
What can the History database of Edge reveal about downloads and searches?

Blue Teamers are the first (and sometimes last) line of defense in the ongoing cyber war. This place is to chat out detection strategies, complain about SIEMs, compare SOAR playbooks, or post mean memes about the Red Team.
Vulnerability Management Software
I need some help here. I'm looking for vulnerability management software that accepts data from vulnerability scanners (Tenable.io and Nessus in my case) and allows for analysts to review the scanned vulnerabilities for further action. This will mostly be in creating tickets, but I want analysts to be able to group vulns together where appropriate (e.g., one system has a ton of vulns because it's obviously been left out of an automated patching program, the solution is not to patch each vulnerability but to include it in the automation) and create tickets appropriately. It also need to support simple Risk Acceptance workflows (no giant approval chains, but likely more just analysts grouping and marking sets of vulns as RA). Finally, it needs to be multi-tenant or at least have some siloing capabilities.
We are currently using Tenable.io for on-going vulnerability scanning in some smaller clients, but the vulnerability management functionality is severely lacking. I've looked at Nucle
Security Control Frameworks
I'm not a vendor, I'm just curious what experience people have with implementing security control frameworks?
DOD uses DISA STIGs. Else uses CIS benchmarks, or self developed based of NIST CSF?
To what degree is your organization using any of these?
Are they enforced? Monitored?
Using any vendor solutions that don't suck?
Does anyone care except you (hopefully π)
Vulnerability Assessments
I'm curious what tools, SaaS, or other solutions are being used for vulnerability assessments?
DOD calls it ACAS, which is just an acronym for required assessment program of record they currently fullfil with Nessus scanner and related vender solutions.
Anyone have Nessus experience that can compare to another vendor? Good, bad, etc?
What can the History database of Edge reveal about downloads and searches?
I did a dive into what you can get out of the Edge (and probably Chrome(ium)) History sqlite database. It logs quite detailed data - useful for forensics!
ALFA: Automated Audit Log Forensic Analysis for Google Workspace
ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit logs and to perform automated forensic analysis on the audit ...
Automated Audit Log Forensic Analysis (ALFA) for Google Workspace is a tool to acquire all Google Workspace audit logs and perform automated forensic analysis on the audit logs using statistics and the MITRE ATT&CK Cloud Framework.
By Greg Charitonos and BertJanCyber
Hacktivists with exaggerated claims again?
Microsoft has denied the claims of the so-called hacktivists "Anonymous Sudan" that they breached the company's servers and stole credentials for 30 million customer accounts.
The hacktivist group Anonymous Sudan claims to have breached Microsoft and stolen credentials from 30 million customers. Microsoft says they are lying. The group has done a lot of DDoS attacks, and claimed much bigger impact than they really have had. Exaggerated claims may lead to increased "panic state" at the top of the corporate food chain. How do you communicate about threat groups making bold statements like this to your higher ups or customers?
ISO27001/27002 - Am I missing something?
TL;DR: Is ISO27001 easy or am I just too dumb to see the complexity?
Hi!
Just wanted to start some conversation on a standard that's sorta kinda infamous where I'm currently at, the ISO27001 standard.
I got tasked with "polishing up an ISMS" for a company and while I can't go into details, I got basically a control name (from 27002:2022) and a description of "what we need it to do." Now that I got into it, I feel that I may be missing something. Most of their controls are "Limit access to server room" or "Make sure access is logged and not permanent."
Like, the standard is not difficult reading, but if they can explain to ME how the controls should look in the end, what am I missing? Is there some extremely difficult part? Or can I just say "Just make the creds timeout after a month. Source: dude trust me?"
If you were tasked with implementing ISO27001, did you encounter any specific hurdles that I may not see from where I'm standing? The only thing I can see after I got throu
Excel as log analysis tool?
I have found Excel to be quite useful for collecting data, doing summary analysis of logs, etc. I also liked this blog post from Mandiant, about using Excel to timeline artefacts with very different structure. It takes a bit of work using find, left, mid, right, concat, etc, but then it is quite useful! Another good thing is that a lot of people are better at creating Excel sheets than doing XPath queries.
Anyone else using Excel for DFIR, and how do you use it?
Container security fundamentals series
A look at how containers work as Linux processes and what that means for security.
cross-posted from: https://infosec.pub/post/86834
This is an excellent series on container security fundamentals by Rory McCune who is a bit of an authority in this field:
Enterprise Purple Teaming: an Exploratory Qualitative Study
Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen. - GitHub - ch33r10/EnterprisePurpleTeaming: Purple Team Resources for Enterprise Purple Teaming:...
Learn how to use the geo_info_from_ip_address() function to retrieve geolocation information about IPv4 or IPv6 addresses.
If we are going to build a good community, we need some content! Here's a new feature in Kusto I have found useful in Sentinel, making it easier to do geolocation lookups in queries: geo_in_from_ip_address.
If we all share a little trick or something we have recently learned now and then, this will be a useful community!
Reports from MSSP's - what do people actually care about?
Whether you are a buyer of security services, or a provider of them, what metrics, visuals, information is actually important to customers? What is the preferred way to consume reports - emails, dashboards, PDF reports, chat bots, smoke signals? Any thoughts and inputs much appreciated!
As a result of user applications increasingly registering actual β.zipβ files as URLs, these filenames may trigger unintended DNS queries or web requests, thereby revealing possibly sensitive or internal company data in a fileβs name to any actor monitoring the associated DNS server
Some more context around the .zip domains.
Red team posted their version
Tools and Techniques for Blue Team / Incident Response - GitHub - A-poc/BlueTeam-Tools: Tools and Techniques for Blue Team / Incident Response
What does your security organization look like?
π Hello all! So, how big is your security organization and how are responsibilities split across teams?
I've been through I don't know how many reorgs and seen quite a few place, and while some patterns emerge it's always interesting to see how Security is split up.
In my current company we evolved from:
Second MOVEit Vulnerability
But instead of pissing on them... Bravo for enlisting the help of @huntress to do a code review. This vuln is NOT being actively exploited... yet.
https://www.progress.com/security/moveit-transfer-and-moveit-cloud-vulnerability