Zach
Everything DFIR - ๐ฆ๐บ
@TheDFIRReport | @CuratedIntel
https://infosec.exchange/@svch0st
https://twitter.com/svch0st
@craiu.bsky.social
Romanian antihacker from another planet. #threatintel #yara #chess #taekwondo black belt Motto: "One reboot a day keeps the implant away"
@validhorizon.bsky.social
Thought Trailer, Cyber Threat Intel, DFIR. He/Him. Bucketing, sharing, and bacon-saving as a service. https://validhorizon.medium.com/
@mparsons.bsky.social
Threat Analyst @ Microsoft - mostly post about astrophotography and occasional some work. Posts are my own
@pivotcon.bsky.social
Threat Research Conference in Malaga, Spain, 7-9 May 2025 #StayTuned #ComingSoon #PIVOTcon #PIVOTcon25 https://pivotcon.org
@cedricpernet.bsky.social
Senior Threat Researcher @ Proofpoint. Cybercrime / Cyberespionage aficionado. Has worked in several CSIRTs/CERTs. Metal & Rock dude, never enough guitars. Motorcycles fan. Wrote a book in French language on cyberespionage. Ex-Law Enforcement Officer
@lorenzofb.bsky.social
Real-time historian of the late cyber capitalist era @TechCrunch. Tweets about infosec, surveillance by day. ๐, โฝ๏ธ, ๐ธ, ๐ฎ by night. โ๏ธ Signal: +1 917 257 1382 Past lives: VICE Motherboard, Mashable, WIRED.
@kevincollier.bsky.social
I cover digital threats for NBC News. Tip me! @kevincollier.01 on signal, [email protected]. NYC, from West Virginia.
@sanjuanswan.bsky.social
mountains, books, bikes, intelligence history. Formerly, threat intel @ GitHub.
@martijngrooten.bsky.social
Threat Intelligence for Silent Push. Security for at-risk people. Researcher, reader, runner. Eternal traveler, serial migrant, lapsed mathematician. Signal: martijngrooten.37
@natebeachw.bsky.social
Cyber threat analyst focused on state-aligned adversaries. Opinions are my own, not my employer's. #threatintel #infosec #osint
@philofishal.bsky.social
macOS security researcher espousing no one's opinions but my own. Dogged follower of #lufc, at least until the world stops going round (IYKYK). philastokes.com
@alex.leetnoob.com
Iโm just a girl who lives in Vegas & likes cloud malware, idk anymore.
@matthewkennedy.bsky.social
Manager at Microsoft Threat Intelligence Center (MSTIC). Adjunct Faculty at Georgetown University. Penn State Alum. Tweets are my own.
@cyberalliance.bsky.social
CTA is a group of cybersecurity practitioners who work together to improve the overall security of the global digital ecosystem. We are stronger together. www.cyberthreatalliance.org
@lanstein.bsky.social
threaty threats -- helping build research workflows into a soc product, but I don't speak for them on this acct. pretty good at bash scripts and strings. disclosures on my linkedin below https://www.linkedin.com/in/alexlanstein/
@w0la9d7.bsky.social
Automation | Threat Intelligence | OSINT | Threat Analysis | Ransomware | Network Security |
@intel471.bsky.social
Intel 471 specializes in delivering intelligence related to threat actors, threat hunting, financial cybercrime, ransomware, vulnerabilities, malware and underground marketplaces. Listen to our podcast, Cybercrime Exposed, on Spotify and Apple. #infose
@aejleslie.bsky.social
Cybercrime & Hacktivism @ Recorded Future | Insikt Group | Curated Intelligence | @aejleslie everywhere else.
@ransomfeed.rfeed.it
Ransomfeed empowers businesses and individuals with datadriven insights on #ransomware threats | #ransomfeed | 100% made in ๐ฎ๐น ๐ ransomfeed.it ๐ค t.me/RansomFeedNews ๐ผ linkedin.com/company/ransomfeed
@ransomlook.bsky.social
Yet an other Ransomware gang tracker - Opensource project: https://github.com/RansomLook/RansomLook - Website: https://www.ransomlook.io
@ransomware.live
Ransomware.live tracks & monitors ransomware groups' victims and their activity. It was created by @JMousqueton.bsky.social, a security researcher. The website provides information on Ransomware groups, victims, negotiations, payment demands and much more.
@woany.bsky.social
Principal Security Researcher @ Microsoft (MSTIC). Software development, detections, security and DFIR. https://github.com/woanware Thought/opinions are mine, not those of my employer.
@dfirdiva.bsky.social
DFIR Analyst Blog: https://dfirdiva.com/ Free & Affordable Training (DFIR, OSINT, Cybersecurity): https://training.dfirdiva.com/ Community Events: https://events.dfirdiva.com/ Curated List of Discounts: https://training.dfirdiva.com/current-discounts
@mrgl1tch.satan.social
@malwrhunterteam.bsky.social
https://x.com/malwrhunterteam | https://id-ransomware.malwarehunterteam.com/
@maddiestone.bsky.social
Security Researcher at Google Project Zero. 0-days all day. Love all things reverse engineering. she/her
@davidjbianco.bsky.social
Threat Hunting, CTI, incident detection & response. SANS instructor. Special interest in helping newbies get started. Also happy to talk about other geeky topics. He/Him.
@struppigel.bsky.social
@malwareunicorn.bsky.social
Fuzzy unicorn @ Microsoftโs MORSE team. Ex-Meta RedTeam, Ex-Endgame, Ex Fireeye. malwareunicorn.org
@viql.bsky.social
Reverse engineer / malware analyst. On the hunt for domain generation algorithms.
@fuzzysec.bsky.social
ๆๅฟ / Antiquarian @ IBM Adversary Services / Ex-TORE โ๏ธ๐ฆ / I rewrite pointers and read memory / AI Psychoanalyst / Teaching at labs.calypso.pub
@hash-miser.bsky.social
Internet janitor, #CERT #BlueTeam and Whisk(e)y enthusiast "Everything you do is useless ! Enjoy ๐ป" [email protected]
@justicerage.bsky.social
Security Researcher @Meta. Writer. Would-be musician. Maintainer of Manalyze and Gepetto. Trolling on a purely personal capacity.
@intel.bsky.social
Georgia Tech Professor. Cyber threat intelligence and cybersecurity professional - former NSA, Microsoft, and Dragos. President of the Threat Intelligence Academy. #FSD ๐ฆ Formerly @cnoanalysis on Twitter
@dcuthbert.bsky.social
Ageing hacker. Black Hat Review board. Now sitting on numerous government cyber security boards so I guess that means Iโve grown up right?
@sector035.bsky.social
Doing #OSINT before it was cool ๐ Just arrived, slowly settling on here.
@arsenalrecon.bsky.social
Developers of digital forensics weapons which include Arsenal Image Mounter, Hibernation Recon, LevelDB Recon, HBIN Recon, & Registry Recon. Arm Yourself! #DFIR