![Dylan🛡AttacktheSOC Profile](https://pbs.twimg.com/profile_images/1864800802662961152/K6rFkYUG_x96.jpg)
Dylan🛡AttacktheSOC
@DylanInfosec
Followers
454
Following
6K
Statuses
285
Dad ⚭ Husband 𒉭 Azure Security | DE&TH | IAM 🏋️♂️CultoftheIron, Learning 🎸 What stands in the way, becomes the way
Joined March 2023
@DenverHartlo @UK_Daniel_Card Tbh it’s been a while since I watched it and if iirc it did have some Fast & Furious level preposterousness but was a good watch for sure. And I’m seeing the 2nd one is coming out soon. Definitely going to watch it
0
0
0
@V_to_the_K I’m gonna say the opposite of most here but I did the same. Found that I actually thrived on blue team and enjoyed it much more. And I get to do offsec every once in a while building detections and testing controls. Take a few days to sit with it. Whatever you decide, good luck!
1
0
4
This. Detecting this in XDR doesn't have to be difficult. The behavior is what matters here not the method of its implementation. Do you need to try and parse the cmdline?? Or can you detect this through anomaly detection of the binary behavior?
@Reptarr2 The good news is that detecting this doesn't have to be difficult - will share the full slide deck soon, but here's a preview:
0
0
4
RT @Cyb3rMik3: 📢 𝐒𝐢𝐠𝐧𝐢𝐟𝐢𝐜𝐚𝐧𝐭 𝐮𝐩𝐝𝐚𝐭𝐞𝐬 𝐨𝐧 𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭 𝐃𝐞𝐟𝐞𝐧𝐝𝐞𝐫 𝐟𝐨𝐫 𝐓𝐡𝐫𝐞𝐚𝐭 𝐈𝐧𝐭𝐞𝐥𝐥𝐢𝐠𝐞𝐧𝐜𝐞! Over the past days a few updates surfaced about MDTI⤵️…
0
9
0
@Cyb3rMonk Yeah that’s completely fair, and agree. That’s my bad. I should’ve stated earlier, I’d love to have more independent events vs the sampling we get now. But if it was keep it as is or get AggregatedReporting..
0
0
1
@Cyb3rMonk Ok ok. You don’t feel image load events are a reliable enough of a vector for detections/bad roi building that functionality out? Or we’re good with the data already being pulled in?
1
0
0