MalwareJake Profile Banner
Jake Williams Profile
Jake Williams

@MalwareJake

Followers
142K
Following
47K
Media
13K
Statuses
102K

Breaker of software | VP R&D @hunterstrategy | CTI/DFIR | @ians_security faculty | Bookings: jake at malwarejake dot com | GSE #150 | He/him

Odenton, MD
Joined September 2009
Don't wanna be here? Send us removal request.
@MalwareJake
Jake Williams
5 years
Let's not mince words: * If you don't support trans people, you're a bad human * If you have to add caveats to your support (e.g. "as long as my kids don't see"), you're one of the worst kinds of human * Trans deserve your *unconditional* support for their humanity
258
305
2K
@MalwareJake
Jake Williams
12 hours
That LinkedIn post is one of the all time dumbest marketing pitches I've ever seen for security services. Frist degree clownery.
@UK_Daniel_Card
mRr3b00t
2 days
It’s difficult not to be rude when people post nonsense like this…. But seriously our industry looks like a clown show when we let anyone and everyone: Lie Get awards Go on tv When they have little to no experience in the subject. When they are clearly not experts in the
Tweet media one
4
3
8
@MalwareJake
Jake Williams
12 hours
Anyone criticizing @HuntressLabs for publishing unique research into first-hand observation of threat actor TTPs is telling on themselves. They're either charlatans or have an axe to grind. Either way, block them and move on (follow @0xTib3rius while you're at it though).
@0xTib3rius
Tib3rius
1 day
For anyone following along, @HuntressLabs released a statement regarding their blog post that published data from the machine of a user who turned out to be a Threat Actor. Also worth pointing out that there was no PII released (to my knowledge) and many of the screenshots were
Tweet media one
16
16
144
@bexcran
Bex Cran
3 days
I love Hannah Fry’s video about this (tech bros used UV-C light at a party and sunburned their corneas). 😂 https://t.co/mcK5BTZN18
@MalwareJake
Jake Williams
2 years
Absolutely wild.
1
1
5
@theomegabit
Mike
4 days
Great talk at #BlueTeamCon 👌🏻
@MalwareJake
Jake Williams
4 days
The slides from my @BlueTeamCon keynote this morning are posted here. It's unfortunately not recorded, but if this is the sort of thing your org would benefit from privately, reach out and we'll talk. https://t.co/6DMkzVgpCe
1
2
6
@jaysonstreet
Jayson E. Street 💙 🤗💛
5 days
Here’s @MalwareJake rocking his keynote at @BlueTeamCon! 🤩 #HackerAdventures
Tweet media one
Tweet media two
0
4
29
@MalwareJake
Jake Williams
4 days
The slides from my @BlueTeamCon keynote this morning are posted here. It's unfortunately not recorded, but if this is the sort of thing your org would benefit from privately, reach out and we'll talk. https://t.co/6DMkzVgpCe
Tweet card summary image
github.com
Conference presentations. Contribute to malwarejake-public/conference-presentations development by creating an account on GitHub.
2
18
63
@brysonbort
Bryson 🦄
12 days
.@MalwareJake and I have thoughts...
Tweet media one
@dodo_sec
Dodo on Security 🇵🇸 🇺🇦
15 days
How did this AI slop get a talk at the main track @ DEFCON????????? https://t.co/uN5KrfiBg7
2
2
39
@brysonbort
Bryson 🦄
13 days
She's a 10, But she's a CONTI operator.
@IntCyberDigest
International Cyber Digest
13 days
Meet the women of Conti ransomware group. 💅
Tweet media one
Tweet media two
Tweet media three
Tweet media four
30
51
569
@MalwareJake
Jake Williams
20 days
After all the hype, I cannot believe how objectively bad GPT-5 is. In my experience, it is an objective step backwards in most tasks. It's pretty clear why OpenAI repeatedly delayed shipping it. Calling it now: OpenAI is toast.
22
9
95
@jeffmcjunkin
Jeff McJunkin
22 days
Far more important than any security awareness exercise is that employees continue trusting the company. If you erode any employee trust during a phishing exercise, you've done more damage than skipping the phishing exercise entirely.
@MalwareJake
Jake Williams
23 days
There is no evidence that phishing simulations make your organization more secure. The vendors providing these services at scale wouldn't shut up about this if their data supported it. You can easily conclude it doesn't...
3
4
18
@MalwareJake
Jake Williams
23 days
There is no evidence that phishing simulations make your organization more secure. The vendors providing these services at scale wouldn't shut up about this if their data supported it. You can easily conclude it doesn't...
85
40
654
@MalwareJake
Jake Williams
25 days
I am yet to ever talk to a client who uses Cisco ACI that would recommend it to a friend (many wouldn't recommend it to an enemy). It floors me that it's still a product at all when alternatives exist in the space. It is ANYTHING BUT simple...
Tweet media one
5
3
17
@vxunderground
vx-underground
25 days
Do you guys remember that Reddit post about installing network equipment in your home for $250/month? Some people argued it's legitimate. I said it's probably state-sponsored from North Korea. I was wrong. It was Belarus. DONT INSTALL RANDOM SHIT IN YOUR HOUSE
@infrawatch_app
Infrawatch
25 days
New research Tuesday: How is a Belarus company convincing US military personnel to install network devices in their homes? Our investigation into DSLRoot reveals Americans are unknowingly helping foreign actors build proxy infrastructure on US soil.
58
413
4K
@bettersafetynet
Mick Douglas 🇺🇦🌻
27 days
One of the reasons I think security is in for a protracted downturn is the decades of spending... And most orgs only have bridle defenses to show for it. Everything has a bypass, but few security pros believe it.
@MalwareJake
Jake Williams
27 days
It's always difficult to explain to victims why their EDR didn't stop ransomware from detonating. Most frustrating is when they're just sure "tamper protection" would stop a kernel mode EDR killer. https://t.co/1A2uZMrdP1
4
2
12
@dinodaizovi
Dino A. Dai Zovi
27 days
I cannot emphasize enough: "Stopping ransomware attacks, 'the kind that disable EDR before doing anything else, means having controls that work even when endpoint telemetry is gone,'" You need to design your controls assuming there is no EDR and *any* creds can be compromised.
@MalwareJake
Jake Williams
27 days
It's always difficult to explain to victims why their EDR didn't stop ransomware from detonating. Most frustrating is when they're just sure "tamper protection" would stop a kernel mode EDR killer. https://t.co/1A2uZMrdP1
0
4
8
@MalwareJake
Jake Williams
27 days
It's always difficult to explain to victims why their EDR didn't stop ransomware from detonating. Most frustrating is when they're just sure "tamper protection" would stop a kernel mode EDR killer. https://t.co/1A2uZMrdP1
Tweet card summary image
theregister.com
: Some custom malware, some legit software tools
9
40
191
@HunterStrategy
HunterStrategy 🇺🇦
29 days
🚨 ONLY 1 DAY TO GO! 🚨 The difference between panic and precision comes down to process - and in this webinar you’ll learn it from the best. Join @MalwareJake and Ibrahim Ahmed tomorrow for a LIVE webinar: Going from “Be Afraid” to “Actionable Hunt” Starts at 2:30PM ET
Tweet media one
0
1
2
@st0_ic
ᗷᖇᗩᗪY 🌮
1 month
WE WON!!! Best. DEFCON. Ever. Thank you to @lintile for pushing through. Thanks to the whole crew for making it all work. Thanks to @MalwareJake and Pandamonium and Only LANS for being awesome competitors tonight!
Tweet media one
4
9
115
@MalwareVillage
Malware Village
1 month
Check out our amazing keynote speakers at @MalwareVillage @DEFCON 33! 🎤 Day 1 Keynote: “Break Systems, Not Promises: I Promised to do a Keynote at DEF CON” by Lena Yu aka @LambdaMamba Day 2 Keynote: “I can’t RE (and You Can Too!)” by @J0hnnyXm4s
Tweet media one
Tweet media two
0
9
33