Paul Batson's Avatar

Paul Batson

@paulbatson

Lazysecurity on the hellsite and infosec.exchange. Secops geek. Detection engineering, threat hunting & IR mostly. Occasionally helps out with some analysis or testing pens. Former BSidesLondon organiser.

122
Followers
458
Following
24
Posts
17.11.2024
Joined
Posts Following

Latest posts by Paul Batson @paulbatson

Post image

I don’t think I’ll ever get tired of the sunsets in the Philippines

18.05.2025 03:48 👍 1 🔁 0 💬 0 📌 0
Preview
Threats: What Every Engineer Should Learn From Star Wars ($15 Value) now completely free Secure your applications with help from your favorite Jedi masters!

Threats is a very serious book with a silly coat of paint on it. Some folks seem to judge books by their cover. But, for a very limited time, you can get the book for free, and judge it on the content. If you’ve been waiting, there’s now no risk.

www.neowin.net/sponsored/th...

21.04.2025 15:24 👍 5 🔁 7 💬 0 📌 0
Preview
Release panix-v2.1.0 · Aegrah/PANIX Release I'm excited to announce the release of PANIX v2.1.0 – a major update that introduces five brand-new persistence techniques and their corresponding revert scripts. This release significantly...

Think I’ll be having a play with this today and see what detection opportunities are in there #linux #ttp #detectionengineering github.com/Aegrah/PANIX...

08.03.2025 23:25 👍 1 🔁 0 💬 0 📌 0

There was sensitive media stored in the account so having a way to know if they pulled it down or not might save her worrying too much.

11.02.2025 23:31 👍 1 🔁 0 💬 0 📌 0

So it looks like it was successful. Does anyone know if there is any route to requesting what activity occurred even if its a long process? We think it was approx. 1-2 mins afterward that she logged in and rolled creds.

11.02.2025 23:29 👍 0 🔁 0 💬 1 📌 0

The Attemped auth looks to be from a sketchy hosting provider. I'd like to give her some reassurance if possible. The creds were reset very quickly. And I know Snapchat does some auth analytics as I've failed auth with unusual country/
device in the past. I'm desperately hoping it was a failed auth.

11.02.2025 19:10 👍 0 🔁 0 💬 1 📌 0

I've done all the usual (confirmed she reset with a strong, unique pass, enabled 2FA, checked with her that the phished creds weren't reused elsewhere). The Snapchat Sessions page only shows her current session with valid IP.

11.02.2025 19:07 👍 0 🔁 0 💬 1 📌 0

Do any of my followers have any contacts at Snapchat? A close friend has been phished but realised a couple of mins later and reset her creds. The email she has received afterwards isn't clear if the attempted auth was successful or not. She is fraught with worry. Please repost for visibility.

11.02.2025 19:03 👍 0 🔁 0 💬 1 📌 0

@markrussinovich.bsky.social Thanks for posting this as it’s given me a project to have a go at! Been looking for a reason to have a play with LLMs :)

25.01.2025 01:04 👍 0 🔁 0 💬 0 📌 0

Taking it a step further, an LLM that could take a bunch of logs, take a draft detection in the prompt, show alerts that would trigger and then spit out out suggested recommended tuning for the detection would be really interesting too.

25.01.2025 01:02 👍 0 🔁 0 💬 1 📌 0
Post image

Regex is too hard for even OpenAI o1: it thought for over three minutes and then produced regex that didn't work. Looks like regex is a good test for AGI.

25.01.2025 00:54 👍 88 🔁 10 💬 4 📌 1

Maybe an LLM specifically trained on regex would be an interesting project. Who wouldn’t like an LLM to take a sample of logs and spit out an efficient and effective regex ;)

25.01.2025 00:56 👍 0 🔁 0 💬 3 📌 0

I decided to put together a starter pack of oldskool hacker and/or hacker-adjacent folks you may want to follow (Or, y'know, maybe you want to block them all, what do I know? You do you, homeslice.)

go.bsky.app/HQWqtno

04.12.2024 03:12 👍 215 🔁 64 💬 37 📌 9

Magical. Out of interest, which Leica?

21.12.2024 16:35 👍 0 🔁 0 💬 1 📌 0

Hope to see some of you tonight for discussions

05.12.2024 14:43 👍 6 🔁 2 💬 0 📌 0

I actually lol’d when they didn’t pick up on any of them. Obviously not a hacker haha.

04.12.2024 22:23 👍 0 🔁 0 💬 0 📌 0

Nice touch with the Hackers references :D

04.12.2024 20:27 👍 1 🔁 0 💬 1 📌 0
Preview
Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage | Microsoft Security Blog Microsoft has observed Secret Blizzard compromising the infrastructure and backdoors of the Pakistan-based threat actor we track as Storm-0156 for espionage against the Afghanistan government and Indi...

This blog is wild. “Secret Blizzard (Turla) has used the tools and infrastructure of at least 6 other threat actors during the past 7 years.”

www.microsoft.com/en-us/securi...

04.12.2024 19:20 👍 23 🔁 6 💬 1 📌 0
Post image

Sekoia has published some pretty comprehensive research on how ransomware gangs exfiltrate data from compromised environments.

blog.sekoia.io/ransomware-d...

28.11.2024 17:08 👍 53 🔁 23 💬 4 📌 1
Preview
Bootkitty: Analyzing the first UEFI bootkit for Linux ESET's discovery of the first UEFI bootkit designed for Linux sendss an important message: UEFI bootkits are no longer confined to Windows systems alone.

www.welivesecurity.com/en/eset-rese...

28.11.2024 19:43 👍 1 🔁 0 💬 0 📌 0
Preview
Modern Red Teaming: macOS, K8s, and Cloud - RTV 24 (Public) Modern Red Teaming: macOS, K8s, and Cloud Carnal0wnage int0x80

DualCore and I spoke at the Red Team Village this year. Here are the slides. QR code with link to gist with all the reference links on last page. Unfortunately it wasn't recorded.

docs.google.com/presentation...

#redteam #purpleteam #redteamvillage

24.11.2024 19:35 👍 33 🔁 18 💬 0 📌 0
Post image

If you'll be at BSides London this year please do find the time to check out this talk by my student Ana, she's going to be talking about the intersection of security and disability with her talk on password accessibility

24.11.2024 22:14 👍 32 🔁 9 💬 3 📌 0

After that I’d add the collection of some specific Events for Windows eg. User added to Security-Enabled Group and PowerShell logs.

Please don’t do what I see so often and focus on collecting firewall events.

25.11.2024 00:12 👍 1 🔁 0 💬 0 📌 0

For anyone just getting into detection engineering or hunting, I’d strongly recommend starting out by making sure you’re collecting process events (with full command lines), persistence locations (eg. scheduled tasks, services, reg run keys, cron, etc) and process network connections.

25.11.2024 00:05 👍 2 🔁 1 💬 1 📌 0

Just added a boatload of new detection engineers who joined Bluesky this week. Make sure to check this starter pack out

24.11.2024 23:53 👍 13 🔁 4 💬 2 📌 1
Post image

If you're interested in Linux DFIR? Then check all our talks/workshops below. #Linux #DFIR #Cybersecurity

CC: @maryst33d.bsky.social

linuxdfir.ashemery.com

24.11.2024 18:38 👍 37 🔁 14 💬 0 📌 0
Preview
BSides London 2024 This year's event will be held Saturday 14th of December 2024, at the Novotel London West Conference Centre.

We have just managed to free up some more tickets for #BSidesLDN2024, when they are gone, they are gone!
www.eventbrite.co.uk/e/bsides-lon...

Please be a team player and remember to cancel your ticket if you can no longer be there on the day!
#Security #BSides #London #Tickets

24.11.2024 15:14 👍 12 🔁 9 💬 0 📌 1

Whilst helping someone out with their gmail security, I’ve just realised they offer darkweb/leak monitoring. How did I not know about this already?

23.11.2024 02:04 👍 0 🔁 0 💬 0 📌 0

🧵5/5 ..FCUK ransomware. And FCUK this group in particular. I’ll be tracking their TTPs and building detections ESPECIALLY FOR THIS GROUP at every opportunity.

20.11.2024 20:52 👍 1 🔁 0 💬 0 📌 0

Ps. when I say fairly sophisticated, I mean as far as ransomware groups go

20.11.2024 20:51 👍 0 🔁 0 💬 0 📌 0