STOP Collaborate and Listen!
Pancakes CON is on a mission
You gotta go, no exemption
Now, grab a ticket, tightly
View the presentations daily and nightly
Will it ever stop? Yo, I don't know
Turn off the lights, come learn and grow!
@PancakesConpancakescon.com/
Real world table-top exercises: Your founder/CEO has just bet the company on some third-party vaporware tech. How do you integrate this into your security plan while simultaneously dealing with your team heading for the exits?
This should be my first in-person training in over two years. Love hanging out with you all on Zoom, but cannot wait to be in the same room with my students!
Up Next is @hal_pomeranz's Introduction to Linux Forensics. This two-day, hands-on course is a quick start into the world of Linux forensics. Learn memory forensics, critical artifact locations, and how to rapidly process Linux logs. 3/6
WHAT?! 😂
If you provide /FS:FILESYSTEM parameter to the format[.]com utility, the resulting process will try to load ("U"+FILESYSTEM).DLL using the default search path...
The weirdest custom DLL launcher I have meet so far :D
The expertise of 'Elephant Beetle' appears to be in targeting legacy Java applications on Linux systems, which is typically their entry point to corporate networks.
via @BleepinComputerbleepingcomputer.com/news/se…
Make it a New Year's resolution not to burn out your staff. I can provide surge staffing support when your teams are overloaded or just needing some time off. Let's talk about how I can help your org!
If you want to understand LAPD, I recommend this stunning report by local people affected by LAPD violence. It is one of the great contemporary community-based histories and analyses of police violence and who benefits from it. @stoplapdspyingautomatingbanishment.org/sec…
4688 may look normal exec but if you look for event details where TargetUserSid is S-1-0-0 (everyone) and TargetUserName not null then you can hunt for processes started via seclogon (i.e. runas.exe /user:user) no correlation or extra enrich needed
gist.github.com/Samirbous/ec… (KQL)
If you're in a SOC and seeing Emotet, Qakbot or Dridex maldocs - take a look at recent #CyberChef recipes from @cluster25_io, @guelfoweb, and @Kostastsale. You'll be able to extract key IOCs to pivot and look for more badness in your network. Thanks to all who share their work!
I managed multiple engineering teams before quitting big tech.
Now that I quit, I can speak freely.
Here are 12 things your manager may not be telling you, but I know for a fact will help you. 👇