eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

215
active users

#threatdetection

0 posts0 participants0 posts today

🚀 New Blog Post: Kunai vs io_uring (why.kunai.rocks/blog/kunai-vs-) 🚀

💡 Ever wondered how io_uring revolutionizes I/O operations in the Linux kernel? Inspired by Armo's blog post (armosec.io/blog/io_uring-rootk) about a PoC rootkit using io_uring, we explored this feature's security implications and how tools like Kunai can monitor these operations.

🔍 Key Takeaways:
🔹 io_uring boosts I/O performance by reducing system call overhead and enabling asynchronous operations
🔹 Security tools struggle to monitor io_uring due to its unique handling of operations
🔹 Kunai now provides visibility into io_uring operations, though blocking malicious activities remains challenging
🔹 Recent kernel versions have introduced auditing and security controls for io_uring, but these are still limited

📖 Read more: why.kunai.rocks/blog/kunai-vs-

why.kunai.rocks · Kunai vs io_uring | KunaiIntroduction

This is about to happen! Join us!

How To Detect And Mitigate Non-Human Identity And Crytographic Vulnerabilities — An ITSPmagazine Webinar With SandboxAQ
Thursday, May 15, 2025 | 1:00 PM 2:00 PM EST

Unmanaged cryptographic assets and non-human identities have left security teams blind to critical risks. These gaps have fueled vulnerabilities, breaches, compliance challenges, and operational drag across enterprise environments.

Join us to see how #AQtiveGuard transforms this landscape.

✨ crowdcast.io/c/how-to-detect-a

More than just visibility, AQtive Guard unifies your non-human identities and cryptographic assets into a single inventory to deliver end-to-end visibility, deeper risk analysis, and streamlined compliance in a single pane of glass—with automated discovery, real-time threat detection, and root cause analysis powered by their unique LQM.

Seamlessly integrated into your existing stack, it’s the AI-driven SaaS platform built to secure today’s systems—and tomorrow’s.

By attending, you will get to:
Discover how to gain unified visibility into cryptographic assets and non-human identities —including API keys, certificates and service accounts—in cloud environments

Explore how AQtive Guard empowers security teams with automated discovery, threat detection, and root cause analysis—enabling faster remediation, reduced risk, and stronger compliance without disrupting existing workflows.

Learn how to future-proof your security posture, with a platform designed for AI Security Operations, Post-Quantum Cryptography readiness, and seamless integration into your existing security stack.

PANELISTS
Marc Manzano
General Manager of Cybersecurity, SandboxAQ
MODERATORS
Sean Martin, CISSP Co-Founder, ITSPmagazine
Marco Ciappelli Co-Founder, ITSPmagazine

Can’t attend the live webinar? All registrants get exclusive access with a link to rewatch the recording.

Register To Attend: crowdcast.io/c/how-to-detect-a

#cybersecurity, #cryptography, #AIsecurity, #infosec, #webinar, #securitytools, #threatdetection, #cloudsecurity, #sandboxAQ, #ITSPmagazine #tech #technology #quantum

crowdcastHow To Detect And Mitigate Non-Human Identity And Crytographic Vulnerabilities — An ITSPmagazine Webinar with SandboxAQRegister now for How To Detect And Mitigate Non-Human Identity And Crytographic Vulnerabilities — An ITSPmagazine Webinar with SandboxAQ on crowdcast, scheduled to go live on May 15, 2025, 01:00 PM EDT.

🎙️ Is static rule-based detection holding security teams back? In this On Location Briefing from #RSAC2025, we dive into why detection needs to evolve — and what the future could look like when it does.

🚀 New Briefing from #RSAC 2025: Fixing the Detection Disconnect — Rethinking Detection from Static Rules to Living Signals

At RSA Conference 2025, Sean Martin, CISSP caught up with Fred Wilmot (Co-Founder & CEO) and Sebastien Tricaud (Co-Founder & CTO) of Detecteam to talk about why detection can’t stay stuck in the past — and how “living signals” can offer a more dynamic, context-aware approach to threat identification.

🔐 How can teams move beyond brittle, static rules to real-time, adaptable detection strategies?

Find out how Detecteam is helping organizations move away from outdated IOCs toward purpose-built, testable detections that actually evolve as threats do.

🎙️ Watch, listen, or read the full conversation here:
👉 itspmagazine.com/their-stories

📌 Learn more about Detecteam’s work:
👉 itspmagazine.com/directory/det

🛰️ See all our RSAC 2025 coverage:
👉 itspmagazine.com/rsac25

🌟 Discover more On Location Conversations, Brand Stories, and Briefings:
👉 itspmagazine.com/brand-story

🎥🎙️ This is just one of the many incredible conversations we recorded On Location in San Francisco, as Sean Martin and Marco Ciappelli covered the event as official media partners for the 11th year in a row.

Stay tuned for more Briefings, Brand Stories, and candid conversations from RSAC 2025!

🎤 Looking ahead:
If your company would like to share your story with our audiences On Location, we’re gearing up for #InfosecurityEurope in June and #BlackHatUSA in August!

⚡ RSAC 2025 sold out fast — we expect the same for these next events.
🎯 Reserve your full sponsorship or briefing now: itspmagazine.com/purchase-prog

ITSPmagazineFixing the Detection Disconnect and Rethinking Detection: From Static Rules to Living Signals | A Brand Story with Fred Wilmot from Detecteam | An On Location RSAC Conference 2025 Brand Story — ITSPmagazine | Broadcasting Ideas. Connecting Minds.™Fred Wilmot and Sebastien Tricaud challenge traditional detection models by introducing a faster, behavior-based approach that continuously generates and validates detections tailored to real-world threats. If you’re tired of optimizing broken processes and want to hear how teams can actually stay a

Some more conversations for you, straight from the floor of RSAC 2025!

🚀 New Briefing from #RSAC2025: From Overwhelmed to Informed — Strategic Threat Detection for the Future

At #RSAC Conference 2025, Sean Martin, CISSP caught up with Hugh Njemanze, Founder and CEO of Anomali, for a quick but powerful conversation about how the future of threat detection is about more than speed — it’s about strategy.

🔐 Why are #securityteams overwhelmed by traditional approaches, and how can smarter, faster, more strategic #threatintelligence change the game?
Find out how #Anomali is helping organizations move from reactive defense to proactive security strategies.

🎙️ Watch, listen, or read the full conversation here:
👉 itspmagazine.com/their-stories

📌 Learn more about Anomali’s work:
👉 itspmagazine.com/directory/ano

🛰️ See all our RSA Conference 2025 coverage:
👉 itspmagazine.com/rsac25

🌟 Explore more Briefings and Brand Stories from RSAC 2025:
👉 itspmagazine.com/brand-story

🎥🎙️ This is just one of the many incredible conversations we recorded On Location in San Francisco, as Sean Martin, CISSP and Marco Ciappelli covered the event as official media partners for the 11th year in a row.

Stay tuned for more Briefings, Brand Stories, and candid conversations from RSAC 2025!

🎤 Looking ahead:
If your company would like to share your story with our audiences On Location, we’re gearing up for Infosecurity Europe in June and Black Hat USA in August!
⚡ RSAC 2025 sold out fast — we expect the same for these next events.
🎯 Reserve your full sponsorship or briefing now: itspmagazine.com/purchase-prog

📲 Hashtags:
#cybersecurity #infosec #infosecurity #technology #tech #society #business #threatdetection #cyberthreatintelligence #strategicsecurity #anomali

ITSPmagazineFrom Overwhelmed to Informed: The Future of Threat Detection Isn’t Just Faster—It’s Strategic | A Brand Story with Hugh Njemanze from Anomali | An On Location RSAC Conference 2025 Brand Story — ITSPmagazine | Broadcasting Ideas. Connecting Minds.™Hugh Njemanze, Founder and CEO of Anomali, reveals how a purpose-built, cloud-native SIEM infused with agentic AI is transforming how security teams detect threats, reduce incidents, and prioritize risk. From faster investigations to board-ready insights, this conversation challenges outdated assump

🚀 Kunai pushes further integration with MISP!

This week, we've made significant progress in bridging Kunai with @misp to enhance threat intelligence sharing. Our focus has been on developing kunai-to-misp, a new tool available at github.com/kunai-project/pykun, which processes Kunai logs and creates MISP events to streamline collaboration.

With this, it is now possible to both update MISP from Kunai and feed Kunai from MISP using the misp-to-kunai tool. Here's a practical workflow example:

1️⃣ Analyze a #linux malware sample with Kunai Sandbox (github.com/kunai-project/sandb)
2️⃣ Use kunai-to-misp on the collected Kunai logs
3️⃣ (Optional) Review attributes' IDS flag to maximize detections and reduce false positives
4️⃣ Use misp-to-kunai to distribute the results across all Kunai endpoints

Additionally, we're leveraging MISP’s data model to craft meaningful MISP objects and relationships, offering a clear visual representation of events inside MISP.

🔗 Try it out and let us know what you think!

Corelight’s NOC team faced a unique challenge at Black Hat USA 2024—detecting SSHAMBLE, a new SSH scanner introduced by HD Moore. By tapping into existing logs and Zeek metadata, we identified the tool’s fingerprint in real-time.

What happened next?
✔️ Real-time detection.
✔️ Discovering threats using old logs. ✅✅
✔️ Zeek metadata making sense of encrypted traffic. 🔍

🔗 Head to the blog to learn more: corelight.com/blog/black-hat-u

#WorkSurveillance #Surveillance #WageSlavery #SIEM #UEBA #CyberSecurity #ThreatDetection #BehaviorProfiling: "This case study explores, examines and documents how employers can use software that analyzes extensive personal data on employee behavior and communication for cybersecurity, insider threat detection and compliance purposes. To illustrate wider practices, it investigates software for “security information and event management” (SIEM), “user and entity behavior analytics” (UEBA), insider risk management and communication monitoring from two major vendors. First, it looks into cybersecurity and risk profiling systems offered by Forcepoint, a software vendor that was until recently owned by the US defense giant Raytheon. Second, it investigates in detail how employers can use cybersecurity and risk profiling software sold by Microsoft, whose “Sentinel” and “Purview” systems provide SIEM, UEBA, insider risk management and communication monitoring functionality. Combined, these systems can monitor everything employees do or say, profile their behavior and single them out for further investigation. Similar to predictive policing technologies, they promise not only to detect incidents but to prevent them before they occur. While organizations can use these software systems for legitimate purposes, this study focuses on their potential implications for employees."

crackedlabs.org/en/data-work/p

Cracked LabsEmployees as RisksA case study on intrusive surveillance and behavioral profiling for cybersecurity, insider risk detection and 'compliance'