Cris Brafman Kittner (@criskittner) 's Twitter Profile
Cris Brafman Kittner

@criskittner

Cyber geek at @FireEye, @Mandiant, @GoogleCloud Wanna-be astronomer. Interplanetary enthusiast. History geek. Opinions my own.

ID: 27024603

linkhttps://www.linkedin.com/in/cbrafmankittner calendar_today27-03-2009 15:19:37

4,4K Tweet

1,1K Followers

1,1K Following

Cris Brafman Kittner (@criskittner) 's Twitter Profile Photo

Incredible conversations & insights happening today, right now. Inspired by the #datadrivenresilience theme at Center for Long-Term Cybersecurity summit. It's a powerful reminder that data-driven insights are crucial for building stronger foundational defenses designed with security in mind to

Women's Cyberjutsu (@womencyberjutsu) 's Twitter Profile Photo

TOMORROW, June 21 is #CyberjutsuDay2024! 👩‍💻 Learn more at: womenscyberjutsu.org/cyberjutsu-con We look forward to seeing our #cyberjutsutribe in Washington, DC! 💜 #womenincybersecurity #infosec #cybersecurity #womenintech #womenincyber #nonprofit

TOMORROW, June 21 is #CyberjutsuDay2024! 👩‍💻 Learn more at: womenscyberjutsu.org/cyberjutsu-con

We look forward to seeing our #cyberjutsutribe in Washington, DC! 💜

#womenincybersecurity #infosec #cybersecurity #womenintech #womenincyber #nonprofit
Elastic Security Labs (@elasticseclabs) 's Twitter Profile Photo

This new article from Joe Desimone reveals 4 attack techniques linked to SmartScreen and SmartAppControl. Check it out: go.es.io/4d5L2BR Will you be at #BHUSA? Stop by Elastic booth #2350 to chat with Joe or catch his lightning talk! #ElasticSecurityLabs #threattechnique

Steve Stone (@stonepwn3000) 's Twitter Profile Photo

OK OK i'm double Xeeting today, but this is a really big deal for Rubrik and Mandiant (part of Google Cloud). We sat down and went after the biggest problems we hear from organizations and we couldn't do it alone, so we're doing it together. We intentionally went after the entire risk lifecycle

Cris Brafman Kittner (@criskittner) 's Twitter Profile Photo

I don't know about you, but I kind of love that #PIVOTcon25 was announced with what seemed to be impeccable timing..industrialcyber.co/training-devel… #PIVOTTAct

Cris Brafman Kittner (@criskittner) 's Twitter Profile Photo

Calling all security researchers! 🚨 The #GoogleCloud Vulnerability Reward Program #VRP is here! Find and report vulnerabilities in Google Cloud products & services and earn serious cash. 💰C'mon, you know you want to. #CloudVRP 🎉 ☁️

Threat Insight (@threatinsight) 's Twitter Profile Photo

Researchers at @Proofpoint expose threat actors’ attempt to hijack thousands of EntraID user accounts across almost 100 cloud tenants by leveraging TeamFiltration, a red teaming framework used by network defenders. brnw.ch/21wTk3G

Ariel Jungheit (@arieljt) 's Twitter Profile Photo

Dropping new research - this time on recent #XDSpy operations. Out of hundreds of LNK files leveraging ZDI-CAN-25373, we isolated a tiny cluster using an additional LNK parsing trick, leading us to uncover a multi-stage infection chain actively targeting government entities

Dropping new research - this time on recent #XDSpy operations. Out of hundreds of LNK files leveraging ZDI-CAN-25373, we isolated a tiny cluster using an additional LNK parsing trick, leading us to uncover a multi-stage infection chain actively targeting government entities
Threat Insight (@threatinsight) 's Twitter Profile Photo

Proofpoint considers TA4557 a sophisticated threat actor. Its expansion beyond the typical North American targeting is notable. Companies posting jobs on third-party job boards should be aware of this activity & educate employees, especially those in recruiting/hiring functions.

Cris Brafman Kittner (@criskittner) 's Twitter Profile Photo

Threat Actors are using the #TeamFiltration pentesting framework to target + 80,000 Entra ID accounts at companies globally. Check out the BleepingComputer for the password-spraying attacks tracked by @Proofpoint's Threat Research Engineering team! bit.ly/441ggH1

Threat Insight (@threatinsight) 's Twitter Profile Photo

🚨Job seekers, watch out! 🚨 @Proofpoint found threat actors targeting job seekers to distribute remote management tools that can lead to data or financial theft, or potentially to install follow-on malware like ransomware. 🧵⤵️

Cris Brafman Kittner (@criskittner) 's Twitter Profile Photo

who's with me? while you're all at hacker summer camp, I'm here already planning for next week, who's with me? -"Phishing in 2025: AI, Social Engineering & the New Threat Landscape." c'mon, join me, for #TheHumanFactor. linkedin.com/events/phishin…

Threat Insight (@threatinsight) 's Twitter Profile Photo

Example system commands: C:\Users\<username>\AppData\Local\Programs\MediaHuman Lyrics Finder Free\LdVBoxSVC.exe LdVBoxSVC.exe Bitly redirect: hxxps://gitsecguards[.]com ClickFix Landing domain: security[.]flaxergaurds[.]com Organizations are encouraged to restrict PowerShell

Luke Stephens (hakluke) (@hakluke) 's Twitter Profile Photo

Calling all CTF creators. 🗣️ Want a job where you create CTF challenges all day, every day? That is exactly what I'm hiring. Fully remote, flexible hours. Requirements: - Must have experience creating CTF challs (not just playing them) - Excellent English proficiency - Great