Jeff Multz
@JeffMultz
Followers
88
Following
196
Media
671
Statuses
3K
Joined June 2015
We’re running another Sliver workshop, this time focused on automation and staging. On July 9, Timothy Makram Ghatas will walk through how to work smarter with Sliver: from CLI tricks to pivot strategies to the SliverPy project. https://t.co/nkk9WQtEY3
0
0
0
Part 2 of our Red Team Tools roundup is out. This time we’re getting into cloud exploitation, identity abuse, and the kind of dev libraries that help you get creative when stealth matters. Read the rundown: https://t.co/3lIe9IHXvQ
0
0
0
This one’s worth a watch, especially if you’re working in cloud security or testing environments with GenAI baked in. Great breakdown from Jessica Stinson and @ScaleSec's Stephen Smiley. https://t.co/sfHd2mKmNf
0
0
0
Our Threat Enablement and Analysis team built a better way to cut through the noise. This is how we triage the firehose, turning chaos into action. By Senior Operator Nate Robb:
bishopfox.com
Prioritize high-impact CVEs fast. Learn how Bishop Fox filters noise to detect real threats and protect customer attack surfaces in real time.
0
0
0
Want a peek into what our red team really uses on engagements? This breakdown hits on some of the tools we rely on to get the job done stealthily. Some familiar names, some underrated gems: https://t.co/iL0MnUZhXr
https://t.co/vxV7qd9pQK
0
0
0
Tools don’t make the hacker, but they can make the job faster, stealthier, and way more effective. These are the C2s our Red Teamers reach for. Featuring open-source tools by @LittleJoeTables, Ronan Kervella, @its_a_feature_, and @Ne0nd0g. Take a look: https://t.co/sVlfLxpqgS
0
0
0
Wes Wright's talk at @BSides SATX "Offensive by Design" digs into how GenAI & Docker are shaking up red team ops. Definitely worth catching if you’re in San Antonio. Full details: https://t.co/Oxfw6E2F74
0
0
0
Tools don’t make the hacker, but they can make the job faster, stealthier, and way more effective. These are the C2s our Red Teamers reach for. Featuring open-source tools by @LittleJoeTables, Ronan Kervella, @its_a_feature_, and @Ne0nd0g. Take a look: https://t.co/j7YIhcIlTQ
0
0
1
Ever wish your tools just knew when to jump in? @sweepthatleg explains how our AI agents work like a red team group chat- each one waking up when it’s time to act. Tools ready. No wasted motion. via @CyberScoopNews Safe Mode Podcast: https://t.co/YuvtKp8Ohc
0
1
1
Rust just turned 10 🎉 Nick Cerne’s blog walks through how (and why) he builds malware in Rust. Really cool look at language features through a red team lens. https://t.co/506gH8gVYe
0
0
0
Ever wish your tools just knew when to jump in? @sweepthatleg explains how our AI agents work like a red team group chat- each one waking up when it’s time to act. Tools ready. No wasted motion. via @CyberScoopNews Safe Mode Podcast: https://t.co/fGngNjZOUC
0
0
0
New clip from @AletheDenis’s Epic Fails & Heist Tales! A relaxed guard. A casual “we’ll stay out of your hair.” And just like that… she was in. Full session: https://t.co/2ZwWuQTQpC
0
3
3
Prioritizing vulnerabilities is only getting harder. This new LEV model from NIST and CISA could help teams better predict what’s likely to be exploited—before it shows up on a KEV list. Smart move toward more data-driven patching. https://t.co/pVfb6kpIOq
securityweek.com
The Likely Exploited Vulnerabilities (LEV) equations can help augment KEV- and EPSS-based remediation prioritization.
0
0
0
New clip from @AletheDenis’s Epic Fails & Heist Tales! A relaxed guard. A casual “we’ll stay out of your hair.” And just like that… she was in. Full session: https://t.co/sA35vommKe
0
1
5
In our latest article, Red Team Practice Director @tetrisguy outlines the vulnerabilities Red Teams find most often (and how to fix them before attackers do.) https://t.co/7Tw9UMnCop
linkedin.com
Author: Trevin Edgeworth, Red Team Practice Director This article originally appeared on Bishop Fox's blog. Adversaries don’t rely on luck; they rely on patterns.
0
0
0
Rust just turned 10 🎉 Nick Cerne’s blog walks through how (and why) he builds malware in Rust. Really cool look at language features through a red team lens. https://t.co/HHOT3JbQ1K
0
0
0
.@brandonkovacs goes live today with Attacking & Defending Deepfakes: A Red Teamer’s Perspective. Deepfake evasion, mitigation tactics, and more! Join us live at 2 p.m. EDT / 7 p.m. BST: https://t.co/UFFkcCW48v
0
0
0
Just dropped: our “Sliver: Getting Started” workshop is now up on-demand! If you’ve been meaning to dive into Sliver (or just want to see what the hype’s about), this is a solid walkthrough from the ground up from Timothy Makram Ghatas. Worth a watch: https://t.co/ndggNh9kkt
0
0
0
Really excited for this one. @brandonkovacs is discussing how red teamers are attacking and defending against deepfakes. Super relevant with how fast AI threats are evolving. Should be a great session. Come hang out on May 21! https://t.co/VYeugD4bHu
0
0
0
Catch Senior Security Engineer @TomNomNom tomorrow at 9:30 a.m. PDT as he takes the virtual stage at NahamCon 2025 with a keynote: "Good Vibes Only: Should You Still Learn to Code?" It’s sharp, timely, and very much Tom. Don’t miss it. https://t.co/pocsiO0XZY
0
0
0