#threatdetection

Stratosphere Research Laboratorystratosphere@infosec.exchange
2025-05-20

Welcome Recon Wave as an organizing partner of the Honeynet Project Workshop 2025 in Prague!

Recon Wave is a powerful attack surface monitoring platform that requires no installation or internal access. From continuous risk tracking to subdomain takeover prevention, they help organizations stay ahead of threats before attackers do.

๐Ÿ“… June 2โ€“4, 2025
๐Ÿ“ NTK, Prague
๐Ÿ”— prague2025.honeynet.org

#Honeynet2025 #Cybersecurity #ThreatDetection #SecurityMonitoring #SOC #Deception

mansi18mans18
2025-05-19

Understanding the difference: ๐๐ž๐ญ๐ฐ๐จ๐ซ๐ค ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ข๐ฌ & ๐•๐ข๐ฌ๐ข๐›๐ข๐ฅ๐ข๐ญ๐ฒ helps you see what's happening, while ๐๐ž๐ญ๐ฐ๐จ๐ซ๐ค ๐ƒ๐ž๐ญ๐ž๐œ๐ญ๐ข๐จ๐ง & Response helps you act on it. Know both. Secure better.

Join our Cybersecurity training - infosectrain.com/cybersecurity

2025-05-18

A new talk from BSidesFrankfurt 2024 is now live on YouTube!

Zero Trust - Attack and Defend by Aaron Jewitt
Aaron shows how Elastic built advanced automation into their SIEM to reliably detect novel attacks in a Zero Trust environment - without overwhelming analysts with false positives. Learn how to automate alerts for suspicious API token or key use from outside your environment and get practical insight into defending modern infrastructures.

Watch now: youtu.be/kkEtCVZiECA

Don't forget to subscribe to our channel for more cutting-edge cybersecurity content!

#BSidesFrankfurt #CyberSecurity #ZeroTrust #SIEM #ThreatDetection #ITSecurity #Infosec

2025-05-16

Graylog is going to #AWSreInforce! ๐ŸŽŠ๐Ÿ•บ We'll have Sam Parikh, Quinn Kroll, Justine Simpson, and Rich Murphy on-site to talk with you at the show. And speaking of Rich Murphy, catch him there, live, on June 17th, 1:30 PM. He'll be talking about taming your alert avalanche. ๐Ÿšจ ๐Ÿ”๏ธ ๐Ÿซข

Are you an SOC analyst drowning in alerts? ๐Ÿค” Learn about a battle-tested playbook for alert noise reduction. Rich will discuss methods to systematically tune out false positives, consolidate redundant alarms, and apply risk-based filtering so that your high-fidelity alerts rise to the top. ๐Ÿ™Œ

See you there! ๐Ÿ‘€

Learn more: registration.awsevents.com/flo

#TDIR #threatdetection #incidentresponse #cybersecurity

Marco Ciappelli๐ŸŽ™๏ธโœจ:verified: :donor:Marcociappelli@infosec.exchange
2025-05-15

This is about to happen! Join us!

How To Detect And Mitigate Non-Human Identity And Crytographic Vulnerabilities โ€” An ITSPmagazine Webinar With SandboxAQ
Thursday, May 15, 2025 | 1:00โ€ฏPM 2:00โ€ฏPM EST

Unmanaged cryptographic assets and non-human identities have left security teams blind to critical risks. These gaps have fueled vulnerabilities, breaches, compliance challenges, and operational drag across enterprise environments.

Join us to see how #AQtiveGuard transforms this landscape.

โœจ crowdcast.io/c/how-to-detect-a

More than just visibility, AQtive Guard unifies your non-human identities and cryptographic assets into a single inventory to deliver end-to-end visibility, deeper risk analysis, and streamlined compliance in a single pane of glassโ€”with automated discovery, real-time threat detection, and root cause analysis powered by their unique LQM.

Seamlessly integrated into your existing stack, itโ€™s the AI-driven SaaS platform built to secure todayโ€™s systemsโ€”and tomorrowโ€™s.

By attending, you will get to:
Discover how to gain unified visibility into cryptographic assets and non-human identities โ€”including API keys, certificates and service accountsโ€”in cloud environments

Explore how AQtive Guard empowers security teams with automated discovery, threat detection, and root cause analysisโ€”enabling faster remediation, reduced risk, and stronger compliance without disrupting existing workflows.

Learn how to future-proof your security posture, with a platform designed for AI Security Operations, Post-Quantum Cryptography readiness, and seamless integration into your existing security stack.

PANELISTS
Marc Manzano
General Manager of Cybersecurity, SandboxAQ
MODERATORS
Sean Martin, CISSP Co-Founder, ITSPmagazine
Marco Ciappelli Co-Founder, ITSPmagazine

Canโ€™t attend the live webinar? All registrants get exclusive access with a link to rewatch the recording.

Register To Attend: crowdcast.io/c/how-to-detect-a

#cybersecurity, #cryptography, #AIsecurity, #infosec, #webinar, #securitytools, #threatdetection, #cloudsecurity, #sandboxAQ, #ITSPmagazine #tech #technology #quantum

mansi18mans18
2025-05-14

Discover the key differences between traditional ๐ญ๐ž๐ฑ๐ญ-๐›๐š๐ฌ๐ž๐ ๐ฅ๐จ๐ ๐ฌ ๐š๐ง๐ ๐ฌ๐ญ๐ซ๐ฎ๐œ๐ญ๐ฎ๐ซ๐ž๐ ๐–๐ข๐ง๐๐จ๐ฐ๐ฌ ๐„๐ฏ๐ž๐ง๐ญ ๐‹๐จ๐ ๐ฌ โ€” from format and readability to system integration and analysis capabilities.

Join our SIEM course - infosectrain.com/courses/ibm-s

๐Ÿ’ฅ New SPL Dispatch drop from : eventstats ๐Ÿ’ฅ

Want to flag weird behavior without losing raw data? eventstats lets you compare each event to the group without rolling things up.

Read it here ๐Ÿ‘‰ dispatch.thorcollective.com/p/

#splunk #threathunting #threatdetection #cybersecurity #thrunting #THORcollective #infosec

๐Ÿ’ก New guest drop on THOR Collective Dispatch: Detection-in-Depth by Day Johnson.

Day explains how to build layered, resilient detection that holds up under real-world pressure, from tuning OOTB rules to threat emulation and kill chain coverage.

If you care about catching adversaries before the damage is done, start here.

dispatch.thorcollective.com/p/

#threathunting #thrunting #detectionengineering #cybersecurity #THORcollective #threatdetection

Marco Ciappelli๐ŸŽ™๏ธโœจ:verified: :donor:Marcociappelli@infosec.exchange
2025-05-08

As you know โ€” well, now you do ๐Ÿ˜ฌ โ€” Marco Ciappelli and Sean Martin, CISSP, are now hosting webinars on ITSPmagazine!

Yes, webinars are everywhere โ€” but these are different:
ITSPmagazine #Webinars are More Than Just a Presentation.
Theyโ€™re Real Conversations That Matter.

๐ŸŽ™๏ธ Join us live on May 8 (or catch it On Demand) for an incredible conversation with Fred Wilmot.

You already know itโ€™s going to be an awesome one โ€” donโ€™t miss it! โœจ

Rethink, Donโ€™t Just Optimize: A New Philosophy For Intelligent Detection And Response โ€” An ITSPmagazine Webinar With Detecteam

Traditional detection and response is overdue for a rethink. This webinar explores the limits of optimization, the danger of misleading metrics, and a new approach focused on adaptability, behavior-driven signals, and speed. See how Detecteamโ€™s REFLEX Platform helps teams turn weak signals into fast, actionable detectionsโ€”before attackers have time to move.

REGISTER: crowdcast.io/c/rethink-dont-ju

#cybersecurity, #detectionandresponse, #threatdetection, #incidentresponse, #securityoperations, #infosec, #cyberdefense, #securitystrategy, #threatintel, #detecteam #infosecurity

Marco Ciappelli๐ŸŽ™๏ธโœจ:verified: :donor:Marcociappelli@infosec.exchange
2025-05-07

๐ŸŽ™๏ธ Is static rule-based detection holding security teams back? In this On Location Briefing from #RSAC2025, we dive into why detection needs to evolve โ€” and what the future could look like when it does.

๐Ÿš€ New Briefing from #RSAC 2025: Fixing the Detection Disconnect โ€” Rethinking Detection from Static Rules to Living Signals

At RSA Conference 2025, Sean Martin, CISSP caught up with Fred Wilmot (Co-Founder & CEO) and Sebastien Tricaud (Co-Founder & CTO) of Detecteam to talk about why detection canโ€™t stay stuck in the past โ€” and how โ€œliving signalsโ€ can offer a more dynamic, context-aware approach to threat identification.

๐Ÿ” How can teams move beyond brittle, static rules to real-time, adaptable detection strategies?

Find out how Detecteam is helping organizations move away from outdated IOCs toward purpose-built, testable detections that actually evolve as threats do.

๐ŸŽ™๏ธ Watch, listen, or read the full conversation here:
๐Ÿ‘‰ itspmagazine.com/their-stories

๐Ÿ“Œ Learn more about Detecteamโ€™s work:
๐Ÿ‘‰ itspmagazine.com/directory/det

๐Ÿ›ฐ๏ธ See all our RSAC 2025 coverage:
๐Ÿ‘‰ itspmagazine.com/rsac25

๐ŸŒŸ Discover more On Location Conversations, Brand Stories, and Briefings:
๐Ÿ‘‰ itspmagazine.com/brand-story

๐ŸŽฅ๐ŸŽ™๏ธ This is just one of the many incredible conversations we recorded On Location in San Francisco, as Sean Martin and Marco Ciappelli covered the event as official media partners for the 11th year in a row.

Stay tuned for more Briefings, Brand Stories, and candid conversations from RSAC 2025!

๐ŸŽค Looking ahead:
If your company would like to share your story with our audiences On Location, weโ€™re gearing up for #InfosecurityEurope in June and #BlackHatUSA in August!

โšก RSAC 2025 sold out fast โ€” we expect the same for these next events.
๐ŸŽฏ Reserve your full sponsorship or briefing now: itspmagazine.com/purchase-prog

#cybersecurity #infosec #infosecurity #technology #tech #society #business #threatdetection #livingsignals #moderncybersecurity #detecteam

2025-05-07

State-sponsored threat actors are persistent and cunning, In this blog, read key strategies for implementing an airtight cyber #ThreatDetection strategy, and stay protected. claroty.com/blog/proactive-cyb

2025-05-07

State-sponsored threat actors are persistent and cunning, In this blog, read key strategies for implementing an airtight cyber #ThreatDetection strategy, and stay protected. claroty.com/blog/proactive-cyb

Marco Ciappelli๐ŸŽ™๏ธโœจ:verified: :donor:Marcociappelli@infosec.exchange
2025-05-06

Some more conversations for you, straight from the floor of RSAC 2025!

๐Ÿš€ New Briefing from #RSAC2025: From Overwhelmed to Informed โ€” Strategic Threat Detection for the Future

At #RSAC Conference 2025, Sean Martin, CISSP caught up with Hugh Njemanze, Founder and CEO of Anomali, for a quick but powerful conversation about how the future of threat detection is about more than speed โ€” itโ€™s about strategy.

๐Ÿ” Why are #securityteams overwhelmed by traditional approaches, and how can smarter, faster, more strategic #threatintelligence change the game?
Find out how #Anomali is helping organizations move from reactive defense to proactive security strategies.

๐ŸŽ™๏ธ Watch, listen, or read the full conversation here:
๐Ÿ‘‰ itspmagazine.com/their-stories

๐Ÿ“Œ Learn more about Anomaliโ€™s work:
๐Ÿ‘‰ itspmagazine.com/directory/ano

๐Ÿ›ฐ๏ธ See all our RSA Conference 2025 coverage:
๐Ÿ‘‰ itspmagazine.com/rsac25

๐ŸŒŸ Explore more Briefings and Brand Stories from RSAC 2025:
๐Ÿ‘‰ itspmagazine.com/brand-story

๐ŸŽฅ๐ŸŽ™๏ธ This is just one of the many incredible conversations we recorded On Location in San Francisco, as Sean Martin, CISSP and Marco Ciappelli covered the event as official media partners for the 11th year in a row.

Stay tuned for more Briefings, Brand Stories, and candid conversations from RSAC 2025!

๐ŸŽค Looking ahead:
If your company would like to share your story with our audiences On Location, weโ€™re gearing up for Infosecurity Europe in June and Black Hat USA in August!
โšก RSAC 2025 sold out fast โ€” we expect the same for these next events.
๐ŸŽฏ Reserve your full sponsorship or briefing now: itspmagazine.com/purchase-prog

๐Ÿ“ฒ Hashtags:
#cybersecurity #infosec #infosecurity #technology #tech #society #business #threatdetection #cyberthreatintelligence #strategicsecurity #anomali

2025-05-06

Ever wondered how companies stay one step ahead of cyber threats? External Attack Surface Management maps all digital assets, monitors vulnerabilities in real-time, and prioritizes risks to keep you safe. Curious how it all works?

thedefendopsdiaries.com/enhanc

#easm
#cybersecurity
#digitalrisk
#threatdetection
#incidentresponse

2025-05-02

Let's talk NDR... Seriously, it's non-negotiable for any modern SOC! ๐Ÿ”ฅ

You know how lots of people figure, "Eh, the firewall's got us covered"? Well, think about this: what if the threat actors have *already* slipped past the gates? ๐Ÿค” That's exactly where NDR steps up.

It constantly keeps an eye on your network traffic, sniffing out activity that just looks *off*. We're talking smart tech here โ€“ behavioral analysis, machine learning, up-to-the-minute threat intel... the works.

Funny story, had a client recently ask, "Is this *really* something we need?" My emphatic answer? Absolutely, YES! Skip NDR, and you're basically leaving the door wide open, completely blind to the intruders already poking around inside. ๐Ÿ˜ˆ

So, what's been your experience with NDR? Got any favorite tools you rely on in your stack? I'd love to hear your thoughts โ€“ drop a comment below! ๐Ÿ‘‡

#NDR #Cybersecurity #NetworkSecurity #SOC #ThreatDetection

๐Ÿ”ฅ Dispatch Debrief: April 2025 is live ๐Ÿ”ฅ
From star sign-inspired hunting techniques to effective frameworks for organizing your hunt squad and demonstrating the worth of finding โ€œnothing,โ€ there's something for every threat hunter.

Discover this month's insights from THOR Collective Dispatch: dispatch.thorcollective.com/p/

#thrunting #THORcollective #cybersecurity #threathunting #infosec #threatdetection

2025-04-30

42,000 phishing domains dropped by the FBI โ€“ a bold new tool in the fight against cybercrime. Could this massive data leak be the key to unearthing hidden breaches and fortifying our defenses?

thedefendopsdiaries.com/fbis-r

#fbi
#phishing
#cybersecurity
#infosec
#threatdetection

mansi18mans18
2025-04-30

๐’๐ˆ๐„๐Œ ๐ฏ๐ฌ ๐’๐ˆ๐Œ ๐ฏ๐ฌ ๐’๐„๐Œ โ€“ ๐–๐ก๐ข๐œ๐ก ๐Ž๐ง๐ž ๐ƒ๐จ๐ž๐ฌ ๐–๐ก๐š๐ญ? Letโ€™s break it down! ๐Ÿ‘‡

Join our Cybersecurity Training Course -infosectrain.com/cybersecurity

2025-04-28

Delayed detection in cybersecurity isnโ€™t just a hiccupโ€”it can be a financial and reputational nightmare. The VeriSource breach shows how even a slight delay can cost big. How secure is your system?

thedefendopsdiaries.com/enhanc

#cybersecurity
#databreach
#threatdetection
#infosec
#cyberawareness

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst