ThreatBreach (@threatbreach) 's Twitter Profile
ThreatBreach

@threatbreach

Guarding the Gateway: From Threat to Breach

ID: 1800888059648712704

linkhttps://threatbreach.io calendar_today12-06-2024 13:49:17

12 Tweet

17 Followers

1 Following

ThreatBreach (@threatbreach) 's Twitter Profile Photo

🚀 Exciting News! Our new blog site is live at blog.threatbreach.io 🛡️ Focused on Malware Analysis, Blue Team Strategies, and Red Team Tactics. Check it out now! #Cybersecurity #MalwareAnalysis #BlueTeam #RedTeam #TechBlog #ReverseEngineering #ThreatDetection

ThreatBreach (@threatbreach) 's Twitter Profile Photo

🚀 New Lab Alert: Evil Corp Breach! 🌩️🔒 Lab: lab.threatbreach.io/labs/evilcorp-… Explore how attackers exploit AWS misconfigurations, and exfiltrate data and detect all attacks using multiple logs and disk images. #AWS #CloudSecurity #CyberSecurity #Infosec #SecOps #ThreatDetection

🚀 New Lab Alert: Evil Corp Breach! 🌩️🔒

Lab: lab.threatbreach.io/labs/evilcorp-…

Explore how attackers exploit AWS misconfigurations, and exfiltrate data and detect all attacks using multiple logs and disk images.

#AWS #CloudSecurity #CyberSecurity #Infosec #SecOps #ThreatDetection
ThreatBreach (@threatbreach) 's Twitter Profile Photo

🚀 AWS Threat Detection Blog Series: Part - 1 🚀 Link: blog.threatbreach.io/posts/aws-thre… This Blog Series will cover: - Attacker Tactics - Log configuration mastery - Log analysis - Top threat detection tools #AWS #CloudSecurity #Cybersecurity #ThreatDetection #infosec

🚀 AWS Threat Detection Blog Series: Part - 1 🚀

Link: blog.threatbreach.io/posts/aws-thre…

This Blog Series will cover:
- Attacker Tactics
- Log configuration mastery
- Log analysis
- Top threat detection tools

 #AWS #CloudSecurity #Cybersecurity #ThreatDetection #infosec
ThreatBreach (@threatbreach) 's Twitter Profile Photo

🚀 Blog Series Update! The second part of the blog series dives into AWS logging capabilities! Link: blog.threatbreach.io/posts/aws-thre… Learn how to collect logs from S3 buckets, VPC, and more. #AWS #CloudSecurity #Logging #TechBlog #ThreatDetection #CyberSecurity #infosec

🚀 Blog Series Update!
The second part of the blog series dives into AWS logging capabilities!
Link: blog.threatbreach.io/posts/aws-thre…

Learn how to collect logs from S3 buckets, VPC, and more.
#AWS #CloudSecurity #Logging #TechBlog #ThreatDetection #CyberSecurity #infosec
ThreatBreach (@threatbreach) 's Twitter Profile Photo

🚀 New Blog Alert: AWS Threat Detection Series 🚀 Link: blog.threatbreach.io/posts/aws-thre… Explore how CloudTrail logs can detect attacks in AWS environments. Learn to map activities to the MITRE ATT&CK Framework. #AWSSecurity #CloudSecurity #ThreatDetection #CloudTrail #MITREATTACK

🚀 New Blog Alert: AWS Threat Detection Series 🚀
Link: blog.threatbreach.io/posts/aws-thre…

Explore how CloudTrail logs can detect attacks in AWS environments. Learn to map activities to the MITRE ATT&CK Framework.

#AWSSecurity #CloudSecurity #ThreatDetection #CloudTrail #MITREATTACK
ThreatBreach (@threatbreach) 's Twitter Profile Photo

🚀 AWS Threat Detection Part 3 - II Link: blog.threatbreach.io/posts/aws-thre… In the last part, we reviewed CloudTrail logs to investigate suspicious activity. In this part let's analyse ARN & IPs and build a timeline. #CloudSecurity #AWSSecurity #ThreatDetection #CloudTrail #ThreatHunting

🚀 AWS Threat Detection Part 3 - II
Link: blog.threatbreach.io/posts/aws-thre…

In the last part, we reviewed CloudTrail logs to investigate suspicious activity. In this part let's analyse ARN & IPs and build a timeline.

#CloudSecurity #AWSSecurity #ThreatDetection #CloudTrail #ThreatHunting
Satyender Yadav (@thedeadthinker) 's Twitter Profile Photo

🚨 Master #MemoryForensics: New Series Coming Soon on ThreatBreach! 🚨 It will cover: - How memory works & acquiring, analysing memory from systems - Using #VolatilityFramework & Developing plugins (not pstree & pslist 😉) - Hunting & uncovering hidden malware, processes etc.

🚨 Master #MemoryForensics: New Series Coming Soon on <a href="/threatbreach/">ThreatBreach</a>! 🚨
It will cover:
- How memory works &amp; acquiring, analysing memory from systems
- Using #VolatilityFramework &amp; Developing plugins (not pstree &amp; pslist 😉)
- Hunting &amp; uncovering hidden malware, processes etc.
ThreatBreach (@threatbreach) 's Twitter Profile Photo

Part 1 of Memory Forensics Mastery series! 🔍 Link: blog.threatbreach.io/posts/memory-f… Topics include: 🎯Why memory forensics matters 🎯What is Virtual memory and Virtual to physical address mapping 🎯Paging, fragmentation & segmentation #MemoryForensics #CyberSecurity #DigitalForensics

Part 1 of Memory Forensics Mastery series! 🔍
Link: blog.threatbreach.io/posts/memory-f…

Topics include:
🎯Why memory forensics matters 
🎯What is Virtual memory and Virtual to physical address mapping
🎯Paging, fragmentation &amp; segmentation 

#MemoryForensics #CyberSecurity #DigitalForensics
ThreatBreach (@threatbreach) 's Twitter Profile Photo

🚨[ Memory Forensics Mastery Part - 2 ] Acquisition of Memory Evidence 👉Link:blog.threatbreach.io/posts/memory-f… Topics Include: 🎯Why memory acquisition matters in DFIR 🎯Methods: live analysis, crashdump files & more 🎯Tools and more #DFIR #MemoryForensics #IncidentResponse #BlueTeam

🚨[ Memory Forensics Mastery Part - 2 ] Acquisition of Memory Evidence
👉Link:blog.threatbreach.io/posts/memory-f…

Topics Include:
🎯Why memory acquisition matters in DFIR
🎯Methods: live analysis, crashdump files &amp; more
🎯Tools and more

#DFIR #MemoryForensics #IncidentResponse #BlueTeam
ThreatBreach (@threatbreach) 's Twitter Profile Photo

🚨 New Lab Alert! Container At Risk 🐳 Link: lab.threatbreach.io/labs/container… Explore a hands-on Linux server compromise lab. Investigate CVE exploitation, Docker escape, privilege escalation, and persistence. #Cybersecurity #Linux #Docker #CVE #DFIR #Forensics #IncidentResponse

🚨 New Lab Alert! Container At Risk 🐳
Link: lab.threatbreach.io/labs/container…

Explore a hands-on Linux server compromise lab. Investigate CVE exploitation, Docker escape, privilege escalation, and persistence. 

#Cybersecurity #Linux #Docker #CVE #DFIR #Forensics #IncidentResponse