FR3D
/* Security & Malware Research | Developer for http://MalBeacon.com | Poking holes in everything & writing about it | Read here: http://fr3d.hk/blog */
@brkalbyrk.bsky.social
Threat Research Team Lead @malwation | TI | OSINT | DFIR | TA2AQX 📡
@malwarejake.bsky.social
Breaker of software, responder of incidents, IANS Faculty, VP R&D Hunter Strategy, Supreme Allied Commander of ANTIFA.
@maldr0id.bsky.social
Military-grade reverse engineer @ Google, working on Android malware Got mistaken for a member of Project Zero once. Everything here is my own opinion he/him ✨🌈🦄
@deviantollam.bsky.social
Philadelphian in Cascadia. Vociferous champion for Oxford commas, two spaces after a period, and ellipses. I break into buildings. 🔓 "Even if the world were ending tomorrow, I would still plant a tree." 🌲 (he/they)
@lorenzofb.bsky.social
Real-time historian of the late cyber capitalist era @TechCrunch. Tweets about infosec, surveillance by day. 🍕, ⚽️, 🎸, 🎮 by night. ☎️ Signal: +1 917 257 1382 Past lives: VICE Motherboard, Mashable, WIRED.
@silascutler.bsky.social
You may know me from your server logs. Malware, Hacks, Internet Scanning, CTI w00w00, Censys, IST
@jroosen.bsky.social
SpyCloud - Director of Security Research, Cryptolaemus Coordinator, Emotet(Ivan)/QBot(Boris) Destroyer, gold prospector & former sysadmin.
@captaingee.ch
cybercrime connoisseur && exploitz engineering enthusiast | synapse fanboy | second breakfast enthusiast
@dms1899.bsky.social
work time: defender fun time: malware hoarder/puzzle solver/capacity tester member of: @cryptolaemus.bsky.social fan of: @hatching_io @sublime_sec
@bushidotoken.net
🇬🇧 | Senior Threat Intelligence Advisor at Team Cymru | Co-author SANS FOR589 | Co-founder Curated Intel
@cryptolaemus.bsky.social
Mealybugs have not been found lately :( I am hungry again for a new bug or perhaps, duck, lots of qakbots around.
@gi7w0rm.bsky.social
Just me, worming through the interwebs. Threat Intelligence and #URINT Analyst Other places: linktr.ee/gi7w0rm Support me: https://ko-fi.com/gi7w0rm
@bellingcat.com
Bellingcat is an independent investigative collective of researchers, investigators and citizen journalists brought together by a passion for open source research. Want to support our charity? bellingcat.com/donate
@hexacorn.bsky.social
Red Brain, Blue Fingers Malware Analysis, Reverse Engineering, Threat Hunting, Detection Engineering, DFIR, Security Research, Programming, Curiosities, Software Archaeology, Puzzles, Bad dad jokes https://www.hexacorn.com/blog/ hexacorn@infosec.exchange
@nullcookies.bsky.social
Fisher of phishers. Cybersecurity pro. Noise human. https://baddomain.bandcamp.com
@maxkersten.nl
Malware analyst and reverse engineer, author of the Binary Analysis Course. DMs are always open. Opinions are my own and not the views of my employer.
@agreenberg.bsky.social
Writer for WIRED. Author of SANDWORM. New book, TRACERS IN THE DARK: The Global Hunt for the Crime Lords of Cryptocurrency, out now. agreenberg@wired.com. Andy.01 on Signal.
@endingwithali.com
software engineer @ fintech- content creator @ http://links.ali.dev - threatwire host @hak5 - @breakingthepod - nyc - ex @miteecs - jewish
@hackinglz.hackpwn.net
CTO @TrustedSec.com | Former Optiv/SecureWorks/Accuvant Labs/Redspin | Race cars
@nixonnixoff.bsky.social
Chief Research Officer @ Unit 221B most reliable way to reach me is my company's outreach form on the website my other urls: https://infosec.exchange/@nixonnixoff https://www.linkedin.com/in/allison-nixon-81822124/ don't bother contacting me on twitter
@justicerage.bsky.social
Security Researcher @Meta. Writer. Would-be musician. Maintainer of Manalyze and Gepetto. Trolling on a purely personal capacity.
@1zrr4h.bsky.social
🏴☠️ OFFENSIVE-INTEL 🏴☠️ Cyber Threat Intelligence by Hackers | Security Researcher en CronUp.com | CuratedIntel Member | 🥷🧠🇨🇱
@teamcymrus2.bsky.social
Follow us for the latest blogs and IOCs from Team Cymru's S2 Threat Research team.
@viql.bsky.social
Reverse engineer / malware analyst. On the hunt for domain generation algorithms.
@struppigel.bsky.social
@malwareunicorn.bsky.social
Fuzzy unicorn @ Microsoft’s MORSE team. malwareunicorn.org
@pmelson.bsky.social
@herrcore.bsky.social
@malware-traffic-analysis.net
Sharing information on malicious network traffic and malware samples at https://www.malware-traffic-analysis.net/
@malwareindepth.com
Malware Researcher | Developer | @Cryptolaemus1 | @NVIDIA Will happily talk about malware with anyone.
@bsky.app
official Bluesky account (check username👆) Bugs, feature requests, feedback: support@bsky.app