US only, fully remote splunk.com/en_us/careers/…
English
0
6
4
1.6K
Jack retweetledi
الرقة تذبح بصمت
The great Syrian people overthrew the Assad regime. Syria is Free We are free
الرقة تذبح بصمت tweet media
English
4
7
32
3K
Jack retweetledi
Threat Insight
Threat Insight@threatinsight·
Proofpoint has tracked this technique since August 2024, and call it “brooxml”. Our researchers do not consider this a zero-day or vulnerability in general. We’ve released Emerging Threats and YARA signatures at the end of this thread.
ANY.RUN@anyrun_app

🚨ALERT: Potential ZERO-DAY, Attackers Use Corrupted Files to Evade Detection 🧵 (1/3) ⚠️ The ongoing attack evades #antivirus software, prevents uploads to sandboxes, and bypasses Outlook's spam filters, allowing the malicious emails to reach your inbox The #ANYRUN team discovered that as part of this #zeroday attack, threat actors attempt to conceal the file type by deliberately corrupting it, making it difficult for certain security tools to detect 📌 Our sandbox solves this problem thanks to interactivity. It launches these broken files in their corresponding programs, which allows it to identify #malicious behavior See example: app.any.run/tasks/6839e806… 🚫 Although these files operate successfully within the OS, they remain undetected by most security solutions due to the failure to apply proper procedures for their file types They were uploaded to VirusTotal, but all antivirus solutions returned "clean" or “Item Not Found” as they couldn't analyze the file properly

English
4
65
179
39.5K
Jack
Jack@malwareforme·
The absolute worst take ever. Just don’t end up in PCRE jail and it’s fine. Regex 4ever
English
0
0
3
266
Jack retweetledi
Microsoft On the Issues
Microsoft On the Issues@MSFTIssues·
Microsoft’s Digital Crimes Unit has seized 240 fraudulent websites, disrupting a major “Phishing-as-a-Service” operation. These campaigns targeted sensitive industries like financial services, jeopardizing data, transactions, and even life savings. aka.ms/DCU-disruption…
English
0
5
7
2.6K
Jack retweetledi
Nick Carr
Nick Carr@ItsReallyNick·
I'm told we are hiring in MSTIC: aka.ms/msticjobs Come for the data, stay for the data. Creative problem solvers have the most impact. If we've worked together, I'm happy to refer you. But...
Nick Carr@ItsReallyNick

i’m legit amped about aligning with all of the “tip of the spear” teams under the CISO this part of the public “secure futures” update is a pretty nice acknowledgment of threat intel impact let’s go! come join us: aka.ms/msticjobs 🕵️ aka.ms/ghostjobs 👻

English
2
16
49
29.4K
Jack retweetledi
Josh Kamdjou
Josh Kamdjou@jkamdjou·
you can deploy verifiable coverage for this with @sublime_sec (for free), here’s the detection that’s been out for over a year (h/t @zoomequipd @ajpc500): sublime.security/feeds/core/det…
CISA Cyber@CISACyber

🚨We’re seeing reports of a large-scale #spearphishing campaign targeting multiple sectors, including government and IT. A foreign threat actor is sending phishing emails with malicious RDP files to gain network access. Take proactive measures. More info: bit.ly/4fp9aQB

English
0
8
17
2.1K
Jack retweetledi
Sublime Security
Sublime Security@sublime_sec·
Announcing our latest NLU model update: BERT Large Language Model (LLM), which is better at understanding tone, intent, and context than ever before. We’ve detailed our research in our latest blog and how it’s used to combat AI-generated attacks: sublime.security/blog/combating…
Sublime Security tweet media
English
0
8
18
4K
Jack retweetledi
Jack retweetledi
Sublime Security
Sublime Security@sublime_sec·
We're excited to announce the release of our new Public EML Analyzer: a free, unauthenticated tool for analyzing email messages. Upload any EML and get Sublime's analysis results along with URL sandbox and attachment previews, insights, and more: analyzer.sublime.security
GIF
English
2
42
149
34.8K
Jack retweetledi
Jeremy Kirk
Jeremy Kirk@Jeremy_Kirk·
Microsoft has been running massive deception campaigns that flood new phishing sites with bogus credentials for bogus companies on MS tenants. When attackers log in, they deliver a torrent of fresh threat intelligence that can be used to defend: #infosec youtube.com/watch?v=78qnM_…
YouTube video
YouTube
English
5
175
665
60.2K