@mimeframe Profile picture

mimeframe

@mimeframe

A [re]tweet or like does not imply endorsement.

Joined August 2012
Similar User
zane photo

@zanelackey

lcamtuf photo

@lcamtuf

Xavier Mertens @xme@infosec.ecxhange 🇫🇷 photo

@xme

chrisrohlf photo

@chrisrohlf

Jack Crook photo

@jackcr

Ryan McGeehan photo

@Magoo

Michael Ligh (MHL) photo

@iMHLv2

jcran photo

@jcran

Ben Hayak photo

@BenHayak

David Litchfield photo

@dlitchfield

Doug Burks photo

@dougburks

Luca Carettoni photo

@lucacarettoni

Jeff Jarmoc 🐉🔥 photo

@jjarmoc

Stephen A. Ridley photo

@s7ephen

1aN0rmus photo

@TekDefense

🔥Rare opportunity! Remote Engineering Manager position available @redcanaryco Work with me and the entire team to build amazing modern security products hire.withgoogle.com/public/jobs/re…


mimeframe Reposted

We're hiring for a Director of Product Marketing, who will be responsible for determining the go-to-market strategy for all Red Canary solutions. Do you have what it takes? Join our marketing squad: hire.withgoogle.com/public/jobs/re…


mimeframe Reposted

My team is on the hunt for a late night remote Detection Engineer to track down evil and help build more detection content. DM me if you have questions. Drop an app here: hire.withgoogle.com/public/jobs/re… @redcanaryco #infosec #BlueTeam


Red Canary now supports Threatstack, in addition to CarbonBlack, Endgame & Crowdstrike redcanary.com/blog/threat-st…


mimeframe Reposted

Spoiler alert...named pipes are useful for many things outside of normal admin activity...

[NEW BLOG] How To Threat Hunt For PsExec, Other Lateral Movement Tools by @ForensicITGuy hubs.ly/H0fBpSc0

redcanary's tweet image. [NEW BLOG] How To Threat Hunt For PsExec, Other Lateral Movement Tools by @ForensicITGuy <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/KmvQ2ZPaR8">hubs.ly/H0fBpSc0</a>


mimeframe Reposted

Calling all unicorns! We are hiring a detection engineer to join our CIRT. If you are a night owl who is committed to looking for threats in endpoint data, wants to join a fast growing team and work from the comfort of your own home, apply here: hire.withgoogle.com/public/jobs/re…


mimeframe Reposted

We have activated our host community to open their homes for $0 for those evacuating the Woolsey & Hill Fires in CA #WoolseyFire #HillFire abnb.co/hmtcm


So true

There is so much ink spilled about agile practice and it is all so much camouflage for the real battle, which is: Are developers working in an external, public dialog or in an internal, private monolog? 12



mimeframe Reposted

Thisn is a phenomenal talk about @MITREattack by @verri3r from @redcanaryco He discussed the practical application of att&ck. It succinctly answered (and rebutted) many questions and assumptions about att&ck. Possibly best talk at #ATTACKcon so far. Will be sharing this widely.

meansec's tweet image. Thisn is a phenomenal talk about @MITREattack by @verri3r from @redcanaryco. He discussed the practical application of att&amp;ck. It succinctly answered (and rebutted) many questions and assumptions about att&amp;ck. Possibly best talk at #ATTACKcon so far. Will be sharing this widely.

Colleague @verri3r crushing it at ATT&CK con, nice work!

ATT&CK can be very useful, and like anything, it's important to know the potential pitfalls as you use it. Kyle Rainey (@verri3r) of @redcanaryco warns us of "5 Ways to Screw Up Your Security Program with ATT&CK." #ATTACKcon

MITREattack's tweet image. ATT&amp;CK can be very useful, and like anything, it's important to know the potential pitfalls as you use it. Kyle Rainey (@verri3r) of @redcanaryco warns us of "5 Ways to Screw Up Your Security Program with ATT&amp;CK." #ATTACKcon


mimeframe Reposted

Atomic Red Team currently has ready-to-execute tests for 118 of 219 total @MITREattack techniques. The most viewed technique is the venerable @subTee special: T1117 (regsvr32.exe) The technique: attack.mitre.org/wiki/Technique… And the tests: github.com/redcanaryco/at… Happy hackin'!

kwm's tweet image. Atomic Red Team currently has ready-to-execute tests for 118 of 219 total @MITREattack techniques. 

The most viewed technique is the venerable @subTee
special: T1117 (regsvr32.exe) 

The technique: <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/krZhBTW6Cl">attack.mitre.org/wiki/Technique…</a>

And the tests: <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/WseSASmJ0B">github.com/redcanaryco/at…</a>

Happy hackin'!

Really speaks to how we’re different: R&D actually informs and improves our product, and tuning and false positives are handled for you. Our customers are only delivered true positives (value)

[NEW BLOG ALERT] Detecting MSXSL Abuse in the Wild - hubs.ly/H0dRsXM0 via @bdownin9



🔥New product: Exec. Automate with ease

Red Canary Introduces Exec: A New Product to Make Automation Safe, Easy, and Meaningful hubs.ly/H0dGsmj0



If you’re new to ATT&CK, or actively implementing it at $dayjob, I suggest checking this out

Join @redcanaryco, @CarbonBlack_Inc and @MITREattack as we take you through a 3-part webinar series focused on 'Threat Hunting with ATT&CK™'. Learn more and register here: redcanary.com/threat-hunting…

redcanary's tweet image. Join @redcanaryco, @CarbonBlack_Inc and @MITREattack as we take you through a 3-part webinar series focused on 'Threat Hunting with ATT&amp;CK™'. Learn more and register here: <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/lh0nNERZVp">redcanary.com/threat-hunting…</a>


That darn @subTee always be actin shady

In comparison, several of our noisier MSBuild detectors combined found about 40 instances of MSBuild running across the same number of endpoints in the last 7 days. Although some were probably @subtee acting shady.

ForensicITGuy's tweet image. In comparison, several of our noisier MSBuild detectors combined found about 40 instances of MSBuild running across the same number of endpoints in the last 7 days. Although some were probably @subtee acting shady.


mimeframe Reposted

If your organization has the capabilities of an ADC and you aren't blocking Winword.exe (or other office products) from spawning powershell then you're missing out. Good read from the folks @redcanaryco redcanary.com/blog/spearphis…


mimeframe Reposted

Behind the Scenes of an Active Breach (Part 1): Establishing Persistence - redcanary.com/blog/active-br… Behind the Scenes of an Active Breach (Part 2): Evading Defenses - redcanary.com/blog/active-br…


mimeframe Reposted

Still looking to hire some security engineers on my team here at Nuna. Remote friendly for more senior folks. Great team culture, work/life balance, perks and a fun challenge - boards.greenhouse.io/nuna/jobs/9643… DM me with any questions!


Major key alert

ANNOUNCEMENT: @redcanaryco and Endgame partner to combine industry-leading endpoint sensor and #IncidentResponse. Read more about how this partnership provides new capabilities to organizations of every size and security maturity: ow.ly/rvZF30li4XW

EndgameInc's tweet image. ANNOUNCEMENT: @redcanaryco and Endgame partner to combine industry-leading endpoint sensor and #IncidentResponse. Read more about how this partnership provides new capabilities to organizations of every size and security maturity: <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/wFWBy8WdsW">ow.ly/rvZF30li4XW</a>


Loading...

Something went wrong.


Something went wrong.