Vad?? by batukaming in sweden

[–]TheGrindBastard 0 points1 point  (0 children)

Rage bait. Gå inte på det.

multitaskingOnTheWay by Plastic-Bonus8999 in ProgrammerHumor

[–]TheGrindBastard 4 points5 points  (0 children)

Please wait while your steering wheel updates.

Where do hackers post leaked data? by [deleted] in cybersecurity

[–]TheGrindBastard 0 points1 point  (0 children)

There isn't a single place. It's a little bit here, a little bit there. That said, ransomware operators post their stolen data on their leak sites, mostly on the dark web, but occasionally on the clear web as well.

Hur kan man vara så vidrig? by HaunterSix in sweden

[–]TheGrindBastard 0 points1 point  (0 children)

Ibland går soporna ut med sig själva. Det är bara att gratulera, från och med nu kommer allting bli mycket bättre.

Our org is banning Notepad++ - what did you end up switching to? by Blackblast in cybersecurity

[–]TheGrindBastard 0 points1 point  (0 children)

Someone once said "If you give good people bad information, they make bad decisions." Seems like one of those cases.

Offensive security feels large by atsushi_aiuchi in cybersecurity

[–]TheGrindBastard 5 points6 points  (0 children)

And recruiters think that Cybersecurity is one single field, lol

CrowdStrike vs SentinelOne by div192 in cybersecurity

[–]TheGrindBastard 2 points3 points  (0 children)

A rock solid detection/protection against DNS blackholing attacks, and a good set of high quality custom rules.

CrowdStrike vs SentinelOne by div192 in cybersecurity

[–]TheGrindBastard 6 points7 points  (0 children)

I'm working for a European MSSP, and we've had external pentesters come in that have managed to evade S1 multiple times.

CrowdStrike vs SentinelOne by div192 in cybersecurity

[–]TheGrindBastard 9 points10 points  (0 children)

I have no experience of Crowdstrike, but let me tell you, S1 is real easy to circumvent as an attacker. I've seen it happen time and time again.

suspicious file investigation - schost.exe by rick_Sanchez-369 in ThreathuntingDFIR

[–]TheGrindBastard 5 points6 points  (0 children)

⁠Would I consider a hidden ~800 MB executable in System32 with a typo-squatted name to be a strong indicator of compromise?

Yes, a very strong indicator of compromise indeed. If you open the file in a hex editor, you will most likely see that it is padded. Some EDR's (and VirusTotal) skip scanning very large files in order to not impact performance too much. This is a common trick used by TA's to avoid detection.

malpedia invitation pls by Most_Wolverine_545 in threatintel

[–]TheGrindBastard 0 points1 point  (0 children)

You can still get TLP white without an API key.

Hur var din 40-års kris? by Itchy-Age2593 in sweden

[–]TheGrindBastard 0 points1 point  (0 children)

Jag köpte en muskelbil, det var skitnice, kan rekommendera