Ross Wolf

631 posts

Ross Wolf

Ross Wolf

@rw_access

fan of the absurd. engineer for @Sublime_Sec. previously at @Elastic @EndgameInc @MITREcorp https://t.co/Jvf9O8HJvM

Colorado Katılım Haziran 2018
619 Takip Edilen1.1K Takipçiler
Ross Wolf retweetledi
Sublime Security
Sublime Security@sublime_sec·
Speed matters in threat hunting. We built high-performance historical hunting and detection backtesting at Sublime that scales to millions of messages without slowing analysts down. Read the technical deep dive: sublime.security/blog/how-we-bu…
English
0
1
7
365
Ross Wolf
Ross Wolf@rw_access·
@sublime_sec TL;DR How to make ~90% similarity search Instead of one hash for a 100% match, 1. Use many min hashes (400-500) 2. Group those into a handful of big hashes (10-20) 3. Find an exact matching big hash to get close 4. Count matching small hashes to calculate similarity
English
0
0
3
449
Ross Wolf
Ross Wolf@rw_access·
I'm definitely feeling warm and fuzzy hashes this holiday season. Fast similarity is something that stumped me for a very long time, but MinHash turned out to be an elegant solution! Wrote up how to build it from scratch on the @sublime_sec blog
Sublime Security@sublime_sec

Grouping similar emails creates herd immunity and boosts analyst productivity. We built a low-latency similarity system that groups millions of messages in milliseconds. Technical deep dive: sublime.security/blog/how-to-bu…

English
1
1
7
557
Ross Wolf retweetledi
Sublime Security
Sublime Security@sublime_sec·
We’re excited to announce that Sublime has raised $150M in a Series C led by @Georgian_io, joined by new investors @Avenir_Growth, @01Advisors, @jonoberheide, and @nicoleperlroth, and existing investors @IndexVentures, @IVP, @slow, and @CitiVentures. This year we launched ASA and ADÉ, our AI agents that autonomously triage threats and auto-adapt coverage, freeing security teams from repetitive work and delivering rapid, tailored defenses. We’ve grown our customer base 4x since the beginning of the year while maintaining zero enterprise customer churn since company inception. This funding accelerates our vision to deliver autonomous email security that adapts to each organization's unique needs, stopping sophisticated attacks while eliminating the manual work and vendor bottlenecks of legacy solutions. Thank you to our customers, partners, and investors for being on this journey with us. 🔗 Read more: sublime.security/blog/sublime-r…
English
2
7
33
19.9K
Ross Wolf retweetledi
Sublime Security
Sublime Security@sublime_sec·
Introducing email bomb protection from Sublime: a powerful solution for automatically detecting, remediating, and triaging email bombs. In these attacks, an adversary will send hundreds or thousands of emails at once to flood an inbox and obfuscate the malicious intent. Learn how our solution works and how to use it: sublime.security/blog/email-bom…
Sublime Security tweet media
English
1
3
10
10.7K
Ross Wolf
Ross Wolf@rw_access·
this was a very cool problem to solve with @filar! It's such a natural evolution of the platform, which has been group-centric since day 1. Fellow nerds, look out for an engineering post about how "fuzzy" grouping works and the scaling+realtime challenges we had to overcome
Sublime Security@sublime_sec

Mass volume email attack campaigns are often customized to the recipient to increase legitimacy. We recently improved our campaign grouping algorithm to be better at identifying similar messages in a campaign to cut review time, reduce alerts, and boost herd immunity. Read how it works here: sublime.security/blog/enhanced-…

English
0
3
16
886
Josh Kamdjou
Josh Kamdjou@jkamdjou·
the “email security mona lisa”
English
1
0
6
236
Josh Kamdjou
Josh Kamdjou@jkamdjou·
brb updating my linkedin profile to say “Built technology masterpiece”
Josh Kamdjou tweet media
English
9
3
51
4.3K
Sublime Security
Sublime Security@sublime_sec·
any guesses? wrong answers only ⬇️
English
3
0
3
370
Sublime Security
Sublime Security@sublime_sec·
Our limited drop Sublime DEF CON t-shirt returns this year with a new design we can’t wait to share. Hint: let's just say it's pretty rad 👍 As always, we’ll post our location during the con, so you can swing by to pick one up and say hello to the team.
Sublime Security tweet media
English
6
1
30
3K
Rich Seymour
Rich Seymour@rseymour·
I can't forgive myself for this typographic incident.
Rich Seymour tweet media
English
3
0
1
169
Ross Wolf
Ross Wolf@rw_access·
@jonathanbourke @sublime_sec Happy to help you debug! Do you mind hopping in our community slack so we can take a look? Twitter replies are just so painful for the back and forth, and I find it way more productive
English
2
0
0
28
Jonathan Bourke
Jonathan Bourke@jonathanbourke·
@sublime_sec my server had a power outage, which borked (a technical term) some docker processes. Back up and running, but Sublime is not ingesting email - no new detections, nothing recent when searching. Any pointers?
English
1
0
0
54
Ross Wolf retweetledi
Justin Ibarra
Justin Ibarra@br0k3ns0und·
if a rule is too complex to understand, the alert is even worse
English
1
2
5
733
Justin Ibarra
Justin Ibarra@br0k3ns0und·
For the curious observers, some things that _can_ make a detection rule bad: - non-performant - overscoped - underscoped - too brittle - too comprehensive - too atomic - too complex - non readable Basically need a zen of rule writing, similar to python
Justin Ibarra@br0k3ns0und

@nas_bench There are definitely bad detections rules 😅😥😰

English
3
3
22
30.3K
Gabriel Landau
Gabriel Landau@GabrielLandau·
@andythevariable It’s brand new 😔. The tool cracked while I was pressing the master link on. Now it’s stuck on the chain and I’m not sure how to get it off.
English
2
0
0
160
Ross Wolf
Ross Wolf@rw_access·
@GabrielLandau Could also cheaply hash the first 1K with an 8 byte hash and the full contents as a SHA256 hash. One fast, one slow. Since many binaries are aligned by the KB or half-KB (as @Andrew___Morris can attest), there's not as much entropy in the file size as you'd think.
English
1
0
3
159
Gabriel Landau
Gabriel Landau@GabrielLandau·
If you publish anything that involves a list of hashes, please consider publishing tuples of (hash,size) instead. This enables lookups to skip expensive hashing work if the size does not match anything in the set. 64-bit file sizes can be encoded as 8 bytes concatenated onto the end of hashes, turning a 32-byte SHA256 into a 40-byte tuple. If space is an issue and you control both the hash generation and verification logic, you can alternatively truncate SHA256 to 192 bits to get 32-byte (hash,size) tuples.
English
3
1
12
2K