
Nde
@YourNextCISO
Followers
394
Following
13K
Media
173
Statuses
2K
SOC Analyst || 💙 Blue Team journey || #cybersecurity👨🏿💻
Douala, Cameroon.
Joined November 2022
RT @T3chFalcon: Decrypting Edge Browser Passwords. Modern Edge/Chrome encrypt saved logins with AES-GCM. Step 1: Extract AES key from the….
0
46
0
RT @bluecapesec: 🔷 Want to learn real Windows forensics?.Join our live walkthrough of a real-world compromise + see what a structured fore….
0
2
0
RT @OtterHacker: Okta chained with Azure with auto MFA subscription for Okta and frame-buster bypass to perform Bitb !. Evilginx is really….
0
51
0
RT @Dghost_Ninja: Hi @hackSultan . My name is Samuel. A cybersecurity enthusiast specialized in Application Security Engineering and Penetr….
0
63
0
RT @Dghost_Ninja: Really need a role for real. If you've an opening or your organization is hiring, please just reach out. So tired of this….
0
20
0
RT @inversecos: Become a contributor at XINTRA @XintraOrg 🔎. We're looking for RED and BLUE team contributors . 🔴Red Team – Emulate real AP….
0
19
0
RT @mathias_fuchs: 🕵️♂️ How do attackers ghost past your EDR?. New blog post dives deep into evasion tricks—LOLBins, memory games, syscall….
medium.com
Endpoint Detection and Response (EDR) solutions are the cyber sentinels on our endpoints — vigilant guards that monitor system behavior…
0
3
0
RT @mathias_fuchs: 🗓 Logs lie. Prefetch tattles. ShimCache whispers. Timestamps dance. Building timelines in DFIR isn’t just science—it’s….
medium.com
Building a coherent DFIR timeline can feel like wrangling the Greek god of time (Chronos) while fending off complete chaos. Timelines are…
0
4
0
RT @inversecos: Red teamers, no need to “pull” clipboard data when Windows already saves it all on disk for you in a neat little file 🗿. (i….
0
316
0
🔥🔥lfg.
Tonight on #MalDevWeekly, we dissect how DPRK APTs are lacing fake tech interviews with JavaScript loaders and Python RATs all masked as tasks. 📅 Tonight.🕗 8PM WAT.🎙️ #MalDevDiaries. Set your reminder. You don’t want to miss this.
1
0
2
RT @T3chFalcon: Tonight on #MalDevWeekly, we dissect how DPRK APTs are lacing fake tech interviews with JavaScript loaders and Python RATs….
0
3
0
RT @T3chFalcon: Think your browser autofill is harmless?. Check this file:. %LocalAppData%/Microsoft/Edge/User Data/Default/Web Data. Insid….
0
246
0
RT @techspence: Another 🔥 episode, another discussion about Windows and common issues I see during internal pentests. .
0
19
0
RT @merill: Microsoft just dropped a banger spreadsheet to help you level up your security! 🚀. It's a FREE Zero Trust assessment tool with….
0
105
0
RT @0xEnleak: Summarizing Chapter 4 of "Handbook of Digital Forensics and Investigation" so you don't have to read it :). This chapter on "….
0
1
0
RT @0x534c: 🚨 Attackers now abuse MS Teams chat + Quick Assist to drop Matanbuchus 3.0 malware. Masquerading as IT, they trigger PowerShell….
0
18
0
RT @msftsecurity: 🔐 Identity, data, devices + network, infrastructure, SecOps = topics now covered in our updated Zero Trust workshop. Give….
microsoft.com
The Microsoft Zero Trust workshop has been expanded to cover all six pillars of Microsoft's Zero Trust model, providing a comprehensive guide for organizations to modernize their security posture.
0
58
0