Check it out and let me know what you think - www.edr-telemetry.com
Check it out and let me know what you think - www.edr-telemetry.com
I'm rt is way more useful for investigations. Drop in a bot token from malware and see threat actor comms directly from a clean web interface.
Demo video attached. Let me know your thoughts!
I'm rt is way more useful for investigations. Drop in a bot token from malware and see threat actor comms directly from a clean web interface.
Demo video attached. Let me know your thoughts!
Big update for anyone working on network detections.
𝗜𝗻𝗰𝗹𝘂𝗱𝗲𝗱:
• 45k+ ET rules available out of the box
• Full ET Open ruleset preloaded
• Build and validate custom Suricata rules
Big update for anyone working on network detections.
𝗜𝗻𝗰𝗹𝘂𝗱𝗲𝗱:
• 45k+ ET rules available out of the box
• Full ET Open ruleset preloaded
• Build and validate custom Suricata rules
Full writeup ➡️ blog.cloudflare.com/18-november-...
Full writeup ➡️ blog.cloudflare.com/18-november-...
If you’ve been following the EDR Telemetry Project, this is the next step:
A full breakdown of how each EDR actually implements its features.
🔥 𝗟𝗶𝗳𝗲𝘁𝗶𝗺𝗲 𝗮𝗰𝗰𝗲𝘀𝘀 𝗮𝘃𝗮𝗶𝗹𝗮𝗯𝗹𝗲 𝗳𝗼𝗿 𝗲𝗮𝗿𝗹𝘆 𝗮𝗱𝗼𝗽𝘁𝗲𝗿𝘀 (𝗹𝗶𝗺𝗶𝘁𝗲𝗱 𝘁𝗶𝗺𝗲).
Intro blog: edr-comparison.com/blog/navigat...
If you’ve been following the EDR Telemetry Project, this is the next step:
A full breakdown of how each EDR actually implements its features.
🔥 𝗟𝗶𝗳𝗲𝘁𝗶𝗺𝗲 𝗮𝗰𝗰𝗲𝘀𝘀 𝗮𝘃𝗮𝗶𝗹𝗮𝗯𝗹𝗲 𝗳𝗼𝗿 𝗲𝗮𝗿𝗹𝘆 𝗮𝗱𝗼𝗽𝘁𝗲𝗿𝘀 (𝗹𝗶𝗺𝗶𝘁𝗲𝗱 𝘁𝗶𝗺𝗲).
Intro blog: edr-comparison.com/blog/navigat...
- Blog Titles
- Script names/variables/functions etc.
- DB table names/columns
It was draining me, I can't go back... 😂
- Blog Titles
- Script names/variables/functions etc.
- DB table names/columns
It was draining me, I can't go back... 😂
We’ve set up two channels for general discussions and challenge creation.
Join here: discord.gg/KfdbeQpp
We’ve set up two channels for general discussions and challenge creation.
Join here: discord.gg/KfdbeQpp
You’ll be able to:
➡️ View and edit all emerging rules
➡️ Test your detections instantly against your PCAPs (everything client-side)
➡️ Create your detections and share them with everyone (AI optional😉)
🔜🔜🔜
You’ll be able to:
➡️ View and edit all emerging rules
➡️ Test your detections instantly against your PCAPs (everything client-side)
➡️ Create your detections and share them with everyone (AI optional😉)
🔜🔜🔜
TAs doing a 180, selling AV to get their commission LOL
TAs doing a 180, selling AV to get their commission LOL
90% Flex
10% Value
🔗: www.anthropic.com/news/disrupt...
90% Flex
10% Value
🔗: www.anthropic.com/news/disrupt...
“unauthorized third party gaining access to and taking certain user contact information…but may have included first and last name, phone number, email address and physical address”
Next paragraph:
“No sensitive information was accessed”
🤦♂️
“unauthorized third party gaining access to and taking certain user contact information…but may have included first and last name, phone number, email address and physical address”
Next paragraph:
“No sensitive information was accessed”
🤦♂️
Time to put it to use 😆 Big things coming next year… watch this space!
Time to put it to use 😆 Big things coming next year… watch this space!
More challenges next week and with a FREE training module coming up!!
Appreciate the support!!🙏
🔗detectionstream.com/sigma/training/gamified
More challenges next week and with a FREE training module coming up!!
Appreciate the support!!🙏
🔗detectionstream.com/sigma/training/gamified
Imagine if you tweak the txt prompts to say “Create a 10,000-word report on...”, that'd be funny 😂💸💸
cloud.google.com/blog/topics/...
#ImposeCost😂
Imagine if you tweak the txt prompts to say “Create a 10,000-word report on...”, that'd be funny 😂💸💸
cloud.google.com/blog/topics/...
#ImposeCost😂
CrowdStrike now covers service + driver + user events, a big win for investigators tracking system-level activity.
In our testing, we only use system-level operations and ignore indirect events.
Details edr-telemetry.com/linux
CrowdStrike now covers service + driver + user events, a big win for investigators tracking system-level activity.
In our testing, we only use system-level operations and ignore indirect events.
Details edr-telemetry.com/linux
So I built something: the Sigma Training Platform. It’s basically what I wish existed when I was learning this stuff….👇
So I built something: the Sigma Training Platform. It’s basically what I wish existed when I was learning this stuff….👇
The 𝗦𝗶𝗴𝗺𝗮 𝗧𝗿𝗮𝗶𝗻𝗶𝗻𝗴 𝗣𝗹𝗮𝘁𝗳𝗼𝗿𝗺 is almost ready. I’m planning to launch it next week with 𝟭𝟬+ 𝗰𝗵𝗮𝗹𝗹𝗲𝗻𝗴𝗲𝘀 you can dive into right away.
Each challenge is designed to help you:
➡️ Practice Sigma rule creation
➡️ Understand detection logic fundamentals...👇
The 𝗦𝗶𝗴𝗺𝗮 𝗧𝗿𝗮𝗶𝗻𝗶𝗻𝗴 𝗣𝗹𝗮𝘁𝗳𝗼𝗿𝗺 is almost ready. I’m planning to launch it next week with 𝟭𝟬+ 𝗰𝗵𝗮𝗹𝗹𝗲𝗻𝗴𝗲𝘀 you can dive into right away.
Each challenge is designed to help you:
➡️ Practice Sigma rule creation
➡️ Understand detection logic fundamentals...👇
I’ve just rolled out authentication, unlocking new personalization features while keeping the core experience open to everyone.
• 𝗦𝗶𝗴𝗻-𝗶𝗻 𝗼𝗽𝘁𝗶𝗼𝗻𝗮𝗹: You can still explore, test, and learn without an account.
• 𝗦𝗶𝗴𝗻-𝗶𝗻 𝗲𝗻𝗵𝗮𝗻𝗰𝗲𝗱: If you do log in, you can now sa...
I’ve just rolled out authentication, unlocking new personalization features while keeping the core experience open to everyone.
• 𝗦𝗶𝗴𝗻-𝗶𝗻 𝗼𝗽𝘁𝗶𝗼𝗻𝗮𝗹: You can still explore, test, and learn without an account.
• 𝗦𝗶𝗴𝗻-𝗶𝗻 𝗲𝗻𝗵𝗮𝗻𝗰𝗲𝗱: If you do log in, you can now sa...
So I decided to use OpenEDR as a case study to highlight a broader issue: 𝗹𝗲𝗴𝗶𝘁𝗶𝗺𝗮𝘁𝗲 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝘁𝗼𝗼𝗹𝘀 𝗯𝗲𝗶𝗻𝗴 𝘄𝗲𝗮𝗽𝗼𝗻𝗶𝘇𝗲𝗱 𝗯𝘆 𝘁𝗵𝗿𝗲𝗮𝘁 𝗮𝗰𝘁𝗼𝗿𝘀.
So I decided to use OpenEDR as a case study to highlight a broader issue: 𝗹𝗲𝗴𝗶𝘁𝗶𝗺𝗮𝘁𝗲 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝘁𝗼𝗼𝗹𝘀 𝗯𝗲𝗶𝗻𝗴 𝘄𝗲𝗮𝗽𝗼𝗻𝗶𝘇𝗲𝗱 𝗯𝘆 𝘁𝗵𝗿𝗲𝗮𝘁 𝗮𝗰𝘁𝗼𝗿𝘀.
The recent NetExec update (codename SmoothOperator) pushed me to share this one 👇
🔗 www.netexec.wiki/news/v1.4.0-...
𝗙𝗶𝗿𝘀𝘁 𝗲𝘃𝗲𝗻𝘁 (𝟰𝟲𝟳𝟮)
Special privileges assigned to new logon:
The recent NetExec update (codename SmoothOperator) pushed me to share this one 👇
🔗 www.netexec.wiki/news/v1.4.0-...
𝗙𝗶𝗿𝘀𝘁 𝗲𝘃𝗲𝗻𝘁 (𝟰𝟲𝟳𝟮)
Special privileges assigned to new logon:
1/
1/