d3sre Profile Banner
Desiree Sacher Profile
Desiree Sacher

@d3sre

Followers
2K
Following
6K
Media
76
Statuses
4K

cyber defense architect, dc4131 alumni, FIRST BoD member, curious geek driven by the urge to understand things

Münster, Germany
Joined June 2009
Don't wanna be here? Send us removal request.
@d3sre
Desiree Sacher
4 years
thanks to the amazing @Ministraitor the recording of my talk is already up: https://t.co/55TKs3b57x . it is aimed for #blueteam struggling with #vulnerabilitymanagement thank you @a41con for having me. it was a great honour to come back like this! #area41 #cyberdefense
1
7
39
@cyb3rops
Florian Roth ⚡️
1 year
I’ve trained many analysts over the years - inside my own teams, in SOCs, CERTs, and various internal security teams. And lately, I’ve been noticing a trend that deeply saddens me. There’s an increasing number of young professionals who struggle with the grind of our work. They
99
316
1K
@Gert_Woellmann
Gert Wöllmann
1 year
👑 5:41 für jeden Politiker – nicht nur in Kanada. 🫳🏼 🎤
7
46
188
@cyb3rops
Florian Roth ⚡️
1 year
I strongly recommend turning this off. It's unbelievable that they quietly enabled this while everyone was focused on their 'Recall' AI feature. Now they're collecting and using everyone's Microsoft Word and Excel data to train their AI models.
@2345Jonte
Jonathan
1 year
@ithizar @cyb3rops Organisation admins can turn it off with gpo: Configuration\Policies\Administrative Templates\Microsoft Office 2016\Privacy\Trust Center. https://t.co/FOBPkKBel8 People should read this:
22
199
781
@adulau
Alexandre Dulaunoy @[email protected]
1 year
From Ruins to Resilience: How Developing and Utilizing Open Source Solutions Enhances CSIRT Capabilities #csirt #cert #opensource #infosec 🔗 https://t.co/LZvMm0asKa
0
16
39
@alexanderjaeger
Alex
1 year
Sad I only can repost this once. This has been my experience as well. Yes commercial tools have their need, but so does open source in CSIRT land. It also gives individuals a way to talk about their work externally, when they cannot about cases.
@adulau
Alexandre Dulaunoy @[email protected]
1 year
From Ruins to Resilience: How Developing and Utilizing Open Source Solutions Enhances CSIRT Capabilities #csirt #cert #opensource #infosec 🔗 https://t.co/LZvMm0asKa
0
3
7
@defconch
DC4131 - DEFCON CH
2 years
A few #DC4131 people will be in Vegas for HackerSummerCamp - come & say hi CüpliHacker @mylaocoon also has some free swag to hand out…
0
3
46
@Jipe_
🇫🇷 Jean-Ph˙ ͜ʟ˙ppe 🇪🇺🇺🇦
2 years
MSFT CVE-2024-30103 and CVE-2024-30080 are 🔥PATCH NOW!
1
4
3
@defconch
DC4131 - DEFCON CH
2 years
Live streaming of #Area41 2024 track 1 is live:
Tweet card summary image
youtube.com
4
6
12
@certbund
CERT-Bund
2 years
❗️ #CERTWarnung ❗️ In Check Point Security Gateways wurde eine #Schwachstelle mit bereits beobachteten Angriffen geschlossen. Der Hersteller hat ein Skript bereitgestellt, mit dem verwundbare Komponenten im eigenen Netzwerk identifiziert werden können. https://t.co/KQ5qnmhkU8
Tweet card summary image
bsi.bund.de
Das Unternehmen Check Point veröffentlichte ein Advisory, in dem auf eine neu entdeckte Schwachstelle in den Produktreihen Quantum und Maestro hingewiesen wird. Diese ermöglicht, es aus der Ferne und...
1
27
54
@a41con
Area41 Security Con
2 years
Don't miss your chance to get tickets for #AREA41 in June in Switzerland! The last tickets will go on sale on Tues May 7th at 19:00 CEST. Hurry up before we sell out! This is your last chance as we are at full capacity. https://t.co/cB4TZyy758
4
9
12
@matthew_d_green
Matthew Green
2 years
Europe is maybe two months from passing laws that end private communication as we know it, and folks are looking the other way (understandably.) You’re not going to get a do-over once these laws are passed.
@bpreneel1
Bart Preneel
2 years
Two major changes: target detection based on risk and require more than one hit to reduce false positives will not have meaningful impact on protection of fundamental rights. 2/10
39
802
2K
@defconch
DC4131 - DEFCON CH
2 years
Next security meetup im Zurich:  April 09 –  18:30 CEST – Schiffbau Bar – Our warehouse sized home from home… https://t.co/zRhmdpmMRQ
0
4
7
@AlexHormozi
Alex Hormozi
3 years
Heroes and villains always have the same back story—pain. The difference is what they choose to do about it. Villain says “the world hurt me, I’ll hurt it back” Hero says “the world hurt me, I’m not gonna let it hurt anyone else.” Heroes use pain. Villains are used by it.
106
385
2K
@a41con
Area41 Security Con
2 years
can’t sleep?!? why not submit a talk for the AREA41 conference - we are the ones with the cool electronic badges in Zurich https://t.co/6yFuZvlTXQ
1
11
18
@a41con
Area41 Security Con
2 years
the CallForPaper for AREA41 conference is open! Submit your A game of technical research to be a part of this conference🤓 ⏳You got till end of April⌛️ https://t.co/6yFuZvlTXQ
0
21
24
@d3sre
Desiree Sacher
2 years
my team and i want to get some feedback on what kind of #FalsePositives in #CyberSecurity #Monitoring everyone is tackling and what the strategies are. we appreciate your input and your time (~ 9 minutes to complete). https://t.co/zLxrPZUA7P thank you 🙏🏼
0
6
8
@pinkflawd
Mari0n
2 years
ICYMI BlackHoodie is going to Austin, on February 23rd in cooperation with @_ringzer0 we're offering a free introduction to reverse engineering for women
blackhoodie.re
Reverse engineer, from 0 to hero!
1
30
27
@certbund
CERT-Bund
2 years
❗️#CERTWarnung❗️ Mindestens seit Dezember werden #Ivanti Connect Secure und Policy Secure-Lösungen mithilfe von #ZeroDay-#Schwachstellen angegriffen. Patches stehen bislang noch nicht zur Verfügung. Der Hersteller bietet jedoch Mitigationsmaßnahmen an. https://t.co/AP1Zz7toSZ
Tweet card summary image
bsi.bund.de
Am Abend des 10. Januar 2024 veröffentlichte der Hersteller Ivanti ein Advisory zu zwei bislang ungepatchten Schwachstellen in mehreren Produkten, die bereits für Cyber-Angriffe ausgenutzt werden....
2
16
48
@pinkflawd
Mari0n
2 years
The first BlackHoodie in 2024 will happen Jan. 10/11 at the Microsoft offices in Arlington, VA, hosting trainings on reverse engineering and hardware hacking! Your trainers are @x71n3 @SynapticRewrite and Christina Johns 🥳
blackhoodie.re
Reverse Engineering, iOS, Hardware
0
31
41
@adulau
Alexandre Dulaunoy @[email protected]
2 years
Over recent months, the MISP project has undergone significant enhancements and advancements. These developments extend beyond software, encompassing enrichments in the community-managed MISP standard base (galaxy, objects). #ThreatIntelligence https://t.co/pSqysyCnPq
https://t.co/GkMtK9bUop MISP 2.4.179 released with a host of improvements a security fix and some new tooling. New steps taken towards LLM integration, Workflow improvements, performance improvements for large edit and many more... #opensource #threatinte #misp
0
9
25