餓鬼

#NetBSD / #dreamcast のために、 #カーナビ #SoC のSH-3にNetBSDの移植が必要

餓鬼

Raspberry Pi 5の #SoC はもはやHEATSINK REQUIREDなんだから、板状ヒートスプレッダなんてつけずに #ヒートシンク を標準添付してくれ #RaspberryPi

"来週はこの基板のチップを3つほど開封します"
twitter.com/techanalye1/status

F0rm4t

Join us at InfoSec Jupyterthon 2024.

This online event, to be held on February 15-16, 2024, serves as an opportunity for infosec analysts and engineers to meet and engage with security practitioners using notebooks in their daily work. It is organized by our friends at Open Threat Research, together with folks from the Microsoft Threat Intelligence community.

Some of the topics to be covered in this year’s talks include:

➡ Analyzing Active Directory with Bloodhound CE, Jupyter, and Python

➡Graphing ransomware & data leak sites trends with Plotly

➡Threat hunting in three dimensions

➡Guardians of Identity: OKTA’s underworld

➡Hacking proprietary protocols with pandas

➡Predicting Windows binary download links with Jupyter notebooks

➡Comparison of collaboration methods between MSTICpy and Splunk SIEM

➡Building a community around notebooks for DFIR and SecOps

➡Building data-driven security tools with Streamlit

➡Red teaming LLMs with Jupyter notebooks

➡Automating adversary emulation

➡Applying machine learning for C2 beaconing detection

microsoft.com/en-us/security/b

#Jupyter #notebook #python #MSTICpy #sentinel #splunk #llm #streamlit #Bloodhound #secops #openai #c2 #beaconing #ransomware #activedirectory #ThreatIntelligence #microsoft #cybersecurity #soc #threathunting #infosec #microsoftsecurity

Join us at InfoSec Jupyterthon 2024 | Microsoft Security Blog

Jupyter notebooks are continuing to grow in popularity…

Microsoft Security Blog
Mattias T :donor:

@geerlingguy recently had a interview with @Raspberry_Pi co-founder Eben Upton.
A really interesting interview which gives a lot of insight into their challenges during the pandemic, and also about their philosophy as a company.

youtu.be/-_aL9V0JsQQ

#raspberrypi #arm #soc #linux

Luca

Hello, I just moved over from infosec.exchange 👋

A short #introduction. More info ➡️ lallodi.github.io

I am faculty at TU Eindhoven in NL 🇳🇱. I am interested in studying emergent #cyberthreats and attack innovation (from #malware to #socialEngineering), and how to integrate this into our defenses. I am the scientific director of the ESH-Security Operation Center (our own @TUEindhoven commercial #SOC, eindhovensecurityhub.nl supporting ed. & res.).

Looking forward to meeting you all! 🍻

– Luca Allodi @ TU/e

Academic Website of Luca Allodi, Eindhoven University…

lallodi.github.io
Laren

I noticed while I was doing a little spring cleaning that I hadn't done an intro post since 2018, and it's been. y'know. A little while. So let's run down the list:

I am (in no particular order):

- A #blueteam analyst. I live my life in SIEMs and Excel. I am a #SOC puppet. Fair warning, however, if you're expecting #infosec posts in any vast quantity here, you are going to be horrifically, and hilariously, disappointed. I'll definitely post about it occasionally, but you're gonna have to put up with my mood swing-like hobby shifts.

- An #amateurradio operator. This is a fancy way of saying I have a #HAMRadio license and I"m not afraid to use it. I'm mostly dabbling in HF at the moment, but have a small VHF/UHF rig (Read: I have an HT.)

- A #ttrpg #dungeonmaster. I play #DnD, #WorldOfDarkness, and I'm working on a #PF2e #pathfinder game atm. Expect occasional shitposts about games and stories about my party's antics.

- Trans. :transgender_flag: And on HRT. And not particularly interested in a bunch of chuds' opinions on it. Rare posts about LGBT stuffs to be expected. (No hashtags on this one. Tempted though I am to stick on one to attract flies to the zapper...)

- And a #streamer occasionally. Rarely. When I feel like it. Streaming takes a lot of energy out of me so I do it primarily when the mood strikes.

dooraim :asahi:

#introduction #whoami

Hey i'm dooraim.

I'm a #softwaredeveloper in a company that creates #embedded #linux systems.

Before I worked for an #opensource project (#pulp) which uses #riscv, for which I implemented the #drivers for #I2C and #SPI.

I know #c as a programming language and now I'm using #python.

Right now I'm working on an interface between gateway and #cloud. I like to study #SoC architecture and core #ISA (#ARM).

にの

MediaTekの最新SoCがSnapdragon 855を撃破したとか話題になってる。

smhn.info/201911-mediatek-dime

#soc