IntelScott Profile Banner
TropChaud Profile
TropChaud

@IntelScott

Followers
1K
Following
736
Media
97
Statuses
530

Reluctant security & intelligence practitioner and tool developer. Mainly Tweets about aggregating and visualizing cyber threat & OSINT datasets

Joined September 2018
Don't wanna be here? Send us removal request.
@IntelScott
TropChaud
4 years
On its 1st anniversary, excited to announce the re-launch of MetaOSINT, the #OSINT tool & resource aggregator! v2 contains 900 new resources (5,700+ total) wrapped in an improved UI. The best news? A method for ongoing updates, so stay tuned for more ~weekly additions!
9
40
114
@IntelScott
TropChaud
2 years
I’ve tracked thousands of #OSINT resources over a half-decade via the MetaOSINT project. Here are my thoughts on how the dataset’s evolution might reflect broader trends & changes in the underlying info landscape during a time of major global disruption: https://t.co/ZP5yRcYuFj
0
4
17
@IntelScott
TropChaud
2 years
MetaOSINT v3.0 is live! The first major update in over a year brings 8,000 new resources to the tool, more than doubling the previous tally. But structured categories & citation counts still make it easy to surface popular, relevant #OSINT resources: https://t.co/He1iwDQZfA
0
17
42
@IntelScott
TropChaud
2 years
Long-overdue update (largest yet) to my #OSINT-focused project MetaOSINT coming soon! Adding a ton of new, timely resources to the database while maintaining its hallmark ease of use. Brush back up before the update lands in the coming days: https://t.co/srbAh35Rls
0
8
32
@craignewmark
craig newmark
2 years
Taking a data-driven approach, @GlobalCyberAlln and @TidalCyber 's recent report validates the significant impact basic #cyberhygiene measures have in defense against the most relevant #ransomware methods of attack against #SMBs. Learn more at https://t.co/EZXphxsN1p
0
4
4
@IntelScott
TropChaud
2 years
The rich detail in recent threat reporting is an extremely welcome trend. But the reality is that longer/denser reports can place more burden on teams, if they’re attempting to (or leadership expects them to) thoroughly process each one
1
0
0
@IntelScott
TropChaud
2 years
If you've felt like it's taking longer to get through a typical CTI report lately, you're not wrong
1
1
6
@TidalCyber
Tidal Cyber
2 years
Meet us in Iowa at the 2023 @QCCornCON on 10/5-7. @advemuian will be presenting "Using ATT&CK for Threat Profiling, Defensive Stacks, and Coverage Maps" and "Mind the Gap: From CTI to Defensive Improvements." Use code "TID25" for 25% off! https://t.co/fODEi2HJ8a #mitreattack
0
2
6
@IntelScott
TropChaud
2 years
Wholeheartedly believe that most in the #threatintel, #detectionengineering, and #adversaryemulation spaces can benefit by bookmarking this free-to-use tool as we push regular updates into the platform
@TidalCyber
Tidal Cyber
2 years
We added tons of content across our free Community Edition this week, including #BlackCat/#ALPHV & #ScatteredSpider tool & TTP collections and updates to @elastic & Atomic Red Team capabilities in our Product Registry: https://t.co/v0DuL5Bnhq #ThreatInformedDefense
0
0
3
@josh_murchie
Josh++
2 years
4
14
84
@TidalCyber
Tidal Cyber
2 years
NEW Community Edition content derives from @CISAgov's detailed new advisory. Start w/ the new Campaign object, pivot to dozens of new & updated Tools, Malware, & @MITREattack Technique relationships just added: https://t.co/N72X9jEWn9
0
5
6
@IntelScott
TropChaud
2 years
The value here is organizing the exercise around a recent, prominent threat - recently enhanced Search in @TidalCyber Community Edition helps quickly surface relevant content, & pivoting on mapped @MITREattack techniques expands focus to include variations on observed procedures
0
1
4
@IntelScott
TropChaud
2 years
A set of mini purple team exercises involved a typical cast of characters including @redcanary #AtomicRedTeam tests + @sigma_hq rules run via Chainsaw on logs configured via @olafhartong's Sysmon-Modular config Ultimately we contributed a new test aligned with an existing rule
1
1
2
@IntelScott
TropChaud
2 years
New blog is out, walking through practical workflows for detecting & testing persistence behaviors used by #FlaxTyphoon #APT, entirely via free/community resources
Tweet card summary image
tidalcyber.com
On August 24, Microsoft released details about a newly defined, China-based espionage group known as Flax Typhoon, outlining numerous techniques observed during recent Flax Typhoon intrusions....
1
2
5
@IntelScott
TropChaud
2 years
Definitely feels like there’s ample space for more practical guidance around baselining, an essential part of the hunting discipline. Looking forward to the next piece!
@ateixei
Alex Teixeira
2 years
@Kostastsale @bohansec I see my message is getting across 👊 I’m also curious to see how others do it as much is spoken but very little shared. Hope this one inspires the willing to get started (a “how to” is on the making) https://t.co/Dc0rUYZNvh
0
0
1
@IntelScott
TropChaud
2 years
New adversary intel, defensive resources, & collections of threats added to the free version of the Tidal platform this week. The redesigned homepage makes it easy to keep track of the top highlights
@TidalCyber
Tidal Cyber
2 years
Our new Community Edition Splash Page is only a few days old but already received its first update, as our teams published fresh content throughout the platform this week. Explore all the timely highlights on the recently redesigned home page here: https://t.co/ISzmp2gbag
0
2
2
@RichardStruse
Richard Struse
2 years
#ATTACK + the latest, breaking OSINT + FREE = Tidal Community Edition!
@TidalCyber
Tidal Cyber
2 years
Summarize the 130+ #TTPs associated with the new #LockBit actor & tool objects added to Tidal’s free Community Edition this week: https://t.co/YjROXq5Qew Click the ribbon labels for more object details & any matrix cell for linked analytics, capabilities, data sources, & more!
0
2
5
@TidalCyber
Tidal Cyber
2 years
Today we released another round of Tidal-authored threat objects in our freely available Community Edition! The latest updates feature 6 new & 4 updated objects, and dozens of associated #TTPs. Access links to all the new content here: https://t.co/oXBIVB0C8m #threatintel
0
3
5
@IntelScott
TropChaud
2 years
We added an original #mitreattack-style object for #BianLian to @TidalCyber's Community Edition, which links to 16 more new & updated objects representing key malware & tools used by BianLian operators:
0
2
4
@IntelScott
TropChaud
2 years
#BianLian is a trending extortion threat, a leading example of a wider landscape trend that sees many #ransomware actors emphasizing data exfil over traditional encryption attacks BianLian actors have claimed hundreds of victims around the world during just a year of operations
1
3
9
@TidalCyber
Tidal Cyber
2 years
One of the Tidal-authored threat objects recently added to our Community Edition covers #BianLian, a #ransomware-turned-data theft operation: https://t.co/wZVwfBhH0r Explore all the #mitreattack knowledge base extensions added to our free platform: https://t.co/nrXu5t83MZ
1
3
5