Jack(@malwareforme) 's Twitter Profileg
Jack

@malwareforme

Security researcher

ID:3104962489

calendar_today23-03-2015 14:28:29

1,1K Tweets

6,4K Followers

899 Following

Josh Stroschein | The Cyber Yeti(@jstrosch) 's Twitter Profile Photo

🔍 Looking for anomaly or hunting rules? Check out Travis Green's hunting rules repo on 👇

✅ github.com/travisbgreen/h…

You can find updates about these rule's on his blog

travisgreen.net

account_circle
Ali Hadi | B!n@ry(@binaryz0ne) 's Twitter Profile Photo

One of the most important skills in is using a hex-editor. Therefore, I created a 40+ video series on how to use 010-editor, which is probably the best Hex Editor out there!
youtube.com/playlist?list=…

One of the most important skills in #DFIR is using a hex-editor. Therefore, I created a 40+ video series on how to use 010-editor, which is probably the best Hex Editor out there! youtube.com/playlist?list=…
account_circle
Jack(@malwareforme) 's Twitter Profile Photo

new role opened for someone who loves crafting detections, threat intel, and all the goodness of smashing bad in email: jobs.careers.microsoft.com/global/en/job/…
happy to answer any questions

new role opened for someone who loves crafting detections, threat intel, and all the goodness of smashing bad in email: jobs.careers.microsoft.com/global/en/job/… happy to answer any questions
account_circle
Josh Stroschein | The Cyber Yeti(@jstrosch) 's Twitter Profile Photo

🚨 Ready to build a malware & reverse engineering VM? This video covers installing :

youtu.be/i8dCyy8WMKY

If you haven't used FLARE-VMin a while, it's worth another look! And if you haven't used it before, it's like for . Lot's of great improvements!

account_circle
Jack(@malwareforme) 's Twitter Profile Photo

wrapped up a basic privacy and security workshop for a local non profit that supports people experiencing IPV, sexual assault, and other forms of abuse. it’s a really cool way to give back to your community and create actionable impact. education is power!

account_circle
waymon(@obnoxious4n6) 's Twitter Profile Photo

MSTIC is hiring Senior Threat Intelligence Analysts in the U.S.! Come join one of the coolest teams around. I’m lucky to have the opportunity to work with some of the smartest people in this industry.

More info here: jobs.careers.microsoft.com/global/en/job/…

account_circle
Josh Stroschein | The Cyber Yeti(@jstrosch) 's Twitter Profile Photo

10 is scheduled for Nov 13 - 15 in 🇪🇸 Madrid, Spain! The call for talks is now open 👇

suricon.net/call-for-talks/

Consider submitting if you're working on something interesting related to network detection/monitoring!

Suricata IDS/IPS

account_circle
Sherrod DeGrippo 🦓(@sherrod_im) 's Twitter Profile Photo

THE Microsoft Threat Intelligence podcast.
🇰🇵Special request DPRK episode! 🇰🇵
Greg and Matthew discuss North Korean cyber operations, highlighting the unique aspects that set North Korea apart, emphasizing North Korea's persistence and adaptability.🫡

podcasts.apple.com/us/podcast/mic…

account_circle
William Metcalf(@node5) 's Twitter Profile Photo

Join me, hadojae, Andrea De Pasquale, and our team as a Sr. Threat Researcher focusing on phishing detection. Use your skills in pattern-based detection, regex, HTML/HTTP, and current phishing landscape, to combat phishing threats for SAA customers
splunk.com/en_us/careers/…

account_circle
Josh Stroschein | The Cyber Yeti(@jstrosch) 's Twitter Profile Photo

Looking for some exercises? I've posted a few on my Github 👇

👿 github.com/jstrosch/malwa…

These include full solution walk-throughs, in case you get stuck! Many of the tools and techniques are furthered explored in my videos 👇

youtube.com/@jstrosch

Looking for some #malware #analysis exercises? I've posted a few on my Github 👇 👿 github.com/jstrosch/malwa… These include full solution walk-throughs, in case you get stuck! Many of the tools and techniques are furthered explored in my videos 👇 youtube.com/@jstrosch
account_circle
Microsoft Threat Intelligence(@MsftSecIntel) 's Twitter Profile Photo

Microsoft researchers Jeremy Dallman, Steve Ginty, and Kimberly Ortiz discuss with Microsoft Threat Intelligence podcast host Sherrod DeGrippo 🦓 their insights on providing timely, accurate, and actionable threat intelligence. Listen to the episode here: msft.it/6011iqlUF

account_circle
Malwrologist(@DissectMalware) 's Twitter Profile Photo

Dbg is now open-source (under Apache license v2)!

Frontend: github.com/DissectMalware…
Backend: github.com/DissectMalware…

Live: yaradbg.dev

grammar: github.com/DissectMalware…

account_circle
Jeremy Hedges(@dcTavvy) 's Twitter Profile Photo

[1/5] In the spirit of (Likely only posting today, as newborn should arrive any day now) and inspired from this post; I created a rule for one of my favorite Anti-Debug methods

account_circle