Let’s start a new weekly hash tag to talk about threat actors and their TTPs!

This week: Maze Hacking Group - A nasty cyber crime group that combines ransomware with data leaks.


@jerry Just read your piece on Marsh's list of endorsed services.

I completely agree that in (as in all other verticals within an larger org) success depends mainly on the ability to hire the right talent and the ability of the cyber lead to execute the strategy by implementing the necessary processes.

For me the next logical step is a deeper specialization of cyber talent - SOC analyst, vuln/risk manager, CSIRT engineer, etc.


What do have NYU.EDU, PURDUE.EDU and CS.WISC.EDU in common?

Their email systems have been used as attack infrastructure against us. Wonder if they all use the same type of email system.

All attacks used five random characters as the user part of the email address.

We observe so many vendor breaches since WFH started, feels like almost everyone got breached around us.

What is your strategy to approach application teams with concerns?

Anyone doing a vendor risk assessment before allowing IM Federation?

Anyone looked into Microsoft Flow / PowerAutomate as a phishing and dataexfil vector yet?

Pro-actively searching through and correlating logs in your SIEM and cyber tools we call Threat Hunting. What does one call pro-actively searching through and correlating threat intel? Is it just the creation of more threat intel or is there a word/phrase for it?

Finally got around adding all these TI links into a wiki page: codeberg.org/cyberseb/ti/wiki/

It already includes a good amount of TI resources but will be updated every time I run across something cool.

Why do you think the NSA is telling us to patch that trust vuln right away?

This is an actively exploited attack vector and slowly becoming mainstream! If you haven't put protection (CASB) in place yet, do it now.


If your organization cannot afford Enterprise grade DNS security tools, have a look at github.com/StevenBlack/hosts

Looking to add some more miners to our minemeld (github.com/PaloAltoNetworks/mi) instance. Anyone had a lot of success and can recommend one or two sources? Any bad experiences with any of the default miners?

Anyone have a good tool that makes searching through Windows Server DNS Debug Logs easy?

The excitement you feel when your SOC reports the first phishing email that found a way around ATP Safe Links...

When one of your vendors gets crypto-locked and you go through all contracts with them to figure out possible impact on your business...

Interesting times.

Show more

InfoSec Community within the Fediverse. Instance is supposed to be fast and secure. Everyone is welcome - Jump on Board!

We have a Getting Started Guide here: https://guide.ioc.exchange

Other Cyber Communities: