MORPHEUS: They're coming for you, Neo. I can guide you, but you must do exactly as I say. Take the elevator to the lobby and go to the CVS across the street. Purchase 5 Steam gift cards at $200 each. Scratch off the protective coating on the back and tell me the fifteen digit redemption codes. Hurry
23.08.2025 21:57 β π 3757 π 962 π¬ 17 π 7
CFP when?!
20.08.2025 21:16 β π 2 π 0 π¬ 1 π 0
This research was a banger, with pretty broad targeting albeit some that falls within the expected profile for the TA group.
Despite the large initial reach, I expect overall infection rates were hampered by relatively low Firefox market share. Fingers crossed they donβt get a Chrome 0-day..
27.11.2024 13:06 β π 1 π 0 π¬ 0 π 0
Diligent intel producers should always be mindful of tracking report readership and gathering feedback.
As a βcyber Intelβ practitioner, Iβve found the lowest friction way to achieve the former is just to publish and watch telemetry as a stream of customers start pinging adversary infrastructure π
27.11.2024 12:37 β π 0 π 0 π¬ 0 π 0
Oh absolutely! We often fall into the trap of chastising obviously negligent behavior (unpatched hosts on the internet!) but sometimes lose sight of the scale and complexity of the challenge.
I would genuinely love to hear these authors opinions with an understanding of modern day cyber threats!
26.11.2024 11:49 β π 1 π 0 π¬ 0 π 0
Although Iβm viewing this from a practitioner point of view instead of a historical one so maybe Iβm missing the point. Unfortunately some folks point to similar sentiment to demonstrate the field has failed, but the challenge is similar to βletβs stop warβ..
26.11.2024 11:33 β π 0 π 0 π¬ 0 π 0
Iβd argue saying the same thing isnβt effective and doesnβt account for reality. Issues have moved from abuse of trust to identification of malice to exploitation of process over the years, and while these quotes evoke a cosy nostalgia they donβt really demonstrate much except human naivety
26.11.2024 11:29 β π 0 π 0 π¬ 1 π 0
Can't really beat this advice. One additional (but related) layer that has been helpful for me: people aren't interested in how you came to your conclusions. Your finished product needs to reflect how you think of the project at the end, not the journey of how you got there.
03.09.2024 17:11 β π 136 π 24 π¬ 5 π 2
Hash collisions are irrelevant within the context of referencing a sample with a description in an immutable data source (a book), so go with MD5 for space reasons.
I have no idea why people always bring collisions up in similar discussions.
11.11.2024 16:09 β π 3 π 1 π¬ 0 π 0
I really liked this article.
My addition is that major offensive cyber campaigns are only really useful as a first strike capability and rapidly lose meaningful utility when conflict moves towards tactical requirements. @moore.bsky.social notes the speed of cyber in his first claim.
07.11.2023 16:30 β π 4 π 0 π¬ 0 π 0
GET MY T-SHIRTS HOODYS MUGS AT https://dashare.zone -
DAILY EXTRAS BY EMAIL AT https://patreon.com/dasharez0ne
WHERE U WILL ALSO FIND "DA SHARE Z1NE", STICKERS AND MORE SHYT -DASHARE.ZONE ADMIN
threat intelligence @google
writing & sharing on adversary tradecraft, malware, threat detection, ics/ot + cyber physical intel, and of course all things #yara
Director Operations, NCSC, GCHQ. 30+ years in Government Cyber Operations. Views entirely my own and do not necessarily reflect those of my organisation. π΄σ §σ ’σ ·σ ¬σ ³σ Ώ πΊπ¦
Threat intel researcher focused on infrastructure hunting. Views are my own and not my employer's.
Threat Research @ Proofpoint. Former @virtualroutes.bsky.social fellow. @warstudieskcl.bsky.social alum. She/her
Threat Intel|Detection
PCAP or it didn't happen.
oh great, now Iβm on bluesky
@ESET Distinguished Researcher | alum of McAfee, Microsoft MVP, Tribal Voice, Zultys | Mod @Lenovo, @Neowin.Net, Scots Newsletter forums | Intel Insider Council | Repost β endorse
#threatintel @Recorded Future | Formerly @PwC GTI | Malware & infrastructure analysis with a side of cyberpunk. ππ She/her, support π³οΈβππ³οΈββ§οΈβ¨
Three Buddy Problem
https://securityconversations.com
Cybersecurity, Battletech, and Sci-Fi.
Lord of Loaders at Volexity
Former Head of CERT-FR. Former Head of Operations at ANSSI
Director of Threat Prevention Labs at @ESET
A security firm providing Incident Response, Proactive Threat Assessments, Trusted Advisory, and Threat Intelligence // volexity.com
Security research and breaking news straight from ESET Research Labs.
welivesecurity.com/research/
Just someone that dabbles in threat research, malware analysis, RE, incident response, CTFs, and old school forensics.
Apologetic ginger.
Manager at Microsoft Threat Intelligence Center (MSTIC). Adjunct Faculty at Georgetown University. Penn State Alum. Tweets are my own.
DFIR by day, DFIR by night.
Former vet tech.
Violinist, Salty, Tired, Meme Enthusiast.