Wyatt Roersma (@wyattroersma) 's Twitter Profile
Wyatt Roersma

@wyattroersma

DFIR, ADHD, He/Him , liberal, supercross, starcraft, halo, python, fitness, feminist. Opinions and tweets are mine.

ID: 92172446

linkhttp://wyattroersma.com calendar_today24-11-2009 01:51:26

5,5K Tweet

1,1K Takipçi

1,1K Takip Edilen

Security Onion (@securityonion) 's Twitter Profile Photo

Need a Cheat Sheet for the NEW #SecurityOnion 2.4? We've just updated it! You can download the PDF version here: github.com/Security-Onion…

Need a Cheat Sheet for the NEW #SecurityOnion 2.4?

We've just updated it!

You can download the PDF version here:
github.com/Security-Onion…
Security Onion (@securityonion) 's Twitter Profile Photo

Are you at #GrrCON today? Come check us out at Booth 50 to learn how the NEW 2.4 version of our FREE and OPEN #SecurityOnion platform can help you peel back the layers and make your adversaries cry! #ThreatHunting #Detection #NetworkVisibility #EndpointVisibility GrrCON

Are you at #GrrCON today? Come check us out at Booth 50 to learn how the NEW 2.4 version of our FREE and OPEN #SecurityOnion platform can help you peel back the layers and make your adversaries cry!

#ThreatHunting
#Detection
#NetworkVisibility
#EndpointVisibility

<a href="/GrrCON/">GrrCON</a>
David Cowen (@hecfblog) 's Twitter Profile Photo

The Forensic Lunch for 1/10/25 with Wyatt Roersma talking about training and fine tuning open source AI models for #DFIR work. hecfblog.com/2025/01/daily-…

Wyatt Roersma (@wyattroersma) 's Twitter Profile Photo

Just made the YouTube video for the YaraFlux MCP Server with Claude!🤯 Now AI assistants can create YARA rules and detect malware in real-time. Watch all 18 functions in action, from rule creation to hex analysis. Game-changer for youtube.com/watch?v=cN9Qv7… #AIforSecurity #YARA

CJ Zafir (@cjzafir) 's Twitter Profile Photo

Cursor Agent is just wild. Now i use Gemini PRO 2.5 to scan the codebase and sonnet 3.5/3.7 to execute code. In this workflow you need 3 things: 1. Detailed project documentation 2. Use multiple AI coding models 3. 50-step implementation plan I spend 30 hours/week on cursor.

Cursor Agent is just wild.

Now i use Gemini PRO 2.5 to scan the codebase and sonnet 3.5/3.7 to execute code.

In this workflow you need 3 things:
1. Detailed project documentation  
2. Use multiple AI coding models
3. 50-step implementation plan

I spend 30 hours/week on cursor.
Security Onion (@securityonion) 's Twitter Profile Photo

If you like Security Onion 2.4.160 and its new features, please like and share the post below to share with your fellow defenders! Thanks!

Wyatt Roersma (@wyattroersma) 's Twitter Profile Photo

GrrCON next week. I will be returning to run the DFIR CTF that includes a black badge as a prize. With all the new threats and product vaporware things are in constant flux. How will we be fighting AI powered threats moving forward? Stay tuned….