All things Cyber Security Ops, Threat Hunting, Threat Intel and Incident Mgmt.
- Global Head of Threat Analysis at Darktrace:
Cyber Security, AI in Cyber Security, Threat Landscape
- Ex-NCSC & UK Government:
Current affairs, Geopolitics & Nat. Security
- Other things:
Diversity and Inclusivity, Compassionate Leadership, Social Mobility, Mentoring & Coaching
.... 1/2
.... 1/2
Surely a singular Team feels more homely... maybe. Conversely, a singular "Word", feels like about as much effort as I put in my school coursework.
Surely a singular Team feels more homely... maybe. Conversely, a singular "Word", feels like about as much effort as I put in my school coursework.
🤷♂️
🤷♂️
(although, I'd argue everything malicious was indeed suspicious at one point)
(although, I'd argue everything malicious was indeed suspicious at one point)
The use of phishing kits as part of an AitM attack, increasing an attackers ability and proficiency in stealing legitimate credentials.
... and then simply just logging on.
The use of phishing kits as part of an AitM attack, increasing an attackers ability and proficiency in stealing legitimate credentials.
... and then simply just logging on.
There is no application of cyber attack, where the intended outcome can't be achieved by non-cyber means.
There is no application of cyber attack, where the intended outcome can't be achieved by non-cyber means.
I've got a few ideas lined up already, but what would you like to see me write about?
I've got a few ideas lined up already, but what would you like to see me write about?
(H/T to @GossiTheDog.cyberplace.social.ap.brid.gy for first spotting this)
Having a search for some of the IOCs from the BeyondTrust blog, reveals that they appear in a file uploaded to VirusTotal on the 19th December
(H/T to @GossiTheDog.cyberplace.social.ap.brid.gy for first spotting this)
Having a search for some of the IOCs from the BeyondTrust blog, reveals that they appear in a file uploaded to VirusTotal on the 19th December
BeyondTrust specialise in Privileged Access Management.
In other words, they have the power to access or generate one-time-use Admin credentials for their customer networks.
BeyondTrust specialise in Privileged Access Management.
In other words, they have the power to access or generate one-time-use Admin credentials for their customer networks.
Detecting the exploitation of internet-facing File Transfer Servers, exploiting CVE-2024-50623
Detecting the exploitation of internet-facing File Transfer Servers, exploiting CVE-2024-50623
- a review of recent exploit campaigns against Palo Alto firewalls which are then used as a launch point into customer networks.
- a review of recent exploit campaigns against Palo Alto firewalls which are then used as a launch point into customer networks.
… be constantly picking up dropped pine needles off the floor
… be constantly picking up dropped pine needles off the floor
With attribution, it’s worth considering we’re talking about threats from multiple groups originating, or in support of, Russia’s objectives.
With attribution, it’s worth considering we’re talking about threats from multiple groups originating, or in support of, Russia’s objectives.
FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
3. Anna One
2. Anna Two
1. Anna One Two Three Four
3. Anna One
2. Anna Two
1. Anna One Two Three Four