Jamie Levy 🦉

Jamie Levy 🦉

@gleeda.bsky.social

@volatilityfoundation.org Core Dev | Art of Memory Forensics co-author | DFIR trainer and enthusiast | Director of Adversary Tactics @huntress.com

2,772 Followers 782 Following 147 Posts Joined Jun 2023
1 month ago
Principal Threat Intel Incident Commander United States of America

We're looking for a Principal Threat Intel Incident Commander here at @huntress.com ! Do you love to:

🔍 Conduct #DFIR analysis?
đź‘€ Track threat actors?
🕸️ Work with others across different departments?
✍️ Write about your findings?
👩‍💼 Present your work?

Apply!: job-boards.greenhouse.io/huntress/job...

5 3 0 1
1 month ago
daendeleon 2d
@ Threads
Greg Bovino was asked how he felt about his demotion today. "Well, obviously, I'm not happy", he replied.
Someone in the crowd shouted back, "So which one are you?"

just choked on my beverage

18,498 3,224 57 523
4 months ago
Staff Threat Intelligence Analyst Remote US

Details can be found here:

job-boards.greenhouse.io/huntress/job...

🤔 Reach out if you have questions.

1 0 0 0
4 months ago

There's an open role for a Staff CTI Analyst on my team here
@huntress.com
📢💫

✨Do you love doing correlations between different incidents, sometimes digging into them, or doing malware analysis?

✨Do you like doing data analysis, and using this to make threat reports? 👇

7 5 1 0
7 months ago
Preview
Joe Grand's Hardware Hacking Basics [FTSCon 2025] This two-day comprehensive course teaches fundamental hardware hacking concepts and techniques used to explore, manipulate, and exploit electronic devices.

We are excited to announce that we are hosting a second training course for #FTSCon week! Join @joegrand.bsky.social as he leads his popular 2-day Hardware Hacking Basics course on Oct. 21-22 in Arlington VA! Registration is now OPEN!

4 5 1 0
5 months ago

We are so excited to have @joegrand.bsky.social keynoting at #FTSCon 2025! Come join us on October 20th!

2 3 0 0
5 months ago
Preview
From The Source 2025 Learn Directly from the World’s Leading Digital Investigators: On Monday, October 20, 2025, the Volatility Foundation is hosting From The Source, a one-day summit, in Arlington, VA, followed by fou…

We are counting down to #FTSCon 2025! We have a slate of great speakers—you don't want to miss this event!


If you haven't registered yet, register here: events.humanitix.com/from-the-sou....

Stay tuned for speaker spotlights!

0 3 0 0
5 months ago
Post image

#FTSCon Speaker Spotlight: Juan Andrés Guerrero-Saade is presenting “From Threat Hunting to Threat Gathering” in the HUNTER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

1 4 0 0
5 months ago
Post image

#FTSCon Speaker Spotlight: Toni de la Fuente is presenting “Open Cloud Security, lessons learned building Prowler” in the MAKER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

0 3 0 0
5 months ago
Post image

#FTSCon Speaker Spotlight: Wesley Shields (@wxs.bsky.social) is presenting “COLDRIVER: NOROBOT/YESROBOT/MAYBEROBOT” in the HUNTER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

4 6 0 1
5 months ago
Post image

#FTSCon Speaker Spotlight: Aleksandra Doniec (@hasherezade.bsky.social) is presenting “Uncovering Malware's Secrets with TinyTracer” in the MAKER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

2 6 0 0
5 months ago
Post image

#FTSCon Speaker Spotlight: Joseph Edwards (@eflags.bsky.social) is presenting “The Forensics of Zoom's Remote Control” in the HUNTER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

1 4 0 1
5 months ago
Post image

#FTSCon Speaker Spotlight: Andrew Case (@attrc.bsky.social) is presenting “Detection and Analysis of Memory-Only Linux Rootkits” in the MAKER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

2 4 0 0
5 months ago

Excited to speak at FTSCon next month!

3 2 0 0
5 months ago
Post image

#FTSCon Speaker Spotlight: Joe FitzPatrick (@securelyfitz.bsky.social) is presenting “Rethinking DMA Attacks with Erebus” in the MAKER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

1 5 0 0
5 months ago
Post image

#FTSCon Speaker Spotlight: Daniel Gordon (@validhorizon.bsky.social) is presenting “When the AppleJeus GitHub is Worth the Squeeze: Citrine Sleet Investigation” in the HUNTER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

6 3 0 1
5 months ago
Post image

#FTSCon Speaker Spotlight: Denis Bueno is presenting “CTADL: Customizable Static Taint Analysis” in the MAKER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

0 4 0 0
5 months ago
Post image

#FTSCon Speaker Spotlight: Michael Horka is presenting “Lilac Typhoon aboard the Indigo Train - The Current State of Chinese Obfuscation Networks” in the HUNTER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

6 5 0 0
6 months ago
Preview
An Attacker’s Blunder Gave Us a Look Into Their Operations | Huntress An attacker installed Huntress onto their operating machine, giving us a detailed look at how they’re using AI to build workflows, searching for tools like Evilginx, and researching targets like software development companies.

An incredible firsthand glimpse into threat actor operations from Huntress:

5 2 0 0
6 months ago
Post image

CYBERWARCON is back.

🗓️ Wednesday, Nov 19, 2025 | Crystal City + virtual
đź”— cyberwarcon.com

13 5 1 2
6 months ago
Call for Presentations. Deadline is 11:59PM ET Friday, August 15th. October 10-11 Arlington, Virginia. sessionize.com/bsidesnova-2025. #BSidesNoVA

Last chance to be a part of *THE* premier #InfoSec event in Northern Virginia, #BSidesNoVA!

Submit a talk or workshop by 11:59PM ET tonight, August 15th.
sessionize.com/bsidesnova-2...

2 3 0 0
7 months ago
Preview
Active Exploitation of SonicWall VPNs | Huntress A likely zero-day vulnerability in SonicWall VPNs is being actively exploited to bypass MFA and deploy ransomware. Huntress advises disabling the VPN service immediately or severely restricting access...

We've seen quite a lot of intrusions involving SonicWall devices here at @huntress.com

We decided to write a bit about what attacker tradecraft we've seen on the other end of these intrusions:

🔎 www.huntress.com/blog/exploit...

3 1 0 0
7 months ago
Post image

BSidesNYC thanks @gleeda.bsky.social and the rest of the 0x05 Technical CFP Committee, @cyb3rkitties.bsky.social, Cesar Vargas, Jase English, Jamie Williams, Jessica Hyde, @rmettig.com, and Stephanie Aceves for volunteering their time to review talks. Many thanks for curating our programming.

2 2 0 0
8 months ago
Post image

The BSidesNYC call for papers is still open. Submit your topic today! bsidesnyc.org

3 4 0 0
8 months ago

This is the first of a series of posts we're doing on some of the vulns found as part of the HackerOne work – we have lots more fun ones coming up about some great SSRF, SQLi, and RCE vulns it discovered, with very clever exploit techniques :)

8 3 0 0
8 months ago
Preview
Inside the BlueNoroff Web3 macOS Intrusion Analysis | Huntress Learn how DPRK's BlueNoroff group executed a Web3 macOS intrusion. Explore the attack chain, malware, and techniques in our detailed technical report.

excited bc today @huntress.com is releasing our analysis of a gnarly intrusion into a web3 company by the DPRK's BlueNoroff!! 🤠

we've observed 8 new pieces of macOS malware from implants to infostealers! and they're actually good (for once)!

www.huntress.com/blog/inside-...

29 19 1 2
10 months ago
Preview
Phishing for Codes: Russian Threat Actors Target Microsoft 365 OAuth Workflows Since early March 2025, Volexity has observed multiple suspected Russian threat actors conducting highly targeted social engineering operations aimed at gaining access to the Microsoft 365 (M365) acco...

@volexity.com #threatintel: Multiple Russian threat actors are using Signal, WhatsApp & a compromised Ukrainian gov email address to impersonate EU officials. These phishing attacks abuse 1st-party Microsoft Entra apps + OAuth to compromise targets.

www.volexity.com/blog/2025/04...

#dfir

18 12 0 1
9 months ago

Congratulations to all of the Volatility contributors - this was no small feat! We are proud to be a sustaining sponsor of this important open-source project that remains the world’s most widely used memory forensics platform. #dfir

10 7 0 0
9 months ago
Preview
Announcing FTSCon 2025 & In-person Malware and Memory Forensics Training! Mark your calendars for Monday, October 20, 2025! We will again be hosting FTSCon in Arlington, Virginia.You can read more event details here. Registration is now open!

We are excited to announce FTSCon 2025 on October 20, 2025, in Arlington VA! Registration is now OPEN + we have a Call for Speakers.

Following FTSCon will be a 4-day Malware & Memory Forensics Training course with Volatility 3.

See the full details here: volatilityfoundation.org/announcing-f...

7 9 0 2
9 months ago
Video thumbnail

It’s raining, and feeding time, so what do we do? Sheep and goat dance set!!!

💣💥 turn up the volume! 🔊🔊

5 0 0 0