We are the Microsoft Security Response Center. To report security vulnerabilities or abuse in Microsoft products, visit http://microsoft.com/en-us/msrc.
Unix berserker, retired hacker-con organiser (Kiwicon!) and now technology-editor-slash-sysadmin-janitor at Risky.biz.
Was @metlstorm on Twitter, am metlstorm@infosec.exchange on Masto.
Check if you have an email address or password that has been compromised in a data breach. Created and maintained by
@troyhunt.com.
Volatility Core developer, Dir. of Research Volexity, LSU Cyber
MITRE ATT&CK® - A knowledge base for describing the behavior of adversaries. Replying/Following/Reposting ≠ endorsement.
http://isc.sans.edu - Global Network Security Information Sharing Community - Daily blogs and cyber security news podcast.
Sharing information on malicious network traffic and malware samples at https://www.malware-traffic-analysis.net/
Author of the Seriously Risky Business cyber security newsletter
Real Intrusions by Real Attackers, the Truth Behind the Intrusion.
https://thedfirreport.com
Builder of security products and programs. Teacher of those who run them.
https://zeltser.com
CTO of Microsoft Azure, author of novels Rogue Code, Zero Day and Trojan Horse, Windows Internals, Sysinternals tools. Opinions are my own.
threaty threats -- helping build research workflows into a soc product, but I don't speak for them on this acct. pretty good at bash scripts and strings. disclosures on my linkedin below
https://www.linkedin.com/in/alexlanstein/
The Internet's Observatory: Tracking cybersecurity and digital governance • connectivity and democracy • tools and policy for change • https://netblocks.org
Covering life in the future
https://www.theverge.com/subscribe
Cisco Talos defends Cisco customers with trusted global cybersecurity intelligence. Support requests: https://talosintelligence.com/support
https://x.com/malwrhunterteam | https://id-ransomware.malwarehunterteam.com/
Creator of Have I Been Pwned. Microsoft Regional Director. Pluralsight author. Online security, technology and “The Cloud”. Australian.
Breaking cybersecurity and technology news, guides, and tutorials that help you get the most from your computer. DMs are open, so send us those tips!
☆ Cybersecurity reporter
★ Newsletters at Risky Business
#infosec #cybersecurity
https://risky.biz
We are Microsoft's global network of security experts. Follow for security research and threat intelligence. https://aka.ms/threatintelblog
macOS Detection Engineer at SentinelOne.
Offensive Security, Malware, Reverse Engineering and Apple Security.
Opinions are my own.
https://syrion.me
We are the Threat Intelligence and Malware Analysis team of
@sentinelone.com
https://sentinellabs.com
https://labscon.io
Mandiant Intelligence at Google. CYBERWARCON and SLEUTHCON founder. Johns Hopkins professor. Army vet.
A security firm providing Incident Response, Proactive Threat Assessments, Trusted Advisory, and Threat Intelligence // volexity.com
Official account of the Volatility Memory Analysis Project and Windows Malware and Memory Forensics Training. http://volatilityfoundation.org
Hacker. Friend. Cybersecurity Researcher at Huntress.
GreyNoise analyzes Internet background noise. Use GreyNoise to remove pointless security alerts, find compromised devices, or identify emerging threats.
Know. When it matters.
https://canary.tools
By defenders. For defenders.
Peel back the layers of your network and make your adversaries cry.
https://www.securityonion.com
🌍 Trusted Threat Detection & Incident Response solutions. Experience the difference with our unmatched capabilities. #SIEM #APISecurity #LogManagement #InfoSec
Red Brain, Blue Fingers
Malware Analysis, Reverse Engineering, Threat Hunting, Detection Engineering, DFIR, Security Research, Programming, Curiosities, Software Archaeology, Puzzles, Bad dad jokes
https://www.hexacorn.com/blog/
hexacorn@infosec.exchange
Running ➡ http://defendpoint.ca | http://edr-telemetry.com | https://edr-comparison.com/ | http://detectionstream.com | 🇬🇷🇨🇦
Senior Correspondent @theverge.com ║ Sign up to Notepad, my weekly newsletter on Microsoft's big bets at http://theverge.com/notepad ║ Tips? msg me on Signal: tomwarren.01
Detection @Splunk | previously @nextronsystems | @sigma_hq & @magicswordio maintainer | Eternal Learner
Proofpoint's insights on targeted attacks and the cybersecurity threat landscape.
The world’s most advanced, autonomous AI-powered cybersecurity platform. We empower the world to run securely, with leading organizations trusting us to Secure Tomorrow™. Secure your enterprise: http://sentinelone.com/request-demo/
https://strikeready.com/blog.html
Download live malware samples mentioned here: https://github.com/StrikeReady-Inc/samples
If you prefer marketing (our product is great!) subscribe to our main page @strikeready.com
Follow us for the latest blogs and IOCs from Team Cymru's S2 Threat Research team.
cybersecurity weather man. scanning the horizons for cloudy cyber. Expert at nothing except computer rubbish. Anti-ransomware since 2015.
official Bluesky account (check username👆)
Bugs, feature requests, feedback: support@bsky.app