hir3n_s Profile Banner
Hiren Sadhwani Profile
Hiren Sadhwani

@hir3n_s

Followers
253
Following
10K
Media
49
Statuses
789

Threat Hunter | #ThreatHunting | #DFIR | #ThreatIntelligence

Joined May 2018
Don't wanna be here? Send us removal request.
@hir3n_s
Hiren Sadhwani
3 months
🎤 Thrilled to have spoken at the SANS #RansomwareSummit 2025! Big thanks to @rj_chap & @maridegrazia for hosting, @MindsEyeCCF for the awesome graphic recording, and all the attendees for being a fantastic audience! Grateful to the @sansforensics team for the opportunity.
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
1
6
@cyb3rops
Florian Roth ⚡️
11 hours
So, these threat actors successfully phished an author of multiple open source NPM packages with a total of 2 billion weekly downloads – including debug, chalk, and ansi-styles. Since most companies run at least one React or Angular app, they had the opportunity to execute code
19
119
595
@BushidoToken
Will
19 days
ICYMI: Was just perusing the latest CrowdStrike 2025 Threat Hunting report ( https://t.co/B4t726AnSJ) and check this wild timeline for Scattered Spider - from account takeover to Entra ID bulk user export in <5 minutes đź‘€
Tweet media one
5
75
225
@HockeyInJune
Julian Cohen
5 years
A security program in one tweet.
Tweet media one
Tweet media two
Tweet media three
Tweet media four
2
80
449
@cyb3rops
Florian Roth ⚡️
29 days
Thoughts on LLMs writing detection rules, and why I’m not impressed: LLMs are good at one thing – predicting the next most plausible word in a sentence. That’s why most AI-generated detection rules are only good at one thing as well: looking plausible. On first glance they seem
21
58
278
@MEAIndia
Randhir Jaiswal
1 month
Statement by Official Spokesperson⬇️ 🔗 https://t.co/22vVtFYFOh
Tweet media one
533
3K
21K
@MEAIndia
Randhir Jaiswal
1 month
Statement by Official Spokesperson⬇️ 🔗 https://t.co/O2hJTOZBby
Tweet media one
3K
18K
69K
@Wietze
Wietze
2 months
#HuntingTipOfTheDay: you know how to spot/decode Base64 or XOR in PowerShell… but what about SecureString? This AES-based encryption is native to PowerShell; attackers have been seen to use this for PowerShell obfuscation. 🔍 Hunt for known SecureString decoding commands
Tweet media one
0
20
99
@hir3n_s
Hiren Sadhwani
3 months
My talk at SANS #RansomwareSummit 2025 is officially uploaded now on YT https://t.co/C8nrH0TbEj
@hir3n_s
Hiren Sadhwani
3 months
🎤 Thrilled to have spoken at the SANS #RansomwareSummit 2025! Big thanks to @rj_chap & @maridegrazia for hosting, @MindsEyeCCF for the awesome graphic recording, and all the attendees for being a fantastic audience! Grateful to the @sansforensics team for the opportunity.
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
2
5
@banthisguy9349
Fox_threatintel
3 months
OSINT tool that can allow you to have a good opsec https://t.co/KXK0UHnnPc Dangling accounts can lead to you being exposed. What is your favorite tools that are similiar to this one?
3
20
114
@malmoeb
Stephan Berger
3 months
A teammate of mine worked on an interesting incident where the attackers connected to the backup server via RDP, launched the Chrome browser, and searched on Google for "VirtualBox". The VirtualBox installer was then downloaded to the home directory of the compromised user:
17
43
360
@anshu217
Anshuman Narang
3 months
#PakistanStabsIran The famous unprecedented lunch between POTUS & Munir on 18 June 2025 21 June 2025 #PakistanNominatesTrump for Nobel Peace Prize Here is the move towards Peace 22 June 2025 So, finally #America has joined #IranIsraelConflict Let's wait and watch what is
2
5
23
@malmoeb
Stephan Berger
3 months
If I were to start a new job at a company, and if I have one (security-related) wish .. If I could pick anything, I’d ask for a clear naming convention for all computers and servers. Additionally, I’d want DHCP and security logs to be stored centrally in a SIEM system. That way,
12
11
114
@nas_bench
Nasreddine Bencherchali
3 months
"Real Time Detection & Response" - Something happens on the system a log gets generated. (fraction of milliseconds are lost) - An local engine matches on it and generate something to send (a couple more milliseconds / seconds are lost) - Time to send that thing to the other
6
26
165
@malmoeb
Stephan Berger
3 months
"But in Q1, we also saw a new social engineering lure where the attackers started using fake website cookie banners to spread malware. A cookie banner, which is required for GDPR compliance, is a pop-up message displayed on a website to inform users about the use of cookies and
Tweet media one
3
41
131
@cyb3rops
Florian Roth ⚡️
3 months
Yes, LLMs don’t think. Apple’s paper shows they fail at logic. But they guess so well, they already outperform mediocre white-collar work – junior coding, copywriting, design, even legal boilerplate. The risk isn’t in jobs that require real thinking. It’s in the ones where
Tweet media one
Tweet media two
Tweet media three
Tweet media four
5
63
239
@cyb3rops
Florian Roth ⚡️
3 months
Windows SMB Client Elevation of Privilege Vulnerability CVSS Score: 8.8 Attack Vector: Network Attack Complexity: Low Privileges Required: Low User Interaction: None Do I have to say more? https://t.co/SbFqsTWTSN
Tweet media one
13
125
414
@Unit42_Intel
Unit 42
3 months
Cybersecurity Alert: Registered on June 7th, wwdc25[.]com hosts a #scam site impersonating the official WWDC25 event. It promotes a fake #cryptocurrency giveaway to steal funds. Do not send any cryptocurrency to the wallet addresses listed! Details at https://t.co/CmEvXoJ2u0
Tweet media one
Tweet media two
Tweet media three
3
16
44
@sansforensics
SANS DFIR
3 months
📢 Next up | Hiren Sadhwani is showing how to spot #Malware like Lumma Stealer & Bumblebee before #Ransomware operators get their hands on your network. ➡️ Join FREE online: https://t.co/Q4hlPMuHWQ #RansomwareSummit #ThreatHunting #DFIR
Tweet media one
0
3
15
@sansforensics
SANS DFIR
3 months
👉 Hiren Sadhwani shares traditional TTPs like #Phishing & RDP exploits still work, but attackers are getting creative with: ‣ ClickFix / fake CAPTCHAs ▸ Email bombing + MS Teams spoofing ▸ Quishing (QR code phishing) ▸ SEO poisoning #RansomwareSummit #ThreatIntel #DFIR
Tweet media one
0
7
15