👀Claude handles an insane request:
“Remove the squid”
“The document appears to be the full text of the novel "All Quiet on the Western Front" by Erich Maria Remarque. It doesn't contain any mention of squid that I can see.”
“Figure out a way to remove the 🦑“
🤖Just experimented with GPT-3 for malware analysis and built a tool that extracts the IAT from a PE file and uses GPT to provide details about imported Windows API. It also searches for related @MITREattack techniques. #malware#GPT3#Infosec#pythongithub.com/fr0gger/IATell…
Security people everywhere, listen to Jason!
Former Netflix security chief Jason Chan (@chanjbs) offers early stage founders six "green flags" to look out for when hiring and building cybersecurity teams that truly make an impact.
bvp.com/atlas/how-to-h…
Really excited to release this one 💜
Focus was on easy to develop + execute + learn from adversary emulation plans that target specific defensive challenges 🎯
Microsoft has observed various threat actors adopting and integrating the Sliver C2 framework in intrusion campaigns with—or as a replacement for—Cobalt Strike. Get technical info and hunting queries from this blog by Microsoft Security Experts: msft.it/6010jdC1q
I'm very happy to share a project I've been working on for a long time now. A 🔥 scathing 🔥 three-part series on cryptocurrencies & NFTs.
Part I: blockchains and crypto
Part II: NFTs
Part III: the politics of cryptocurrencies
Part I was just released:
kaspersky.com/blog/crypto-ac…
Learn how to create low-cost private decoy AWS resources in accounts and generate alerts when they are accessed. 📊
Read more to access our #AWSCloudFormation template to deploy private decoy resources 👉
go.aws/3QDCiaO
Had a blast presenting at #DEFCON30 today, GitHub repo for TeamFiltration is online! github.com/Flangvik/TeamF…
Thank you so much for all the amazing feedback, can't wait to see what this tool looks like in a year now that it's public!
187K Followers 6K FollowingThe leading provider of crowdsourced cybersecurity solutions purpose-built to secure the digitally connected world...Unleash Ingenuity™
223K Followers 6K FollowingFounder @Binary_Defense @TrustedSec Co-Owner https://t.co/HQC75WhdJh. @WeHackHealth Pod. God + Family/Hacker/CSO/USMC/Intel/Fitness. Make the world a better place.
4K Followers 940 FollowingRugby player | Ex Newcastle Falcons | ex Ospreys | Olympic silver medalist | #TeamGB | Wales 7s and 15s international | Views are my own | Follow The Arsenal
187K Followers 6K FollowingThe leading provider of crowdsourced cybersecurity solutions purpose-built to secure the digitally connected world...Unleash Ingenuity™
223K Followers 6K FollowingFounder @Binary_Defense @TrustedSec Co-Owner https://t.co/HQC75WhdJh. @WeHackHealth Pod. God + Family/Hacker/CSO/USMC/Intel/Fitness. Make the world a better place.
43K Followers 897 FollowingCo-founder of @centrahq/@detectify/@poweredbyingrid. I do not advertise doing hacking services, do not trust the ones telling you I do.
253K Followers 536 FollowingBringing you HD original puns and dad jokes. Over 2M followers across platforms 🔥 ✉️ [email protected] Pre-order our book below! 📚⬇️
1.5M Followers 1K Followingi make costumes/sometimes voice act! just happy to be alive to be honest lmfao 🇳🇿@jska00 Business Inquiries: [email protected]
30K Followers 1K Following24/7/365 threat detection and response across your cloud, identity, endpoints and everything in-between. We got you: https://t.co/pFNwBJN3d5
4K Followers 316 FollowingChief Security Architect, OneDrive + SharePoint at Microsoft. Likes = bookmarks not endorsements. Also at https://t.co/dszQvjBZ4U
63K Followers 82 FollowingThe latest research and news from Unit 42, the Palo Alto Networks (@paloaltontwks) Threat Intelligence and Security Consulting Team covering incident response.
13K Followers 492 FollowingWe're determined to make the world a safer place through our-industry recognized managed security services.
Founded by @HackingDave|Sister company @TrustedSec