Nick Carr (@itsreallynick) 's Twitter Profile
Nick Carr

@itsreallynick

Tech Director / Threat Intelligence at Microsoft. Previously, Director of Incident Response & Intel Research at Mandiant. Former Chief Technical Analyst at CISA

ID: 73195179

linkhttp://linkedin.com/in/itsreallynick calendar_today10-09-2009 19:15:18

12,12K Tweet

38,38K Takipçi

3,3K Takip Edilen

John Lambert (@johnlatwc) 's Twitter Profile Photo

This tweet thread discusses how to use #Kusto explorer to graph data on the fly. ➡️ Get kusto explorer: aka.ms/ke ⬇️ Read on!

Ramin Nafisi (@malwarere) 's Twitter Profile Photo

In collaboration with Microsoft Threat Intelligence (MSTIC), SonicWall has identified a deceptive campaign to distribute a modified/patched version of SonicWall’s SSL VPN NetExtender application (dubbed #SilentRoute by MSTIC) that closely resembles the official SonicWall

Sandboxx News (@sandboxxnews) 's Twitter Profile Photo

Operation Midnight Hammer that hit Iran's nuclear facilities, was the largest stealth bomber air strike in history and will be studied for years to come. Article by Alex Hollings sandboxx.us/news/how-ameri…

vx-underground (@vxunderground) 's Twitter Profile Photo

It's absurd that the NCA UK very seriously tried to steer a young Mr. West in a positive direction. They formally enrolled him as an official trainee, which makes his resume look good. They cleaned up his record. He was attending a university. Despite his crimes, the United

DANΞ (@cryps1s) 's Twitter Profile Photo

We’re significantly expanding our insider threat and supply chain security program here at OpenAI. We’re hiring both technical detection engineers and senior investigators to defeat attacks through internal, external, supply chain actors. Apply here: openai.com/careers/senior…

FBI (@fbi) 's Twitter Profile Photo

ALERT—The FBI has recently observed the cybercriminal group Scattered Spider expanding its targeting to include the airline sector. These actors rely on social engineering techniques, often impersonating employees or contractors to deceive IT help desks into granting access.

ALERT—The FBI has recently observed the cybercriminal group Scattered Spider expanding its targeting to include the airline sector. These actors rely on social engineering techniques, often impersonating employees or contractors to deceive IT help desks into granting access.
Keller Rinaudo Cliffton (@keller) 's Twitter Profile Photo

African countries have been saying for a decade that they want trade not aid. Instead of low quality services provided by NGOs for free that create economic dependence, the presidents of these countries have been saying for years that they want technology, entrepreneurship, jobs,

Nick Carr (@itsreallynick) 's Twitter Profile Photo

I’m a user of and retail investor (😬) in 23andMe… the situation over there is so bizarre. Tbh I didn’t invest much and so I haven’t paid that much attention but I just got the email (pictured). So let me get this straight: • 23andMe filed for Chapter 11 bankruptcy in March

I’m a user of and retail investor (😬) in 23andMe… the situation over there is so bizarre. Tbh I didn’t invest much and so I haven’t paid that much attention but I just got the email (pictured).
So let me get this straight:
• 23andMe filed for Chapter 11 bankruptcy in March
Nick Carr (@itsreallynick) 's Twitter Profile Photo

The same tech culture that gets abused by individual scammers/fraudsters like Soham – gets absolutely crushed by the DPRK IT Workers at scale (Jasper Sleet). It’s fascinating to see the disproportionate interest in individuals/anecdotes vs. massive coordinated success for years

Nick Carr (@itsreallynick) 's Twitter Profile Photo

Blown away by Starlink and how easy it is to setup and the speeds we are getting on the road right now, just pointing it out the sunroof. A complete game changer. Pumped to set it up at the campsite. Immediately canceled our 5G device today & upgraded to Unlimited Roam –

Sysinternals (@sysinternals) 's Twitter Profile Photo

We've released Procmon for Linux, Sysmon for Linux, and SysinternalsEBPF with Azure Linux 3.0 support! Get the tools at sysinternals.com. See what's new on the Sysinternals Blog: techcommunity.microsoft.com/blog/Sysintern…

Nick Carr (@itsreallynick) 's Twitter Profile Photo

Grok The transparency in code changes and detailed timeline are nice to see. Though I will admit it’s a bit strange to have [presumably] human-written content in the above posts, then everything below are your replies & defense of the robustness of the controls – all written instantly

Matt Zorich (@reprise_99) 's Twitter Profile Photo

New in the Defender XDR advanced hunting platform, GraphApiAuditEvents - any blue team, threat hunter or those working on detections should make sure they get familiar with this data, it can be key for detecting malicious activity in your environment. It shows information about