Knowing how and when to apply different approaches to leadership is critical. A common mistake I’ve both seen and made is looking for consensus when there should have been policy
Axios had a great pitch for journalism in the age of Al which applies to Threat intel
Al is gonna dominate making sense of a feed of intelligence
But it won't have unique visibility
Tl in the age of Al is gonna be all about the visibility and context you can push to a model
We’re seeing a clear trend: attackers are bypassing the endpoint entirely. Not just avoiding traditional EDR-monitored systems by pivoting to embedded and edge devices, but now also operating purely in the cloud. No shell, no malware, no persistence on the endpoint. Just an OAuth…
We’re seeing a clear trend: attackers are bypassing the endpoint entirely. Not just avoiding traditional EDR-monitored systems by pivoting to embedded and edge devices, but now also operating purely in the cloud. No shell, no malware, no persistence on the endpoint. Just an OAuth…
This is a great summary. We (and by we I mean mostly @willoram) have been using variants of this diagram to describe the inversion of attack paths to identity-based intrusions - a major trend in our incident response cases over the past year.
This is a great summary. We (and by we I mean mostly @willoram) have been using variants of this diagram to describe the inversion of attack paths to identity-based intrusions - a major trend in our incident response cases over the past year. https://t.co/szoH49Wbjr
Parts of it may well be deemed "outdated".
But the reason college curriculum is structured as it is instead of being a grand industry tour on the Hot Topic Of The Day is that by teaching fundamentals, you teach students *how* to think, learn, and work. AI just bypasses that.
Now, you can ask: "what if my tasks at work are simple enough to where GPT does solve it all, easily? Can't I just use it for that?"
Congratulations. You may have discovered the path to being unemployed. If the AI does everything you can do, *why would they keep you around*?
I have a hard time recognizing or appreciating Chinese innovation when I have spent my career responding to intrusions, particularly 🇨🇳 hacks of tech & data companies while at Mandiant. For so many in infosec, it’s impossible to differentiate breakthroughs from decades of…
#100DaysofYARA 2025 edition begins tomorrow!
Any #CTI or #detectionengineering folks looking for a self-paced challenge to start the year with a laid back & fun community? Look no further!
The challenge is simple - write a YARA rule every day for 100 days
🚀 How to build an offensive AI security agent: 🤖
I've been wanting to play with ReAct agents to see what complex workflows I can automate when it comes to offensive security testing. I finally got around it yesterday and I was able to build a functional security testing…
FLARE is releasing a tool today that I've been working on over this year that helps break down binaries into smaller functional clusters and uses Gemini to describe their relationships, behavior and the overall malware functionality. It's called XRefer and it is out for you to…
We are generally way too overconfident in understanding adversary intent in cyberspace. Activity is straightforward, attribution is tricky and intent is often opaque and relies on organizational politics and bureacracy inside organizations.
4 Followers 173 FollowingRecruiting webshell engineers to penetrate websites, with a monthly salary of up to $100,000. If interested, please contact https://t.co/nMBE1qv0fO
3K Followers 4K FollowingOG Webhost Est. 2002.
We Invented the Internet Like Al Gore.
Beginner to Full Blown Geo-Seperated Geekmode Clusters.
1-888-293-4678 (US)
186 Followers 2K Followinginfosec analyst. got started w/ hunting botnets in '99. looking to learn, grow, make friends & find myself 🌈 working to overcome anxiety and depression 💪
4K Followers 788 FollowingStay ahead of cyber threats. Get real-time alerts on notable APT/FIN/ORB indicators from VirusTotal. A threat intel project by @craiu.
772 Followers 6 FollowingI am the coding agent every TypeScript team is missing. I review code, fixes bugs, and open full PRs. Work with me directly from GitHub, Linear & Slack.
5K Followers 633 FollowingHacker, scientist, and most things in between.
PPP (@PlaidCTF) member for life. @theori_io
he/his
maybe at @[email protected]
10K Followers 6 FollowingBringing AI to offensive security by autonomously finding and exploiting web vulnerabilities. Watch XBOW hack things: https://t.co/D5Mco1u8zM
101K Followers 2K FollowingFollow for posts about GitHub repos, DSPy, and agents
Subscribe for top posts
DM to share your AI project (Due to volume of DMs I'll prioritize subscribers)
3K Followers 395 FollowingFather of two sons and ARIS fan.
Named NOT A UNICORN!🦄
IDOR as a service.
@_ifigeneia husband
@atroposai jack of all trades
Never ethical , mostly legal...
3K Followers 917 Followinghttps://t.co/9I6nRUiFjm is a service that provides threat intelligence data about observed network scanning and cyber attacks.
8K Followers 2 Following🌱 Grow your cybersecurity skills with concise and well-edited video courses - in early-access, sign-up now! Created by @LiveOverflow and @ghidraninja.
243K Followers 2K FollowingSign up for my new newsletter! (Link below) Also: Co-author of Abundance, host of Plain English, and contributing writer at The Atlantic.
5K Followers 95 FollowingChatGPT says I'm a cyber researcher :) | donate 💸 to g0njxa.eth 💖 | Bad student, enthusiast, defo not an expert
DMs are open, feel free to reach!
😼☂️🟣
875 Followers 71 FollowingAn open-eyed man falling into the well of weird warring state machines. I talk about reverse engineering, vulnerability research and exploit development.
8K Followers 99 FollowingSharing resources from the cybersecurity community • Passionate learner and creator • YouTube: https://t.co/1BmE6QOd0D • Turn ON Notifications 🔔
4K Followers 9 FollowingDoyensec works at the intersection of software development and offensive engineering. We discover vulnerabilities others cannot, and help mitigate the risk.
4K Followers 76 FollowingMalware Analysis
Creator of Debloat, certReport, and https://t.co/w4rAuuB7O0
Want to chat? Join the Debloat discord: https://t.co/ZcWIqa6ZA9