#CyberThreat22 Good to hear some insights from NCSC on how they handle zero day incident notifications to organisations.
Final day! You can still "attend" CyberThreat remotely - for free - if you can't make it in person (UK time 9-5).
https://www.sans.org/cyber-security-training-events/cyberthreat-2022/
#CyberThreat #CyberThreat2022 #SecurityConference #NCSC #SANS #InfoSec #CyberThreat22
#cyberthreat #cyberthreat2022 #securityconference #ncsc #sans #infosec #cyberthreat22
RT @4enzikat0r@twitter.com
Cool #DFIR tool introduced at @SANSInstitute@twitter.com #CyberThreat22 for Enterprise IR by @foxit@twitter.com.
Check it out at https://www.fox-it.com/nl-en/dissect/
@Mandiant talking about what can happen on locking down one method of, in this case, child-based attack on an innocent wall… “if I lock up all the crayons, what happens if they find a marker” - block a simple tool & an attacker may well find something worse to use 💯
Also loving the link analysis breaking down the attack…
Cool #DFIR tool introduced at @sansinstitute #CyberThreat22 for Enterprise IR by @nccgroupinfosec.
Check it out at https://www.fox-it.com/nl-en/dissect/
@volexity's @tlansec is in London at #CyberThreat22! His talk, "Two for One: Firewall 0-day investigations", is Tues, Jan 17 @ 16:10 UTC. Learn about 2 real-world examples of Chinese nation-state attackers using #0day exploits to compromise #firewall devices.
#cyberthreat22 #0day #firewall #threatintel #dfir
@richard I don't expect he'll see many on Mastodon, so I'm giving him something to look at #CyberThreat22
It’s an absolute privilege to have colleagues from CERT-UA joining us at #CyberThreat22 and giving such a detailed insight into their work. Looking forward to spending time this week building on our already strong partnership with Ukraine.