𝗪𝗵𝗮𝘁’𝘀 𝗰𝗼𝗺𝗶𝗻𝗴 𝗻𝗲𝘅𝘁:
𝗪𝗵𝗮𝘁’𝘀 𝗰𝗼𝗺𝗶𝗻𝗴 𝗻𝗲𝘅𝘁:
They’re related, but they solve completely different problems. Telemetry 𝗶𝘀 𝗼𝗻𝗲 𝗽𝗶𝗲𝗰𝗲 𝗼𝗳 𝘁𝗵𝗲 𝗽𝘂𝘇𝘇𝗹𝗲. The comparison service 𝗹𝗼𝗼𝗸𝘀 𝗮𝘁 𝘁𝗵𝗲 𝗲𝗻𝘁𝗶𝗿𝗲 𝘀𝗼𝗹𝘂𝘁𝗶𝗼𝗻.
They’re related, but they solve completely different problems. Telemetry 𝗶𝘀 𝗼𝗻𝗲 𝗽𝗶𝗲𝗰𝗲 𝗼𝗳 𝘁𝗵𝗲 𝗽𝘂𝘇𝘇𝗹𝗲. The comparison service 𝗹𝗼𝗼𝗸𝘀 𝗮𝘁 𝘁𝗵𝗲 𝗲𝗻𝘁𝗶𝗿𝗲 𝘀𝗼𝗹𝘂𝘁𝗶𝗼𝗻.
www.bleepingcomputer.com/news/securit...
www.bleepingcomputer.com/news/securit...
On that note...there are many fake POCs circulating. Be careful what you run. A POC is not available yet.
On that note...there are many fake POCs circulating. Be careful what you run. A POC is not available yet.
The platform now supports official pySigma validation fully in-browser, compiled to WebAssembly. Same validation as sigma-cli. Thanks to @sifex from detection.studio for the inspiration behind the implementation.
Here’s what we added:👇
The platform now supports official pySigma validation fully in-browser, compiled to WebAssembly. Same validation as sigma-cli. Thanks to @sifex from detection.studio for the inspiration behind the implementation.
Here’s what we added:👇
I put together a full deep dive walking through our process, the tooling we use, and how we score everything based on direct telemetry.
I put together a full deep dive walking through our process, the tooling we use, and how we score everything based on direct telemetry.
Check it out and let me know what you think - www.edr-telemetry.com
Check it out and let me know what you think - www.edr-telemetry.com
I'm rt is way more useful for investigations. Drop in a bot token from malware and see threat actor comms directly from a clean web interface.
Demo video attached. Let me know your thoughts!
I'm rt is way more useful for investigations. Drop in a bot token from malware and see threat actor comms directly from a clean web interface.
Demo video attached. Let me know your thoughts!
Big update for anyone working on network detections.
𝗜𝗻𝗰𝗹𝘂𝗱𝗲𝗱:
• 45k+ ET rules available out of the box
• Full ET Open ruleset preloaded
• Build and validate custom Suricata rules
Big update for anyone working on network detections.
𝗜𝗻𝗰𝗹𝘂𝗱𝗲𝗱:
• 45k+ ET rules available out of the box
• Full ET Open ruleset preloaded
• Build and validate custom Suricata rules
Full writeup ➡️ blog.cloudflare.com/18-november-...
Full writeup ➡️ blog.cloudflare.com/18-november-...
If you’ve been following the EDR Telemetry Project, this is the next step:
A full breakdown of how each EDR actually implements its features.
🔥 𝗟𝗶𝗳𝗲𝘁𝗶𝗺𝗲 𝗮𝗰𝗰𝗲𝘀𝘀 𝗮𝘃𝗮𝗶𝗹𝗮𝗯𝗹𝗲 𝗳𝗼𝗿 𝗲𝗮𝗿𝗹𝘆 𝗮𝗱𝗼𝗽𝘁𝗲𝗿𝘀 (𝗹𝗶𝗺𝗶𝘁𝗲𝗱 𝘁𝗶𝗺𝗲).
Intro blog: edr-comparison.com/blog/navigat...
If you’ve been following the EDR Telemetry Project, this is the next step:
A full breakdown of how each EDR actually implements its features.
🔥 𝗟𝗶𝗳𝗲𝘁𝗶𝗺𝗲 𝗮𝗰𝗰𝗲𝘀𝘀 𝗮𝘃𝗮𝗶𝗹𝗮𝗯𝗹𝗲 𝗳𝗼𝗿 𝗲𝗮𝗿𝗹𝘆 𝗮𝗱𝗼𝗽𝘁𝗲𝗿𝘀 (𝗹𝗶𝗺𝗶𝘁𝗲𝗱 𝘁𝗶𝗺𝗲).
Intro blog: edr-comparison.com/blog/navigat...
- Blog Titles
- Script names/variables/functions etc.
- DB table names/columns
It was draining me, I can't go back... 😂
- Blog Titles
- Script names/variables/functions etc.
- DB table names/columns
It was draining me, I can't go back... 😂
We’ve set up two channels for general discussions and challenge creation.
Join here: discord.gg/KfdbeQpp
We’ve set up two channels for general discussions and challenge creation.
Join here: discord.gg/KfdbeQpp
You’ll be able to:
➡️ View and edit all emerging rules
➡️ Test your detections instantly against your PCAPs (everything client-side)
➡️ Create your detections and share them with everyone (AI optional😉)
🔜🔜🔜
You’ll be able to:
➡️ View and edit all emerging rules
➡️ Test your detections instantly against your PCAPs (everything client-side)
➡️ Create your detections and share them with everyone (AI optional😉)
🔜🔜🔜
TAs doing a 180, selling AV to get their commission LOL
TAs doing a 180, selling AV to get their commission LOL
90% Flex
10% Value
🔗: www.anthropic.com/news/disrupt...
90% Flex
10% Value
🔗: www.anthropic.com/news/disrupt...
“unauthorized third party gaining access to and taking certain user contact information…but may have included first and last name, phone number, email address and physical address”
Next paragraph:
“No sensitive information was accessed”
🤦♂️
“unauthorized third party gaining access to and taking certain user contact information…but may have included first and last name, phone number, email address and physical address”
Next paragraph:
“No sensitive information was accessed”
🤦♂️
Time to put it to use 😆 Big things coming next year… watch this space!
Time to put it to use 😆 Big things coming next year… watch this space!
More challenges next week and with a FREE training module coming up!!
Appreciate the support!!🙏
🔗detectionstream.com/sigma/training/gamified
More challenges next week and with a FREE training module coming up!!
Appreciate the support!!🙏
🔗detectionstream.com/sigma/training/gamified
Imagine if you tweak the txt prompts to say “Create a 10,000-word report on...”, that'd be funny 😂💸💸
cloud.google.com/blog/topics/...
#ImposeCost😂
Imagine if you tweak the txt prompts to say “Create a 10,000-word report on...”, that'd be funny 😂💸💸
cloud.google.com/blog/topics/...
#ImposeCost😂