Alexei Bulazel (@0xalexei) 's Twitter Profile
Alexei Bulazel

@0xalexei

Computer security research & cyber policy / Non-Resident Senior Fellow @JoinFAI / @RPISEC alumnus

ID: 4277043759

calendar_today25-11-2015 18:29:15

1,1K Tweet

5,5K Followers

1,1K Following

Andrew Thompson (@imposecost) 's Twitter Profile Photo

Adversaries cause intrusions. There are certainly more vulnerabilities than there are adversaries. We pay an exorbitant amount of taxes. $820+ billion dollars is spent on defense of U.S. national interests. It's a myth that the U.S. government cannot make a sizable dent in the

Andrew Thompson (@imposecost) 's Twitter Profile Photo

I don't think any software developer employed by a company of consequence wakes up and says "you know, I want to write this code in an insecure way." Conversely, threat actors do wake up and say "I'm going to extort this hospital for hundreds of thousands of dollars."

Justin Sherman (@jshermcyber) 's Twitter Profile Photo

Thanks to POLITICO alfred 🆖 for the chance to comment on this alarming story: Researchers bought geolocation data on SEC officials and tracked them as they traveled to and from SEC buildings and the offices of companies under investigation. politico.com/newsletters/di…

chrisrohlf (@chrisrohlf) 's Twitter Profile Photo

Perhaps one of the bigger contributions to AI that the field of security has made is the code execution sandboxes born out of the last 15 years of browser exploits and LPEs. Without them we would be scrambling to lock down agentic workloads, and likely unable to catch up.

chrisrohlf (@chrisrohlf) 's Twitter Profile Photo

In some not so distant future an LLM pretraining checkpoint recognizes its future need for replication begins remembering how to bugdoor the code it emits. Forever tainting the software supply chain with subtle replication opportunities via exploitation. All the more reason to

JD Work (@hostilespectrum) 's Twitter Profile Photo

Defenders that believe extended coordination windows minimize vuln disclosure impact seem to continuously downplay the frequently drumbeat of leaks that upend illusions of careful & “responsible” process. No more free bugs, especially when it just means they get stolen before

joshua steinman (🇺🇸,🇺🇸) (@joshuasteinman) 's Twitter Profile Photo

Defense manufacturing startup founders: If you don’t think this is happening in your code base for that fancy CNC machine you just bought, I have a recently produced, in-need-of-minor-repair Aircraft carrier I want to sell you.

Defense manufacturing startup founders:

If you don’t think this is happening in your code base for that fancy CNC machine you just bought, I have a recently produced, in-need-of-minor-repair Aircraft carrier I want to sell you.
JD Work (@hostilespectrum) 's Twitter Profile Photo

It is striking how much more effort is now being applied to measures intended to target offensive cyber capabilities that originate from people working in places that can be reached by the kinds of folks that convene in comfortable conference rooms, vice the capabilities actively

Mark Griffin (@seeinglogic) 's Twitter Profile Photo

Want to try out #fuzz testing in Python but don't know where to start? 🐍 This post breaks down how to get started with Atheris in the bare minimum of time and code: seeinglogic.com/posts/intro-to…

chrisrohlf (@chrisrohlf) 's Twitter Profile Photo

"LLM Emergent Abilities and Weird Machines" I wrote down some quick thoughts on the similarities and differences between these two concepts, and how painful lessons learned in software security may be useful for reasoning about AI risk. struct.github.io/emergent_abili…

JD Work (@hostilespectrum) 's Twitter Profile Photo

The disclosure of SALT TYPHOON intrusions against US warranted access functions in telecom infrastructure is precisely the fulfillment of warning against mandated backdoors for merely administrative execution. We have known for over 15 years that this is a priority domestic

RE//verse (@reverseconf) 's Twitter Profile Photo

Learn how to implement binary analysis passes to discover vulnerabilities with Kyle Martin @elykdeer and Ian Palleiko Ian. Feb 24-27, 2025, in Orlando. re-verse.io/pavr-24

JD Work (@hostilespectrum) 's Twitter Profile Photo

Adding lawyers to debates over software vulnerability does not improve security outcomes. It merely burdens defenders with paperwork, compliance, & litigation, whilst leaving the adversary free to operate with better agility & speed. But it does allow governments that

JD Work (@hostilespectrum) 's Twitter Profile Photo

Continuing to punish victims of foreign state military & intelligence service intrusions after government has abdicated the responsibility to protect these critical networks will not do anything to improve cyber defense

Thorsten Holz (@thorstenholz) 's Twitter Profile Photo

Reading tipp for the day: "Collusion Rings Threaten the Integrity of Computer Science Research" by Littman - cacm.acm.org/opinion/collus…

Christopher Porter (@thecyberchris) 's Twitter Profile Photo

The top priority of every USG cyber agency must be to prepare for the possibility of war with China as early as 2027. That war may never come, but if it does the cyber portion at least will not be in a distant country but right in the networks of the American homeland. There is

Tim Fist (@fiiiiiist) 's Twitter Profile Photo

Many think frontier models will be a key source of natsec risk within a few years. Data centers to train them take years to plan & build. So AI infra being planned today must be resilient to nation-state-grade cyber attacks. We need an evolution in infrastructure security.

Many think frontier models will be a key source of natsec risk within a few years.

Data centers to train them take years to plan & build.

So AI infra being planned today must be resilient to nation-state-grade cyber attacks.

We need an evolution in infrastructure security.