Joe Słowik · @jfslowik
2636 followers · 1148 posts · Server infosec.exchange
Joe Słowik · @jfslowik
2211 followers · 631 posts · Server infosec.exchange

We're getting into "silly season" at the end of the year. With that in mind, I've thought about the things I did in 2022 that I found most interesting, helpful, or potentially impactful.

First, there's the paper on -driven I wrote and presented on at several events:
gigamon.com/content/dam/resour

Then, there was my @VirusBulletin paper on the actor responsible for the event, which I thought was neat as a deep-dive into organizational relationships that get masked in our tracking a single "adversary:"
virusbulletin.com/uploads/pdf/

On a personal front, I wrote up some prelimianry analysis on the attempted (?) incident as part of the conflict in - and there are still some items raised there for which we don't have answers several months after the incident was discovered:
pylos.co/2022/04/23/industroye

Finally, I wrote a blog for my employer diving into the idea of the in and that I think is helpful for analysts from to the
blog.gigamon.com/2022/08/05/re

I need to think this over a bit, but look for something covering the most insightful work of others, from my perspective, from the past year!

#cti #threathunting #xenotime #triton #industroyer2 #ics #ot #ukraine #falsepositive #detectionengineering #SecurityMonitoring #ir #soc

Last updated 2 years ago

Joe Slowik · @jfslowik
1604 followers · 214 posts · Server infosec.exchange

For the past 2-3 years I've tried to do two long-form research projects each year: one focused on practical methodologies, the other on activity.

Last year, I did a paper on -driven , and another on /#Triton entity. That was cool.

Right now, 2023 is looking like:
1. Intelligence-driven approaches to and alerting
2. State-sponsored activity leveraging or similar for disruptive operations

This is subject to change, but this looks like what I'll be diving into right now

#infosec #threatresearch #apt #cti #threathunting #xenotime #detectionengineering #ransomware #cyber

Last updated 2 years ago

Joe Slowik · @jfslowik
1378 followers · 101 posts · Server infosec.exchange

The threat environment is interesting as, aside from ransomware shit, the threats are latent, dormant, or in development. The evolution of , identification of / , continued activity, identification of test labs for cyber physical capabilities... All indicate an environment under rapid development, but with fewer actual public examples than fingers on your hand. Circumstances make risk assessment (and cost forecasting) exceptionally difficult for asset owners... But the adversaries are out there, and as shown in , they are learning. Claiming adversaries will never figure out a cyber physical attack and that the future threat landscape is over hyped seems unhelpful, or motivated by feelings less than altruistic.

#ot #ics #berserkbear #incontroller #pipedream #xenotime #prc #industroyer2

Last updated 2 years ago

Claroty · @Claroty
6 followers · 4 posts · Server infosec.exchange

🎙️ New episode of the Aperture podcast out now! Joe Slowik joins host @mike_mimoso to talk about malware and . Listen here: claroty.com/resources/podcasts

#triton #xenotime

Last updated 2 years ago