Cyb3rMonk Profile Banner
Mehmet Ergene Profile
Mehmet Ergene

@Cyb3rMonk

Followers
12K
Following
5K
Statuses
4K

πŸ‘‰ Learn #KQL for #ThreatHunting, #DetectionEngineering, and #DFIR at https://t.co/uAlYlXIpyV @BluRavenSec | Microsoft Security MVP | #DataScience

Joined May 2011
Don't wanna be here? Send us removal request.
@Cyb3rMonk
Mehmet Ergene
7 months
πŸš€ Exciting News and a Giveaway! πŸš€ Announcing my new course: Advanced Hands-On KQL for Threat Hunting and Detection Engineering! πŸŽ“βœ¨ This course is designed to take you from zero to master, equipping you with cutting-edge skills to stay ahead in the cybersecurity game. Here’s what you can expect: πŸ” Advanced Time Series Anomaly Detection: Discover methods you’ve never seen before. πŸ”— Attack Path & Execution Chain Detection with Process Mining: A novel approach to threat detection. 🌐 Attack Pattern Detection Using Graph Semantics: Start thinking in graphs and revolutionize your detection and investigation skills. And now, the exciting part! 🎁 I’m giving away 1 FREE seat in the course! To enter: 1️⃣ Follow @BluRavenSec 2️⃣ Like and repost this post 3️⃣ Comment why you want to join #KQL #Kusto #SIEM #MicrosoftSentinel #MicrosoftDefender #MicrosoftDefenderXDR #Defender #cybersecurity #KQLForSecurityAnalysts #ThreatHunting #DetectionEngineering #training #dfir #incidentresponse
Tweet media one
62
74
199
@Cyb3rMonk
Mehmet Ergene
24 hours
@SecurityAura That's also why you get those IR cases 😁
0
0
2
@Cyb3rMonk
Mehmet Ergene
3 days
Implementing a machine learning algorithm using #KQL πŸ€”
0
0
2
@Cyb3rMonk
Mehmet Ergene
4 days
RT @svpino: Pandas is dying a slow, painful death. It's the world's most popular data library, but it's slow, and many libraries have sign…
0
246
0
@Cyb3rMonk
Mehmet Ergene
4 days
RT @SecurePeacock: Today at WWHF @Wietze is dropping Invoke-ArgFuscator πŸ‘€
0
25
0
@Cyb3rMonk
Mehmet Ergene
4 days
@DylanInfosec I just don't think there would be a use case where you would want to detect loading of an image multiple times. Maybe I'm wrong. πŸ€·β€β™‚οΈ
1
0
1
@Cyb3rMonk
Mehmet Ergene
4 days
@DylanInfosec I don't think it's necessary.
1
0
1
@Cyb3rMonk
Mehmet Ergene
10 days
@godslittlemacro Yes, it's sufficient for blocking. GPO provides more flexibility.
0
0
1
@Cyb3rMonk
Mehmet Ergene
10 days
0
0
0
@Cyb3rMonk
Mehmet Ergene
11 days
@OliverRochford They don't even know basic data analysis, let alone data science.
0
0
0
@Cyb3rMonk
Mehmet Ergene
11 days
@anton_chuvakin @SecurePeacock One of my favorite CTI talks/rants
0
1
4
@Cyb3rMonk
Mehmet Ergene
13 days
RT @Wietze: #LOLBAS project update: Entries now have placeholders for paths, URLs, and more. This makes it easier to visually see what par…
0
55
0
@Cyb3rMonk
Mehmet Ergene
16 days
@NathanMcNulty Is this the reason why we see empty device id in sign in events for a registered/joined device?
0
0
0
@Cyb3rMonk
Mehmet Ergene
16 days
@NathanMcNulty Also, if I have a registered/joined device, does the device provide device identity for every single sign in to any app? If not, does CA ask the device to provide device identity which makes the devices sign in again with the device id?
1
0
1
@Cyb3rMonk
Mehmet Ergene
17 days
@NathanMcNulty So, requiring a entra joined/registered or compliant device implicitly uses this filter for device then?
1
0
1
@Cyb3rMonk
Mehmet Ergene
17 days
@NathanMcNulty What do you mean by filter for devices?
1
0
1
@Cyb3rMonk
Mehmet Ergene
17 days
Detectable by Design? We keep failing on "shift left", "secure by design", and some other approaches to prevent malicious activities. How about "detectable by design" approach? It's certain that your product will fail on the prevention side. You could design your product in a way that makes it easy to detect malicious activities at least.
1
3
25