pseudonyme (@pseudonyme_ovb) 's Twitter Profile
pseudonyme

@pseudonyme_ovb

ID: 166711595

calendar_today14-07-2010 20:40:37

56,56K Tweet

385 Followers

892 Following

Anton (@antonlovesdnb) 's Twitter Profile Photo

Going to be spinning up a little series of posts with some Blue Team specific Claude tips - follow along with #ClaudeForBlueTeam First tip - ATT&CK can be downloaded as a JSON file, which Claude loves to work with. Remember, ATT&CK has a Data Source component - use Claude to

Going to be spinning up a little series of posts with some Blue Team specific Claude tips - follow along with

#ClaudeForBlueTeam 

First tip - ATT&CK can be downloaded as a JSON file, which Claude loves to work with. Remember, ATT&CK has a Data Source component - use Claude to
Renato (@rcfontana) 's Twitter Profile Photo

Cracked a YARA for all LATAM fincrime threats! rule Delphi_usage_Straight_to_Jail { meta: acc="99.9%" strings: $d1 = "DVCLAL" $v1 = "TForm" $v2 = "TDataModule" $v3 = "TEdit" condition: uint16(0)==0x5A4D and 3 of them } // #100DaysOfYara

Oliver Prompts (@oliviscusai) 's Twitter Profile Photo

someone just open-sourced a tool that converts pdfs to markdown at 100 pages per second. 100% free. runs entirely on cpu. no expensive gpus needed.

someone just open-sourced a tool that converts pdfs to markdown at 100 pages per second.

100% free. runs entirely on cpu. no expensive gpus needed.
BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

GlassWorm malware hits 400+ code repos on GitHub, npm, VSCode, OpenVSX bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

Pierluigi Paganini - Security Affairs (@securityaffairs) 's Twitter Profile Photo

EU sanctions Chinese and Iranian actors over cyberattacks on critical infrastructure - securityaffairs.com/189585/securit… #securityaffairs #hacking #China

Tim Blazytko (@mr_phrazer) 's Twitter Profile Photo

New blog post: Building a Pipeline for Agentic Malware Analysis Agentic RE + malware analysis with custom skills, MCP tooling, and persistent case state to automate intial triage Link: synthesis.to/2026/03/18/age… Github: github.com/mrphrazer/agen…

New blog post: Building a Pipeline for Agentic Malware Analysis

Agentic RE + malware analysis with custom skills, MCP tooling, and persistent case state to automate intial triage

Link: synthesis.to/2026/03/18/age…

Github: github.com/mrphrazer/agen…
Will (@bushidotoken) 's Twitter Profile Photo

New Blog! The Beast Returns: Analysis of a Beast Ransomware Server 👹 In March 2026, @TeamCymru detected a Beast operator’s server that enabled us to understand the flow of their attacks from start, to middle, to the end, including ransomware binaries. team-cymru.com/post/beast-ran…

Cyberguerre (@cyb3rguerre) 's Twitter Profile Photo

C'est une petite révolution pour les utilisateurs de Firefox : le navigateur va bientôt inclure un VPN gratuit sans aucun abonnement requis 👉 l.numerama.com/m8v

C'est une petite révolution pour les utilisateurs de Firefox : le navigateur va bientôt inclure un VPN gratuit sans aucun abonnement requis
👉 l.numerama.com/m8v
ANSSI (@anssi_fr) 's Twitter Profile Photo

🛡️Vers une nation cyber-résiliente 📅 L'ANSSI rassemblait hier l'écosystème cyber pour lancer la dynamique de sécurisation induite par NIS 2. ⚙️Le Référentiel Cyber France (ReCyF) ainsi que des ressources et outils concrets ont été dévoilés. + d'infos : cyber.gouv.fr/actualites/nis…

🛡️Vers une nation cyber-résiliente

📅 L'ANSSI rassemblait hier l'écosystème cyber pour lancer la dynamique de sécurisation induite par NIS 2.

⚙️Le Référentiel Cyber France (ReCyF) ainsi que des ressources et outils concrets ont été dévoilés.

+ d'infos :
cyber.gouv.fr/actualites/nis…
urlscan.io (@urlscanio) 's Twitter Profile Photo

This one is important, folks: Make sure that *all* of your API requests to urlscan.io are using authentication starting May 4th, otherwise your stuff *will* break: urlscan.io/blog/2026/03/1…

ESET Research (@esetresearch) 's Twitter Profile Photo

#ESETresearch analyzed more than 80 EDR killers, seen across real-world intrusions, and used ESET telemetry to document how these tools operate, who uses them, and how they evolve beyond simple driver abuse. welivesecurity.com/en/eset-resear… 1/6