Craig Chamberlain

16.3K posts

Craig Chamberlain banner
Craig Chamberlain

Craig Chamberlain

@randomuserid

Former Elastic, QRadar. I do detection. I'll find you, it's what I do. It's all I do. Tweets my own @[email protected] | @randomuserid.bsky.social

Boston, MA Entrou em Ocak 2011
1.6K Seguindo2.4K Seguidores
Tweet fixado
Craig Chamberlain
Craig Chamberlain@randomuserid·
Looking forward to presenting again at #BSidesSF on April 22, this time it's "Hunting Cloud Supply Chain Threats Using Anomaly Detection." sched.co/1HzuT
Craig Chamberlain tweet media
English
0
0
7
1K
Craig Chamberlain
Craig Chamberlain@randomuserid·
@MalwareJake I have a feeling you’re right about their capabilities having been degraded and if so that is good news and I will take it. I’m not super concerned about external DDoS attacks in general, I think crews persisting inside networks would be my main problem. If they still have some.
English
0
1
3
1.8K
Jake Williams
Jake Williams@MalwareJake·
Hi, former NSA hacker here 👋: You'll notice they're targeting civilian infrastructure, not government networks with intelligence collection value. That's because once you deliver an effect (CYBERCOM speak for "cyber attack") in a network, you lose the ability to collect intelligence from that target. 1/4
Emanuel (Mannie) Fabian@manniefabian

Amid the Israeli and US strikes on Iran, a wave of cyberattacks have also targeted the country, the semi-official Fars news agency reports. Fars says that several major Iranian news agencies were targeted and "experienced severe disruptions in their operations," and that some widely used mobile applications were also experiencing disruptions.

English
54
625
7.5K
2.6M
Craig Chamberlain
Craig Chamberlain@randomuserid·
@stephanpastis I give my name as Rock (my name apparently means a rocky outcropping in old English) I gave up a long time ago trying to make my first or last name spelled or pronounced
English
0
0
0
23
Stephan Pastis
Stephan Pastis@stephanpastis·
I always give my name as Steve when ordering coffee because Stephan is too hard to spell. Today this happened:
Stephan Pastis tweet media
English
410
940
32K
356.9K
Craig Chamberlain
Craig Chamberlain@randomuserid·
@cyb3rops What data types are available for writing detection on? Network data I suppose but is there any host data that can be instrumented and used?
English
0
0
0
75
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
VMware reports active exploitation of new ESXi zero-days - but only gives us a patch matrix 🙄 - How is it so hard to understand that if a zero-day is actively exploited, we need indicators and forensic guidance to hunt? - Otherwise, we’re just blindly patching already compromised systems 🤦‍♂️ support.broadcom.com/web/ecx/suppor…
Florian Roth ⚡️ tweet media
English
14
114
501
46.1K
Craig Chamberlain
Craig Chamberlain@randomuserid·
@HackingDave @amrittsering If you bought one of those, made to look like a clown, and brought it home, it might eventually cure your clown phobia. Might take a few months
English
1
0
1
94
Dave Kennedy
Dave Kennedy@HackingDave·
@amrittsering This is very true. I would be signing up for the first mission to Mars.
English
2
0
3
301
gabsmashh
gabsmashh@gabsmashh·
gotta give a presentation next week on SIEM & critical infrastructure security and my meme stores are low. please offer up any funny ones you have available. thx.
English
66
36
702
116.8K
啤酒大亨
啤酒大亨@BBarronn·
@dtoxmilenko @evilsocket 😂😂 A damp squib after all. Who is printing from Linux anyway ? I’d like to read that write up on how they got a printer to work in Linux
English
1
0
2
624
Craig Chamberlain
Craig Chamberlain@randomuserid·
@csoandy @securityweekly Firewall bypass..their firewall change was rejected and they realized they could get a network cabling change approved / done
English
0
0
0
35
Andy Ellis
Andy Ellis@csoandy·
@securityweekly Guess: they’re patching two switches together. No, there’s no good reason to do it this way.
English
1
0
2
1.1K
Science girl
Science girl@sciencegirl·
Alpaca without its wool
English
4.9K
32.4K
301.3K
39.8M
Craig Chamberlain
Craig Chamberlain@randomuserid·
@HackingDave Maybe they have you on some kind of VIP list of persons needing special or extraordinary fraud protection. Can you make contact with their security team or CSO
English
0
0
1
54
Dave Kennedy
Dave Kennedy@HackingDave·
ATT drama update, they gave me a number to fraud department. Was the wrong number and can't speak to a live person, it's just to submit if you've had fraud. Called back number for customer service, 35 min hold time, finally research someone live and all of their systems are down. Out of this world..
English
24
2
61
22.2K
Suno
Suno@suno·
we’re planning out our new office - what should we do with this nook?
Suno tweet media
English
1.7K
42
3.4K
1.6M
Craig Chamberlain
Craig Chamberlain@randomuserid·
@HackingDave @Combobulate Maybe someone just wanted to start a program to study the topic and writing something as interesting as this sounds was the way to get it funded and / or construct the apparatus to look inside the SAPs and see what’s there. Maybe someone just wanted to go look because they could
English
0
0
0
59
Craig Chamberlain
Craig Chamberlain@randomuserid·
@HackingDave @Combobulate IDK is this real? If it were real, why would they declassify something that acknowledges unacknowledged programs so secret, and so sensitive, involving something so advanced that they worry about "irreversible damage" to natsec if it leaked..
English
1
0
0
59
Dave Kennedy
Dave Kennedy@HackingDave·
The release of the classified (now unclassified) documents of the Kona Blue program is further smoke of what is most probably an extremely large fire in the UFO/UAP discussion. AARO published the documents of the Kona Blue program which shows the request for direct funding of advanced and unknown technologies, retrieval programs, medical examinations and more. The program was designed to reverse engineer alien technology from crashed retrieval programs. Does this confirm existence of aliens? No. The government is claiming the program was scrapped because it never found any evidence of aliens. The lingering question is why would such a large program (15, 25, and 50 mil) be necessary if nothing existed? Also it notes funding for examination of already retrieved advanced crafts and organizing efforts to those that have already studied them. This stuff is wild. aaro.mil/Portals/136/PD…
English
24
11
130
44.3K
Simo
Simo@SimoKohonen·
@jfslowik Henceforth known as the rhombus model
English
1
1
4
546
Joe Słowik 🌻
Joe Słowik 🌻@jfslowik·
This is from a posting for a cyber threat intel analyst position topping out at $150k. Whoever put this together is some other kind of disturbed
Joe Słowik 🌻 tweet media
English
30
3
96
39.3K
Craig Chamberlain
Craig Chamberlain@randomuserid·
@jermops @QuinnyPig Oh I see it’s load balanced somehow and fault tolerant. For a financial transaction system zero downtime I can see how that could make sense. Maybe for some web property backends
English
0
0
0
18
jermops, before he was cool
@randomuserid @QuinnyPig Not defending the pricing, but there is non-trivial complexity, and value, in maintaining a set of fault tolerant NAT boxes, right-sizing them, upgrading them, failing between them for such events, seamlessly, using the same IP, and never going down. Highway robber pricing, tho
English
1
0
0
37