Ambuj Kumar
            
            @ambuj0
Followers
                572
              Following
                928
              Media
                68
              Statuses
                1K
              Built NVIDIA's GPUs. Founder/ex-CEO Fortanix. Created Confidential Computing. $150m+ raised. Founder/CEO of Simbian - solving security with AI.
              
              California, USA
            
            
              
              Joined July 2009
            
            
           Celebrating Excellence | IIT Kanpur confers the Distinguished Alumni Award 2025 upon Shri Ambuj Kumar (BT/EE/2002). From the corridors of IIT Kanpur to leading groundbreaking innovations in cybersecurity and AI-driven cyber defence, Shri Ambuj Kumar has redefined data protection 
          
                
                0
              
              
                
                3
              
              
                
                13
              
             I am incredibly humbled and honored to receive the Distinguished Alumnus Award from IIT Kanpur. I spent my formative years of adulthood at IIT and it provided me lot more than the education. Lifelong friends and cherished memories that would be endless source of happiness and 
           Celebrating Excellence | 66th Foundation Day As we mark the 66th Foundation Day of IIT Kanpur, we take pride in honoring our Distinguished Alumni Award (DAA) winners, whose exceptional achievements across diverse fields continue to inspire generations. Their journeys embody the 
            
                
                0
              
              
                
                0
              
              
                
                0
              
             $300 trillion of PayPal stable coins were erroneously minted. So turns out many stable coins are no safer than debt or note issued by the companies. It's time to bring cryptography into cryptocurrency. Make stable coin minting algorithmically bound by USD deposits. 
          
                
                1
              
              
                
                0
              
              
                
                0
              
             Big news for threat hunters! Simbian is now part of the Microsoft Sentinel ecosystem, bringing our AI-powered Threat Hunt Agent to the Sentinel data lake. 💡You can now use AI Threat Hunt Agent to: • Validate threat hunt hypotheses in natural language. • Automate deep 
          
                
                0
              
              
                
                2
              
              
                
                2
              
             A big day for the security industry - @simbianai announces AI Threat Hunt Agent in partnership with @Microsoft. This is the world's first product that uses LLMs to reason over contextual data and run all kinds of queries over newly announced Sentinel Data Lake to hunt for 
          
                
                1
              
              
                
                0
              
              
                
                0
              
             🚀 𝐁𝐢𝐠 𝐧𝐞𝐰𝐬 𝐟𝐫𝐨𝐦 @simbianai + @Microsoft! Today, we’re thrilled to announce that Simbian’s AI Threat Hunt Agent now leverages Microsoft Sentinel Data Lake (GA today!) — empowering Microsoft 365 E5 customers to hunt threats faster, broader, and deeper. By automating 
          
                
                0
              
              
                
                2
              
              
                
                5
              
             How often do you see an early startup mentioned in joint press release by industry stalwarts like @Wipro and @CrowdStrike! Proud of our work as Wipro launches its MDR powered by CrowdStrike and @simbianai
          
          
                
                1
              
              
                
                0
              
              
                
                2
              
             Excited to share that @Wipro has chosen @simbianai power its MSSP with AI Agents. Wipro's customers all over the world can now use our technology for autonomous triage, investigation, and containment of their SOC alerts. Wipro is an undisputed leader in security protecting 
          
                
                1
              
              
                
                0
              
              
                
                0
              
             Malware was introduced in 18 popular npm packages by compromising the maintainer’s account via a phishing campaign. Malware (obfuscated code), which is not part of a legitimate package, would intercept crypto transactions to route them to attackers’ crypto addresses.   𝐇𝐨𝐰 
          
                
                0
              
              
                
                1
              
              
                
                1
              
             Everyone is excited about AI building better B2B products. What they're missing is the massive disruption that AI will cause by giving buyers the knowledge to choose wisely. Today's B2B market is full of garbage companies that exist only because something they did 50 years ago. 
          
                
                1
              
              
                
                1
              
              
                
                8
              
             Attackers are moving at AI speed Thankfully Claude disabled attacker's access to Claude, which I estimate, would have caused all of 13 seconds of delay before they would have created another account. Attackers are moving at AI speed. Defense needs to move too. Good thing is 
          
                
                1
              
              
                
                0
              
              
                
                0
              
             Step 5 -- Ransom Now was the time to send a ransom note. And, you can only imagine the glee on the attacker's face when they would have promoted Claude to write a nice ransom note! They asked for $500k in BTC. You can only imagine the rest of the story. 
          
                
                1
              
              
                
                0
              
              
                
                0
              
             Step 4 -- Steal the data At this point, attackers typically encrypt all your sensitive data and ask for ransom. But, Claude had a better idea. How about we move the data out and threat to leak unless they paid the ransom? This is brilliant because not only orgs were left 
          
                
                1
              
              
                
                0
              
              
                
                0
              
             Step 3 -- install a foothold with a malware Following the successful intrusion, attackers need to persist so they can carry out their deeds without getting detected. Claude was mind-blowingly powerful here. It created malware that could evade sophisticated security tools * Used 
          
                
                1
              
              
                
                0
              
              
                
                0
              
             Step 2 -- Breach the castle aka Intrude Once the target is identified, the next step is to get inside. Among the thousands of different techniques, which one should be applied first? And, how to navigate the attack based on the results? Claude was the co-pilot here, selecting 
          
                
                1
              
              
                
                0
              
              
                
                0