Added a couple of short entries today
Collection of various answers I've given online
New whitepaper just published:
Reduce data size and cut #SIEM licensing costs
The Outreachy organizers are putting new policies in place to deal with the impact of the global crisis caused by the novel coronavirus, COVID-19.
The EU ATT&CK Community Workshop goes virtual. https://attack-community.org/event/
Monday-Tuesday 18-19 May 2020
"Replying to HackerzRussian MrRussianHacker"
I wonder where they're from....
Just reminded myself of this idea for a longer post...
My company in the Top SIEM 2020 Companies by Enterprise Security Magazine! https://medium.com/@EPSecurityMag/top-siem-companies-cc651da448ce https://security-information-and-event-management.enterprisesecuritymag.com/vendors/top-siem-solution-companies.html
We are in the Enterprise Security Magazine - Top SIEM Companies 2020 https://security-information-and-event-management.enterprisesecuritymag.com/vendors/top-siem-solution-companies.html
Sicherheitsexperten fordern bessere Cyber-Katastrophenhilfe! #AGKritis
Krankenhäuser, Wasserversorgung, Kraftwerke: Kritische Infrastruktur kann gehackt werden, mit schwerwiegenden Folgen. Sicherheitsexperten fordern nun eine Art Cyberhilfswerk, nach dem Vorbild des technischen Hilfswerks.
All talks must be 1/2 on an introductory hacking / infosec topic and 1/2 on any other hobby topic.
> A classified document leaked by Edward Snowden and published by The Intercept in 2016 shows that the NCMI teamed up with the National Security Agency, the digital spying behemoth, to gather "medical SIGINT," or signals intelligence, a government term for the fruits of hacking and eavesdropping
So #COVID19 has hit & you’re quarantined with the 8 people that you've last @
@mmokhi off volunteering with the infosec healthcare group
@mwlucas sharing cheetos
@Tlacaelel stress cleaning
@ticoombs talking about the scary stories
@hummingrain lock picking our way into the closed shops I think
@grainloom also lockpicking
@email@example.com researching the convergence of biological/computer virus models
@lousycanuck checks for signs of human life
"Attention Europe #infosec folks: some of us are forming a team of people willing to give up their time if needed to support healthcare providers who may suffer attacks at this difficult time."
Original status update and comment please at : https://www.linkedin.com/feed/update/urn:li:activity:6644297939785138176/?commentUrn=urn%3Ali%3Acomment%3A(activity%3A6644297939785138176%2C6644531899760988160)
There is also some Australia, Middle East and North America centred activity, but I don't know where the status updates are.
University of Cincinnati made their malware reverse engineering classes public:
Now just waiting for my airline to hopefully do cancellations/refunds (not that, they have enough on their plate already)
Computer Virus Propagation Models http://home.deib.polimi.it/zanero/papers/zanero-serazzi-virus.pdf
I deleted that other toot because yes you do need testing especially on implementations like Modbus/TCP.
I took a closer look at the link that I had and it indicates that they are doing some 'secondary monitoring' so not touching SCADA systems directly, ie "monitoring for archive misconfigurations"
A Mastodon instance for info/cyber security-minded people.