Dan Kelly (@int0x00) 's Twitter Profile
Dan Kelly

@int0x00

🦉 Adversary Methods RAD, assembly coding, APT disintegrating, EANx40’ing cyber warrior. Sweating Cyber 24/7 on 群二st.

ID: 1048496726

calendar_today30-12-2012 18:13:44

1,1K Tweet

1,1K Takipçi

1,1K Takip Edilen

Dan Kelly (@int0x00) 's Twitter Profile Photo

I'm going to talk about this publicly because enough time has passed and there's no longer any capability to burn. I typically don't talk about anything I work on due to obvious reasons but here goes... Several years ago I was monitoring an APT actor. There's little point trying

Dan Kelly (@int0x00) 's Twitter Profile Photo

You have to hand it to CS. They’ve finally deployed a 100% hackproof EDR. Nobody is getting hacked on this fine Friday…

Dan Kelly (@int0x00) 's Twitter Profile Photo

I miss the days when actors wrote real malware. I find myself spending an unprecedented amount of time dealing with script kiddies writing their bullshit malware in .NET, Python and Go. Skill up kids.

Dan Kelly (@int0x00) 's Twitter Profile Photo

Since it turns out there's interest in cyber war stories, let me give you a cyber and war story combined and drop another bomb. Literally speaking. This is most topical as it covers Israel's (Air Force) air strike carried out on Hamas "cyber HQ" in 2019. I want to heavily caveat

Dan Kelly (@int0x00) 's Twitter Profile Photo

Behind the scenes, inner moderation comments of community notes is a true battle ground. I can’t help but think the quality of moderation will decrease as the effort becomes higher. At the end of the day, who wants to spend their own time doing a content moderation job for free?

Dan Kelly (@int0x00) 's Twitter Profile Photo

Something I constantly see (some) journalists and snowdenites push is that capability equals intent and use. It simply doesn’t, and pushing the agenda only signals intent to spread misinformation, a total lack of understanding or a combination of both.

Dan Kelly (@int0x00) 's Twitter Profile Photo

The propaganda right now that surrounds the infamous and mighty north korean soldiers going to fight in Ukraine... I mean, aside from being malnourished, underfunded, badly equipped, badly trained, massively inexperienced, unmotivated and also using soviet era weapons then yeah

Dan Kelly (@int0x00) 's Twitter Profile Photo

There's an important point I want to get across to defenders and IT teams in general. Having a custom built or extremely complex infrastructure or backend doesn't deter or stop threat actors. In fact, I've seen many threat actors routinely figure out parts of networks and

Dan Kelly (@int0x00) 's Twitter Profile Photo

China's foreign ministry spokeswoman Mao Ning told a news briefing that the accusations were "baseless" and "lacking evidence". "China consistently opposes all forms of hacking and firmly rejects the dissemination of false information targeting China for political purposes," Mao

Dan Kelly (@int0x00) 's Twitter Profile Photo

Get lies and propaganda baked into your AI. How long before we face a Huawei style threat in our AI? Probably not long.

Dan Kelly (@int0x00) 's Twitter Profile Photo

All the China influencers showing the inner workings and real costs of foreign brands manufacturing goods in China. Hopefully next they’ll give us a tour and cost breakdown of the fentanyl labs

Dan Kelly (@int0x00) 's Twitter Profile Photo

Age does not bring wisdom. Experience brings wisdom. Never underestimate the young, just as you should never overestimate the old