Scott Lynch
@packetengineer
Followers
2K
Following
48K
Media
177
Statuses
21K
Certified @SANSDefense Instructor | SECOPS/CERT Manager | Defcon BTV | Navy Vet | Sailor | Tweets Are My Own
Joined July 2011
Really excited about this one ⚡️ This post dives deep into Aurora - Nextron’s free ETW-based detection agent - and shows how it can help detection engineers, IR teams, and monitoring specialists explore and understand what’s actually observable via ETW 🔎🌊 - Free (Aurora Lite)
We’ve published a deep dive into how Aurora uses ETW to reconstruct structured event data for detection engineering The post covers: - ETW-based logsource mappings - Custom field enrichment (e.g., ProcessTree, GrandparentCommandLine) - Gaps in ETW coverage and where minimal
2
17
88
"Why would I use THOR during IR?" "Why scan backups before restore?" "Why run periodic compromise assessments?" We usually say: because we find what others miss. And then they say: like what? Well … here’s the answer 👇
We analyzed the top 500 most successful THOR rules – “successful” meaning: they detected samples that were either ignored or missed by nearly all AV engines on VirusTotal. Some rules detect clear malware. Others reveal dual-use tools, renamed hacktools, misused admin binaries,
3
15
113
Shadow IT/Shadow SaaS is a bigger threat than _most_ of the critical and high vulnerabilities the average vuln report spits out…
22
17
259
Starting in 30 minutes! - The world's top cyber minds gather at the SANS #EmergingThreatsSummit 2025 to reveal: - How quantum computing will break today's encryption - How AI is weaponizing cyberattacks - How to defend critical infrastructure in a hyperconnected world and
0
12
9
A tale of two (large) purchases and cybersecurity Let’s take the case of purchasing a new expensive software-controlled piece of equipment that supports business operations like MRI Machines, heavy manufacturing equipment, ATM Machines, etc. a short 🧵
2
6
41
30 percent of some Microsoft code now written by AI - especially the new stuff
theregister.com
: Satya Nadella reveals attempts to merge Word, PowerPoint, Excel, which may now happen with LLMs
0
3
4
AWS creates EC2 instance types tailored for demanding on-prem workloads
theregister.com
: What? Why? It’s an update to its Outposts racks hybrid cloud rigs aimed at bankers and telcos
0
2
3
BTW Windows Subsystem for Linux officially uses Arch now
theregister.com
: The tryhard's favorite distro wins an approved home in Microsoft's OS
0
3
6
I vibe coded a bunch of stuff to help CISOs/SOC managers/SOC analysts/Responders etc. https://t.co/6g2qHRM2qA
mr-r3b00t.github.io
Security Operations Chef
14
78
467
Everyone wants to spend $100k for EDR but no one wants to take away local admin rights from Suzie in accounting…
79
155
1K
Investigation Scenario 🔎 The process explorer.exe spawned rundll32.exe on a system on your network. What do you look for to investigate whether an incident occurred? Assume you have access to whatever digital evidence source you need. #InvestigationPath #DFIR #SOC
10
8
66
📄 How to Read a Security Policy Like a Pro (and Spot the Gaps That Matter) Reviewing a security policy? Don’t just skim for buzzwords. Here’s how pros audit policies for clarity, coverage, and control gaps - before they become audit findings. 🧵
3
40
194
If you’re looking for a feel good video check this one out. Great job guys!! #DiscoverConnection I Took a Fast Food Worker on Their Dream Vacation https://t.co/WS6SDYsUeQ via @YouTube
0
0
2
Today I learned that a ransomware actor (probably reading this tweet) used our free scanner Thor Lite to evaluate software on a target system with custom YARA rules. So yeah… ransomware actors are using our tools now. Guess that makes it dual-use.
14
40
239
🚩 The Cybersecurity Red Flags in a Job Description You Shouldn’t Ignore Looking for your next security role? Don’t just scan for salary - scan for red flags. Here’s how to spot warning signs in job postings before you waste your time (or burn out). 🧵
3
44
319
Prevention > Detection. Let’s make attackers hate their life. No doubt EDR is essential, but it’s not a silver bullet.
25
81
689
You can do a lot to defend with the builtin windows firewall. Some things that come to mind are: - Block SMB between workstations - Block WMI/WinRM where not needed - Only allow inbound RDP from management VLANs or jump boxes to servers - Only allow remote management from
16
48
413
Looking for docs on EventID <-> Audit Policy mapping beyond what MS provides? Working on a new mindmap covering the Kernel (ntoskrnl) / Driver functions responsible for generating Security EventIDs along with their corresponding policy Sub-Category and conditions for generation.
2
12
78