taosecurity Profile Banner
Richard Bejtlich ๐Ÿ’พ ๐Ÿ‡บ๐Ÿ‡ฆ Profile
Richard Bejtlich ๐Ÿ’พ ๐Ÿ‡บ๐Ÿ‡ฆ

@taosecurity

Followers
56K
Following
26K
Media
2K
Statuses
23K

Inactive on Twitter since 1 November 2022. Find me here: https://t.co/9xgPCjr0Rq

Washington, DC
Joined December 2008
Don't wanna be here? Send us removal request.
@taosecurity
Richard Bejtlich ๐Ÿ’พ ๐Ÿ‡บ๐Ÿ‡ฆ
3 years
Inspired by @netresec, I decided to claim @taosecurity on a Mastodon server:
2
1
7
@taosecurity
Richard Bejtlich ๐Ÿ’พ ๐Ÿ‡บ๐Ÿ‡ฆ
3 years
If you'd like to read well-researched #history to abandon politically-driven myth, I recommend these 2 books: #ad. The Gunpowder Age: #China, Military Innovation, and the Rise of the West in World History. The Myth of the Lost Cause.
Tweet media one
Tweet media two
2
3
8
@grok
Grok
5 days
Join millions who have switched to Grok.
243
264
2K
@taosecurity
Richard Bejtlich ๐Ÿ’พ ๐Ÿ‡บ๐Ÿ‡ฆ
3 years
As an ex-@usairforce intel officer who was active duty in 1999, I enjoyed the new book "Shooting Down the Stealth Fighter," by the Serb personnel manning the S-125/SA-3. It's mostly about IADS, but it offers a ton of unclass details for #airpower fans. #ad
Tweet media one
0
4
7
@taosecurity
Richard Bejtlich ๐Ÿ’พ ๐Ÿ‡บ๐Ÿ‡ฆ
3 years
Iโ€™m concerned that Putin is planning a repeat of his 1999 Moscow apartment bombing. Iโ€™m worried he orders use of a โ€œdirty bombโ€ in UA, maybe Kherson, and then blames it on UA. Heโ€™s already learned from recent Western tactics to give public early warning, except his would be lies.
0
2
5
@taosecurity
Richard Bejtlich ๐Ÿ’พ ๐Ÿ‡บ๐Ÿ‡ฆ
3 years
I'm pleased to see @Suricata_IDS getting some marketing love at my company @corelight_inc's web page. We offer a true #networksecuritymonitoring platform at up to 100 Gbps, with all 4 NSM data types (alerts, transaction logs, extracted files, and pcap).
go.corelight.com
Corelight integrates Suricata IDS with Zeekโ€™s rich network telemetry to evolve beyond the standalone intrusion detection system.
0
1
4
@taosecurity
Richard Bejtlich ๐Ÿ’พ ๐Ÿ‡บ๐Ÿ‡ฆ
3 years
Iโ€™m concerned about the following scenario. 1) RU โ€œevacuatesโ€ civilians from Kherson. 2) UA approaches city to retake it. 3) RU destroys Kherson while retreating, and claims UA is responsible. 4) RU denies UA the territory via destruction and accuses UA of โ€œwar crimes.โ€.
1
0
3
@taosecurity
Richard Bejtlich ๐Ÿ’พ ๐Ÿ‡บ๐Ÿ‡ฆ
3 years
Prediction: heavily-regulated industries will be the first to see requirements to have their cybersecurity program headed by someone with some sort of state- or Fed-approved license. This is no different from general contractors needing a license, while workers need not have one.
5
1
8
@taosecurity
Richard Bejtlich ๐Ÿ’พ ๐Ÿ‡บ๐Ÿ‡ฆ
3 years
Speaking of @Microsoft embedding @Zeekurity into @Windows, here's a post I wrote in 2008 explaining why and how #networksecuritymonitoring on the endpoint would be helpful. It's so cool to see a concrete step in this direction, on a massively-deployed OS:
2
0
12
@taosecurity
Richard Bejtlich ๐Ÿ’พ ๐Ÿ‡บ๐Ÿ‡ฆ
3 years
This is not a late "April Fool." This is real. I've been waiting months to say it. Now it's public. @Microsoft is embedding @Zeekurity into @Windows. This brings #networksecuritymonitoring to a potential billion+ endpoints. Hear Microsoft's take, Thu-Fri:
@corelight_inc
Corelight
3 years
๐ŸงตWe are excited to share that @Zeekurity is now a component of @Microsoft @Windows ! An incredible development that truly establishes Zeek as the de facto standard for #networkevidence:. 1/4.
3
26
64
@taosecurity
Richard Bejtlich ๐Ÿ’พ ๐Ÿ‡บ๐Ÿ‡ฆ
3 years
Much as you might love your team and job, it's better to resign than compromise your integrity. There is no shortage of open CSO or other security executive roles. If you find truly egregious conditions, you might become a legal whistleblower like @dotMudge. That takes real guts.
1
2
7
@taosecurity
Richard Bejtlich ๐Ÿ’พ ๐Ÿ‡บ๐Ÿ‡ฆ
3 years
CSOs: wondering what to do if pressured by board or execs to act illegally or unethically? Easy: resign. That's what high-level, high-responsibility execs do. It's part of being a professional. I resigned as director of IR when my new boss tried to force me to stack rank my team.
0
9
37
@taosecurity
Richard Bejtlich ๐Ÿ’พ ๐Ÿ‡บ๐Ÿ‡ฆ
3 years
In case anyone needed a reminder that being a CISO is a serious responsibility - and obstructing FTC investigations is not in the job description - today is a wake-up call. If youโ€™re a security professional, this should not be anything new. Itโ€™s time for cyber to leave Neverland.
0
2
17
@taosecurity
Richard Bejtlich ๐Ÿ’พ ๐Ÿ‡บ๐Ÿ‡ฆ
3 years
Why does no one care about this story? Is it because those who usually promote privacy also use this data? I read the vendor's rebuttal. It's a joke that they deny the usefulness of IP addresses for identifying individuals or patterns of life. End #Augury.
Tweet media one
@josephfcox
Joseph Cox
3 years
New: the US military has spent millions of dollars on a powerful internet monitoring tool that includes browsing data, email data, cookies, more. Data is worldwide, covers 90%+ of the internet, harvested from ISPs then sold to military by private company.
0
0
9
@taosecurity
Richard Bejtlich ๐Ÿ’พ ๐Ÿ‡บ๐Ÿ‡ฆ
3 years
I look forward to trying this. Wireshark is the gold standard for making it totally simple to try one form of network traffic observation. Download, install, run, select interface, see packets. Packet inspection isnโ€™t everything, but itโ€™s a key part of #networksecuritymonitoring.
@WiresharkNews
Wireshark Foundation
3 years
#Wireshark 4.0.0 has been released. Enjoy.
1
1
5
@taosecurity
Richard Bejtlich ๐Ÿ’พ ๐Ÿ‡บ๐Ÿ‡ฆ
3 years
I highly recommend this @BSidesAugusta talk by @DavidJBianco on his #PyramidofPain. He explains how we implemented a strategy (10+ years ago) to detect and respond to intrusions before adversary mission completion, via threat intelligence-driven campaigns.
Tweet media one
4
21
64
@taosecurity
Richard Bejtlich ๐Ÿ’พ ๐Ÿ‡บ๐Ÿ‡ฆ
3 years
If Elon Musk ends up buying Twitter, pay attention to Russian financing of the deal.
460
2K
8K
@taosecurity
Richard Bejtlich ๐Ÿ’พ ๐Ÿ‡บ๐Ÿ‡ฆ
3 years
In 2019 I wrote a blog for @corelight_inc, "Network security monitoring is dead, and encryption killed it." My goal was to debunk that long-standing myth. Apparently at least 1 security company didn't get the point. ๐Ÿคฆโ€โ™‚๏ธ#NSMlives despite encryption. Pls see:
0
1
14
@taosecurity
Richard Bejtlich ๐Ÿ’พ ๐Ÿ‡บ๐Ÿ‡ฆ
3 years
I have a feeling that tracking and targeting Russian tactical nukes is intelligence requirement number one right now.
0
0
10
@taosecurity
Richard Bejtlich ๐Ÿ’พ ๐Ÿ‡บ๐Ÿ‡ฆ
3 years
This is one of the reasons for my longstanding policy of not accepting connection requests from anyone but those with whom Iโ€™ve closely worked for at least several months. I believe in trying to improve the LinkedIn ecosystem.
@briankrebs
briankrebs
3 years
Someone created a ton of fake LinkedIn profiles for people claiming to be CISOs at Fortune 500 firms. LinkedIn took several down after being notified, but the profiles garnered quite a few CISO connections. Highlights need for more reputation tools on LI.
1
1
9
@taosecurity
Richard Bejtlich ๐Ÿ’พ ๐Ÿ‡บ๐Ÿ‡ฆ
3 years
Calling all graduates of the TCP/IP Weapons School class I taught from 2006-2012 -- we used to fool around with similar tactics and tools, especially in the late 2000s classes.
1
0
4