
NVISO Labs
@NVISO_Labs
Followers
4K
Following
720
Media
118
Statuses
640
NVISO Labs is the research arm of @NVISOSecurity, focused on infosec research. This is where our lab rats share the results! 🐀
in the lab
Joined September 2016
Looking to elevate your #ThreatDetection strategy? 👀 Learn how to design repositories for detection-as-code with tips on branch strategy, repo organization & more. Part 2 of @_st0pp3r_‘s blog post series on #DetectionEngineering is live! 👇.
1
14
33
Detection-as-Code: From Concept to Practice 👇. Check out @_st0pp3r_ latest blog series, where he unpacks the fundamentals of #DetectionEngineering and takes a closer look at the game-changing concept of #DetectionAsCode.
0
26
72
How can you use #Defender for Endpoint to track IP address assignments during an #incidentresponse investigation?. That’s the scenario we'll explore in our latest blog post.👉
0
3
9
Interested in how Android’s certificate handling has changed with #Mainline & #Conscrypt updates and details methods to intercept HTTPS traffic on #Android 14+ ? Read the blog post here 👉
blog.nviso.eu
A deep-dive into Conscrypt updates via Mainline and the impact on Android 11 to Android 16.
0
6
16
RT @AIatMeta: Today is the start of a new era of natively multimodal AI innovation. Today, we’re introducing the first Llama 4 models: Lla….
0
2K
0
RT @dhh: Unbelievably impressive. I think programmers are right to have some worry that the world of tomorrow won't need all of them. Illus….
0
351
0
Has your company ever been affected by a compromised business email? Read @plehdneS latest blog post, "How to Hunt & Defend Against Business Email Compromise" here 👇.
blog.nviso.eu
Explore threat hunting methods to detect business email compromise, leveraging user logon activity analysis and preventative measures to reduce risks.
0
3
5
Discover how #RedTeam operations enhance #OTsecurity and resilience. Learn from two case stories and lessons to identify and mitigate threats effectively. Read Sarah's blog post here 👉
blog.nviso.eu
Discover how Red Team operations enhance OT security and resilience. Learn from two case stories and lessons to identify and mitigate threats effectively.
0
0
2
New blog post: "Backups & DRP in the Ransomware Era". Dive into building a #ransomware-resilient #backup and recovery environment that protects your data during critical incidents. Click here to read the full blog post ➡️
blog.nviso.eu
Traditional disaster recovery plans fall short against ransomware. This blog discusses a backup design that ensures data security during critical incidents.
0
0
4
Read the @Forbes article on Stamatios Chatzimangous' analysis revealing how the #BlackBasta hacking group exploits @Microsoft users by targeting them with a sneaky combination of #spam overload and fake IT support messages in a new wave of #cyberattacks.
0
3
7
New blog post!. Title: Detecting Teams Chat Phishing Attacks (Black Basta).by Stamatios Chatzimangou. Link: #SOC #BlueTeam #Phishing #Sentinel #KustoQueryLanguage #SIEM #BlackBasta.
blog.nviso.eu
Uncover "Black Basta" ransomware tactics: spam floods, fake IT support on Teams, and remote access scams. Learn detection and prevention strategies now.
0
18
56
RT @zack_overflow: Revamped the gratuitous explosions and particle effects to the code editor I'm building. And added sound effects!. (Soun….
0
4K
0
New blog post! . Title: Hunting for Remote Management Tools: Detecting RMMs .| by @StefC1993 (Stef Collart). Link: . #BlueTeam #Detection #KQL #RMM #Threathunting.
0
54
164
New blog post! . Title: All that JavaScript for… spear phishing?.| By @bartblaze (Bart Parys) . Link: #BlueTeam #CryptoJS #Phishing.
0
17
31
New blog post! . Title: Hunting Chromium Notifications.| By @0xThiebaut (Maxime Thiebaut). Link: #ThreatHunting #Phishing #Chromium #Chrome #Edge #Forensics.
blog.nviso.eu
Browser notifications provide social-engineering opportunities. In this post we’ll cover the associated forensic artifacts, threat hunting possibilities and hardening recommendations.
0
5
20
New blog post!. Title: MEGAsync Forensics and Intrusion Attribution.| By @0xThiebaut (Maxime Thiebaut). Link: #Forensics #MEGAsync #LockBit #Python #Statecache.
blog.nviso.eu
MEGAsync forensics can be leveraged to identify exfiltrated files, additional victims and, subsequently, perform attribution.
0
5
9
RT @kmkz_security: Very instructive!.For all the ppl interested in TIBER implementation it is a must read 👇.
0
2
0
New blog post!. Title: The Big TIBER Encyclopedia.| By Jonas Bauters . Link: #AdversaryEmulation #RedTeam #PurpleTeam #TIBER #TLPT.
blog.nviso.eu
An analysis of current TIBER implementations ahead of DORA’s TLPT requirements Introduction TIBER (Threat Intelligence-Based Ethical Red Teaming) is a framework introduced by the European Cen…
0
6
21