Charles Price (@linuxisp) 's Twitter Profile
Charles Price

@linuxisp

Threat Analyst @ Microsoft Threat Intelligence Center #MSTIC | previously UK Gov and Zycomm/W3Z | IPv6 nerd | Ham M0DMF | Views my own.

ID: 260679720

calendar_today04-03-2011 11:00:26

279 Tweet

338 Followers

449 Following

Matt Zorich (@reprise_99) 's Twitter Profile Photo

You think servers are complex now, what about when you had to patch Windows Server 2000 via a floppy disk to support 128 bit encryption

You think servers are complex now, what about when you had to patch Windows Server 2000 via a floppy disk to support 128 bit encryption
Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

We’re sharing more details from our investigation of the Storm-0558 campaign that targeted customer email, including our analysis of the threat actor’s techniques, tools, and infrastructure, and the steps we took to harden systems involved: msft.it/6017g26HL

Charles Price (@linuxisp) 's Twitter Profile Photo

I’ve just accidentally “fed” my tomatoes with two stroke oil. The bottle is the same shape and colour as Tomorite.

Charles Price (@linuxisp) 's Twitter Profile Photo

Trying to receive the telemetry from a neighbour’s weather station and encountered some incidental over-collect. Attenuation required!

Trying to receive the telemetry from a neighbour’s weather station and encountered some incidental over-collect. Attenuation required!
Emil Eifrem (@emileifrem) 's Twitter Profile Photo

Wow, in Jensen's keynote yesterday at #GTC24, he calls out three sources of data to integrate with LLMs: 1) vector databases, 2) ERP / CRM and 3) *knowledge graphs*! There's this increasing realization that LLMs and Knowledge Graphs are match made in heaven. Higher accuracy,

Wow, in Jensen's keynote yesterday at #GTC24, he calls out three sources of data to integrate with LLMs: 1) vector databases, 2) ERP / CRM and 3) *knowledge graphs*!

There's this increasing realization that LLMs and Knowledge Graphs are match made in heaven. Higher accuracy,
Charles Price (@linuxisp) 's Twitter Profile Photo

Come and work for MSTIC! You'll work closely with me and threat researchers across MSTIC to integrate large, diverse datasets into Synapse and develop novel techniques to detect, track and disrupt the threat actors. Role is US-based and up to 100% remote. jobs.careers.microsoft.com/global/en/job/…

thesilence / @thesilence.bsky.social (@whoisjonhlu) 's Twitter Profile Photo

It's a great start to the week when your latest blog is published! Part 2 of my series on threat clusters is up on the The Vertex Project website! vertex.link/blogs/merging-…

Ollie Whitehouse (@ollieatnowhere) 's Twitter Profile Photo

We released our analysis of Pygmy Goat - a native x86-32 ELF shared object that was discovered on Sophos XG firewall devices, providing backdoor access to the device. ncsc.gov.uk/static-assets/… Yara / STIX / Snort etc ncsc.gov.uk/section/keep-u…