Max Heinemeyer (@shelldaemon) 's Twitter Profile
Max Heinemeyer

@shelldaemon

Cyber Security & AI Enthusiast. Ethical Hacker. CPO @ Darktrace. Thoughts are my own. (he / him)

ID: 2244315960

calendar_today13-12-2013 18:47:44

1,1K Tweet

636 Takipçi

298 Takip Edilen

Kyle Alspach (@kylealspach) 's Twitter Profile Photo

Cyberattacks involving data manipulation could pose an even more severe threat than data theft or ransomware (at least in some cases). But they're not top of mind for most businesses protocol.com/enterprise/dat…

Greg Linares (Laughing Mantis) (@laughing_mantis) 's Twitter Profile Photo

This will be a thread discussing a real world breach involving a drone delivered exploit system that occurred this summer Some details I am not able to discuss, however for the blue teams & red teams out there I hope this provides a good measure of capability. 🧵🚁 🎮🖥️🦠

Toby Lewis (@tobaslouis) 's Twitter Profile Photo

Details of the OpenSSL vuln have now been released. Downgraded from Crit > High. No known exploit POC & no ITW exploitation. A big factor is that it would need pre-existing compromise of the CA path to even reach the vuln code. If that's happened, there are bigger problems.

Max Heinemeyer (@shelldaemon) 's Twitter Profile Photo

My threat research colleagues have translated last week's internal leaks of the #yanluowang #ransomware gang and analysed them. Interesting to see what impact these leaks have on the broader ransomware landscape. darktrace.com/blog/inside-th…

michelle huang (@michellehuang42) 's Twitter Profile Photo

i trained an ai chatbot on my childhood journal entries - so that i could engage in real-time dialogue with my "inner child" some reflections below:

Max Heinemeyer (@shelldaemon) 's Twitter Profile Photo

[Private] [German] [Non-IT] My wife is releasing her new book on 14th Feb. Today is the cover reveal! Another amazing achievement for her :)

[Private] [German] [Non-IT] My wife is releasing her new book on 14th Feb. Today is the cover reveal! Another amazing achievement for her :)
Mehmet Ergene (@cyb3rmonk) 's Twitter Profile Photo

Do you often use ChatGPT for cybersecurity? If so, what do you use it for? Be it for writing queries, scripts, etc. I've spent just a couple of minutes so far and couldn't find a use case for myself and probably I'm missing something or just dumb.

Joe Muller (@bosonjoe) 's Twitter Profile Photo

An interesting discussion in the #AutoGPT Discord on red-teaming the AGI we are playing with. github.com/Torantulino/Au…

Jim Fan (@drjimfan) 's Twitter Profile Photo

The famed Stanford Smallville is officially open-source! 25 AI agents inhabit a digital Westworld, unaware that they are living in a simulation. They go to work, gossip, organize socials, make new friends, and even fall in love. Each has unique personality and backstory.

The famed Stanford Smallville is officially open-source!

25 AI agents inhabit a digital Westworld, unaware that they are living in a simulation. They go to work, gossip, organize socials, make new friends, and even fall in love. Each has unique personality and backstory.
Max Heinemeyer (@shelldaemon) 's Twitter Profile Photo

#EPSS & #KEV are great for #vulnerability management. What's usually still lacking is local organizational context though 🧐. Combining ML, graph theory & attack path modelling for vulnerability prioritization with local context 🙏: darktrace.com/blog/leveragin…

Max Heinemeyer (@shelldaemon) 's Twitter Profile Photo

A lot of organizations are getting hammered by QR-code based phishing. Many SOC teams seem to be struggling to find a good answer. We've been seeing and stopping this since (before) July this year - using machine learning. Real-life example & tech: darktrace.com/blog/phishing-…

remy🐀 (@_mattata) 's Twitter Profile Photo

RE: APEX / ALGS / EAC Remote Code Execution 👋 I wrote undectable cheats for online games for challenge and sport for many, many years. I know enough to know that no one has the answers, but I'd like to call out some things you may have glazed over, and put them in context. 🧵

RE: APEX / ALGS / EAC Remote Code Execution

👋 I wrote undectable cheats for online games for challenge and sport for many, many years. I know enough to know that no one has the answers, but I'd like to call out some things you may have glazed over, and put them in context. 🧵
Mobeen Tahir (@mobeentahirwt) 's Twitter Profile Photo

🎙️In this episode of 'The Next Big Thing' #podcast, Chris and I are joined by Max Heinemeyer, Chief Product Officer Darktrace to discuss the intersection of #AI and #cybersecurity. Spotify: open.spotify.com/episode/5tIA9W… Apple: podcasts.apple.com/us/podcast/the… youtube.com/watch?v=Gi0BA7…