Andrew Case (@attrc) 's Twitter Profile
Andrew Case

@attrc

@Volatility Core developer, Dir. of Research @Volexity, @lsucyber, The Art Of Memory Forensics Co-Author

ID: 119293693

linkhttps://www.volexity.com calendar_today03-03-2010 06:24:28

20,20K Tweet

27,27K Followers

4,4K Following

Andrew Case (@attrc) 's Twitter Profile Photo

With Volcano, security teams can automate the entire workflow of acquisition of memory and select files to deep analysis to automated alerts that directly point to signs of memory only malware and attacker activity throughout RAM and key artifacts sources from disk.

Swissky (@pentest_swissky) 's Twitter Profile Photo

thermoptic - A next-generation HTTP stealth proxy which perfectly cloaks requests as the Chrome browser across all layers of the stack. - by mandatory.bsky.social github.com/mandatoryprogr…

Chi-en (Ashley) Shen (@ashl3y_shen) 's Twitter Profile Photo

So excited that I’m going to present my latest research at DistrictCon in January! The last round of tickets are going on sale on this Sunday (Nov 16th nour zohbi EST). Looking forward to see you in DC!

So excited that I’m going to present my latest research at <a href="/DistrictCon/">DistrictCon</a> in January! The last round of tickets are going on sale on this Sunday (Nov 16th <a href="/12pm/">nour zohbi</a> EST). Looking forward to see you in DC!
PIVOTcon (@pivot_con) 's Twitter Profile Photo

#PIVOTcon26 registration is now OPEN 🤟📷 #ThreatResearch #ThreatIntel 📷pivotcon.org Please read carefully the whole 🧵 for the rules about invite -> registration (1/6)🌐

Kostas (@kostastsale) 's Twitter Profile Photo

Just in: DoorDash breached… “unauthorized third party gaining access to and taking certain user contact information…but may have included first and last name, phone number, email address and physical address” Next paragraph: “No sensitive information was accessed” 🤦‍♂️

Just in: DoorDash breached…

 “unauthorized third party gaining access to and taking certain user contact information…but may have included first and last name, phone number, email address and physical address”

Next paragraph:

“No sensitive information was accessed”

🤦‍♂️
Steven Adair (@stevenadair) 's Twitter Profile Photo

It was great talking to Robert McMillan earlier this week on nation-state threat actors using AI ahead of a report released by Anthropic. We often suspect the use of AI in attacks, and our research confirmed #UTA0388 used it to identify targets, write emails, and dev malware.

BSides Galway (@bsidesgalway) 's Twitter Profile Photo

CFP for BSides Galway closes tomorrow (30 Nov). If you are waiting for the perfect abstract, don’t. Reviewers care about what you learned and why it matters, not fancy wording. Take 20 minutes, write what you have, submit: sessionize.com/bsides-galway-…

BSidesPhilly (@bsidesphilly) 's Twitter Profile Photo

Remember last year? We sold out! Don't be the one hearing about all the great research and connections you missed. 😳 Be logical and 🔒 in your attendance! ➡️ Purchase tickets here: bsidesphilly.org #InfoSec #BSidesPhilly #Cybersecurity

Caitlin Condon (@catc0n) 's Twitter Profile Photo

I'm #hiring exploit developers in the U.S. and UK! If you love writing RCE exploits (but also want to help folks detect 'em effectively), hit me up. Roles are 100% remote, but location matters — strong preference for Cheltenham, UK or MA/TX/MD. No sponsorship (sorry!)

Volexity (@volexity) 's Twitter Profile Photo

.Volexity #threatintel tracks a wide variety of threat actors abusing Device Code & OAuth authentication workflows to phish credentials. And these techniques continue to see success due to creative social engineering. [1/2]

.<a href="/Volexity/">Volexity</a> #threatintel tracks a wide variety of threat actors abusing Device Code &amp; OAuth authentication workflows to phish credentials. And these techniques continue to see success due to creative social engineering. [1/2]
volatility (@volatility) 's Twitter Profile Photo

The volatility #PluginContest closes on Dec 31, 2025! Make sure to submit your entry by the deadline! If you’re looking for inspiration, take a look at our roll call of past contest submissions: volatilityfoundation.org/volatility-plu… #memoryforensics

BSidesSLC (@bsidesslc) 's Twitter Profile Photo

🚨 CFP OPEN! BSidesSLC 2026 is now accepting talk & workshop submissions. Deadline January, 9, 2026 If you’ve got something to share in cyber (AI, red team, blue team, cloud, exploit dev, AppSec, GRC, IR, hardware, malware… you name it) — send it in! Submit 👉

🚨 CFP OPEN!
BSidesSLC 2026 is now accepting talk &amp; workshop submissions.
Deadline January, 9, 2026

If you’ve got something to share in cyber (AI, red team, blue team, cloud, exploit dev, AppSec, GRC, IR, hardware, malware… you name it) — send it in!

Submit 👉
Stephan Berger (@malmoeb) 's Twitter Profile Photo

Calling out for help. We have proof that a threat actor exfiltrated data to a Microsoft Azure Blob, thanks to detailed logs in the *.log files written by azcopy, for example: C:\Users\compromised_user\.azcopy\1323eb6d-2624-834e-45e0-218454b383be.log We see the blob name where

Antonio Morales (@nosoynadiemas) 's Twitter Profile Photo

We’re hiring two Principal Security Researchers to work at GitHub (USA/UK-based). This is a 100% remote role. If you’re interested, you can apply here: careers-githubinc.icims.com/jobs/4807/prin… and here globalcareers-githubinc.icims.com/jobs/4808/prin…

AndrewMohawk⁽ⁿᵘˡˡ⁾ (@andrewmohawk) 's Twitter Profile Photo

Fun react bug, (CVE-2025-55183) if you have a server side component and it explicitly or implicitly exposes a stringified argument you can get the source code for that function. Also found DoS, but reported it to vercel instead of meta and some else reported the next day 🙃

BSidesDayton (@bsidesdayton) 's Twitter Profile Photo

BSidesDayton 2026! Date: Saturday, May 23, 2026 Theme: Going Offline – Decentralize, Disconnect, DIY Tickets: eventbrite.com/e/bsidesdayton… #infosec #infosecurity #InfoSecCommunity #informationsecurity #informationsecurity #informationtechnology

The Hacker's Choice (@thc@infosec.exchange) (@hackerschoice) 's Twitter Profile Photo

THC Release 💥: The world’s largest IP<>Domain database: ip.thc.org All forward and reverse IPs, all CNAMES and all subdomains of every domain. For free. Updated monthly. Try: curl ip.thc.org/1.1.1.1 Raw data (187GB): ip.thc.org/docs/bulk-data… (The fine work

THC Release 💥: The world’s largest IP&lt;&gt;Domain database: ip.thc.org

All forward and reverse IPs, all CNAMES and all subdomains of every domain. For free. 

Updated monthly.

Try: curl ip.thc.org/1.1.1.1

Raw data (187GB): ip.thc.org/docs/bulk-data…

(The fine work
Sam Rodriques (@sgrodriques) 's Twitter Profile Photo

Science is too slow. At Edison, we are integrating AI Scientists into the full stack of research, from basic discovery to clinical trials. We want cures for all diseases by mid-century. We have raised a $70M seed to get started. Join us. We need cracked software engineers who

Science is too slow.

At Edison, we are integrating AI Scientists into the full stack of research, from basic discovery to clinical trials. We want cures for all diseases by mid-century.

We have raised a $70M seed to get started.

Join us.

We need cracked software engineers who