Lodi Hensen (@lodihensen) 's Twitter Profile
Lodi Hensen

@lodihensen

ID: 2640791019

calendar_today25-06-2014 14:10:17

1,1K Tweet

310 Followers

787 Following

Fox-IT (@foxit) 's Twitter Profile Photo

Phishing – Ask and ye shall receive. Read Fox-IT's blog about impersonating everyday applications with a tool to phish for user credentials using existing applications as a (realistic) cover: fox-it.com/en/insights/bl…

Phishing – Ask and ye shall receive. Read Fox-IT's blog about impersonating everyday applications with a tool to phish for user credentials using existing applications as a (realistic) cover: fox-it.com/en/insights/bl…
Hybrid Analysis (@hybridanalysis) 's Twitter Profile Photo

[UPDATE] Free and instant YARA hunt and binary pattern search now available on Hybrid Analysis to scan petabytes of malware. Read the whole story: hybrid-analysis.blogspot.com/2018/08/crowds… // Powered by CrowdStrike’s MalQuery

[UPDATE] Free and instant YARA hunt and binary pattern search now available on Hybrid Analysis to scan petabytes of malware. Read the whole story: hybrid-analysis.blogspot.com/2018/08/crowds… // Powered by <a href="/CrowdStrike/">CrowdStrike</a>’s MalQuery
Tesorion (@tesorion_nl) 's Twitter Profile Photo

Zelf uw cybersecurity-dienstverlening configurere; toekomst of realiteit? Lees nu het volgende blog van Rick Hofstede via onderstaande link. tesorion.nl/zelf-uw-cybers…

Zelf uw cybersecurity-dienstverlening configurere; toekomst of realiteit? Lees nu het volgende blog van Rick Hofstede via onderstaande link. 

tesorion.nl/zelf-uw-cybers…
Maarten Ummels (@maartenummels) 's Twitter Profile Photo

Possible connection between the #Sodinokibi and #GandCrab #ransomware families found by Tesorion experts! bit.ly/2vKoROL #CyberSecurity #Oracle #WebLogic #RansomwareAttack #Vulnerability #Hacking.

Lodi Hensen (@lodihensen) 's Twitter Profile Photo

Great job by Tesorion’s Threat Intelligence Team! #nemty #decrypter available on request: tesorion.nl/a-decryptor-fo…

Veeam EMEA (@veeam_emea) 's Twitter Profile Photo

Sluit je aan bij #VeeamONTour op 13 juni! Lodi Hensen van Tesorion en Rico Wezenberg praten je bij over het belang van een snelle en efficiënte reactie als het gaat om de bescherming van uw organisatie tegen ransomware-aanvallen. Mis het niet! Lodi Hensen Rico Wezenberg

Maarten van Dantzig (@maartenvdantzig) 's Twitter Profile Photo

Cool blog from Fox-IT's forensics team: detecting and recovering event logs deleted by NSA's eventlogedit tool blog.fox-it.com/2017/12/08/det…

Cool blog from <a href="/foxit/">Fox-IT</a>'s forensics team: detecting and recovering event logs deleted by NSA's eventlogedit tool blog.fox-it.com/2017/12/08/det…
Fox-IT (@foxit) 's Twitter Profile Photo

Wat zijn de eerste stappen die je moet nemen bij een cyberaanval? Leer het tijdens een van de @FoxITAcademy Cyber Crisis Management trainingen gegeven door Forensisch IT expert Lodi Hensen. fox-it.com/academy/module…

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

VPNFilter 🏹 YARA rules github.com/Neo23x0/signat… Sigma rule extended to include the specific User-Agent github.com/Neo23x0/sigma/… Suricata rule gist.github.com/Neo23x0/00bc2b…

VPNFilter 🏹
YARA rules
github.com/Neo23x0/signat…
Sigma rule extended to include the specific User-Agent
github.com/Neo23x0/sigma/…
Suricata rule
gist.github.com/Neo23x0/00bc2b…