Alex Pinto's Avatar

Alex Pinto

@alexcp.bsky.social

Cybersecurity data storytelling. DBIR at Verizon Business. Previously serial founder and parallel shitposter. He/him.

611 Followers  |  584 Following  |  102 Posts  |  Joined: 05.07.2023  |  2.0035

Latest posts by alexcp.bsky.social on Bluesky

Botei no wishlist. Nada como um bom retrรด survival horror.

06.10.2025 16:23 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

i'm inventing a new kind of roguelike where instead of poker, slot machines or coin flipping you play as a little guy with a sword

03.10.2025 16:29 โ€” ๐Ÿ‘ 525    ๐Ÿ” 43    ๐Ÿ’ฌ 29    ๐Ÿ“Œ 1

THE MEME IS REAL

29.09.2025 01:38 โ€” ๐Ÿ‘ 9272    ๐Ÿ” 2822    ๐Ÿ’ฌ 62    ๐Ÿ“Œ 39
Preview
From Microsoft's Crisis to Medical Device Revolution: The Evolution of Threat Modeling The year 2002 marked a turning point in cybersecurity history, though few realized it at the time. Microsoft was hemorrhaging customers due to security vulnerabilities, worms were spreading unchecked, and patching costs were mounting. In the midst of this crisis, Bill Gates penned his famous memo on "trustworthy computing," setting the stage for a fundamental transformation in how we approach software security.At the center of this transformation was Adam Shostack, a critic-turned-insider who wo

I did a long, in depth podcast with Shannon Lantzy, you can listen at https://www.shannonlantzy.com/post/from-microsoft-s-crisis-to-medical-device-revolution-the-evolution-of-threat-modeling

26.09.2025 17:17 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Enjoy! Itโ€™s a delightful game. The language is fully translatable as well, but that was beyond my reach when I played it.

22.09.2025 20:49 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Oh, man! Really want to hear your thoughts on this one!

22.09.2025 20:45 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Most impactful project Iโ€™ve ever been involved with for sure.

The Sony Hack Attribution Generator was a close second.

17.09.2025 14:47 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Am I the jerk? Redditors say yes โ€” but ChatGPT and other bots say no. ChatGPT and other AI bots tell posters from Reddit's "AITA" board that, actually, they're not the jerks.

Putting the whole โ€œchat bots are bad for your psycheโ€ thing aside, this is brilliant experiment design.

www.businessinsider.com/reddit-aita-...

16.09.2025 20:19 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Missed you, man.

13.09.2025 16:00 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

As a Brazilian-American, my feelings about 9/11 are now very conflicted.

11.09.2025 20:10 โ€” ๐Ÿ‘ 5    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

This one did make the DBIR Breach Hall Of Fame 2019. First and only breach where the threat actor was outside planet Earth.

github.com/vz-risk/VCDB...

11.09.2025 14:57 โ€” ๐Ÿ‘ 4    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
CTA Webinar What Gets Measured, Gets Done   A National Dashboard for Cybersecurity
YouTube video by Cyber Threat Alliance CTA Webinar What Gets Measured, Gets Done A National Dashboard for Cybersecurity

Now available on-demand.
What Gets Measured, Gets Done: A National Dashboard for Cybersecurity
www.youtube.com/watch?v=yBeV...
with lumanaries in the cyber measurement field.
#cybersecurity #cybermetrics #threatintelligence

11.09.2025 14:43 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

If AI models were able to do all the things people claim they do, the foundational model companies would be raking in Trillions from the additional output and they would keep the AI itself under lock and key.

Itโ€™s like buying a โ€œhow to get richโ€ course off the internet.

03.09.2025 18:01 โ€” ๐Ÿ‘ 13    ๐Ÿ” 10    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 1

I love the methodology. The author makes a lot of sense here.

03.09.2025 17:58 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Yes, please.

27.08.2025 21:41 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
2025 State of the Internet: Digging into Residential Proxy Infrastructure In-depth analysis of the PolarEdge botnet (first reported on by Sekoia in early 2025) a suspected ORB targeting edge devices since mid-2023. This blog covers infrastructure patterns, profiles current ...

PHENOMENAL work by @censys.bsky.social w/special shout out to one of the best cyber researchers out there (Himaja, who is smartly not on social media).

They discovered sophisticated proxy infra designed for long-term espionage operations, & most victims probably have no idea they're compromised.

14.08.2025 17:33 โ€” ๐Ÿ‘ 3    ๐Ÿ” 4    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 1

What a sweetie! Congrats, Leigh!

10.08.2025 16:05 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Are there any good write ups on the Salesforce data exfils that have been happening?

Did ShinyHunters create a mass credential dump tool just like the one we had last year with Snowflake?

09.08.2025 03:42 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Take your like and leave.

08.08.2025 20:10 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Holding a bowl of berries at arms length to keep the AI Hunter Killers at bay during the Water Wars.

08.08.2025 00:30 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

It seems like berries really are the LLM modelโ€™s weakness.

08.08.2025 00:29 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Rare glimpse of the 2026 DBIR editorial document:

โ€œGiven the prevalence of file transfer and management servers in 2023 and perimeter devices in 2024, you may ask yourself which one of those led the vulnerability exploitation vector in 2025.โ€

โ€œThe answer is, of course, yes.โ€

07.08.2025 01:26 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Oh no! Terrible week for it.

07.08.2025 01:19 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image 05.08.2025 16:40 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Trump subiu no telhado.

(For all the PT-BR idiom enjoyers out there)

05.08.2025 15:32 โ€” ๐Ÿ‘ 0    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
In the Future All Food Will Be Cooked in a Microwave, and if You Canโ€™t Deal With That Then You Need to Get Out of the Kitchen As a restaurant owner โ€“ Iโ€™m astounded at the rate of progress since microwaves were released a few short years ago. Todayโ€™s microwave can cook a frozen burrito. Tomorrowโ€™s mโ€ฆ

I laughed so hard I thought I was going to cough up an organ. Every line is gold.

04.08.2025 23:06 โ€” ๐Ÿ‘ 105    ๐Ÿ” 48    ๐Ÿ’ฌ 7    ๐Ÿ“Œ 6

Lots of Chico Buarque playing in my house today.

05.08.2025 01:14 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

This is what I think too, but I canโ€™t find a direct citation or reference to โ€œwhen we took down XYZ group, we found they had a robust R&D practiceโ€.

Have you ever come across something like this?

04.08.2025 19:47 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities GreyNoiseโ€™s new research reveals a recurring pattern: spikes in malicious activity often precede the disclosure of new CVEs โ€” especially in enterprise edge technologies like VPNs and firewalls.

โ€ข What these signals might reveal about attacker workflows
โ€ข How defenders can use this information to act early

Read the full research report here:

www.greynoise.io/resources/ea...

Always happy to discuss or answer questions about the data โ€” just drop a line at research@greynoise.io.

31.07.2025 13:17 โ€” ๐Ÿ‘ 4    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Three high-profile former CISA employees have joined @istorg.bsky.social to keep working on Secure by Design and figure out a stable future for the CVE program. www.politico.com/newsletters/...

28.07.2025 15:00 โ€” ๐Ÿ‘ 15    ๐Ÿ” 9    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 2

@alexcp is following 20 prominent accounts