Advertisement ยท 728 ร— 90

Posts by Steven Lim

Preview
DefenderXDR - Hunting DKIM replay attacks and Infrastructure On the 6th Feb 2026 Kaseya published the blog โ€œDKIM replay attacks exposed: How cybercriminals abuse Apple and PayPal invoice emailsโ€ https://www.kaseya.

๐—›๐˜‚๐—ป๐˜๐—ถ๐—ป๐—ด ๐——๐—ž๐—œ๐—  ๐—ฅ๐—ฒ๐—ฝ๐—น๐—ฎ๐˜† ๐—”๐˜๐˜๐—ฎ๐—ฐ๐—ธ๐˜€ ๐—ฎ๐—ป๐—ฑ ๐—œ๐—ป๐—ณ๐—ฟ๐—ฎ๐˜€๐˜๐—ฟ๐˜‚๐—ฐ๐˜๐˜‚๐—ฟ๐—ฒ ๐˜‚๐˜€๐—ถ๐—ป๐—ด ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ฒ๐—ฟ๐—ซ๐——๐—ฅ
www.linkedin.com/pulse/defend...

2 months ago 1 0 0 0
Post image

๐Ÿ“š ๐—ก๐—ผ๐˜๐—ฒ๐—ฝ๐—ฎ๐—ฑ++ ๐—›๐—ถ๐—ท๐—ฎ๐—ฐ๐—ธ๐—ฒ๐—ฑ ๐—ฏ๐˜† ๐—ฆ๐˜๐—ฎ๐˜๐—ฒ-๐—ฆ๐—ฝ๐—ผ๐—ป๐˜€๐—ผ๐—ฟ๐—ฒ๐—ฑ ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐—”๐—ฐ๐˜๐—ผ๐—ฟ

Heads up, defenders: a supply chain compromise targeting Notepad++ has been linked to state-sponsored activity. Here's a Sentinel KQL to help you hunt for potentially affected endpoints๐Ÿซก

2 months ago 1 0 0 0

github.com/SlimKQL/Hunt...

1 year ago 0 0 0 0
Post image

LDAPNightmare POC Detection
www.safebreach.com/blog/ldapnig...

1 year ago 0 0 1 0

Custom detection code:
github.com/SlimKQL/Hunt...

1 year ago 0 0 0 0

Custom detection code:
github.com/SlimKQL/Hunt...

1 year ago 0 0 0 0
Post image

๐—–๐˜‚๐˜€๐˜๐—ผ๐—บ ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ฒ๐—ฟ๐—ซ๐——๐—ฅ ๐——๐—ฒ๐˜๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป - ๐—•๐—น๐—ผ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด 2๏ธโƒฃ4๏ธโƒฃ ๐— ๐—ฎ๐—น๐—ถ๐—ฐ๐—ถ๐—ผ๐˜‚๐˜€ ๐—–๐—ต๐—ฟ๐—ผ๐—บ๐—ฒ ๐—˜๐˜…๐˜๐—ฒ๐—ป๐˜€๐—ถ๐—ผ๐—ป๐˜€๐Ÿ›ก๏ธ
www.extensiontotal.com/cyberhaven-i...

1 year ago 1 0 1 0
Advertisement
Post image

Hunting 16 Malicious Chrome Extension๐Ÿ”ฅ
thehackernews.com/2024/12/16-c...
github.com/SlimKQL/Hunt...

1 year ago 4 1 1 0
Post image

๐Ÿšจ Reports suggest US authorities may ban TP-Link Wi-Fi routers in 2025. Regulated industries, ensure your end users aren't connected to TP-Link routers. Use MDE discovery and DefenderXDR's SeenBy() to detect connections. ๐Ÿ›ก๏ธ๐Ÿ“ก

1 year ago 1 0 0 0
Post image

Advanced Vishing KQL Detection by sending your Teams PSTN call log to ADX ๐ŸŽฏ
www.trendmicro.com/en_us/resear...

1 year ago 3 1 0 0

Thanks! :) The threat actor social engineering attacks are targeting normal business users, uers with role are technical in nature and tend not to follow these type of instruction, hence I exclude this group of privilege roles users.

1 year ago 0 0 1 0
Preview
Clipboard to Compromise: PowerShell Script Self-Pwn | Proofpoint US Proofpoint observed an increase in threat actors directing users to copy and paste malicious Powershell script malware onto their computers. Learn more.

www.proofpoint.com/us/blog/thre...

1 year ago 1 0 0 0
Post image

PowerShell Self-Pwn Detection

Proofpoint highlights a social engineering tactic where users are tricked into running malicious PowerShell scripts, leading to malware infections. Despite needing user interaction, the attack's success relies on clever social engineering.

1 year ago 3 1 2 0
Post image

Detecting Teams Red Team Tool ConvoC2
cybersecuritynews.com/red-team-too...

1 year ago 3 0 0 0
Advertisement
Post image

SentinelLab observed threat actor targeting service providers in Southern Europe abusing Visual Studio Code tunnels to maintain persistent remote access to compromised systems. www.bleepingcomputer.com/news/securit... KQL to detect such abuse.

1 year ago 1 1 0 0
Post image

Detect Black Basta Ransomware Campaign RMMTools Deployment - Social Engineering Attack via Teams where the ransomware operator sends a SharePoint link to user to download portable RMM tools to evade detection from web proxy. www.rapid7.com/blog/post/20...

1 year ago 2 0 0 0

Thank you! ๐Ÿ˜„๐Ÿ™

1 year ago 1 0 0 0
Preview
The KQL Grimoire A collection of the most sought-after KQL spells for Microsoft Sentinel and DefenderXDR ๐Ÿ”ฅ [** Updated: 7th December 2024 **] Hello! Let me share a little about my professional journey. My experience s...

The KQL Grimoire ๐Ÿ“–

A collection of the most sought-after KQL spells for Microsoft Sentinel and DefenderXDR
www.linkedin.com/pulse/slims-...

1 year ago 6 2 1 0
Post image

๐—ก๐—ฒ๐˜„ ๐—จ๐—ฅ๐—Ÿ ๐—™๐—ถ๐—น๐—ฒ ๐—ก๐—ง๐—Ÿ๐—  ๐—›๐—ฎ๐˜€๐—ต ๐——๐—ถ๐˜€๐—ฐ๐—น๐—ผ๐˜€๐˜‚๐—ฟ๐—ฒ ๐—ฉ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐˜† ๐——๐—ฒ๐˜๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป (0๏ธโƒฃ๐—ฑ๐—ฎ๐˜†)
A highly accurate DefenderXDR exposure management detection for URL File NTLM Hash Disclosure Vulnerability (0day) www.bleepingcomputer.com/news/securit...

1 year ago 0 0 0 0

github.com/SlimKQL/Hunt...

1 year ago 1 0 0 0
Post image

In AD environments, Timeroasting exploits NTP authentication to request password hashes of computer/trust accounts. If non-standard or legacy passwords are used, offline brute-forcing is possible. I've created a KQL query to detect such activities. #KQL #Timeroast

1 year ago 4 1 2 0
Advertisement

github.com/SlimKQL/Hunt...

1 year ago 0 0 0 0
Post image

Sharing a Sentinel KQL detection for ShadowHound by Friends-Security, which enhances AD enumeration for security assessments. Beware: it can be misused by threat actors & red teamers for reconnaissance. My KQL rule helps identify and mitigate these risks. #KQL #ShadowHound

1 year ago 5 1 1 0
Preview
Hunting-Queries-Detection-Rules/Sentinel/Hunting Rockstar 2FA.kql at main ยท SlimKQL/Hunting-Queries-Detection-Rules KQL Queries. Microsoft Defender, Microsoft Sentinel - SlimKQL/Hunting-Queries-Detection-Rules

Hunting Rockstar 2FA:
github.com/SlimKQL/Hunt...

1 year ago 0 1 0 0
Post image

Hunting Rockstar 2FA: A Key Player in Phishing-as-a-Service (PaaS)
www.trustwave.com/en-us/resour...

1 year ago 2 1 1 0
Preview
Hunting-Queries-Detection-Rules/DefenderXDR/Social Engineering Attack Monitor - Teams & Emails.kql at main ยท SlimKQL/Hunting-Queries-Detection-Rules KQL Queries. Microsoft Defender, Microsoft Sentinel - SlimKQL/Hunting-Queries-Detection-Rules

KQL Code:
github.com/SlimKQL/Hunt...

1 year ago 1 1 0 0
Post image

Social Engineering Attack Alert - Teams & Emails

Kevin Beaumont shared insights on helping orgs recover from ransomware attacks. Key tactic: social engineering. Attackers used phone recon to gather contacts, then flooded users with emails & Teams messages. Custom KQL script for early detection:

1 year ago 7 2 1 0
Post image

CloudApp BEC Defense Policy - Axios

Attackers bypass MFA using a phishing framework with Axios HTTP client. Detect compromise in sign-in logs with user agent axios/1.7.7. Proposing auto-detection & isolation for SecOps assessment.

Sources: Asger Deleuran Strunk / Stephan Berger

1 year ago 4 3 0 0
Advertisement
Post image

๐—ง๐—ต๐—ฒ ๐—ฃ๐—ฒ๐—ฟ๐—ณ๐—ฒ๐—ฐ๐˜ ๐—–๐˜‚๐˜€๐˜๐—ผ๐—บ ๐——๐—ฒ๐˜๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป ... ๐Ÿ˜˜

Using CloudApp & Behaviour Analytics to detect malicious threat actor Copilot Agent.

#Cybersecurity #DefenderXDR #CloudApp #CopilotAgent #KQL

1 year ago 6 1 0 0
Preview
Copilot Agent: The Good, the Bad, and the Ugly It's been a while since my last LinkedIn article in August, but after attending some of the online sessions from Microsoft Ignite, I felt inspired to write this article about Copilot Agents. This prod...

Copilot Agent: The Good, the Bad, and the Ugly
www.linkedin.com/pulse/copilo...

1 year ago 3 0 0 0