okla.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Oklahoma... we're trying ya'll

Administered by:

Server stats:

34
active users

#thrunting

2 posts2 participants0 posts today
sydney<p>🔥Latest Dispatch: HEARTH🔥<br>HEARTH (Hunting Exchange and Research Threat Hub) is an open-source project for sharing and refining threat hunting ideas.</p><p>Learn what it is and how to contribute: <a href="https://dispatch.thorcollective.com/p/introducing-hearth" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dispatch.thorcollective.com/p/</span><span class="invisible">introducing-hearth</span></a></p><p><a href="https://infosec.exchange/tags/ThreatHunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatHunting</span></a> <a href="https://infosec.exchange/tags/Thrunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Thrunting</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/HEARTH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HEARTH</span></a> <a href="https://infosec.exchange/tags/THORcollective" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>THORcollective</span></a></p>
sydney<p>🚨 New Dispatch Drop 🚨<br>Attackers will get in—just give them time.<br>In this week's THOR Collective Dispatch, we talk why security teams must test their defenses: <a href="https://dispatch.thorcollective.com/p/why-cybersecurity-teams-need-to-test" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dispatch.thorcollective.com/p/</span><span class="invisible">why-cybersecurity-teams-need-to-test</span></a></p><p><a href="https://infosec.exchange/tags/threathunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threathunting</span></a> <a href="https://infosec.exchange/tags/thrunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>thrunting</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/THORcollective" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>THORcollective</span></a></p>
sydney<p>🚨 New THOR Collective Dispatch post 🚨<br>In Part 5 of @jotunvillur.bsky.social and my DEATHCon Thrunting Workshop series, we use advanced data analysis to find threats in HTTP datasets.<br>Full post here: <a href="https://dispatch.thorcollective.com/p/a-deathcon-thrunting-workshop-overview-a4b" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dispatch.thorcollective.com/p/</span><span class="invisible">a-deathcon-thrunting-workshop-overview-a4b</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/threathunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threathunting</span></a> <a href="https://infosec.exchange/tags/thrunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>thrunting</span></a> <a href="https://infosec.exchange/tags/THORCollective" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>THORCollective</span></a> <a href="https://infosec.exchange/tags/splunk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>splunk</span></a></p>
sydney<p>Excited to share our latest post from THOR Collective Dispatch! <span class="h-card" translate="no"><a href="https://infosec.exchange/@et" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>et</span></a></span> dives into Splunk DECEIVE, an AI-powered honeypot by <span class="h-card" translate="no"><a href="https://infosec.exchange/@DavidJBianco" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>DavidJBianco</span></a></span>.</p><p>Curious? Read more: <a href="https://dispatch.thorcollective.com/p/exploring-splunk-deceive" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dispatch.thorcollective.com/p/</span><span class="invisible">exploring-splunk-deceive</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/thrunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>thrunting</span></a> <a href="https://infosec.exchange/tags/THORCollective" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>THORCollective</span></a> <a href="https://infosec.exchange/tags/splunk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>splunk</span></a></p>
sydney<p>👻 Tired of getting ghosted by endless events? The five-number summary is your threat-hunting sidekick.<br>Check out our latest THOR Collective Dispatch for the full breakdown.🕵️</p><p>Join us👉: <a href="https://dispatch.thorcollective.com/p/stop-chasing-ghosts-how-five-number" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dispatch.thorcollective.com/p/</span><span class="invisible">stop-chasing-ghosts-how-five-number</span></a> </p><p><a href="https://infosec.exchange/tags/threathunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threathunting</span></a> <a href="https://infosec.exchange/tags/thrunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>thrunting</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/mathiscool" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mathiscool</span></a> <a href="https://infosec.exchange/tags/THORCollective" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>THORCollective</span></a></p>
sydney<p>🐘 Let’s address the elephant in the room — <a href="https://infosec.exchange/tags/thrunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>thrunting</span></a> is a thing now, and it stuck.<br>Why? Because thrunting has that perfect blend of <a href="https://infosec.exchange/tags/hacker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacker</span></a> culture &amp; "I dare you to question this term" energy.</p><p>🔥 Keep thrunting.<br>👉 <a href="https://dispatch.thorcollective.com/p/the-case-for-thrunting" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dispatch.thorcollective.com/p/</span><span class="invisible">the-case-for-thrunting</span></a></p><p><a href="https://infosec.exchange/tags/threathunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threathunting</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
sydney<p>🚀 Attention Thrunters!🚀</p><p>Part 3 of the DEATHCon thrunting workshop is live! <span class="h-card" translate="no"><a href="https://infosec.exchange/@Jotunvillur" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Jotunvillur</span></a></span> and I break down a hypothesis-driven scenario step by step. Grab your hammer and sharpen your skills! 🛠️<br>Read now: <a href="https://dispatch.thorcollective.com/p/a-deathcon-thrunting-workshop-overview-part-3" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dispatch.thorcollective.com/p/</span><span class="invisible">a-deathcon-thrunting-workshop-overview-part-3</span></a></p><p><a href="https://infosec.exchange/tags/threathunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threathunting</span></a> <a href="https://infosec.exchange/tags/thrunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>thrunting</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
sydney<p>THOR Collective dropped part two of <br><span class="h-card" translate="no"><a href="https://infosec.exchange/@Jotunvillur" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Jotunvillur</span></a></span> and my @DEATHCon2025 workshop blog series on <a href="https://infosec.exchange/tags/threathunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threathunting</span></a> with the <a href="https://infosec.exchange/tags/PEAK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PEAK</span></a> framework. 🎯</p><p>Check it out at: <a href="https://dispatch.thorcollective.com/p/a-deathcon-thrunting-workshop-overview" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dispatch.thorcollective.com/p/</span><span class="invisible">a-deathcon-thrunting-workshop-overview</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/thrunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>thrunting</span></a> <a href="https://infosec.exchange/tags/THORCollective" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>THORCollective</span></a></p>