Dave Aitel (@daveaitel) 's Twitter Profile
Dave Aitel

@daveaitel

Cyber Security Researcher | Policy Analyst | Partner at Cordyceps.Systems | @[email protected]

ID: 8371802

linkhttp://www.aitelfoundation.org calendar_today23-08-2007 00:57:41

93,93K Tweet

28,28K Followers

1,1K Following

JD Work (@hostilespectrum) 's Twitter Profile Photo

Ransomware operators targeting a movie concession supplier, apparently never considering that the absolutely cratered box office and death of the theatre experience might just impact prospects of getting paid

iNaturalist (@inaturalist) 's Twitter Profile Photo

Our Observation of the Day is this group of cyanobacteria colonies (in the genus Rivularia), seen in New Zealand by lloyd_esler! More details at: inaturalist.org/observations/2…

Our Observation of the Day is this group of cyanobacteria colonies (in the genus Rivularia), seen in New Zealand by lloyd_esler!

More details at: inaturalist.org/observations/2…
Matt Johansen (@mattjay) 's Twitter Profile Photo

An attacker successfully phished a Cyberhaven employee. They gained access to their Chrome Web Store admin credentials and published a malicious version of the Cyberhaven extension.

An attacker successfully phished a Cyberhaven employee.

They gained access to their Chrome Web Store admin credentials and published a malicious version of the Cyberhaven extension.
Michael Eder @edermi@infosec.exchange (@michael_eder_) 's Twitter Profile Photo

NFS has not received much attention of the offensive security community in nearly a decade. Today, we are happy to share our research on the topic: hvs-consulting.de/en/nfs-securit…. I'll give you a short overview in this thread 🧵 (1/5) #redteam #pentest

Alexei Bulazel (@0xalexei) 's Twitter Profile Photo

I am always so thankful for the path Dave Aitel paved - showing me and so many other alumni of RPISEC, that CS majors who work on zero-day exploits as a hobby not only have a seat at the table in cyber policy discussions, but in many cases ought to lead them

Tim Blazytko (@mr_phrazer) 's Twitter Profile Photo

The line-up for RE//verse is impressive, but one talk I’m particularly excited about is from Vikas Gupta and BlipsAndChitzšŸš€: ā€œStanding on the Shoulders of Giants: De-Obfuscating WebAssembly using LLVMā€ re-verse.sessionize.com/session/763329

Daniel Kronauer (@danielkronauer) 's Twitter Profile Photo

Rove beetles of the genus Tetradonia patrol the periphery of army ant columns, snatch weak or injured ants off the trail, and pull them into the leaf litter to consume them. These predators are one of the many myrmecophiles, or ant guests, associated with army ant colonies.

Rove beetles of the genus Tetradonia patrol the periphery of army ant columns, snatch weak or injured ants off the trail, and pull them into the leaf litter to consume them. These predators are one of the many myrmecophiles, or ant guests, associated with army ant colonies.
Nicolas Krassas (@dinosn) 's Twitter Profile Photo

Someone is slipping a hidden backdoor into Juniper routers across the globe, activated by a magic packet go.theregister.com/feed/www.there…

Ryan Naraine (@ryanaraine) 's Twitter Profile Photo

Dave Aitel, writing on DailyDave: "This is probably my new favorite podcast, with an uncensored take on current infosec events, largely from an incident response standpoint, but in general covering all the bases and courageously offending everyone at great length." Dave Aitel

Yarden Shafir (@yarden_shafir) 's Twitter Profile Photo

FYI if you’re willing to link with ntdll or dynamically resolve it there’s a ton of APIs that return TEB/PEB or leave them in one of the registers. (Don’t believe official return values. MSDN is a liar!)

FYI if you’re willing to link with ntdll or dynamically resolve it there’s a ton of APIs that return TEB/PEB or leave them in one of the registers.
(Don’t believe official return values. MSDN is a liar!)
OpenAI Newsroom (@openainewsroom) 's Twitter Profile Photo

We’re sharing more about how we report vulnerabilities we discover in third-party software—through research or automated means. Our new disclosure policy is designed for cooperation, transparency, and ecosystem-wide security. openai.com/index/scaling-…

David Weston (DWIZZZLE) (@dwizzzlemsft) 's Twitter Profile Photo

Firmware Binary Analysis in Azure is in public preview!! New blog on its capabilities and how to get access. Drag and drop your firmware to browser and find issues techcommunity.microsoft.com/blog/iotblog/a…

Firmware Binary Analysis in Azure is in public preview!!  New blog on its capabilities and how to get access.  Drag and drop your firmware to browser and find issues

techcommunity.microsoft.com/blog/iotblog/a…