Invoke RE
Malware analysis can be hard, but learning it shouldn’t be.
https://training.invokere.com
@jhuntinfosec.com
👨💻 coder + hacker + engineer. 🏹 Hunting Adversaries. 🦅 #Philly sports 🎮 Video games. Views/Opinions are my own. Freedom for all. 🇺🇸🏳️🌈🏳️⚧️🇺🇦 Posts/Skeets disappear. Re-post ≠ endorsement.
@herrcore.bsky.social
@campuscodi.risky.biz
☆ Cybersecurity reporter ★ Newsletters at Risky Business #infosec #cybersecurity https://risky.biz
@curatedintel.bsky.social
Bringing together intelligence researchers and incident responders. #TrackThePlanet 🌍 curatedintel.org
@bushidotoken.net
🇬🇧 | Senior Threat Intelligence Advisor at Team Cymru | Co-author SANS FOR589 | Co-founder Curated Intel
@steph3nsims.bsky.social
Security Researcher, Musician, SANS Fellow and Offensive Ops Curriculum Lead, Off By One Security, Gray Hat Hacking Author. Berkeley, California
@silascutler.bsky.social
You may know me from your server logs. Malware, Hacks, Internet Scanning, CTI w00w00, Censys, IST
@lennyzeltser.com
Advances cybersecurity. Grows tech businesses. Fights malware. CISO at Axonius. Faculty Fellow at SANS Institute. Creator of REMnux. https://zeltser.com
@vxundergroundre.bsky.social
The largest collection of malware source code, samples, and papers on the internet. Password: infected (unofficial, this is a bot! Maintained by @yjb.bsky.social, the bot can't handle retweets, video, and maybe a few other things)
@bbaskin.bsky.social
Just someone that dabbles in threat research, malware analysis, RE, incident response, CTFs, and old school forensics. Apologetic ginger.
@bsky.app
official Bluesky account (check username👆) Bugs, feature requests, feedback: support@bsky.app