#Detectionengineering

Claus Cramon Houmannclaushoumann
2026-02-04

Know any good who aren't white males? Please propose, wanna follow them! :)

2026-02-02

ShadowHS highlights a shift in Linux malware toward fileless, operator-driven tradecraft.

Key observations include in-memory loaders, encrypted payloads, argv masquerading, SSH-based lateral movement, and exfiltration over non-standard user-space channels. Detection depends more on behavioral signals than traditional signatures.

How are teams adapting Linux monitoring for memory-resident threats?

Source: cyberpress.org/shadowhs-spread

Follow @technadu for measured, research-driven security insights.

#InfoSec #LinuxThreats #MalwareResearch #DetectionEngineering #CyberDefense #TechNadu

ShadowHS Fileless Malware Targets Linux Systems With Automated Spread
2026-01-27

I've released my new course:
Practical Threat Hunting for Beginners

Larn the core knowledge and practical skills required to perform effective threat hunting in real-world environments.

academy.bluraven.io/course/pra

#ThreatHunting #detectionengineering

⚯ Michel de Cryptadamus ⚯cryptadamist@universeodon.com
2026-01-26

Released v1.3.3. of #Yaralyzer, my surprisingly popular tool for visualizing YARA rule matches with colors (a lot of colors).

1. --export-png images lets you export images of the analysis

2. almost all command line options (including multi argument ones like --yara-rules-dir) can be permanently set via environment variables or .yaralyzer file

3. couple of small bug fixes and debugging related command line options

You can try it on the web here: yaratoolkit.securitybreak.io/
(I didn't build this website, Thomas Roccia from Microsoft just integrated Yaralyzer into his existing site)

- Github: github.com/michelcrypt4d4mus/y
- Pypi: pypi.org/project/yaralyzer/
- on macOS you can also get it with #Homebrew by installing Pdfalyzer: brew install pdfalyzer

#ascii #asciiArt #blueteam #cybersecurity #detectionEngineering #DFIR #forensics #FOSS #GPL #hacking #infosec #KaliLinux #maldoc #malware #malwareAnalysis #malwareDetection #openSource #pypi #python #redteam #reverseEngineering #reversing #Threatassessment #threathunting #YARA #YARArule #YARArules

screenshot of yaralyzer output
2026-01-22

As AI adoption in SOCs accelerates, benchmarks are becoming de facto decision tools — yet many still evaluate models in controlled, exam-like settings.
Recent research highlights consistent issues:
• Security workflows reduced to MCQs
• Little measurement of detection or containment outcomes
• Heavy reliance on LLMs judging other LLMs

These findings reinforce the need for workflow-level, outcome-driven evaluation before operational deployment.

Source: sentinelone.com/labs/llms-in-t

Thoughtful discussion encouraged. Follow @technadu for practitioner-focused AI and security analysis.

#SOC #ThreatHunting #AIinInfosec #LLMs #SecurityResearch #DetectionEngineering

LLMs in the SOC (Part 1) | Why Benchmarks Fail Security Operations Teams
2026-01-21

It looks like #BSidesLuxembourg will have a #detectionengineering village. If that’s something you want to contribute to, please be in touch asap as we start defining what that will be implemented as asap

#bsides

DEF CON Group 420dcg420
2025-12-31

‼️We are introducing a tool for the first time…

🔨Hefaistos - AI assisted Detection-as-Code platform

📅 We are starting on January 31, 2025

Details and waiting list here - blog.dcg420.org/from-static-te

2025-12-28

I'm @ #39c3. If you like to talk about #blueteam topics you can reach me via DECT 7544 or DM. I would love to brainstorm about a #sovereign SOC stack. #detectionengineering #difr

2025-12-20

It's been a bit light on news over the last 24 hours, but we've got some significant updates on law enforcement actions against cybercriminals and an interesting development in ransomware capabilities. Let's dive in:

Law Enforcement Cracks Down on Ransomware and ATM Jackpotting ⚖️
- Two former cybersecurity professionals, a manager of incident response and a ransomware negotiator, pleaded guilty to participating in ALPHV/BlackCat ransomware attacks, causing over $9.5 million in losses and highlighting the insider threat risk.
- A Ukrainian national pleaded guilty to involvement in Nefilim ransomware attacks, which targeted high-revenue companies in the US and Europe, with authorities still actively pursuing a co-conspirator and offering an $11 million reward.
- The US Department of Justice has indicted 54 individuals linked to the Venezuelan Tren de Aragua (TdA) terrorist organisation for a multi-million dollar ATM jackpotting scheme using Ploutus malware, with $40.73 million lost since 2021.

🤫 CyberScoop | cyberscoop.com/incident-respon
🤫 CyberScoop | cyberscoop.com/nefilim-ransomw
📰 The Hacker News | thehackernews.com/2025/12/us-d

RansomHouse Levels Up Its Encryption Game 🛡️
- The RansomHouse ransomware-as-a-service (RaaS) operation has upgraded its encryptor to a new variant, dubbed 'Mario', moving from a simple linear technique to a more complex, multi-layered, two-stage encryption process.
- 'Mario' introduces dynamic chunk sizing at an 8GB threshold, intermittent encryption, and uses complex mathematics to determine processing order, making static analysis and reverse engineering significantly more difficult.
- These enhancements provide stronger encryption results, faster speeds, and better reliability, increasing the leverage for threat actors during post-encryption negotiations.

🤖 Bleeping Computer | bleepingcomputer.com/news/secu

#CyberSecurity #ThreatIntelligence #Ransomware #LawEnforcement #Cybercrime #ATMJackpotting #Malware #InfoSec #IncidentResponse #DetectionEngineering

2025-12-20

I strongly recommend anyone looking to learn hands-on detection engineering or threat hunting (or even seasoned vets looking to sharpen their skills) to attend DEATHcon. I’ve been running through the workshops during my holiday breaks and it’s one of the most hands-on conferences I have attended. Build a VM and connect to the deathcon network via tailscale to play with all sorts of log types to cut your teeth on. The course is well run, speakers are super responsive to requests via their discord channel, and the hosts gratefully keep the infra up through the end of the year so you can practice at your own pace. They also ran a RMM rodeo competition which resulted in a whole bunch of new RMM tools getting pulled into to the main LOLRMM project. My only regret is I haven’t worked through all the workshops because there are so many. Tickets went super fast for 2025, so be sure to grab one as soon as they go up for sale in 2026! You cannot beat the price for both the quantity and quality of material you receive.

deathcon.io/

#threatintelligence #cti #threathunting #detectionengineering #soc

Tedi Heriyantotedi@infosec.exchange
2025-12-20
Tedi Heriyantotedi@infosec.exchange
2025-12-20
Claus Cramon Houmannclaushoumann
2025-12-18

If you're doing or -> submit to the @BSidesLuxembourg CFP, we are brewing something really interesting for you!

2025-12-10

Help us build an awesome event this upcoming May!

Submit to our CFP, help us get our villages, workshop day and talk tracks over 2 days to be awesome!

Maybe a cloudsec village or cloud track?

We're seriously trying to build a #detectionengineering village or track.

How about AI security?

An offensive village?

We already got some promising submissions - 2 villages proposed and under evaluation (Car hacking, CTI).

Claus Cramon Houmannclaushoumann
2025-12-10

Despite the promising title of this blog post by John Vester 'Why the MITRE ATT&CK Framework Actually Works', its a load of crock.

You can't and shouldn't use MITRE &CK to prove any sort of detection coverage or 'strong points'. At best, you can prove total absence in certain subtechniques.

If you want to do any sort of data driven you need -> there's no way around it.

levelup.gitconnected.com/why-t

ATT&CK is still ♥️ 😍 tho.

🎤 The Autonomous SOC (Taylor’s Version)
Guest post with Kassandra Murphy

AI hype is loud. Most teams are just automating chaos.
Fix the basics first. Then scale the magic.

Read it on THOR Collective Dispatch.
Autonomy doesn’t replace us. It remasters us.

dispatch.thorcollective.com/p/

#autonomousSOC #taylorsversion #cybersecurity #threathunting #SOClife #detectionengineering #automation #THORcollective #infosec #securityoperations

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst