RT != Endorsement
@faisalusuf@infosec.exchange
@faisalusuf
lists.apache.org/thread/c2v7m...
lists.apache.org/thread/c2v7m...
While the project has applications in software development, it can also used for raising alarms when a threat actor modifies existing infrastructure.
azure.microsoft.com/en-us/blog/d...
While the project has applications in software development, it can also used for raising alarms when a threat actor modifies existing infrastructure.
azure.microsoft.com/en-us/blog/d...
Rules:
1- rules-threat-hunting/cloud/okta/okta_password_health_report_query.yml 2- rules-emerging-threats/2023/TA/Okta-Support-System-Breach/okta_apt_suspicious_user_creation.yml
Rules:
1- rules-threat-hunting/cloud/okta/okta_password_health_report_query.yml 2- rules-emerging-threats/2023/TA/Okta-Support-System-Breach/okta_apt_suspicious_user_creation.yml
@Mitiga_io report.
https://www.bleepingcomputer.com/news/security/amazons-aws-ssm-agent-can-be-used-as-post-exploitation-rat-malware/
@Mitiga_io report.
https://www.bleepingcomputer.com/news/security/amazons-aws-ssm-agent-can-be-used-as-post-exploitation-rat-malware/
How it works behind the scene: https://www.tines.com/blog/phishly-democratizing-suspicious-email-analysis-tines-urlscan
How it works behind the scene: https://www.tines.com/blog/phishly-democratizing-suspicious-email-analysis-tines-urlscan