@evacide.bsky.social
Director of Cybersecurity @eff.org Co-founder of @stopstalkerware.bsky.social These opinions are my own, not my employers’ I did a TED talk once
@mg.lol
@dmitri.silverado.org
Geopolitics, Russia, China, Cyber Chairman @silverado.org Author of WorldOnTheBrink.com Host GeopoliticsDecanted.com podcast Founder Alperovitch Institute for Cybersecurity Studies at Johns Hopkins SAIS Co-Founder CrowdStrike @DAlperovitch elsewhere
@ridt.bsky.social
Author of ACTIVE MEASURES, RISE OF THE MACHINES, CYBER WAR WILL NOT TAKE PLACE, "Attributing Cyber Attacks," more. Johns Hopkins, Alperovitch Institute.
@mattblaze.org
Scientist, safecracker, etc. McDevitt Professor of Computer Science and Law at Georgetown. So-called expert on election security and a few other things. Slow photographer. RF nerd. Occasionally blogs at https://mattblaze.org/blog
@jags.bsky.social
Executive Director for Intelligence and Security Research @ SentinelOne. Distinguished Fellow and Adj Professor @ Hopkins SAIS Alperovitch Institute. Three Buddy Problem Co-Host. LABScon Founder, Cyber Paleontologist, Fourth-Party Collector.
@silascutler.bsky.social
You may know me from your server logs. Malware, Hacks, Internet Scanning, CTI w00w00, Censys, IST
@hackerfantastic.bsky.social
Co-Founder https://hacker.house cyber security assurance & hacker training ~ ISBN9781119561453 ~ a book on professional hacking. Contact for competitive quotes on cyber security projects.
@esultanik.bsky.social
Ph.D. computer security researcher at Trail of Bits. Editor of and frequent contributor to #pocorgtfo. My CV is a PDF that’s also an NES ROM https://sultanik.com/nesresume/
@chrisbing.bsky.social
@propublica.org reporter: hacking, intelligence and foreign affairs. @johnshopkinssais.bsky.social grad. 📧email: [email protected] / 📞Signal:771-217-8550. More contact info: http://bit.ly/2wagIS7
@bellingcat.com
Bellingcat is an independent investigative collective of researchers, investigators and citizen journalists brought together by a passion for open source research. Want to support our charity? bellingcat.com/donate
@retr0.id
reverse engineering, cryptography, exploits, hardware, file formats, and generally giving computers a hard time Fedi: @[email protected] Macroblog: https://www.da.vidbuchanan.co.uk/blog/
@saelo.bsky.social
V8 Security technical lead. Previously Project Zero. Phrack author. Personal account.
@dwizzzle.bsky.social
Corporate Vice President, OS Security and Enterprise @Microsoft
@lcamtuf.coredump.cx
Substack: http://lcamtuf.substack.com/archive Homepage: http://lcamtuf.coredump.cx
@shanehuntley.bsky.social
Aussie security / tech guy. Google Threat Intelligence. Co-founder Threat Analysis Group (TAG). Tweets are my own not my employers.
@azeria-labs.com
Founder of Azeria Labs, Trainer, Author of Blue Fox: Arm Assembly Internals & Reverse Engineering
@maddiestone.bsky.social
Security Researcher at Google Project Zero. 0-days all day. Love all things reverse engineering. she/her
@kennwhite.bsky.social
cryptography • neuro • cloud • biscuits ORD-DCA-NYC-BCN ✈️ [email protected]
@perrib.us
DARPA Program Manager | Organizing DEF CON CTF with Nautilus | RPISEC Alumna | Personal account, opinions my own, RT ≠ endorsement
@weld.bsky.social
Gray haired gray hat. Co-founder Veracode. Former L0pht security researcher. Builds tools to find and fix vulnerabilities in code at scale. Twitter: https://twitter.com/WeldPond
@fuzzysec.bsky.social
意志 / Antiquarian @ IBM Adversary Services / Ex-TORE ⚔️🦅 / I rewrite pointers and read memory / AI Psychoanalyst / Teaching at labs.calypso.pub
@ionescu.bsky.social
Windows Internals Author, Developer, Reverse Engineer, Security Researcher, Speaker, Trainer, and most recently Nation State Hacker. Core OS Platform Developer at Apple, Hyper-V Vendor at Microsoft, Chief Architect at CrowdStrike and now Director at CSE.
@catc0n.bsky.social
Takes a lot of photos, calls many places home. Previously vulnerability research director @Rapid7 / @metasploit.
@richinseattle.bsky.social
Fuzzing; Vulnerability Research; Deep Learning; Reverse Engineering Training & Publications @ http://fuzzing.io Hacking the planet since 1995 Undercurrents.io BOFH I'll stop the world and melt with you
@justinschuh.com
Back in Chicago as a stay-at-home dad starting a small business. Expect some infosec/privacy/safety, 3D printing, and politics. You're probably following me because of my old job(s). infosec.exchange/@jschuh Defunct: twitter.com/justinschuh
@doublepulsar.com
cybersecurity weather person. @gossithedog before Elon ruined everything
@ddz.bsky.social
I drink amari and I know things. $ddz LMDDGTFY: https://duckduckgo.com/?q=dino+dai+zovi NYC/BK
@malwareunicorn.bsky.social
Fuzzy unicorn @ Microsoft’s MORSE team. Ex-Meta RedTeam, Ex-Endgame, Ex Fireeye. malwareunicorn.org
@stacksmashing.bsky.social
Security researcher with a focus on hardware & firmware. I occasionally publish stuff on YouTube. Co-founder of hextree.io. Contact: [email protected]
@agarri.fr
Web hacker 😈 Burp Suite Pro trainer 👨🏫 Maintainer of @mastering-burp.agarri.fr 🛠️
@hackinglz.hackpwn.net
CTO @TrustedSec.com | Former Optiv/SecureWorks/Accuvant Labs/Redspin | Race cars
@iagox86.bsky.social
Principal Security Researcher at GreyNoise. https://skullsecurity.org Mostly post about work stuff, maybe some improv stuff and maybe even magic some day. Seattle-based (originally Canadian), queer, cybersecurity nerd. (He/him)
@n0x08.bsky.social
Network Security | Hacker | WIRED25 2020 | CTI-League Founder | Security Researcher
@malwarejake.bsky.social
Breaker of software, responder of incidents, IANS Faculty, VP R&D Hunter Strategy, Supreme Allied Commander of ANTIFA.
@wdormann.bsky.social
I play with vulnerabilities and exploits. While this site initially showed promise, I've grown tired with its lack of improvement. You'll find me @[email protected] on Mastodon.