shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

292
active users

#detection

0 posts0 participants0 posts today

So this is now a thing: github.com/linkedin/sigma-rules

Not much just quite yet, but soon, I expect there to be more from us.

Thanks particularly to @timb_machine and @hal_pomeranz for their excellent work on the procfs bind mounts stuff, it was one of the more inciting factors for my team to push forward with getting a public place to put this kind of work.

GitHubGitHub - linkedin/sigma-rulesContribute to linkedin/sigma-rules development by creating an account on GitHub.

#Russia's #Doppelganger "foreign malign influence campaign" #FMIC Plans for #Election2024 include the following projects:

1. Good Old USA #GOUSA — promote #isolationism

2. Guerrilla Media Campaign in the US #USGMC — exploit perceived #polarization

3. US Social Media Influencers Network #USSMIN — avoid #detection & #mitigation

4. Target US by Influencing Other Countries #USTIOC#electionInterference

See pages 30-34 of the #DoppelgangerAffidavit at justice.gov/d9/2024-09/doppelg

@KamalaHarrisWin

Want to identify many popular lateral movement techniques?

Master psexec.

Many lateral movement techniques embedded within popular attack tools like Meterpreter, Beacon, and others, behave very very similarly to psexec, just with added obfuscation.

If you thoroughly understand how psexec works, you'll learn to spot many other tools.

praetorian.com/blog/threat-hun

PraetorianThreat Hunting: How to Detect PsExec -This article profiles the use of the PsExec command-line tool as a cyber-attack technique, and how threat hunters can detect it.