Evan H. Dygert (@edygert) 's Twitter Profile
Evan H. Dygert

@edygert

Principal Scientist Cyber Threat Research and Active Measures at AbbVie, SANS Certified Instructor

ID: 41169736

calendar_today19-05-2009 18:03:04

186 Tweet

425 Followers

387 Following

SANS DFIR (@sansforensics) 's Twitter Profile Photo

How do #ransomware operators get into their "victim's" environments? #FOR528: Ransomware for #IncidentResponders will teach you the specifics of ransomware so you can prepare for, detect, hunt, respond to, and deal with the aftermath of an attack 👉 sans.org/u/1pqY

SANS DFIR (@sansforensics) 's Twitter Profile Photo

STAY AHEAD OF #RANSOMWARE LIVESTREAM SERIES | Host Ryan "Chaps" Chapman | 3/21 at 1:00 pm ET EPISODE 1 Top 5 misconceptions of Ransomware - Thinking you or your organization dont need to worry about ransomware? Ransomware is pervasive and anyone can be targeted. youtube.com/watch?v=ekdpO4…

Evan H. Dygert (@edygert) 's Twitter Profile Photo

If you've taken SEC573, this will take your skills to the next level. If not, you don't know what you're missing. Great stuff!

SANS Institute (@sansinstitute) 's Twitter Profile Photo

Join Rob T. Lee & Max Shuftan for the FREE SANS #SmallBusinessSummit Live Online to learn essential tips from experts in the #cybersecurity field to help #SmallBusinesses become more secure & resilient. ✍️ Register Today for FREE: sans.org/u/1p0c youtu.be/qWyj-Zew4FM

SANS Institute (@sansinstitute) 's Twitter Profile Photo

Join Summit chair Ryan "Chaps" Chapman Live Online for FREE at the #RansomwareSummit on Friday, June 23. Learn about #Ransomware intrusion emulation, tools and techniques for hunting ransomware operators, and more! ✍️ Don't miss out and register today: buff.ly/42k3mRr

Mark Baggett (@markbaggett) 's Twitter Profile Photo

SANS SEC673 is my new Advanced Information Security Automation with Python class. If you want to learn advanced python skills and apply them to infosec this is the course for you. Like the introduction course SEC573 with its GPYC Certification, SEC673 is filled with fun and

SANS SEC673 is my new Advanced Information Security Automation with Python class.  If you want to learn advanced python skills and apply them to infosec this is the course for you.  Like the introduction course SEC573 with its GPYC Certification, SEC673 is filled with fun and
Anuj Soni (@asoni) 's Twitter Profile Photo

📢 Excited to announce my latest video on my YT channel, where I'll share my successes (and failures) analyzing #malware youtu.be/13vrVmq3PFQ

St0pp3r (@_st0pp3r_) 's Twitter Profile Photo

Another week, another SANS Institute, EMEA course. This time it was #FOR610. Thanks NVISO for the opportunity and Evan H. Dygert for being an amazing instructor throughout the week. I managed to walk away with one of the coins and my team was able to secure first place at #SANS #NetWars.

Another week, another <a href="/SANSEMEA/">SANS Institute, EMEA</a> course. This time it was #FOR610. Thanks <a href="/NVISOsecurity/">NVISO</a> for the opportunity and <a href="/edygert/">Evan H. Dygert</a> for being an amazing instructor throughout the week. I managed to walk away with one of the coins and my team was able to secure first place at #SANS #NetWars.
Karsten Hahn (@struppigel) 's Twitter Profile Photo

APIs related to memory allocation. Those can be useful to put breakpoints for unpacking. All of these end up at NtAllocateVirtualMemory, though.

APIs related to memory allocation. Those can be useful to put breakpoints for unpacking.

All of these end up at NtAllocateVirtualMemory, though.
SANS DFIR (@sansforensics) 's Twitter Profile Photo

In a landmark operation, the notorious #LockBit #ransomware gang faced a significant disruption. Dive into the details with Ryan "Chaps" Chapman & Will as they dissect the recent events and forecast the ramifications for #cybersecurity 👉2/26 1:00 pm ET youtube.com/watch?v=Ith3Ig…

Lenny Zeltser (@lennyzeltser) 's Twitter Profile Photo

A 3-minute episode with my "origin story," courtesy of Axonius . The video covers some of the life experiences that formed the foundation for my career: axonius.com/humans

Thomas Roccia 🤘 (@fr0gger_) 's Twitter Profile Photo

🤯 The level of sophistication of the XZ attack is very impressive! I tried to make sense of the analysis in a single page (which was quite complicated)! I hope it helps to make sense of the information out there. Please treat the information "as is" while the analysis

🤯 The level of sophistication of the XZ attack is very impressive! I tried to make sense of the analysis in a single page (which was quite complicated)! 

I hope it helps to make sense of the information out there. Please treat the information "as is" while the analysis
Sarah Edwards 👩🏻‍💻🐈‍⬛ (@iamevltwin) 's Twitter Profile Photo

Hey y'all, it's been a minute. I've been quite busy with the BRAND NEW revamp for SANS DFIR FOR518 (Mac and iOS forensics). 💻NEW dataset with the latest versions of macOS and iOS 🔬All NEW Labs! 23 in fact! 📱Introducing Corellium (First SANS Forensics course!)

Anuj Soni (@asoni) 's Twitter Profile Photo

Part 2 of my shellcode analysis series is here! This time, we’re automating shellcode extraction with one of hasherezade’s incredible open-source tools. 🎥 Watch now: youtu.be/D6Bm5vD78eY

Part 2 of my shellcode analysis series is here!

This time, we’re automating shellcode extraction with one of <a href="/hasherezade/">hasherezade</a>’s incredible open-source tools.

🎥 Watch now: youtu.be/D6Bm5vD78eY