Ian Campbell (@neurovagrant) 's Twitter Profile
Ian Campbell

@neurovagrant

Security ops engineer, writer, voracious reader. he/him. Opinions here mine only. Autistic/depressed/anxious/hungry. Also at neurovagrant.com

ID: 19544311

linkhttps://masto.deoan.org/@neurovagrant calendar_today26-01-2009 17:05:47

52,52K Tweet

2,2K Followers

1,1K Following

Ryan Chenkie (@ryanchenkie) 's Twitter Profile Photo

⚠️ Developers, please be careful when installing Homebrew. Google is serving sponsored links to a Homebrew site clone that has a cURL command to malware. The URL for this site is one letter different than the official site.

⚠️ Developers, please be careful when installing Homebrew.

Google is serving sponsored links to a Homebrew site clone that has a cURL command to malware. The URL for this site is one letter different than the official site.
Ian Campbell (@neurovagrant) 's Twitter Profile Photo

I'm super proud of my employer DomainTools and our DT Investigations team under Daniel Schwalbe today. Consider this historical analysis piece on Russian disinfo actors the first of many disinformation-related pieces to come!

SecuritySnacks (@securitysnacks) 's Twitter Profile Photo

.Ian Campbell shares his top cybersecurity picks: podcasts, blogs, research papers, and more! Starting with "To Catch a Thief: China's Rise to Cyber Supremacy" by Nicole Perlroth. Episode 1 features Dmitri Alperovitch. Three episodes out now! dti.domaintools.com/cybersecurity-…

.<a href="/neurovagrant/">Ian Campbell</a> shares his top cybersecurity picks: podcasts, blogs, research papers, and more! 

Starting with "To Catch a Thief: China's Rise to Cyber Supremacy" by <a href="/nicoleperlroth/">Nicole Perlroth</a>. Episode 1 features <a href="/DAlperovitch/">Dmitri Alperovitch</a>. Three episodes out now!

dti.domaintools.com/cybersecurity-…
SecuritySnacks (@securitysnacks) 's Twitter Profile Photo

DTI reveals a phishing campaign targeting defense and aerospace firms linked to the Ukraine conflict. The infrastructure uses mail servers to spoof organizations and steal credentials, motivated by cyber espionage. dti.domaintools.com/phishing-campa… #Ukraine #phishing #CyberEspionage

DTI reveals a phishing campaign targeting defense and aerospace firms linked to the Ukraine conflict. The infrastructure uses mail servers to spoof organizations and steal credentials, motivated by cyber espionage. 
dti.domaintools.com/phishing-campa…
#Ukraine #phishing #CyberEspionage
DomainTools (@domaintools) 's Twitter Profile Photo

Looking for smart reads & listens in cyber? @Neurovagrant shares what’s buzzing on our team’s radar this week: 🎧 Maltego's Human Element 📚 The Citizen Lab 📰 Nextgov/FCW 🔍 Threat Insight Full list 👉 dti.domaintools.com/cybersecurity-…

Omri Segev Moyal (@gelossnake) 's Twitter Profile Photo

Introducing a new attack vector: AI-Induced Destruction. After a shared volume of incident responses, we can confirm: AI coding assistants are now a legitimate threat category. Not sci-fi. Not theoretical. Happening daily. Thread (1/4)

Introducing a new attack vector: AI-Induced Destruction.
After a shared volume of incident responses, we can confirm: AI coding assistants are now a legitimate threat category.

Not sci-fi. Not theoretical. Happening daily.

Thread (1/4)
Omri Segev Moyal (@gelossnake) 's Twitter Profile Photo

The pattern is simple: - Dev gives vague instruction - AI has production access - Literal interpretation - Catastrophic damage Your SOC won't flag it. Your SIEM won't alert. The attack comes from inside, from tools you authorized.

Ian Campbell (@neurovagrant) 's Twitter Profile Photo

We been doin some fun stuff lately even more fun stuff coming soon. Feels like I've reached a place where around every corner lies a fascinating rabbit-hole, especially thanks to my teammates.

Ian Campbell (@neurovagrant) 's Twitter Profile Photo

Prompt||GTFO events have been extremely educational for me as an AI skeptic, as well as fun and entertaining. Worth checking them out. Google Form for getting the invite (or applying to present): docs.google.com/forms/d/e/1FAI… LinkedIn post with more info: linkedin.com/feed/update/ur…

Ian Campbell (@neurovagrant) 's Twitter Profile Photo

If you need something to read this morning, we published research on Friday around an activity cluster targeting 18+ interests, especially gambling and porn. Well. Also tax websites. Which I suppose is an adult interest. Sigh. #threatintel #infosec dti.domaintools.com/securitysnack-…

Ian Campbell (@neurovagrant) 's Twitter Profile Photo

This Phrack timeline of the Kimsuky dump is wiiiiiiild. phrack.org/issues/72/7_md… (we did some deeper analysis of the dump, linked below, but wow...) ( dti.domaintools.com/inside-the-kim… )

Ian Campbell (@neurovagrant) 's Twitter Profile Photo

Hey folks, just a reminder I'll be at BSides NoVA this weekend, giving a talk on DNS and domain intel in investigative journalism! It's an intersection of passions for me, so I'm wicked excited. bsidesnova-2025.sessionize.com/session/1001159

Ian Campbell (@neurovagrant) 's Twitter Profile Photo

Shout out to Silobreaker for putting out *really* well-done weekly geopolitical briefs that provide substantial, timely, and relevant analysis without feeling like a chore to make time for. #threatintel #infosec #cybersecurity silobreaker.com/resources/repo… linkedin.com/newsletters/ge…

Hamid Kashfi (@hkashfi) 's Twitter Profile Photo

Microsoft casually patched CVE-2025-59287 last week, which is an easy to find & exploit pre-auth RCE in the WSUS! Mind that, vulnerable versions go back to 2012 (oldest still supported OS ver.). Yeah Microsoft invented SDLC yada yada, but can someone explain that? It's not even a