@Z3mil Profile picture

David Lalz 🇦🇺

@Z3mil

Security nerd, aspire to know more today about the world than I knew yesterday and lessen the suffering of others.

Joined October 2014
Similar User
Razor photo

@RazorEQX

Fatih ERDOĞAN photo

@FeCassie

Julien Reisdorffer photo

@JReisdorffer

<svg/onload=alert(🇭🇹🇳🇱)>  photo

@BufferBandit

spiderdr0id photo

@spiderdr0id

Laris photo

@infosecgatekeep

Ryland DuFour photo

@rylanddufour

G̴o̴u̵D̵o̸x̷ photo

@GouDox

Adi Millis photo

@AdiMillis

Rob Sarupria photo

@HertzCar

Nuthan Prasad photo

@nuthanprasad79

Lu Chi photo

@d0xygen

Mister Em JJ Em photo

@MR_MJJM

David Lalz 🇦🇺 Reposted

📢 If you are at @defcon this week, I will be speaking on Friday about the XZ backdoor discovered by @AndresFreundTec from a threat researcher's perspective and presenting my analysis. This is one of the most impressive and complex cases I've ever analysed! 🤯

Tweet Image 1

David Lalz 🇦🇺 Reposted

If logs were eyes we'd only see the visual spectrum, unaware that the other rest of the spectrum even exists...that someone could be operating on a whole different wavelength.

Tweet Image 1

David Lalz 🇦🇺 Reposted

We need more Security Engineers! #BSidesSF

Tweet Image 1

David Lalz 🇦🇺 Reposted

Was going through some random things fixing up my blog and stumbled across @CYINT_dude’s 2017 CTI Summit presentation about Writing for Cyber Threat Intelligence. It’s still brilliant content magnificently presented and a must watch. youtube.com/watch?v=XEmksb…


David Lalz 🇦🇺 Reposted

It's been long overdue, but my part 2 blog on Active Directory forest trusts is finally here! This blog is about trust transitivity and on the finding on CVE-2020-0665 which was a trust bypass by faking a domain. Enjoy the (long) read: dirkjanm.io/active-directo…

Tweet Image 1

David Lalz 🇦🇺 Reposted

In a recent #DarkSide attack (prior to pipeline stuff) one of the affiliates tried using a file called "uninstallSophos.bat", didn't work. Next "removesophos.bat", nope, finally "DIEsophos.bat" and fail. lol, I love the frustration they must have been feeling at this point.🤬


David Lalz 🇦🇺 Reposted

#kekeo #tr19 The Management Pyramide by @gentilkiwi ift.tt/2JqQwxP

Tweet Image 1

David Lalz 🇦🇺 Reposted

"In order to protect, you must know the "Land" you're going to protect" - some unknown threat hunter🤔 Here are some useful books to read if you're/wanna be a good threat hunter (Windows edition): 1. Windows Security Monitoring (Andrei Miroshnikov) #threathunting #windows

Tweet Image 1

David Lalz 🇦🇺 Reposted

Cyber theory, purple teaming, technical labs and more! Check out our full schedule of events for #Cyberjustucon! womenscyberjutsu.org/event/cyberjut…

Tweet Image 1

David Lalz 🇦🇺 Reposted

See my top 25 CTI presentations for 2020! Thanks to all the presenters that shared their knowledge and their insights for #threatintel tradecraft, threats, and best practices. Hope you enjoy them! threatintel.eu/2021/03/09/top… #cti #ctisummit #firstcti #cyberwarcon #for578


David Lalz 🇦🇺 Reposted

With a lot of people reverse engineering .NET nowadays (gee I wonder why) it might be good to reshare this article I wrote two years ago about my approach to .NET reversing with a very practical example of my methodology and thought process cybereason.com/blog/.net-malw…


David Lalz 🇦🇺 Reposted

To all looking into the SolarWinds Orion breach: Orion holds credentials, such as Domain Admin, Cisco/Router/SW root/enable creds, ESXi/vCenter Credentials, AWS/Azure/Cloud root API keys. and so much more. CONSIDER THESE CREDENTIALS COMPROMISED if you see other IOCs #SunBurst


David Lalz 🇦🇺 Reposted

We stopped looking for cyber security pros to fill our vacant positions a while ago & started employing top programmers, smart admins & even math/physics geniuses &train them in-house High talent + lack of education usually outperforms low talent + high education in the long run

Among Us...Cybersecurity edition

Tweet Image 1


David Lalz 🇦🇺 Reposted

How to evaluate a cybersecurity vendor's ML claims even if you don't know much about ML (thread). 1) Ask them why they didn't solely rely on rules/signatures in their system -- why is ML necessary? If they don't have a clear explanation, deduct a point.


David Lalz 🇦🇺 Reposted

This is hilarious. A paper on the tedious administrative work of maintaining cybercrime infrastructure weis2020.econinfosec.org/wp-content/upl…


David Lalz 🇦🇺 Reposted

Reposting from a random internet location...

Tweet Image 1

David Lalz 🇦🇺 Reposted

Excited to announce that the ACSC (@CyberGovAU) will be hosting an IR challenge at #BSidesCbr19 Based on IR scenarios they have seen throughout the year, this will be one event not to miss! bsidescbr.com.au/IR.html

Tweet Image 1

David Lalz 🇦🇺 Reposted

I got the best advice yesterday from an amazingly successful SV VC: “Find genuinely good human beings, and make them your good friends.”


Loading...

Something went wrong.


Something went wrong.