
Andrew Ruddick
@arudd1ck
Breaking software. Security Researcher @ Microsoft. Views are my own.
ID: 1447201300974821379
http://infosec.exchange/@arudd1ck 10-10-2021 14:04:32
129 Tweet
560 Followers
211 Following

Carl Sampson
@chs
Security Researcher
Daniel Halliday
@hallidaydaniel
former blue check holder?
Alex Matrosov
@matrosov
🔬Founder & CEO @Binarly_io, #codeXplorer, #efiXplorer, @REhints and "Rootkits and Bootkits" book. Previously worked at Nvidia, Cylance, Intel, ESET, Yandex.
mdowd
@mdowd
Internet Hacker. Founder of @vigilant_labs. Previously, co-founder of Azimuth Security (now L3Harris Trenchant)
/adrian//alien8
@alien8
Founder alien8 Security, Threat Condition, @infosec_city Co-Founder @44CON, Cortex Insight , Retired Defcon goon. I ride bikes. Likes *good* coffee.
David Fowler
@davidfowl
Distinguished Engineer at Microsoft on .NET, Creator of NuGet, SignalR, ASP.NET Core and Barbadian 🇧🇧, Tennis Player, Father, other half @symonefowler
Lukas Sassl (MSFT) 🇺🇦
@johndoe_1987_
Find me on Bluesky: @sassl.info | Some stuff about #MSExchange | Work @Microsoft | Opinions = my own | MD: infosec.exchange/@JohnDoe_1987_
Tim Misiak
@timmisiak
OS/systems engineer. Worked on WinDbg for a while. I write about low level tech sometimes. On bluesky: @timdbg.com On mastodon/fediverse: @[email protected]
Aaron LeMasters
@lilhoser
Thread 0: A B. Thread 1: B A.
Mr. Anthony 安東尼
@darkfloyd1014
Director @vxresearch |@blackhatevents Asia & USA Review Board | Love animals, retro game & browser bug hunting
James Forshaw
@tiraniddo
Security researcher in Google Project Zero. Author of Attacking Network Protocols. Tweets are my own etc. Mastodon: @[email protected]
Richard Johnson
@richinseattle
Computer Security, Reverse Engineering, and Fuzzing; Training & Publications @ fuzzing.io; hacking the planet since 1995; Undercurrents BOFH
Trend Zero Day Initiative
@thezdi
Trend Zero Day Initiative™ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
Trail of Bits
@trailofbits
We help secure the world’s most targeted organizations and products. We combine security research with an attacker mentality to reduce risk and fortify code.
Haifei Li
@haifeili
For contact in the security community. NOTE: All the tweets are totally my personal opinions, not about any of my current employer stuff.
`Ivan
@ivanlef0u

Orange Tsai 🍊
@orange_8361
This is 🍊
Tom Gallagher
@secbughunter
Vice President of Engineering, Microsoft Security Response Center (MSRC)
Mathieu Tarral
@mtarral
Security Research @intel IntelLabs/kAFL : HW assisted feedback fuzzer for x86 VMs intel/tsffs : Coverage guided fuzzer built on SIMICS
Egor Bogatov
@egorbo
I work on .NET JIT Compiler 🚀 at Microsoft
44CON
@44con
UK's best combined Information Security Conference and training event. Newsletter newsletter.44con.com run by @alien8 infosec.exchange/@44CON
Kiran
@themeanbean123

Alisa Esage Шевченко
@alisaesage
Nationstate-Certified Cybersecurity Threat • Architect of Evil Pointer Arithmetic • Owner of Zero Day Engineering
Jacob Soo
@_jsoo_
Founder starlabs.sg
Ivan Fratric 💙💛
@ifsecure
Security researcher at Google Project Zero. Author: Jackalope, TinyInst, WinAFL, Domato. PhD. Tweets are my own. Backup @[email protected]
Giovanni Cherubin
@gchers
I research ML and (its) security/privacy @MSFTResearchCam & @msftsecresponse. May rant for hours about climbing/openbsd/rust/conformal prediction/ctfs
vlcnge
@vlcnge

Angelboy
@scwuaptx
Senior Security Researcher at @d3vc0r3 MSRC 2024 MVR Top 100
Samuel Groß
@5aelo
V8 Security technical lead. Previously Project Zero. Personal account. Also @[email protected] and saelo.bsky.social
CTurt
@cturte
hacking at *undisclosed*
Shaw - 白狐 (Byakko)
@cyb3rf0x_
Global Cyber Security Operations Center Threat Hunting Lead, forensicator, data analyst and investigator, hobby artist, developer and gamer
SwiftOnSecurity
@swiftonsecurity
computer security person. former helpdesk.
Sam Pope
@20brokensp
Things I break: Software ,Passes, My own body. MSRC UK Software Researcher & Swindon Storm CB #20
Windows On Windows
@wowstartsnow
The YouTube channel on the history & development of #Microsoft #Windows. 📺 Join the Discord @ dsc.gg/wowserv! 👨🏻💻 Follow for daily Windows facts. 🤓 #WIMVP
CODE WHITE GmbH
@codewhitesec
Red Teaming. Security Research. Continuous Penetration Testing. Threat Intelligence.
SorryMybad
@s0rrymybad
Sorry
RyeLv
@b2ahex
Security Researcher
chompie
@chompie1337
hacker, weird machine mechanic, exploit dev @xforce
Yarden Shafir
@yarden_shafir
A circus artist with a visual studio license
Saar Amar
@amarsaar
Reversing, exploits, {Windows, Hyper-V, *OS} internals, mitigations. Apple SEAR. Opinions are my own. @[email protected]
Alex Plaskett
@alexjplaskett
Security Researcher | Pwn2Own 2018, 2021, 2022, 2024 | Posts about 0day, OS, mobile and embedded security.
starlabs
@starlabs_sg
A Singapore company that discovers vulnerabilities to help customers mitigate the risks of cyber attacks. Organisers of @offbyoneconf
Connor McGarr
@33y0re
Software Engineer @preluderesearch
offensivecon
@offensive_con
OffensiveCon is a highly technical international security conference focused on offensive security only. 12-17th of May. Organized by @Binary_Gecko.
frycos
@frycos
Private account! Red teamer @codewhitesec. @[email protected] @frycos.bsky.social
Pham Khanh
@rskvp93
Security Engineer at @calif_io. Winner of Pwn2own Vancouver 2021, Torento 2022, Vancouver 2023. MSRC top 100 2019, 2020, 2021.
Nathan Blondel
@slowerzs

Cybersecurity and Infrastructure Security Agency
@cisagov
America's Cyber Defense Agency and National Coordinator for critical infrastructure security & resilience. Likes, RTs, follows ≠ endorsements.
Alyse
@bellebytes
Executive Director of Security Red Team #GXPN #GMOB / I also sing for a band called LYLVC
Simon Scannell
@scannell_simon
Cloud Vulnerability Research @ google. Opinions are my own
Lynn
@lynnfosec
Program Manager at Microsoft Security Response Center, opinions are my own
TyphoonCon🌪️
@typhooncon
TyphoonCon is an annual all Offensive Security Conference, taking place May 26-30, 2025 in Seoul, South Korea 🌪️
Max 'Libra' Kersten
@libranalysis
Malware analyst and reverse engineer, author of the Binary Analysis Course. DMs are always open. Opinions are my own and not the views of my employer.
Q5Ca
@_q5ca
Chief Remote Work Officer at @u0Kplusplus
Nguyen Xuan Hoang
@hoangnx99
Security Researcher at @vcslab Chief Finance Officer of @u0Kplusplus
Microsoft BlueHat
@msftbluehat
BlueHat is where the security research community and @Microsoft security pros come together as peers, to connect, share and learn. Run by @MSFTSecResponse
Piotr Bazydło
@chudypb
Principal Vulnerability Researcher at watchTowr | Previously: Zero Day Initiative | @[email protected]
0x41con
@0x41con
AAAAAAAA
Kevin Sheldrake
@kevsecurity
Hacker, coder, etc. Isovalent where I work on Tetragon. ex-Microsoft Sysinternals, including #Sysmon For Linux #eBPF
elicn
@elicohennehemia
Researching low level stuff