Alyssa (she/her) (@ramen0x3f) 's Twitter Profile
Alyssa (she/her)

@ramen0x3f

@ramen0x3f.bsky.social

Senior Threat Researcher and Pun Aficionado @Microsoft
Former research+red team+hand drawn memes @Mandiant

ID: 836294705000427520

linkhttps://linktr.ee/alyssarahman calendar_today27-02-2017 19:19:30

360 Tweet

3,3K Followers

578 Following

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

During the Mandiant FLARE team's webinar series "The Sample," you will hear stories of notable #malware samples they have reverse engineered. Tune in this Thursday for the first installment of the series. Register 👉 mndt.info/3LAMFtF

During the Mandiant FLARE team's webinar series "The Sample," you will hear stories of notable #malware samples they have reverse engineered. Tune in this Thursday for the first installment of the series.

Register 👉  mndt.info/3LAMFtF
Matthew Dunwoody (@matthewdunwoody) 's Twitter Profile Photo

🔥I'm looking for a manager for the Mandiant (part of Google Cloud) #AdvancedPractices Research team! 🦅 If you want to: 1⃣manage high-performing experts 2⃣find evil and codify attacker methodologies 3⃣work on a team at the front lines of security ...this may be for you. jobs.smartrecruiters.com/Mandiant/74399…

Alyssa (she/her) (@ramen0x3f) 's Twitter Profile Photo

Just received my flag* as well for my time at Mandiant (part of Google Cloud)! It was a big deal for me to hit the 5 year mark in my career while doing cool research with AP ❤️🦅 Stoked I have a memento *majestic cat not included

Just received my flag* as well for my time at <a href="/Mandiant/">Mandiant (part of Google Cloud)</a>! 

It was a big deal for me to hit the 5 year mark in my career while doing cool research with AP ❤️🦅 Stoked I have a memento 

*majestic cat not included
Alyssa (she/her) (@ramen0x3f) 's Twitter Profile Photo

This is an awesome blog on attacker VPN usage! 🤩 Come for the walkthrough of Jared Wilson’s fun research and stay for the fantastic list of hunting examples/rules that will get your creative juices flowing 👏🏽

bk (Ben Koehl) (@bkmsft) 's Twitter Profile Photo

#MSTIC 🛡️ & #DART 👻 are now hiring Hunt Analysts who live at the intersection of incident response and threat intelligence. Have experience in both areas? Come join us! Hunt Analyst 🕵️: careers.microsoft.com/us/en/job/1446… careers.microsoft.com/us/en/job/1439…

Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Microsoft has discovered a post-compromise capability we’re calling MagicWeb, which the threat actor tracked as NOBELIUM is using to maintain persistent access to environments they have compromised. In-depth technical analysis and hunting guidance here: msft.it/6016jeB4i

Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

A threat group tracked by Microsoft as DEV-0196 is linked to an Israel-based private sector offensive actor (PSOA) known as QuaDream, which reportedly sells a suite of exploits, malware, and infra. Read our analysis in collaboration with The Citizen Lab: msft.it/6010gy5fA