The inaugural agenda features 15 talks detailing operational updates on the threat landscape, matters of attribution, and unique explorations of unconventional manifestations of state presence.
Get registered quick!!!
stateofstatecraft.com/agenda
The inaugural agenda features 15 talks detailing operational updates on the threat landscape, matters of attribution, and unique explorations of unconventional manifestations of state presence.
Get registered quick!!!
stateofstatecraft.com/agenda
🏗️ Build or increase your cloud incident response skills with realistic labs and scenarios.
Register for Cloud Labs: cloudlabs.invictus-ir.com
🏗️ Build or increase your cloud incident response skills with realistic labs and scenarios.
Register for Cloud Labs: cloudlabs.invictus-ir.com
𝘜𝘱𝘥𝘢𝘵𝘦-𝘔𝘰𝘥𝘶𝘭𝘦 -𝘕𝘢𝘮𝘦 𝘔𝘪𝘤𝘳𝘰𝘴𝘰𝘧𝘵-𝘌𝘹𝘵𝘳𝘢𝘤𝘵𝘰𝘳-𝘚𝘶𝘪𝘵𝘦
Learn more about the new features in the blog and thanks everyone that contributed!
invictus-ir.com/news/black-h...
#stayInvictus #CloudIncidentResponse #DFIR
𝘜𝘱𝘥𝘢𝘵𝘦-𝘔𝘰𝘥𝘶𝘭𝘦 -𝘕𝘢𝘮𝘦 𝘔𝘪𝘤𝘳𝘰𝘴𝘰𝘧𝘵-𝘌𝘹𝘵𝘳𝘢𝘤𝘵𝘰𝘳-𝘚𝘶𝘪𝘵𝘦
Learn more about the new features in the blog and thanks everyone that contributed!
invictus-ir.com/news/black-h...
#stayInvictus #CloudIncidentResponse #DFIR
Citizen Lab worked closely with one of the targets and shared their work on it also: citizenlab.ca/2025/06/russ...
Citizen Lab worked closely with one of the targets and shared their work on it also: citizenlab.ca/2025/06/russ...
Hash:
87144d0aa002a87376b673f7d0c0eb88
C2:
Telegram Bot used for error messages and auto-start messaging to the operator
computerlearning.ddns./net
Pivots:
bookstoragestore./com
lastfilterfile/.info
78.159.117./177
78.159.117./175
185.132.176./241
154.44.186./106
Hash:
87144d0aa002a87376b673f7d0c0eb88
C2:
Telegram Bot used for error messages and auto-start messaging to the operator
computerlearning.ddns./net
Pivots:
bookstoragestore./com
lastfilterfile/.info
78.159.117./177
78.159.117./175
185.132.176./241
154.44.186./106
www.aivd.nl/documenten/p...
Microsoft calls it Void Blizzard. Their report is here: www.microsoft.com/en-us/securi...
www.aivd.nl/documenten/p...
Microsoft calls it Void Blizzard. Their report is here: www.microsoft.com/en-us/securi...
That APT turned out to be Silk Typhoon, which accessed Commvault's Azure cloud system back in February
Practical takeaways include:
✔️ Mapped TTPs
✔️ IR checklist
✔️ Actor context & relevancy
invictus-ir.com/news/profili...
#CTI #CloudSecurity #AWS #DFIR #JavaGhost
Practical takeaways include:
✔️ Mapped TTPs
✔️ IR checklist
✔️ Actor context & relevancy
invictus-ir.com/news/profili...
#CTI #CloudSecurity #AWS #DFIR #JavaGhost
🔗 securitylabs.datadoghq.com/articles/tal...
#CloudSecurity #ThreatIntel #CTI
🔗 securitylabs.datadoghq.com/articles/tal...
#CloudSecurity #ThreatIntel #CTI
Check out our blog post describing the changes by Amy Robertson & @whatshisface.bsky.social at medium.com/mitre-attack....
Check out our blog post describing the changes by Amy Robertson & @whatshisface.bsky.social at medium.com/mitre-attack....
www.volexity.com/blog/2025/04... #dfir
www.volexity.com/blog/2025/04... #dfir
Two actors, two strategies. What it means for IR, cloud defense, and ransomware readiness.
👉 invictus-ir.com/news/cloud-h...
#DFIR #CloudSecurity #CTI
Two actors, two strategies. What it means for IR, cloud defense, and ransomware readiness.
👉 invictus-ir.com/news/cloud-h...
#DFIR #CloudSecurity #CTI
🪵 Are you collecting the right logs for cloud security incidents? We break down the must-have logs to detect, investigate, and respond effectively in the cloud.
🔗 www.invictus-ir.com/news/cloud-i...
#dfir #aws #microsoft #google
🪵 Are you collecting the right logs for cloud security incidents? We break down the must-have logs to detect, investigate, and respond effectively in the cloud.
🔗 www.invictus-ir.com/news/cloud-i...
#dfir #aws #microsoft #google
If you handle BEC investigations, you've probably encountered eM Client more than once. We break down the forensic traces this application leaves behind.
🔍 Read now: www.invictus-ir.com/news/forensi...
#CyberSecurity #DFIR #BEC #ThreatIntel #CTI
If you handle BEC investigations, you've probably encountered eM Client more than once. We break down the forensic traces this application leaves behind.
🔍 Read now: www.invictus-ir.com/news/forensi...
#CyberSecurity #DFIR #BEC #ThreatIntel #CTI
Dive into an intriguing BEC attack and discover how this threat actor navigated a cloud environment to evade detection. We’ve also mapped the TTPs and shared IOCs on our GitHub.
👉 www.invictus-ir.com/news/locked-...
Dive into an intriguing BEC attack and discover how this threat actor navigated a cloud environment to evade detection. We’ve also mapped the TTPs and shared IOCs on our GitHub.
👉 www.invictus-ir.com/news/locked-...