ITSEC Newsletter 2023-08-03

Red team is best team

“In this two part blog series, I’ll share a methodology for building and implementing a DAC pipeline from start to finish. I’ll be utilizing a practical detection use case to show a process for creating, testing, deploying, and modifying detections using DAC principles.“

"Every so often a piece of security research will generate a level of excitement and buzz that's palpable. Dan Kaminsky's DNS bug, Barnaby Jack's ATM Jackpotting, Chris Valasek and Charlie Miller's Jeep hacking escapades. There's something special about the overheard conversations, the whispered sightings of the superstar du jour, and the packed-to-the-rafters conference hall. These moments have delivered something more than just research: they delivered entertainment.”

“Once upon a time, whenever you tried to open your devtools on Supreme's website, you found yourself trapped in a pesky debugger loop. This made it incredibly annoying to reverse engineer their anti-bot scripts.“