St0pp3r (@_st0pp3r_) 's Twitter Profile
St0pp3r

@_st0pp3r_

Detection Engineering ยท Threat Hunting ยท Incident Response

ID: 1042452014981107712

linkhttps://github.com/st0pp3r calendar_today19-09-2018 16:35:02

141 Tweet

162 Followers

247 Following

NVISO Labs (@nviso_labs) 's Twitter Profile Photo

Has your company ever been affected by a compromised business email? Read 0xSe7eN latest blog post, "How to Hunt & Defend Against Business Email Compromise" here ๐Ÿ‘‡ blog.nviso.eu/2025/03/21/howโ€ฆ

DEATHCon (@deathcon2025) 's Twitter Profile Photo

The DEATHCon 2025 Call for Workshops is now open! If you have a great idea for teaching people how to do #detectionengineering or #threathunting or an adjacent skill through hands-on experience in our lab, we'd love to hear it! deathcon.io/cfp.html Submit before June 1

Agapios Tsolakis (@kwaleetea) 's Twitter Profile Photo

๐Ÿšจ BLOG ALERT ๐Ÿšจ I dove into maintenance in #DetectionEngineering - why it matters so much and the paradox that wonโ€™t let me sleep at night. This is the first post in a new series:

vas (@vasumanmoza) 's Twitter Profile Photo

Claude 4 just refactored my entire codebase in one call. 25 tool invocations. 3,000+ new lines. 12 brand new files. It modularized everything. Broke up monoliths. Cleaned up spaghetti. None of it worked. But boy was it beautiful.

Claude 4 just refactored my entire codebase in one call.

25 tool invocations. 3,000+ new lines. 12 brand new files.

It modularized everything. Broke up monoliths. Cleaned up spaghetti.

None of it worked.
But boy was it beautiful.
DEATHCon (@deathcon2025) 's Twitter Profile Photo

Great list of resources for anyone getting started in #detectionengineering (h/t to Richard Akroyd for creating this list) github.com/rfackroyd/deteโ€ฆ

NVISO Labs (@nviso_labs) 's Twitter Profile Photo

Detection-as-Code: From Concept to Practice ๐Ÿ‘‡ Check out St0pp3r latest blog series, where he unpacks the fundamentals of #DetectionEngineering and takes a closer look at the game-changing concept of #DetectionAsCode. blog.nviso.eu/2025/07/08/detโ€ฆ

Detection-as-Code: From Concept to Practice ๐Ÿ‘‡

Check out <a href="/_st0pp3r_/">St0pp3r</a> latest blog series, where he unpacks the fundamentals of #DetectionEngineering and takes a closer look at the game-changing concept of #DetectionAsCode.
blog.nviso.eu/2025/07/08/detโ€ฆ
St0pp3r (@_st0pp3r_) 's Twitter Profile Photo

Check out part 2 of our #DetectionEngineering - Practicing #DetectionAsCode series is out! This part is all about laying the groundwork for a scalable and efficient detection repository.

แดษชแด„สœแด€สŸษชs แดษชแด„สœแด€สŸแดs (@cyb3rmik3) 's Twitter Profile Photo

๐Ÿ“ข New blog post ๐Ÿ“ข ๐๐ซ๐ž๐š๐ค๐ข๐ง๐  ๐๐จ๐ฐ๐ง ๐ญ๐ก๐ž ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐„๐ฑ๐ญ๐ž๐ซ๐ง๐š๐ฅ ๐€๐ญ๐ญ๐š๐œ๐ค ๐’๐ฎ๐ซ๐Ÿ๐š๐œ๐ž ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ ๐จ๐ฉ๐ฉ๐จ๐ซ๐ญ๐ฎ๐ง๐ข๐ญ๐ข๐ž๐ฌ ๐Ÿ๐จ๐ซ ๐ช๐ฎ๐ž๐ซ๐ข๐ž๐ฌ ๐ข๐ง ๐€๐๐ฏ๐š๐ง๐œ๐ž๐ ๐‡๐ฎ๐ง๐ญ๐ข๐ง๐  & ๐‹๐จ๐  ๐€๐ง๐š๐ฅ๐ฒ๐ญ๐ข๐œ๐ฌ

NVISO Labs (@nviso_labs) 's Twitter Profile Photo

Ever wondered what a "middleman" can do for your security? In the world of software development, one of the biggest hidden dangers is #HardcodedCredentials. Read our latest blog post on #CyberArkโ€™s Central Credential Provider (CCP) here ๐Ÿ‘‡ blog.nviso.eu/2025/08/01/stoโ€ฆ