Kris Hardy 🧐 · @nonlinear
59 followers · 347 posts · Server mastodon.nz

My Security team at , in , , is for a and . We are a cloud-native organization that delivers APIs for some of the world's leading fast-food restaurants, and are looking for people with experience in , , , and reviewing and improving security posture. Security Analyst: plexure.breezy.hr/p/65e1bdf956
Security Engineer: plexure.breezy.hr/p/0229cfabdb

#plexure #auckland #nz #hiring #SecurityAnalyst #securityengineer #appsec #compliance #gdpr #FediHire

Last updated 1 year ago

F0rm4t · @F0rm4t
41 followers · 45 posts · Server infosec.exchange

I decided to write a Jupyter Notebook that can automate the process of collecting IOC’s from Twitter and putting them in Microsoft Sentinel using MSTICPy.
This tool can help security professionals save time and quickly identify potential security threats.

In this blog post, I will explain the process of creating this tool and how it can be used to enhance your cybersecurity efforts.

➡️ Blog Post: lnkd.in/dnFutQSe

➡️ GitHub: lnkd.in/d73rJhN9

➡️ Video Demo: lnkd.in/dqPyZjWd

#notebook #jupyternotebook #sentinel #MicrosoftSentinel #python #ioc #threatintelligence #ti #twitter #api #soc #SecurityAnalyst #threatintelligenceplatform #tip #threatindicators #indicators #jupiter #azure #microsoft #cloud #cloudsecurity #threathunting #threatinvestigation #osint #tweet #blocklist #malware #xdr #defender #msticpy #tweepy #pandas #cybersecurity #video #github #security #help

Last updated 2 years ago

F0rm4t · @F0rm4t
41 followers · 44 posts · Server infosec.exchange

"Public preview of near real-time custom detections in Microsoft 365 Defender.

You can now create custom detection rules that run in near real-time, in addition to existing frequencies ranging from every 24 hours to every hour. These detections can be integrated with the broad set of Microsoft 365 Defender across email, endpoint, and identity, leading to faster response times and faster mitigation of threats.

This new frequency will be available in Microsoft 365 Defender as Continuous (NRT). "

techcommunity.microsoft.com/t5

#microsoftsecurity #microsoft365 #microsoft #defender #microsoft365defender #xdr #NRT #nearrealtime #detection #soc #azure #cloud #cloudsecurity #analyst #SecurityAnalyst #cybersecurity

Last updated 2 years ago

F0rm4t · @F0rm4t
41 followers · 43 posts · Server infosec.exchange
Techucation · @Techucation
13 followers · 29 posts · Server mastodon.nz

Once an accidental coder, now a successful security analyst! This unnamed girl's passion for coding led to a rewarding career, promotions, and contracts with top tech companies. Her story inspires us all to pursue our passions and push beyond our limits. Anything is possible with hard work, determination, and a bit of luck.

#womenintech #SuccessStory #coding #SecurityAnalyst

Last updated 2 years ago

Bob Young :verified: · @fifonetworks
132 followers · 204 posts · Server infosec.exchange

Less than 3 minutes, and there were 60 attempts blocked by the firewall. This goes on 24/7. Here’s the edited report and explanation.

One of my clients wanted me to block IP addresses from all but five countries. Originally there were only three countries allowed, but over the course of time business needs warranted allowing traffic from two more countries.

The firewall is passive. In other words, it logs the event, but it returns no response to the IP address in the other country. A response would trigger additional activity.

There are many ways for cybercriminals to circumvent this. It’s not perfect.
1) Blocking IP addresses by the country of registration does nothing to stop similar probes from a proxy in one of the allowed countries.
2) This doesn’t stop malicious links or attachments in emails from servers in allowed countries.
3) This doesn’t stop employees from visiting infected websites in allowed countries.

But it does significantly reduce contact with malicious or infected servers. For example, suppose an employee receives an email that contains a malicious link pointing to one of the blocked countries. If the employee is tricked into clicking on the link, the link doesn’t work, and the employee gets a notice on their screen that it’s forbidden. At the same time, a firewall log entry is generated. This event can be used for one-on-one training with the employee, so they better understand how to identify suspicious links.

SPECIAL CASE: INTERNATIONAL CORPORATIONS
“But Bob, my company is international. We have traffic from almost every country.”

You might want to think that through a little more carefully. Ask yourself, “Do the Customer Care agents handling North America really need traffic from IP addresses in Western Europe?” You might find that the firewall rules for the Detroit office, the London office, and the Tokyo office can all be made more secure with custom geographic IP address block lists.

Of course, that means you’ll need enough cybersecurity staff to stop using cookie-cutter firewall rules in all 700 offices. You’ll need to analyze the traffic in each office, see where the legitimate traffic endpoints are, and only block the others.

#callmeifyouneedme #fifonetworks #cybersecurity #firewall #soc #SecurityAnalyst

Last updated 2 years ago

Corelight · @corelight
84 followers · 23 posts · Server infosec.exchange

Imagine this. An advanced adversary has bypassed your perimeter defenses, moved inside your environment, and become a literal ghost in the machine. Undetected, the adversary is free to move from system to system, searching for its next target. This is a scenario that every fears and is a daunting challenge.

But this webcast demonstrates that don't need to go undetected. Learn how to overcome network blind spots and hunt, discover, and disrupt adversary attacks through a correlation of and platforms. If you're a threat hunter, incident responder, , , or , we encourage you to watch this technical webcast from Corelight and Cyborg Security:

👻 "Think Like a Threat Hunter: Hunting the Ghost in the Machine"

🎤 Corelight's Nick Hunter and Cyborg Security's Brandon Denker

▶️youtube.com/watch?v=QZkdOY412k

#soc #threathunting #cyberthreats #ndr #edr #SecurityAnalyst #securityengineer #securitymanager #securityArchitect #exploit #vulnerabilities #cyberattack #networksecurity #endpointsecurity #cybersecurity #dfir

Last updated 2 years ago

Corelight · @corelight
53 followers · 4 posts · Server infosec.exchange

What's the tech that's improving SOC analyst efficiency? 🤔
.
.
.
If you guessed NDR, then you'll love this new eBook from Enterprise Strategy Group (ESG).

It's true. 60% of organizations say that network detection and response (NDR) improved their SOC analyst efficiency. Here are some other stats from the eBook to consider. Nearly half of organizations say that it:

1. Detected attacks missed by other tools
2. Accelerated incident response
3. Provided the broadest network visibility across environments

Don't just take our word for it. Read ESG's "The Evolving Role of NDR" eBook today: go.corelight.com/esg-report-ev

#ndr #DetectionAndResponse #networksecurity #cybersecuritysolutions #networksecurityengineer #SecurityAnalyst #soc #secops

Last updated 2 years ago