Jamie Levy πŸ¦‰'s Avatar

Jamie Levy πŸ¦‰

@gleeda.bsky.social

@volatilityfoundation.org Core Dev | Art of Memory Forensics co-author | DFIR trainer and enthusiast | Director of Adversary Tactics @huntress.com

2,747 Followers  |  782 Following  |  146 Posts  |  Joined: 26.06.2023  |  1.6563

Latest posts by gleeda.bsky.social on Bluesky

Staff Threat Intelligence Analyst Remote US

Details can be found here:

job-boards.greenhouse.io/huntress/job...

πŸ€” Reach out if you have questions.

07.11.2025 18:37 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

There's an open role for a Staff CTI Analyst on my team here
@huntress.com
πŸ“’πŸ’«

✨Do you love doing correlations between different incidents, sometimes digging into them, or doing malware analysis?

✨Do you like doing data analysis, and using this to make threat reports? πŸ‘‡

07.11.2025 18:37 β€” πŸ‘ 7    πŸ” 5    πŸ’¬ 1    πŸ“Œ 0
Preview
Joe Grand's Hardware Hacking Basics [FTSCon 2025] This two-day comprehensive course teaches fundamental hardware hacking concepts and techniques used to explore, manipulate, and exploit electronic devices.

We are excited to announce that we are hosting a second training course for #FTSCon week! Join @joegrand.bsky.social as he leads his popular 2-day Hardware Hacking Basics course on Oct. 21-22 in Arlington VA! Registration is now OPEN!

01.08.2025 15:09 β€” πŸ‘ 4    πŸ” 5    πŸ’¬ 1    πŸ“Œ 0

We are so excited to have @joegrand.bsky.social keynoting at #FTSCon 2025! Come join us on October 20th!

15.09.2025 16:30 β€” πŸ‘ 2    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Preview
From The Source 2025 Learn Directly from the World’s Leading Digital Investigators: On Monday, October 20, 2025, the Volatility Foundation is hosting From The Source, a one-day summit, in Arlington, VA, followed by fou…

We are counting down to #FTSCon 2025! We have a slate of great speakersβ€”you don't want to miss this event!


If you haven't registered yet, register here: events.humanitix.com/from-the-sou....

Stay tuned for speaker spotlights!

18.09.2025 12:02 β€” πŸ‘ 0    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Post image

#FTSCon Speaker Spotlight: Juan AndrΓ©s Guerrero-Saade is presenting β€œFrom Threat Hunting to Threat Gathering” in the HUNTER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

18.09.2025 13:15 β€” πŸ‘ 1    πŸ” 4    πŸ’¬ 0    πŸ“Œ 0
Post image

#FTSCon Speaker Spotlight: Toni de la Fuente is presenting β€œOpen Cloud Security, lessons learned building Prowler” in the MAKER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

18.09.2025 14:46 β€” πŸ‘ 0    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Post image

#FTSCon Speaker Spotlight: Wesley Shields (@wxs.bsky.social) is presenting β€œCOLDRIVER: NOROBOT/YESROBOT/MAYBEROBOT” in the HUNTER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

18.09.2025 16:29 β€” πŸ‘ 4    πŸ” 6    πŸ’¬ 0    πŸ“Œ 1
Post image

#FTSCon Speaker Spotlight: Aleksandra Doniec (@hasherezade.bsky.social) is presenting β€œUncovering Malware's Secrets with TinyTracer” in the MAKER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

18.09.2025 18:10 β€” πŸ‘ 2    πŸ” 6    πŸ’¬ 0    πŸ“Œ 0
Post image

#FTSCon Speaker Spotlight: Joseph Edwards (@eflags.bsky.social) is presenting β€œThe Forensics of Zoom's Remote Control” in the HUNTER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

18.09.2025 19:56 β€” πŸ‘ 1    πŸ” 4    πŸ’¬ 0    πŸ“Œ 1
Post image

#FTSCon Speaker Spotlight: Andrew Case (@attrc.bsky.social) is presenting β€œDetection and Analysis of Memory-Only Linux Rootkits” in the MAKER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

18.09.2025 21:34 β€” πŸ‘ 2    πŸ” 4    πŸ’¬ 0    πŸ“Œ 0

Excited to speak at FTSCon next month!

18.09.2025 20:58 β€” πŸ‘ 4    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Post image

#FTSCon Speaker Spotlight: Joe FitzPatrick (@securelyfitz.bsky.social) is presenting β€œRethinking DMA Attacks with Erebus” in the MAKER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

19.09.2025 13:23 β€” πŸ‘ 1    πŸ” 5    πŸ’¬ 0    πŸ“Œ 0
Post image

#FTSCon Speaker Spotlight: Daniel Gordon (@validhorizon.bsky.social) is presenting β€œWhen the AppleJeus GitHub is Worth the Squeeze: Citrine Sleet Investigation” in the HUNTER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

19.09.2025 15:34 β€” πŸ‘ 6    πŸ” 3    πŸ’¬ 0    πŸ“Œ 1
Post image

#FTSCon Speaker Spotlight: Denis Bueno is presenting β€œCTADL: Customizable Static Taint Analysis” in the MAKER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

19.09.2025 17:06 β€” πŸ‘ 0    πŸ” 4    πŸ’¬ 0    πŸ“Œ 0
Post image

#FTSCon Speaker Spotlight: Michael Horka is presenting β€œLilac Typhoon aboard the Indigo Train - The Current State of Chinese Obfuscation Networks” in the HUNTER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

19.09.2025 11:23 β€” πŸ‘ 6    πŸ” 5    πŸ’¬ 0    πŸ“Œ 0
Preview
An Attacker’s Blunder Gave Us a Look Into Their Operations | Huntress An attacker installed Huntress onto their operating machine, giving us a detailed look at how they’re using AI to build workflows, searching for tools like Evilginx, and researching targets like software development companies.

An incredible firsthand glimpse into threat actor operations from Huntress:

09.09.2025 18:04 β€” πŸ‘ 5    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Post image

CYBERWARCON is back.

πŸ—“οΈ Wednesday, Nov 19, 2025 | Crystal City + virtual
πŸ”— cyberwarcon.com

18.08.2025 15:19 β€” πŸ‘ 13    πŸ” 5    πŸ’¬ 1    πŸ“Œ 2
Call for Presentations. Deadline is 11:59PM ET Friday, August 15th. October 10-11 Arlington, Virginia. sessionize.com/bsidesnova-2025. #BSidesNoVA

Call for Presentations. Deadline is 11:59PM ET Friday, August 15th. October 10-11 Arlington, Virginia. sessionize.com/bsidesnova-2025. #BSidesNoVA

Last chance to be a part of *THE* premier #InfoSec event in Northern Virginia, #BSidesNoVA!

Submit a talk or workshop by 11:59PM ET tonight, August 15th.
sessionize.com/bsidesnova-2...

16.08.2025 00:50 β€” πŸ‘ 2    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Preview
Active Exploitation of SonicWall VPNs | Huntress A likely zero-day vulnerability in SonicWall VPNs is being actively exploited to bypass MFA and deploy ransomware. Huntress advises disabling the VPN service immediately or severely restricting access...

We've seen quite a lot of intrusions involving SonicWall devices here at @huntress.com

We decided to write a bit about what attacker tradecraft we've seen on the other end of these intrusions:

πŸ”Ž www.huntress.com/blog/exploit...

04.08.2025 17:07 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

BSidesNYC thanks @gleeda.bsky.social and the rest of the 0x05 Technical CFP Committee, @cyb3rkitties.bsky.social, Cesar Vargas, Jase English, Jamie Williams, Jessica Hyde, @rmettig.com, and Stephanie Aceves for volunteering their time to review talks. Many thanks for curating our programming.

31.07.2025 12:34 β€” πŸ‘ 2    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Post image

The BSidesNYC call for papers is still open. Submit your topic today! bsidesnyc.org

27.06.2025 15:30 β€” πŸ‘ 3    πŸ” 4    πŸ’¬ 0    πŸ“Œ 0

This is the first of a series of posts we're doing on some of the vulns found as part of the HackerOne work – we have lots more fun ones coming up about some great SSRF, SQLi, and RCE vulns it discovered, with very clever exploit techniques :)

24.06.2025 20:07 β€” πŸ‘ 8    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Preview
Inside the BlueNoroff Web3 macOS Intrusion Analysis | Huntress Learn how DPRK's BlueNoroff group executed a Web3 macOS intrusion. Explore the attack chain, malware, and techniques in our detailed technical report.

excited bc today @huntress.com is releasing our analysis of a gnarly intrusion into a web3 company by the DPRK's BlueNoroff!! 🀠

we've observed 8 new pieces of macOS malware from implants to infostealers! and they're actually good (for once)!

www.huntress.com/blog/inside-...

18.06.2025 20:53 β€” πŸ‘ 29    πŸ” 19    πŸ’¬ 1    πŸ“Œ 2
Preview
Phishing for Codes: Russian Threat Actors Target Microsoft 365 OAuth Workflows Since early March 2025, Volexity has observed multiple suspected Russian threat actors conducting highly targeted social engineering operations aimed at gaining access to the Microsoft 365 (M365) acco...

@volexity.com #threatintel: Multiple Russian threat actors are using Signal, WhatsApp & a compromised Ukrainian gov email address to impersonate EU officials. These phishing attacks abuse 1st-party Microsoft Entra apps + OAuth to compromise targets.

www.volexity.com/blog/2025/04...

#dfir

22.04.2025 16:39 β€” πŸ‘ 18    πŸ” 12    πŸ’¬ 0    πŸ“Œ 1

Congratulations to all of the Volatility contributors - this was no small feat! We are proud to be a sustaining sponsor of this important open-source project that remains the world’s most widely used memory forensics platform. #dfir

16.05.2025 15:20 β€” πŸ‘ 10    πŸ” 7    πŸ’¬ 0    πŸ“Œ 0
Preview
Announcing FTSCon 2025 & In-person Malware and Memory Forensics Training! Mark your calendars for Monday, October 20, 2025! We will again be hosting FTSCon in Arlington, Virginia.You can read more event details here. Registration is now open!

We are excited to announce FTSCon 2025 on October 20, 2025, in Arlington VA! Registration is now OPEN + we have a Call for Speakers.

Following FTSCon will be a 4-day Malware & Memory Forensics Training course with Volatility 3.

See the full details here: volatilityfoundation.org/announcing-f...

23.05.2025 18:00 β€” πŸ‘ 7    πŸ” 9    πŸ’¬ 0    πŸ“Œ 2
Video thumbnail

It’s raining, and feeding time, so what do we do? Sheep and goat dance set!!!

πŸ’£πŸ’₯ turn up the volume! πŸ”ŠπŸ”Š

07.06.2025 00:46 β€” πŸ‘ 4    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Lots of new stickers!

thegarbagefile.etsy.com

03.05.2025 20:32 β€” πŸ‘ 194    πŸ” 22    πŸ’¬ 11    πŸ“Œ 3

We have reached out to Samsung. There is active exploitation in the wild.

Be sure to look for new files created in the server directory of your MagicInfo install, and child processes spawning from the Apache Tomcat process.

07.05.2025 07:08 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0

@gleeda is following 20 prominent accounts