Instacyber's Avatar

Instacyber

@instacyber.bsky.social

Reveals APTs with one easy application! | Artificial amateurs, aren't at all amazing // Analytically, I assault, animate things

115 Followers  |  53 Following  |  8 Posts  |  Joined: 29.08.2023  |  1.6406

Latest posts by instacyber.bsky.social on Bluesky

Post image

MORPHEUS: They're coming for you, Neo. I can guide you, but you must do exactly as I say. Take the elevator to the lobby and go to the CVS across the street. Purchase 5 Steam gift cards at $200 each. Scratch off the protective coating on the back and tell me the fifteen digit redemption codes. Hurry

23.08.2025 21:57 β€” πŸ‘ 3757    πŸ” 962    πŸ’¬ 17    πŸ“Œ 7

CFP when?!

20.08.2025 21:16 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

This research was a banger, with pretty broad targeting albeit some that falls within the expected profile for the TA group.

Despite the large initial reach, I expect overall infection rates were hampered by relatively low Firefox market share. Fingers crossed they don’t get a Chrome 0-day..

27.11.2024 13:06 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Diligent intel producers should always be mindful of tracking report readership and gathering feedback.

As a β€œcyber Intel” practitioner, I’ve found the lowest friction way to achieve the former is just to publish and watch telemetry as a stream of customers start pinging adversary infrastructure πŸ˜…

27.11.2024 12:37 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Oh absolutely! We often fall into the trap of chastising obviously negligent behavior (unpatched hosts on the internet!) but sometimes lose sight of the scale and complexity of the challenge.

I would genuinely love to hear these authors opinions with an understanding of modern day cyber threats!

26.11.2024 11:49 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Although I’m viewing this from a practitioner point of view instead of a historical one so maybe I’m missing the point. Unfortunately some folks point to similar sentiment to demonstrate the field has failed, but the challenge is similar to β€œlet’s stop war”..

26.11.2024 11:33 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

I’d argue saying the same thing isn’t effective and doesn’t account for reality. Issues have moved from abuse of trust to identification of malice to exploitation of process over the years, and while these quotes evoke a cosy nostalgia they don’t really demonstrate much except human naivety

26.11.2024 11:29 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Can't really beat this advice. One additional (but related) layer that has been helpful for me: people aren't interested in how you came to your conclusions. Your finished product needs to reflect how you think of the project at the end, not the journey of how you got there.

03.09.2024 17:11 β€” πŸ‘ 136    πŸ” 24    πŸ’¬ 5    πŸ“Œ 2

Hash collisions are irrelevant within the context of referencing a sample with a description in an immutable data source (a book), so go with MD5 for space reasons.

I have no idea why people always bring collisions up in similar discussions.

11.11.2024 16:09 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

I really liked this article.

My addition is that major offensive cyber campaigns are only really useful as a first strike capability and rapidly lose meaningful utility when conflict moves towards tactical requirements. @moore.bsky.social notes the speed of cyber in his first claim.

07.11.2023 16:30 β€” πŸ‘ 4    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

@instacyber is following 20 prominent accounts