cyb3rmeerk4t (@cyb3rmeerk4t) 's Twitter Profile
cyb3rmeerk4t

@cyb3rmeerk4t

ID: 968386361366478848

calendar_today27-02-2018 07:24:35

154 Tweet

38 Followers

827 Following

Mark Griffin (@seeinglogic) 's Twitter Profile Photo

Want to try out time travel debugging (TTD) but always been too scared to ask? Good news, this post walks through getting started with Binary Ninja's TTD workflow. It also shares some of my advanced tricks that make TTD even more of an RE cheat code 👀 seeinglogic.com/posts/binary-n…

The DFIR Report (@thedfirreport) 's Twitter Profile Photo

🧙Want to Become a DFIR Report Analyst?🧙 Here’s your path to joining the team: 1️⃣ Rank in the top 3 in one of the next two CTFs 2️⃣ Write a detailed report on one of the CTF cases 3️⃣ Ace an interview with our analysts Ready to prove your skills and make an impact? Let’s go!

Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

To help defenders get better access to relevant threat intelligence articles, the Microsoft Defender XDR portal home page now displays featured Microsoft Defender Threat Intelligence (MDTI) articles to highlight noteworthy Microsoft content. msft.it/6017mPalP

To help defenders get better access to relevant threat intelligence articles, the Microsoft Defender XDR portal home page now displays featured Microsoft Defender Threat Intelligence (MDTI) articles to highlight noteworthy Microsoft content. msft.it/6017mPalP
vx-underground (@vxunderground) 's Twitter Profile Photo

We're going a giveaway. Our friends over at XINTRA are letting us giveaway their "iOS ARM64 Reversing and Exploitation" course to 2 people. The course is online, self-paced, and will grant the participant 1 year of online course access. The course focuses around iOS 14.

We're going a giveaway.

Our friends over at <a href="/XintraOrg/">XINTRA</a> are letting us giveaway their "iOS ARM64 Reversing and Exploitation" course to 2 people. The course is online, self-paced, and will grant the participant 1 year of online course access.

The course focuses around iOS 14.
Renzon (@r3nzsec) 's Twitter Profile Photo

There is a lot to learn by just listening to this podcast. What a journey, Kyle Hanslovan Huntress. Thanks for this excellent talk. buzzsprout.com/1889238/episod…

Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Microsoft experts discuss the impact of defenders having tools such as Kusto Query Language (KQL) to hunt for threats, as well as attackers using social engineering and PowerShell to deploy malware such as infostealers: msft.it/6017meDNJ

SANS Institute (@sansinstitute) 's Twitter Profile Photo

Applications for the Paller Cybersecurity Scholarship @SANS_EDU — a fully-funded scholarship designed to help fill the global cybersecurity skills gap — are now open. Learn more ➡️ bit.ly/3TQH6xq

Applications for the Paller Cybersecurity Scholarship <a href="/SANS_EDU/">@SANS_EDU</a> — a fully-funded scholarship designed to help fill the global cybersecurity skills gap — are now open. 

Learn more ➡️ bit.ly/3TQH6xq
samy kamkar (@samykamkar) 's Twitter Profile Photo

DEF CON 32 video (Optical Espionage: Using Lasers to Hear Keystrokes Through Glass Windows) and Git released for my high-fidelity RF-laser microphone (converting infrared light into high quality sound and keystrokes): github.com/samyk/rflaserm…

Virus Bulletin (@virusbtn) 's Twitter Profile Photo

Palo Alto Networks analysts Navin Thomas, Renzon Cruz & Cuong Dinh look into an AV/EDR bypass tool discovered during investigation of an extortion attempt. The threat actor purchased access to the client network via Atera RMM from an initial access broker. unit42.paloaltonetworks.com/edr-bypass-ext…

Palo Alto Networks analysts Navin Thomas, Renzon Cruz &amp; Cuong Dinh look into an AV/EDR bypass tool discovered during investigation of an extortion attempt. The threat actor purchased access to the client network via Atera RMM from an initial access broker. unit42.paloaltonetworks.com/edr-bypass-ext…
Virus Bulletin (@virusbtn) 's Twitter Profile Photo

Trend Micro's Hara Hiroaki has written a blog post based on his presentation at VB2024 (#vb2024) about a new LODEINFO campaign connected to Earth Kasha and a correlation analysis with the APT10 Umbrella. trendmicro.com/en_us/research…

Trend Micro's Hara Hiroaki has written a blog post based on his presentation at VB2024 (#vb2024) about a new LODEINFO campaign connected to Earth Kasha and a correlation analysis with the APT10 Umbrella. trendmicro.com/en_us/research…
Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

At CYBERWARCON, Microsoft is sharing research on North Korean threat actors who steal cryptocurrency and target satellite & weapons systems orgs, as well as details on intelligence collection operations by Chinese threat actor Storm-2077. Learn more: msft.it/6016Wvv28

GreyNoise (@greynoiseio) 's Twitter Profile Photo

379,868 attempts to exploit CVE-2021-32030 failed due to one tiny error—precision matters. 🔍labs.greynoise.io/grimoire/2024-…

The DFIR Report (@thedfirreport) 's Twitter Profile Photo

🌟New report out today!🌟 The Curious Case of an Egg-Cellent Resume Analysis & reporting completed by Pete, Zach and guest contributor Kelsey from Proofpoint! Audio: Available on Spotify, Apple, YouTube and more! 👇 Click the link below to read the report!

🌟New report out today!🌟

The Curious Case of an Egg-Cellent Resume

Analysis &amp; reporting completed by <a href="/_pete_0/">Pete</a>, <a href="/svch0st/">Zach</a>  and guest contributor <a href="/k3dg3/">Kelsey</a> from <a href="/proofpoint/">Proofpoint</a>!

Audio: Available on Spotify, Apple, YouTube and more!

👇 Click the link below to read the report!
Security Response (@msftsecresponse) 's Twitter Profile Photo

Are you a security researcher interested in AI bounty submissions? Join us to learn more about Microsoft's Bug Bounty Program and how to qualify for the Zero Day Quest. In this session, hosted by Lynn Miyashita (Lynn) and Andrew Paverd (Andrew Paverd), we'll discuss Microsoft's

Are you a security researcher interested in AI bounty submissions? Join us to learn more about Microsoft's Bug Bounty Program and how to qualify for the Zero Day Quest. In this session, hosted by Lynn Miyashita (<a href="/lynnfosec/">Lynn</a>) and Andrew Paverd (<a href="/ajpaverd/">Andrew Paverd</a>), we'll discuss Microsoft's
SANS Institute (@sansinstitute) 's Twitter Profile Photo

🏅 Honoring Alan Paller: 2024 Cyber Security Hall of Fame Inductee! Alan founded SANS in 1989, training 40K+ cybersecurity pros & establishing the first accredited cybersecurity college. 📅 Ceremony: Dec 5, Hanover, MD. 🌐 Learn more: cybersecurityhalloffame.org #Cybersecurity

🏅 Honoring Alan Paller: 2024 Cyber Security Hall of Fame Inductee!

Alan founded SANS in 1989, training 40K+ cybersecurity pros &amp; establishing the first accredited cybersecurity college.

📅 Ceremony: Dec 5, Hanover, MD.
🌐 Learn more: cybersecurityhalloffame.org

#Cybersecurity
Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

In case you're new to CTI ... and include MD5 hash values in a blog, make at least* sure the MD5 values have the same size * we can filter out the values for empty files or zero filled files ourselves

In case you're new to CTI ... and include MD5 hash values in a blog, make at least* sure the MD5 values have the same size

* we can filter out the values for empty files or zero filled files ourselves
SANS DFIR (@sansforensics) 's Twitter Profile Photo

📣 3 Weeks Away! | Join Katie Nickels Rebekah Brown Rick Holland & your community at #CTISummit for in-depth talks ft. cutting-edge insights, techniques, & solutions. 🗓️ Summit: Jan 27-28 📍 DC Metro | All-Access OR 🌐 Free Online | Select Talks ➡️ Register: sans.org/u/1xCe

Robert McArdle (@bobmcardle) 's Twitter Profile Photo

Ben and Bob do a Podcast sounds like an excellent kids books :) youtube.com/watch?v=4IOpUI… (CTO of Maltego, Ben April, interviews me on management styles in Security Research)