Iโm happy to share that Iโm starting a new position as Regional Director of Operations, APAC at @s32tech.bsky.social
My move from the US in Mission Integration directly to Australia will help us deliver our intel solutions more precisely and sooner to regional clients who need them - now.
26.12.2025 21:53 โ ๐ 3 ๐ 1 ๐ฌ 0 ๐ 0
The Deepening Quiet War: Why Russiaโs Yantar Has the UKโs SIGINT Community on Alert
When the Russian vessel Yantar approached the edge of UK waters this month, it triggered an unusually public warning from Britainโs Defence Secretary and set off a wave of alerting across the British ...
โAlthough the internet feels wireless, the economic and governmental systems that underpin global society rely on miles of glass strands no thicker than a garden hose.โ
Read my latest piece about Russiaโs Shadow Grey War against Britain & the west at EternalBlue News.
eternalbluenews.com/grey
20.11.2025 21:32 โ ๐ 3 ๐ 2 ๐ฌ 0 ๐ 0
For anyone interested in detection and prevention methods against Salt Typhoon intrusions targeting communication providers, here is a comprehensive guide:
media.defense.gov/2024/Dec/03/...
04.12.2024 14:37 โ ๐ 53 ๐ 36 ๐ฌ 2 ๐ 1
This is certainly snake oil. Detecting malware through backup analysis is already ultra dodgy; doing it via an app adds major roadblocks due to iOSโs app sandboxing and highly restrictive access controls.
Has anyone actually done any analysis on what this does, other than scan for file names?
04.12.2024 17:38 โ ๐ 7 ๐ 1 ๐ฌ 1 ๐ 0
Host of Breaking Points and Krystal Kyle & Friends
Advancing the power of facts, globally ๐
Focused on building resilience in democracies | Former U.S. intelligence officer | Chair, @ISRS.ngo | Board director & CISO | TheCipherBrief
Startup CISO. BSidesLV Lockpick. Hacker lawyer. Amzn & Google alum, USCG wife, Wellesley, GMU Law. IAAL but IANYL.
Cybersecurity nerd; #DFIR @ Google by day; FOSS, threat intel and malware analysis by night. Investigator, coder, terrible sense of humor.
https://yeti-platform.io and more (github.com/tomchop)
views are my own โข he/him โข tomchop.me
Privacy reporter. Cat mom. Working on a novel.
Now Google Threat Intelligence & doing fun things at DistrictCon, fmrly GreyNoiseIO and RecordedFuture, SAISHopkins MASCI alumna | โกs & rts are my own, my employer definitely doesnโt like Taylor Swift that much
Hunting ghosts in wires and boxes, Head of CTI, former NCSC-PL, PL Navy #fightingthreats | @PIVOTcon.bsky.social co-founder & Chief Meme Officer
Senior security researcher and reverse engineer @Intezer
Principal Threat Researcher at Trend Micro
Working at Google TAG. Retired FreeBSD committer. May or may not be a robot.
Cyber Threat, NatSec, Analytic Tradecraft | Instructor of Cybersecurity @ USU Data Analytics & Information Systems | Masters Student @ USU Center for Anticipatory Intelligence | Developer, Analyst, Author
Principal Threat Analyst - Google Threat Intelligence Group
Threat Research @ Recorded Future. Previously @ Security Research Labs. He/Him. ๐ณ๏ธโ๐
๐ฎ Senior Threat Researcher at @proofpoint ๐ฎ | Kindness and Compassion | Not a reflection of the opinions or policies of my employer | Andrew Northern
threat intelligence @google
writing & sharing on adversary tradecraft, malware, threat detection, ics/ot + cyber physical intel, and of course all things #yara
threaty threats -- helping build research workflows into a soc product, but I don't speak for them on this acct. pretty good at bash scripts and strings. disclosures on my linkedin below
https://www.linkedin.com/in/alexlanstein/
AU PERSON 1. threat intel. i hunt bad guys.
EXDIR of U.S. CYBERCOM. Cyber Huntress, #1 Fan of CCC, Life goals include the oceanโฆ
Technologist, entrepreneur, and hacker | CEO @ OODA | Founder @DevSec | Past Founder of FusionX & Terrorism Research Center. Black Hat board member.