J Z
@0xjanz
Security Tester @ Standard Chartered
ID: 1127304366078287872
11-05-2019 20:07:59
23 Tweet
12 Followers
212 Following
Steve YARA Synapse Miller
@stvemillertime
threat intelligence @google writing & sharing on adversary tradecraft, malware, threat detection, ics/ot intel and all things #yara
confidenceconf
@confidenceconf
CONFidence, a legendary cybersecurity conference taking place on 2-3 June 2025 in Krakow, Poland.
mRr3b00t
@uk_daniel_card
Global Cyber Security Support
abuse.ch
@abuse_ch
Fighting malware and botnets
Richard Johnson
@richinseattle
Computer Security, Reverse Engineering, and Fuzzing; Training & Publications @ fuzzing.io; hacking the planet since 1995; Undercurrents BOFHJason Riemer
@jriemer
Security Customer Success @Microsoft. Hockey Dad. Gadget Geek. Take photos sometimes. My ramblings and opinions, not those of my employer
Julien Legras
@julien_legras
Pentest team leader @synacktiv
Francisco Falcon
@fdfalcon
Vulnerability researcher at ??
André Moulu
@andremoulu
Android security researcher and team leader at @Cellebrite, member of @ge0n0sis Obviously tweets are my own.
F4b
@0xf4b
VR team tech lead @Synacktiv
spencer
@techspence
🛡️Empowering defenders & dismantling threats | Ethical Threat | pentester @securit360 | host @cyberthreatpov | SWAG ethicalthreat.etsy.com
Daniel Lunghi
@thehellu
Threat researcher @TrendMicroRSRCH mostly focused on #APT
Jakub Sajniak
@kubolos231
Pentesting at @stm_cyber. Playing CTFs with @p4_team | @S™.
John Hultquist
@johnhultquist
Chief Analyst, Mandiant Intelligence @Google. @CYBERWARCON and @SLEUTHCON founder. Johns Hopkins professor. Army vet.
Krzysztof Katowicz-Kowalewski
@varseand
Rate limit exceeded; follow on infosec.exchange/@vnd
h0wl
@h0wlu
🛡️@redteampl Co-founder 🦉@BlackOwlSec Founder 🧜♀️@WarConPL Co-founder 👨🔬Fuzzing 🕵️Web2 & Web3 Security 🪽Angel Investor
Jazi
@h2jazi
Threat Intel researcher! Technical tweets only; not reflective of employer's views. No endorsement of political groups/entities.
Mariusz Chmielewski
@mchmielewskimil
Biomedicine & reasoning systems technology researcher. IT Architect, manager, AI developer, knowledge driven sport enthusiast. Knowledge engineer (PHD)
Samir
@sbousseaden
Detection Engineering | Elastic Security Mastodon: @[email protected]
BAESystems_Poland
@baes_poland
Hacking Space 📡
@hackingspace
A source for security researchers, and tech enthusiast #OSINT #Pentesting #Vulnerabilities #CyberSecurity
Mastho
@masthoon
Security Researcher
Kyle Ehmke
@kyleehmke
Threat intel researcher focused on infrastructure hunting. Views are my own and not my employer's. Others: @[email protected] @kyleehmke.bsky.social
Kse Proso
@kseproso
#APT groups analyst #ThreatIntel researcher @GroupIB @GroupIB_TI Opinions are my own.
JAMESWT
@jameswt_wt
#Independent #Malware #Hunter #CyberSecurity #InfoSec virustotal.com/gui/user/james…
IR3k
@c0t0d0s2
ThreatRecon
@nshcthreatrecon
We are the Cyber Threat Intelligence division of NSHC Threat Research Lab. We track Threat Actor Groups activities worldwide and aim to release our findings.
Arkbird
@arkbird_solg
Malware slayer Member of @CuratedIntel
Bryce
@bryceabdo
🐗 🦅 🎯 Research & Discovery @ Google/Mandiant
chompie
@chompie1337
hacker, weird machine mechanic, exploit dev @xforce
Shadow Chaser Group
@shadowchasing1
Shadow Chaser Group is a sub-group of the GcowSec team which consists of college students who love it.Shadow Chaser Group focused on APT hunt and analysis
proxylife
@pr0xylife
DFIR | Malware Hunter | @Cryptolaemus1
Fenrisk
@fenrisksec
French security company specialized in offensive assessments
Crazy Coder
@aadriksh
Quantum programmer entangled in infinite loops and Schrödinger’s exceptions.
CYBERWARCON
@cyberwarcon
🎟️ GET YOUR TIX | 📧 Email us or visit the site for sponsorship info!
Wojska Obrony Cyberprzestrzeni
@cyberwojska
Witamy na oficjalnym profilu Wojsk Obrony Cyberprzestrzeni. Cyber Command. #CyberAktywni #CyberBezpieczni #CyberSkuteczni
Monitor Konfliktów
@monitor807
Bieżące informacje o konfliktach zbrojnych. Monitor na FB:facebook.com/share/1GocuLey… wspieraj nas na 👉 suppi.pl/monitorkonflik…
RedTeamTacticsAcademy
@redteamtactics
Outsmart, Outmaneuver, Redefine the Tactics blog 👉 posts.redteamtacticsacademy.com learn 👉 masterclass.redteamtacticsacademy.com
Marcin Ratajczyk
@znanyproblem
Zawodowo: Threat Hunting driven by Threat Intelligence, Sysmon, DFIR Hobbystycznie: Atrybucja cyberoperacji, Stosunki międzynarodowe Tylko prywatne opinie.
Logan Goins
@_logangoins
Offensive Security Consultant Co-op, IBM X-Force Red
Active Directory Things
@adallthetime
Microsoft Certified Master (MCM): Active Directory. Previously AD field engineer at Microsoft. Notes from the field & the lab (@duff22b)
ExecuteMalware
@executemalware
#malware hunter & analyst. Opinions are my own.
sysopfb
@sysopfb
Threat Intel as a reverse-engineer in Crimeware domain. Dubbed "Malware Mangler" by TheRegister. [email protected]
Silv0123
@silv0123
Malware Analyst #ThreatIntel #BlueTeam #DFIR #CTI
ANY.RUN
@anyrun_app
Empowering businesses with proactive security solutions: Interactive Sandbox, TI Lookup and Feeds. Sign up for free: app.any.run/?utm_source=x#…
CAPE Sandbox
@capesandbox
Payloads or it didn't happen. github.com/kevoreilly/CAP…
CyberWar - 싸워
@cyberwar_15
Since. 2001. 8. 8 / 우리는 2001년 8월 8일부터 북한 사이버 공작원과 싸우고 있습니다.
return0;
@returnothing
🇨🇦⚜️ | Security Researcher | CCNA | Bug Hunter | Github : github.com/thisisveryfunny | HTB : app.hackthebox.com/users/1622406
Google VRP (Google Bug Hunters)
@googlevrp
We ❤️ 🐜🐞🦗🦟🦋. {echo,{{{Google,Chrome,Android,Abuse,Mobile,OSS,Cloud}Vulnerability,Patch}Reward,VulnerabilityResearchGrants}Program}
Check Point Research
@_cpresearch_
Fighting cyber threats one research at a time. News from Check Point’s (@checkpointSW) Research team.