Cyrus (@cyrussecurity) 's Twitter Profile
Cyrus

@cyrussecurity

Security Researcher @crowdstrike | ex @microsoft | Beardown @UArizona

ID: 163770286

linkhttps://youtube.com/channel/UC2m3HMPldWE07G7XS1t50aQ calendar_today07-07-2010 06:44:22

10,10K Tweet

764 Followers

1,1K Following

Matthew Mesa (@mesa_matt) 's Twitter Profile Photo

Be alert that there is Qakbot being spread in the wild: 49220571574da61781de37f35c66e8f0dadb18fdedb6d3a1be67485069cfd4b0 Campaign: tchk08 ITW URLs on Virustotal: upd5[.]pro upd112.appspot[.]com

Jake Williams (@malwarejake) 's Twitter Profile Photo

DOGE is a bigger threat to US federal government information systems than China. If you find this statement controversial, I'm going to question your IT and cybersecurity credentials.

CrowdStrike (@crowdstrike) 's Twitter Profile Photo

🚨The CrowdStrike 2025 Global Threat Report is available NOW. Get unparalleled insights into how adversaries evolved in 2024. Download the full report here: crwdstr.ke/6015LwkGS

Unit 42 (@unit42_intel) 's Twitter Profile Photo

A threat actor leveraging the same naming pattern has registered 10K+ domains for various #smishing scams. They pose as toll services for US states and package delivery services. Root domain names start with "com-" as a way to trick victims. More info at bit.ly/4ipQ0LW

A threat actor leveraging the same naming pattern has registered 10K+ domains for various #smishing scams. They pose as toll services for US states and package delivery services. Root domain names start with "com-" as a way to trick victims. More info at bit.ly/4ipQ0LW
LaurieWired (@lauriewired) 's Twitter Profile Photo

Just built an MCP for Ghidra. Now basically any LLM (Claude, Gemini, local...) can Reverse Engineer malware for you. With the right prompting, it automates a *ton* of tedious tasks. One-shot markups of entire binaries with just a click. Open source, on Github now.

DAY JOHNSON ⚡️ (@daycyberwox) 's Twitter Profile Photo

Stop robbing yourself of real knowledge. “Learning” today often looks like 5-10 minute videos claiming to be “complete guides” or “everything you need to know”—but most of the time, they either oversimplify or barely scratch the surface. Reading books/papers, listening to

Cyrus (@cyrussecurity) 's Twitter Profile Photo

I’m sorry, but when did it ever leave the core mission? This is bs. That agency and the people working for them were doing great work. ⁦ARCHIVED: Jen Easterly⁩ had done amazing things there DHS Secretary Noem: CISA needs to get back to ‘core mission’ | CyberScoop cyberscoop.com/kristi-noem-rs…

FBI (@fbi) 's Twitter Profile Photo

ALERT—The FBI has recently observed the cybercriminal group Scattered Spider expanding its targeting to include the airline sector. These actors rely on social engineering techniques, often impersonating employees or contractors to deceive IT help desks into granting access.

ALERT—The FBI has recently observed the cybercriminal group Scattered Spider expanding its targeting to include the airline sector. These actors rely on social engineering techniques, often impersonating employees or contractors to deceive IT help desks into granting access.
Ramin Nafisi (@malwarere) 's Twitter Profile Photo

Microsoft Threat Intelligence has uncovered a cyberespionage campaign by the Russian state actor we track as Secret Blizzard that has been targeting embassies located in Moscow using an adversary-in-the-middle (AiTM) position to deploy their custom #ApolloShadow malware.