Jack

1.1K posts

Jack banner
Jack

Jack

@malwareforme

Security researcher

เข้าร่วม Mart 2015
926 กำลังติดตาม6.3K ผู้ติดตาม
ทวีตที่ปักหมุด
Jack
Jack@malwareforme·
Getting away from Twitter. You can find me on BlueSky while I rebuild followers and figure it out: malwareforme.bsky.social
English
0
0
1
216
Jack รีทวีตแล้ว
@·
We are looking for some interns to join our team here at Microsoft. If you are currently studying cyber security, computer science, mathematics or anything similar and based in Ireland or Cheltenham then we would love to hear from you - aka.ms/ghostjobs
English
2
40
58
10.1K
Jack รีทวีตแล้ว
@·
People often share full Kusto queries, which is awesome, but what about those handy one liners and tips you have picked up along the way? Here are some of my favourites, share yours below! Extend an additional column for your local time, example +5 UTC: | extend LocalTime = TimeGenerated +5h Find events only on weekends, cast a variable to make it easy to read: let Saturday = time(6.00:00:00); let Sunday = time(0.00:00:00); AuditLogs | where dayofweek(TimeGenerated) in (Saturday, Sunday) Find events during certain hours of the day: | where hourofday(TimeGenerated) !between (4 .. 23) Calculate the minutes (or hours or days etc) between two events: | extend ['Minutes Between Events']=datetime_diff("minute",Timestamp1,Timestamp2) Parse the details, including browser family and version etc of a user agent: | extend UserAgentDetail = todynamic(parse_user_agent(UserAgent, "browser")) Decode base64 encoded strings, useful for PowerShell: | extend DecodedCommand = base64_decode_tostring(EncodedCommand) Rename columns while using project: | project LogTime=TimeGenerated, SigninLocation=Location, IP=IPAddress, Agent=UserAgent
English
6
38
214
13.8K
Jack รีทวีตแล้ว
@·
If you're a guy in your early 20s, learn regex. Go into debt if you have to
English
26
18
313
24.1K
SwiftOnSecurity
SwiftOnSecurity@SwiftOnSecurity·
Pretend I'm an idiot, what is the best read on the background and motivation of China being a fucking expansionist dick to all its neighbors
English
67
17
463
77.9K
Jack รีทวีตแล้ว
Josh Kamdjou
Josh Kamdjou@jkamdjou·
excited to announce @sublime_sec has raised a $60M Series B led by @IVP @CNBC wrote about the news this morning: cnbc.com/2024/12/12/ema… @ianthiel and I are so grateful and humbled by the trust our customers and community have placed in us. we won't let you down
Josh Kamdjou tweet media
English
18
17
115
58.3K
Jack รีทวีตแล้ว
William Metcalf
William Metcalf@node5·
Enjoy punching phish? Experience writing detections for phish, using regex, Yara, etc., and looking to grow as a researcher within an experienced team? Join me and the rest of the Splunk Attack Analyzer Misfits of Detection Science. US only, fully remote splunk.com/en_us/careers/…
English
0
6
4
1.6K
Jack
Jack@malwareforme·
RT @Raqqa_SL: The great Syrian people overthrew the Assad regime. Syria is Free We are free
Jack tweet media
English
0
7
0
0
Jack รีทวีตแล้ว
Threat Insight
Threat Insight@threatinsight·
Proofpoint has tracked this technique since August 2024, and call it “brooxml”. Our researchers do not consider this a zero-day or vulnerability in general. We’ve released Emerging Threats and YARA signatures at the end of this thread.
ANY.RUN@anyrun_app

🚨ALERT: Potential ZERO-DAY, Attackers Use Corrupted Files to Evade Detection 🧵 (1/3) ⚠️ The ongoing attack evades #antivirus software, prevents uploads to sandboxes, and bypasses Outlook's spam filters, allowing the malicious emails to reach your inbox The #ANYRUN team discovered that as part of this #zeroday attack, threat actors attempt to conceal the file type by deliberately corrupting it, making it difficult for certain security tools to detect 📌 Our sandbox solves this problem thanks to interactivity. It launches these broken files in their corresponding programs, which allows it to identify #malicious behavior See example: app.any.run/tasks/6839e806… 🚫 Although these files operate successfully within the OS, they remain undetected by most security solutions due to the failure to apply proper procedures for their file types They were uploaded to VirusTotal, but all antivirus solutions returned "clean" or “Item Not Found” as they couldn't analyze the file properly

English
4
65
179
39.5K
Jack
Jack@malwareforme·
The absolute worst take ever. Just don’t end up in PCRE jail and it’s fine. Regex 4ever
English
0
0
3
266
Jack รีทวีตแล้ว
@·
Microsoft’s Digital Crimes Unit has seized 240 fraudulent websites, disrupting a major “Phishing-as-a-Service” operation. These campaigns targeted sensitive industries like financial services, jeopardizing data, transactions, and even life savings. aka.ms/DCU-disruption…
English
0
5
7
2.6K
Jack รีทวีตแล้ว
@·
I'm told we are hiring in MSTIC: aka.ms/msticjobs Come for the data, stay for the data. Creative problem solvers have the most impact. If we've worked together, I'm happy to refer you. But...
@

i’m legit amped about aligning with all of the “tip of the spear” teams under the CISO this part of the public “secure futures” update is a pretty nice acknowledgment of threat intel impact let’s go! come join us: aka.ms/msticjobs 🕵️ aka.ms/ghostjobs 👻

English
2
16
49
29.4K
Jack รีทวีตแล้ว
Josh Kamdjou
Josh Kamdjou@jkamdjou·
you can deploy verifiable coverage for this with @sublime_sec (for free), here’s the detection that’s been out for over a year (h/t @zoomequipd @ajpc500): sublime.security/feeds/core/det…
CISA Cyber@CISACyber

🚨We’re seeing reports of a large-scale #spearphishing campaign targeting multiple sectors, including government and IT. A foreign threat actor is sending phishing emails with malicious RDP files to gain network access. Take proactive measures. More info: bit.ly/4fp9aQB

English
0
8
17
2.1K
Jack รีทวีตแล้ว
@·
Announcing our latest NLU model update: BERT Large Language Model (LLM), which is better at understanding tone, intent, and context than ever before. We’ve detailed our research in our latest blog and how it’s used to combat AI-generated attacks: sublime.security/blog/combating…
 tweet media
English
0
8
18
4K
Jack รีทวีตแล้ว
@·
We are now developing @elastic threat hunting queries, alongside our detection rules, and openly sharing these as well! 🎉🎉 Can visually explore these with rulexplorer.io! 🔥🔥 #ThreatHunting #DetectionEngineering
 tweet media tweet media tweet media
English
5
85
347
37.9K
Jack รีทวีตแล้ว
@·
We're excited to announce the release of our new Public EML Analyzer: a free, unauthenticated tool for analyzing email messages. Upload any EML and get Sublime's analysis results along with URL sandbox and attachment previews, insights, and more: analyzer.sublime.security
GIF
English
2
42
149
34.8K
Jack รีทวีตแล้ว
@·
Microsoft has been running massive deception campaigns that flood new phishing sites with bogus credentials for bogus companies on MS tenants. When attackers log in, they deliver a torrent of fresh threat intelligence that can be used to defend: #infosec youtube.com/watch?v=78qnM_…
YouTube video
YouTube
English
5
175
665
60.2K