christian_taillon (@christian_tail) 's Twitter Profile
christian_taillon

@christian_tail

Cyber nerd who enjoys hunting for evil and helping others fight black hats. Can close Vim without consulting Google. Probably sipping ☕.
Opinions are my own.

ID: 1272942939639930880

linkhttps://christiant.io calendar_today16-06-2020 17:23:50

303 Tweet

554 Followers

219 Following

Clint Gibler (@clintgibler) 's Twitter Profile Photo

Your company is rushing to build product features that use AI How do you do that securely? There are MANY ways things can go wrong 🚨 Rami McCarthy's deep dive is BY FAR the best guide I've seen 🚨 Learn the latest attacks and defenses in one 🧵 tldrsec.com/p/securely-bui…

christian_taillon (@christian_tail) 's Twitter Profile Photo

🚨 CVE-2025-38236 – Linux Kernel Priv-Esc 🚨 Current in-the-wild exploit targets the Chrome sandbox on Linux desktops, but this is NOT just a workstation problem. Any local user able to send crafted AF_UNIX socket messages can trigger it on any vulnerable Linux system.

christian_taillon (@christian_tail) 's Twitter Profile Photo

In interesting news, for this month's patch Tuesday, Microsoft observed none of the vulns being actively exploited in the wild! There are eight vulnerabilities where exploitation may be likely. Only one, CVE-2025-54916 , is a remote code execution (RCE) vulnerability.

Nick VanGilder (@nickvangilder) 's Twitter Profile Photo

So Microsoft, S1, and Palo have all withdrawn from the MITRE Attack Evaluations for 2026. Moderately interestingly, S1 and Palo pulled out on the same day (9/12).

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

The first samples of #EDRFreeze that landed on VirusTotal were already detected by our existing rules – even though we hadn’t written anything specific for it. The reason is that the authors reused previously documented techniques we had already covered in our generic YARA rules

The first samples of #EDRFreeze that landed on VirusTotal were already detected by our existing rules – even though we hadn’t written anything specific for it. The reason is that the authors reused previously documented techniques we had already covered in our generic YARA rules
Mike Manrod (@croodsolutions) 's Twitter Profile Photo

Outstanding kickoff for Threat Intelligence Support Unit (TISU) training. Special thanks to The Bingus Man for coming out to support and participate (and to all our volunteers, attendees, and contributors - including co-creators Ezra Woods and christian_taillon, et al.)

Outstanding kickoff for Threat Intelligence Support Unit (TISU) training. Special thanks to <a href="/NotNordgaren/">The Bingus Man</a> for coming out to support and participate (and to all our volunteers, attendees, and contributors - including co-creators <a href="/Shammahwoods/">Ezra Woods</a> and <a href="/christian_tail/">christian_taillon</a>, et al.)
christian_taillon (@christian_tail) 's Twitter Profile Photo

Big move. I know the MCP standard is less stable and changes often, but it is definitely the way the industry seems to be going for agentic tool calling. Going to be a wild 6 months for tool usage.

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

Artem I. Baranov 🐦 But there’s still a „you“. It reads the emails for <you>. The market expectation is that there’s no you anymore. I didn’t say that it’s not useful. I said that the expectations are too high.

Séb Krier (@sebkrier) 's Twitter Profile Photo

People are getting angry at this and it's the exact same failure mode as "why are football players paid more than nurses huh??" High valuations come from scarcity and growth expectations, not total societal contribution. They're not a thermometer for "what society values".

People are getting angry at this and it's the exact same failure mode as "why are football players paid more than nurses huh??" 

High valuations come from scarcity and growth expectations, not total societal contribution. They're not a thermometer for "what society values".
Mike Manrod (@croodsolutions) 's Twitter Profile Photo

Join us at Grand Canyon U or one of the many other locations, to participate in SW Splunk Boss of the SOC (#Bots) this Halloween!! Not frightened by scary movies anymore? Some of the BotS challenges will haunt your nightmares.

vas (@vasumanmoza) 's Twitter Profile Photo

Gemini 3.0 just refactored my entire codebase in one call. 25 tool invocations. 3,000+ new lines. 12 brand new files. It modularized everything. Broke up monoliths. Cleaned up spaghetti. None of it worked. But boy was it beautiful.

Gemini 3.0 just refactored my entire codebase in one call.

25 tool invocations. 3,000+ new lines. 12 brand new files.

It modularized everything. Broke up monoliths. Cleaned up spaghetti.

None of it worked.
But boy was it beautiful.