0x534c Profile Banner
Steven Lim Profile
Steven Lim

@0x534c

Followers
2K
Following
189
Media
156
Statuses
247

#Cybersecurity #Sentinel #DefenderXDR #KQL #KQLWizard

Singapore
Joined May 2009
Don't wanna be here? Send us removal request.
@0x534c
Steven Lim
1 month
๐Ÿ›ก 300 KQLs on !!! ๐ŸŽ‰๐ŸŽ‰๐ŸŽ‰. ๐Ÿ† A major milestone reaching the 300 series and a double-digit % contributor of this repository.๐Ÿง™โ€โ™‚๏ธ. #Cybersecurity #SlimKQL #KQLWizard
Tweet media one
1
6
49
@0x534c
Steven Lim
11 hours
๐Ÿ•ต๏ธโ€โ™‚๏ธ New Detection Drop "You enumerate. I correlate. You exfil. I alert." ๐Ÿ”ฅ. Just shipped a Sentinel KQL detection for NauthNRPC โ€” a stealthy RPC-based AD recon tool. ๐Ÿ” Built to catch the quiet ones before they get loud.
Tweet media one
0
8
46
@0x534c
Steven Lim
15 hours
๐Ÿš€ launched ~1.5 weeks ago and already hit: ๐Ÿ‘ฅ 3K+ members ๐Ÿ›ก๏ธ 182+ detections (KQL, Sigma, YARA, Splunk, Elastic. ). Thatโ€™s ~18 detections/day! ๐Ÿ”ฅ.Join the global defender community & contribute! . ๐Ÿ”— Use invite code: Slim2025. #DefenderUnite
Tweet media one
2
11
91
@0x534c
Steven Lim
2 days
Storm 1811 SE Attack Detection. 1: Email Bombing.2: Microsoft Teams Impersonation.3: Remote Access via Quick Assist.4: Deploy Black Basta ransomware .
Tweet media one
0
14
88
@0x534c
Steven Lim
2 days
A KQL behavioural detection of the new #DEVMAN ransomware. Link: #Cybersecurity #DefenderXDR.
@anyrun_app
ANY.RUN
6 days
๐Ÿšจ #DEVMAN is a customized #ransomware variant of the #DragonForce RaaS. It's run by a threat actor that's already leaked data of 40 victims across Asia, Europe, LATAM, and Africa. Explore technical analysis from @MauroEldritch ๐Ÿ‘‡.
0
6
21
@0x534c
Steven Lim
2 days
Mail Bomb Mayhem? KQL to the Rescue. Spotted a mail bomb attack originating from 30+ sender IPs. Leveraged KQL to trace the source and identify the ISPs involved. Visibility matters.๐Ÿ›ก๏ธ.
Tweet media one
0
8
47
@0x534c
Steven Lim
5 days
SlimKQL Community Group. Hi all, I have migrated all my 338 KQLs from the GitHub Repo to SlimKQL Community Group. If you would like to get updates on my latest KQL detections, please do "FOLLOW" this community group. Thank you!. Steven ๐Ÿ˜„
Tweet media one
1
6
48
@0x534c
Steven Lim
5 days
Blind Eagle infrastructure exclusively leverages VBS files as its initial attack vector, relies heavily on free Dynamic DNS (DDNS) services, and deploys read RATs as a second-stage malware. KQL:.
Tweet media one
0
3
23
@0x534c
Steven Lim
6 days
๐ŸชฑLateral Movement Analysis KQL. Automatic Attack Disruption: A KQL query designed to provide statistics on the number of hosts and ports that the rogue quarantine device has connected to, supporting lateral movement investigation.
Tweet media one
1
21
113
@0x534c
Steven Lim
7 days
Automatic Attack Disruption Monitoring. #DefenderXDR #AutomaticAttackMonitoring
Tweet media one
1
3
24
@0x534c
Steven Lim
7 days
Unit42 - 500+ Phishing Domains Impersonating MS Login Pages. Adversary are leveraging over 500+ newly registered .shop domains, likely created via DGA to conduct phishing campaigns impersonating MS login pages. All-in-one scan:.
Tweet media one
3
23
114
@0x534c
Steven Lim
8 days
๐Ÿ“ฌ Detecting EXO Graph Enumeration Spot abnormal M365 reconnaissance via Exchange Online using ActorInfoString + ML-powered CloudAppEvents. Ideal for catching attackers probing with compromised accounts.
Tweet media one
0
14
59
@0x534c
Steven Lim
8 days
๐Ÿ˜‡โœŒ๏ธ - Successfully renewed!. PS: I do observed there are more questions on Security Copilot with Microsoft Sentinel . #Cybersecurity #MicrosoftCertification #SecurityOperations
Tweet media one
0
0
14
@0x534c
Steven Lim
8 days
When combined with machine learning analytics from CloudAppEvents, this enriched context helps surface uncommon or anomalous user activity, significantly boosting the accuracy of threat detection in Exchange Online.
1
0
0
@0x534c
Steven Lim
8 days
Starting June, the introduction of ActorInfoString brings added transparency by capturing the True UserAgentโ€”providing deeper insight into the origin of actions within your Exchange Online environment.
1
0
1
@0x534c
Steven Lim
8 days
Detect anomalous external OAuthApp activity using ๐Ÿ†•ActorInfoString ๐Ÿ”ฅ. KQL Code:.
Tweet media one
2
31
152
@0x534c
Steven Lim
9 days
๐—ฆ๐—ฐ๐—ฎ๐˜๐˜๐—ฒ๐—ฟ๐—ฒ๐—ฑ ๐—ฆ๐—ฝ๐—ถ๐—ฑ๐—ฒ๐—ฟ ๐Ÿ•ท๏ธ. According to Unit 42, the threat actor is now targeting aviation industry. Using the Unit 42 IOCs, I have crafted a DefenderXDR KQL to scan the MDE telemetry for the past 30 days. KQL code:.
Tweet media one
3
15
117
@0x534c
Steven Lim
9 days
0
2
5
@0x534c
Steven Lim
9 days
Researchers at Securonix identified a sophisticated malware campaign named ๐—ฆ๐—˜๐—ฅ๐—ฃ๐—˜๐—ก๐—ง๐—œ๐—ก๐—˜#๐—–๐—Ÿ๐—ข๐—จ๐——, which exploits ๐—–๐—น๐—ผ๐˜‚๐—ฑ๐—ณ๐—น๐—ฎ๐—ฟ๐—ฒ ๐—ง๐˜‚๐—ป๐—ป๐—ฒ๐—น infrastructure to deliver Python-based malware to Windows systems.
Tweet media one
1
8
25
@0x534c
Steven Lim
10 days
๐Ÿ”ย is a growing hub for community-driven detection rulesโ€”KQL, Sigma, YARA, Splunk & more. I've migrated across my 300+ KQL rules @SlimKQL and will continue sharing new ones. Catch them all here ๐Ÿ‘‰ @KQLWizard ๐Ÿ˜‰๐Ÿ”ฅย ย . Invitation Code: Slim2025
Tweet media one
3
38
197
@0x534c
Steven Lim
11 days
0
1
4