JM's Avatar

JM

@mrjm.bsky.social

Dad, husband & Security dinosaur: lots of SecEng ⚙️, Redteam ☠️ DFIR ⛑️. Passion for National Security 🇺🇸🇨🇦🇫🇷, Coding 💻 & Space 🚀 https://linkedin.com/in/jmamblat

81 Followers  |  94 Following  |  30 Posts  |  Joined: 04.08.2023  |  1.8896

Latest posts by mrjm.bsky.social on Bluesky

Post image

Look what's happening at the French Embassy in Washington DC.

04.03.2025 21:05 — 👍 66543    🔁 10436    💬 652    📌 420
Post image

'Did you even say thank you?'

01.03.2025 21:01 — 👍 19658    🔁 3388    💬 219    📌 129

Hopefully work is temporarily outsourced to the other four eyes 🤞🏻

03.03.2025 00:28 — 👍 1    🔁 0    💬 0    📌 0
Preview
As Trump warms to Putin, U.S. halts offensive cyber operations against Moscow Defense Secretary Pete Hegseth has ordered U.S. Cyber Command to pause cyber and information operations against Russia as Trump seeks to bring Putin to the negotiating table to end war in Ukraine.

SecDef has ordered a pause on offensive cyber and info operations while the US & Moscow are in talks, though planning for operations continues, according to sources. While such a pause is not unusual, the move comes as Trump accommodates Putin in his designs on Ukraine.
wapo.st/4kjGtrI

02.03.2025 01:18 — 👍 97    🔁 39    💬 9    📌 5

We are experiencing an assault on science unparalleled by anything I’ve seen in my life. It’s not one issue or another anymore, the entire institution is under attack by the most powerful individuals in the country.

This Friday, where will you be?

standupforscience2025.org

02.03.2025 16:27 — 👍 44463    🔁 12151    💬 647    📌 402
Exclusive: Hegseth orders Cyber Command to stand down on Russia planning The secretary of Defense has ordered U.S. Cyber Command to stand down from all planning against Russia, including offensive digital actions, sources tell Recorded Future News.

Why this matters:
1. While NSA doesn't have to stand down, many service members working *at* NSA work for their individual services, addressing their intelligence priorities. The national mission broadly benefits from this. These members likely must stand down. 1/
therecord.media/hegseth-orde...

28.02.2025 20:35 — 👍 270    🔁 104    💬 11    📌 25
Preview
r-tec Blog | Bypass AMSI in 2025 This blog post will shed some light on what's behind AMSI (roughly, but hopefully easy to understand) and how you can still effectively bypass it - more than four years later.

This is a really cool post if interested in Redteam and bypassing AVs.. en.r-tec.net/r-tec-blog-b...

03.03.2025 00:01 — 👍 1    🔁 0    💬 0    📌 0
Preview
Lazarus targets nuclear-related organization with new malware Lazarus targets employees of a nuclear-related organization with a bunch of malware, such as MISTPEN, LPEClient, RollMid, CookieTime and a new modular backdoor CookiePlus.

“Lazarus group evolves its infection chain with old and new malware” #threatintel #cybersecurity
securelist.com/lazarus-new-...

24.12.2024 13:02 — 👍 2    🔁 0    💬 0    📌 0
Screenshot of a password box, with example "Nine+twelve=21"

Screenshot of a password box, with example "Nine+twelve=21"

New password generation algorithm just dropped, get cracking.

18.12.2024 13:02 — 👍 77    🔁 10    💬 3    📌 2
Preview
Russian government spies targeted Ukraine using tools developed by cybercriminals | TechCrunch Researchers say a hacking group linked to the FSB used tools developed by a cybercrime group to target Ukraine's Army and Border Guard.

“Russian government spies targeted Ukraine using tools developed by cybercriminals” #nationalsecurity #intel #infosec

techcrunch.com/2024/12/11/r...

13.12.2024 11:44 — 👍 1    🔁 0    💬 0    📌 0

Told Assad I am not mad and to prove it I've given him apartment with large windows & scenic views.

09.12.2024 07:24 — 👍 4002    🔁 411    💬 151    📌 34

Would you like to work with great folks to secure something important? LinkedIn security is hiring -- with more roles coming, including a Sr. Director for Risk and Compliance. I'd love to work with you!

No jerks, please.

09.12.2024 19:54 — 👍 37    🔁 11    💬 2    📌 2
Preview
US alleges China hacked calls of 'very senior' political figures, official says The U.S. believes that an alleged sweeping Chinese cyber espionage campaign known as Salt Typhoon targeted and recorded telephone calls of "very senior" American political figures, a White House official said on Saturday.

(Should not be a surprise :) “US alleges China hacked calls of 'very senior' political figures, official says” #nationalsecurity #cybersecurity
www.reuters.com/world/us-all...

09.12.2024 23:48 — 👍 0    🔁 0    💬 0    📌 0
Post image

Breaking: The House Permanent Select Committee on Intelligence has released an unclassified report into the IC and its work on Havana Syndrome, or Anomalous Health Incidents. From the first lines of the executive summary: "It appears increasingly likely…that a foreign adversary is behind some AHIs."

05.12.2024 19:50 — 👍 331    🔁 111    💬 11    📌 17
Preview
Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage | Microsoft Security Blog Microsoft has observed Secret Blizzard compromising the infrastructure and backdoors of the Pakistan-based threat actor we track as Storm-0156 for espionage against the Afghanistan government and Indi...

A Russian APT hacked the infrastructure and tools of other APTs and cybercriminal groups to conduct cyber espionage attacks in South East Asia. Great @microsoftsecurity.bsky.social report. #infosec www.microsoft.com/en-us/securi...

04.12.2024 22:21 — 👍 27    🔁 16    💬 2    📌 2
Preview
Guidance Urges Visibility and Device Hardening against PRC-Affiliated Threat Actor FORT MEADE, Md. – The National Security Agency (NSA) joins the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and others in releasing

“Guidance Urges Visibility and Device #Hardening against PRC-Affiliated Threat Actor” #infosec #cybersecurity

www.nsa.gov/Press-Room/P...

04.12.2024 11:15 — 👍 0    🔁 0    💬 0    📌 0
Preview
U.S. officials urge Americans to use encrypted apps amid cyberattack that exposed live phone calls Officials from the FBI and CISA said it was impossible to predict when the telecommunications companies would be fully safe from interlopers.

The irony, it burns.

Yes, there are tradeoffs to end to end encryption, but it's wild for the FBI to start agreeing with basically the entire security community that it's an often-necessary security message.

www.nbcnews.com/tech/securit...

03.12.2024 23:02 — 👍 69    🔁 25    💬 2    📌 1
Preview
GitHub - rasta-mouse/process-inject-kit: Port of Cobalt Strike's Process Inject Kit Port of Cobalt Strike's Process Inject Kit. Contribute to rasta-mouse/process-inject-kit development by creating an account on GitHub.

#CobaltStrike ‘s Process Inject Kit from C to C++ BOF templates.. courtesy Rasta Mouse #redteam #infosec #cybersecurity

github.com/rasta-mouse/...

01.12.2024 15:46 — 👍 1    🔁 1    💬 0    📌 0
Preview
Capture The Flag (CTF) Get ready to elevate your DFIR skills with our exciting DFIR Labs Capture The Flag (CTF) competition! This event will immerse you in real-world intrusion scenarios, crafted to evaluate various face…

“DFIR Labs Capture The Flag (#CTF) competition” #infosec #cybersecurity fun in December
thedfirreport.com/services/dfi...

01.12.2024 14:31 — 👍 0    🔁 0    💬 0    📌 0
Preview
Dissecting JA4H for improved Sliver C2 detections Background On November 18, 2024, Palo Alto Networks announced the discovery of two critical vulnerabilities, CVE-2024-0012 and CVE-2024-9474, in the operating system that powers their firewall device...

“Dissecting JA4H for improved Sliver #C2 detections” #cybersecurity #infosec #dfir
#detection

blog.webscout.io/dissecting-j...

30.11.2024 12:49 — 👍 8    🔁 1    💬 0    📌 1
Preview
Release 20 · GrapheneOS/PdfViewer Notable changes in version 20: improve app compatibility by trying to load data with no MIME type passed improve zoom gesture by scrolling during zooming to keep focus in the same place instead of...

Secure PDF Viewer app version 20 released:

github.com/GrapheneOS/P...

See the linked release notes for a summary of the improvements over the previous release and a link to the full changelog.

#GrapheneOS #privacy #security #pdf #android

28.11.2024 19:53 — 👍 33    🔁 2    💬 1    📌 0
Preview
GRUB LUKS Bypass and Dump Recently I needed to get the data off of a LUKS encrypted partition on a Virtual Machine that “wasn’t mine” and I’d never done it before.

GRUB LUKS Bypass and Dump, #linux #cybersecurity #infosec

remyhax.xyz/posts/luks-v...

28.11.2024 17:28 — 👍 2    🔁 0    💬 1    📌 0
Practical LLM Security: Takeaways From a Year in the Trenches
YouTube video by Black Hat Practical LLM Security: Takeaways From a Year in the Trenches

If you missed my blackhat talk on the security of LLM applications, it's up on youtube now:

m.youtube.com/watch?v=Rhpq...

28.11.2024 12:25 — 👍 19    🔁 8    💬 1    📌 1
Preview
UK Sends Kyiv More Storm Shadows as Starmer Pledges Support The UK government recently supplied Ukraine with dozens more Storm Shadow cruise missiles, according to people familiar with the matter, a first under Prime Minister Keir Starmer, who has pledged cont...

“The UK government recently supplied Ukraine with dozens more Storm Shadow cruise missiles, according to people familiar with the matter, a first under Prime Minister Keir Starmer” www.bloomberg.com/news/article...

26.11.2024 11:15 — 👍 191    🔁 30    💬 5    📌 1

New tech brings new vulnerabilities. Introducing CWE-1427: Improper Neutralization of Input Used for LLM Prompting,
Externally-provided data used to build prompts provided LLMs, but the way they are constructed causes the LLM to fail to distinguish between user-supplied inputs and system directives

20.11.2024 18:37 — 👍 40    🔁 10    💬 1    📌 0
Preview
Empowering Gemini for Malware Analysis with Code Interpreter and Google Threat Intelligence | Google Cloud Blog When used for malware analysis, Gemini now has capabilities to address obfuscation, and obtain insights on IOCs.

Great post about malware analysis #cybersecurity #infosec #dfir
cloud.google.com/blog/topics/...

26.11.2024 11:10 — 👍 2    🔁 1    💬 0    📌 0
Preview
Putin's Nuclear Meltdown | Geopolitics Decanted by Silverado Dmitri Alperovitch talks all things nukes with Dr. Jeffrey Lewis, an expert in arms control and nuclear and missile nonproliferation, currently a professor at the James Martin Center for Nonproliferat...

Putin’s Nuclear Meltdown: My Geopolitics Decanted chat with @armscontrolwonk.bsky.social about implications of Russia’s nuclear doctrine changes, Oreshik missile launch, the real Putin redlines, Iran’s resumption of warhead design work and China’s nuke buildup
podcast.silverado.org/episodes/put...

26.11.2024 00:52 — 👍 183    🔁 43    💬 6    📌 3
Preview
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access In early February 2022, notably just ahead of the Russian invasion of Ukraine, Volexity made a discovery that led to one of the most fascinating and complex incident investigations Volexity had ever w...

“The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access” #threatintel #dfir #cybersecurity #infosec

www.volexity.com/blog/2024/11...

22.11.2024 23:13 — 👍 3    🔁 0    💬 0    📌 1

I attended a meetup in Seattle and got to spend time with @bnewbold.net and @pfrazee.com from the Bluesky engineering team.

I walked away with an understanding of the role DIDs and PDSs play in the grand scheme of things, and why the most exciting work sits higher up the stack. I almost unretired.

20.11.2024 18:18 — 👍 1452    🔁 97    💬 34    📌 12

@mrjm is following 20 prominent accounts