John Connor (@connorsecurity) 's Twitter Profile
John Connor

@connorsecurity

Cybersecurity from the future

ID: 1212057615259201538

calendar_today31-12-2019 17:07:16

376 Tweet

427 Followers

1,1K Following

nolen (@itseieio) 's Twitter Profile Photo

At the height of One Million Checkboxes's popularity I thought I'd been hacked. A few hours later I was tearing up, extraordinarily proud of some brilliant teens. A thread about my favorite story from running OMCB....

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

I always tell people interested in TI and DFIR that books and the tools/methods they describe are just half the journey. Most of what I've learned about threat actors - their methods, tools, and techniques - came from reading threat reports. While I started by extracting IOCs

Shane Huntley (@shanehuntley) 's Twitter Profile Photo

We are generally way too overconfident in understanding adversary intent in cyberspace. Activity is straightforward, attribution is tricky and intent is often opaque and relies on organizational politics and bureacracy inside organizations.

Muhammad Umair (@m_umairx) 's Twitter Profile Photo

FLARE is releasing a tool today that I've been working on over this year that helps break down binaries into smaller functional clusters and uses Gemini to describe their relationships, behavior and the overall malware functionality. It's called XRefer and it is out for you to

Anshuman Bhartiya (@anshuman_bh) 's Twitter Profile Photo

🚀 How to build an offensive AI security agent: 🤖 I've been wanting to play with ReAct agents to see what complex workflows I can automate when it comes to offensive security testing. I finally got around it yesterday and I was able to build a functional security testing

Graham Helton (@grahamhelton3) 's Twitter Profile Photo

The best formula I've found for my career so far. Find something to hack. Research it. Hack it better. Build tooling. Tell people about it. -> repeat.

Greg Lesnewich (@greglesnewich) 's Twitter Profile Photo

#100DaysofYARA 2025 edition begins tomorrow! Any #CTI or #detectionengineering folks looking for a self-paced challenge to start the year with a laid back & fun community? Look no further! The challenge is simple - write a YARA rule every day for 100 days

Nick Carr (@itsreallynick) 's Twitter Profile Photo

I have a hard time recognizing or appreciating Chinese innovation when I have spent my career responding to intrusions, particularly 🇨🇳 hacks of tech & data companies while at Mandiant. For so many in infosec, it’s impossible to differentiate breakthroughs from decades of

Lakshya Jain (@lxeagle17) 's Twitter Profile Photo

Now, you can ask: "what if my tasks at work are simple enough to where GPT does solve it all, easily? Can't I just use it for that?" Congratulations. You may have discovered the path to being unemployed. If the AI does everything you can do, *why would they keep you around*?

Lakshya Jain (@lxeagle17) 's Twitter Profile Photo

Parts of it may well be deemed "outdated". But the reason college curriculum is structured as it is instead of being a grand industry tour on the Hot Topic Of The Day is that by teaching fundamentals, you teach students *how* to think, learn, and work. AI just bypasses that.

alden (@birchb0y) 's Twitter Profile Photo

genuinely writing yara rules is just like a macrodata refinement bad vibes + scary numbers = probably malware give me my waffle party

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

We’re seeing a clear trend: attackers are bypassing the endpoint entirely. Not just avoiding traditional EDR-monitored systems by pivoting to embedded and edge devices, but now also operating purely in the cloud. No shell, no malware, no persistence on the endpoint. Just an OAuth

Kris McConkey (@smoothimpact) 's Twitter Profile Photo

This is a great summary. We (and by we I mean mostly Will Oram) have been using variants of this diagram to describe the inversion of attack paths to identity-based intrusions - a major trend in our incident response cases over the past year.

This is a great summary. We (and by we I mean mostly <a href="/willoram/">Will Oram</a>) have been using variants of this diagram to describe the inversion of attack paths to identity-based intrusions - a major trend in our incident response cases over the past year.