ambuj0 Profile Banner
Ambuj Kumar Profile
Ambuj Kumar

@ambuj0

Followers
572
Following
928
Media
68
Statuses
1K

Built NVIDIA's GPUs. Founder/ex-CEO Fortanix. Created Confidential Computing. $150m+ raised. Founder/CEO of Simbian - solving security with AI.

California, USA
Joined July 2009
Don't wanna be here? Send us removal request.
@IITKanpur
IIT Kanpur
10 days
Celebrating Excellence | IIT Kanpur confers the Distinguished Alumni Award 2025 upon Shri Ambuj Kumar (BT/EE/2002). From the corridors of IIT Kanpur to leading groundbreaking innovations in cybersecurity and AI-driven cyber defence, Shri Ambuj Kumar has redefined data protection
0
3
13
@ambuj0
Ambuj Kumar
17 days
I am incredibly humbled and honored to receive the Distinguished Alumnus Award from IIT Kanpur. I spent my formative years of adulthood at IIT and it provided me lot more than the education. Lifelong friends and cherished memories that would be endless source of happiness and
@IITKanpur
IIT Kanpur
21 days
Celebrating Excellence | 66th Foundation Day As we mark the 66th Foundation Day of IIT Kanpur, we take pride in honoring our Distinguished Alumni Award (DAA) winners, whose exceptional achievements across diverse fields continue to inspire generations. Their journeys embody the
0
0
0
@ambuj0
Ambuj Kumar
19 days
$300 trillion of PayPal stable coins were erroneously minted. So turns out many stable coins are no safer than debt or note issued by the companies. It's time to bring cryptography into cryptocurrency. Make stable coin minting algorithmically bound by USD deposits.
1
0
0
@simbianai
Simbian
1 month
Big news for threat hunters! Simbian is now part of the Microsoft Sentinel ecosystem, bringing our AI-powered Threat Hunt Agent to the Sentinel data lake. 💡You can now use AI Threat Hunt Agent to: • Validate threat hunt hypotheses in natural language. • Automate deep
0
2
2
@ambuj0
Ambuj Kumar
1 month
A big day for the security industry - @simbianai announces AI Threat Hunt Agent in partnership with @Microsoft. This is the world's first product that uses LLMs to reason over contextual data and run all kinds of queries over newly announced Sentinel Data Lake to hunt for
1
0
0
@simbianai
Simbian
1 month
🚀 𝐁𝐢𝐠 𝐧𝐞𝐰𝐬 𝐟𝐫𝐨𝐦 @simbianai + @Microsoft! Today, we’re thrilled to announce that Simbian’s AI Threat Hunt Agent now leverages Microsoft Sentinel Data Lake (GA today!) — empowering Microsoft 365 E5 customers to hunt threats faster, broader, and deeper. By automating
0
2
5
@ambuj0
Ambuj Kumar
2 months
How often do you see an early startup mentioned in joint press release by industry stalwarts like @Wipro and @CrowdStrike! Proud of our work as Wipro launches its MDR powered by CrowdStrike and @simbianai
1
0
2
@ambuj0
Ambuj Kumar
2 months
Excited to share that @Wipro has chosen @simbianai power its MSSP with AI Agents. Wipro's customers all over the world can now use our technology for autonomous triage, investigation, and containment of their SOC alerts. Wipro is an undisputed leader in security protecting
1
0
0
@simbianai
Simbian
2 months
Malware was introduced in 18 popular npm packages by compromising the maintainer’s account via a phishing campaign. Malware (obfuscated code), which is not part of a legitimate package, would intercept crypto transactions to route them to attackers’ crypto addresses. ⁣ ⁣ 𝐇𝐨𝐰
0
1
1
@ambuj0
Ambuj Kumar
2 months
Cybersecurity needs to move from rituals to science.
0
0
4
@ambuj0
Ambuj Kumar
2 months
Everyone is excited about AI building better B2B products. What they're missing is the massive disruption that AI will cause by giving buyers the knowledge to choose wisely. Today's B2B market is full of garbage companies that exist only because something they did 50 years ago.
1
1
8
@ambuj0
Ambuj Kumar
2 months
Follow me to keep informed of happenings in AI for security
0
0
0
@ambuj0
Ambuj Kumar
2 months
Attackers are moving at AI speed Thankfully Claude disabled attacker's access to Claude, which I estimate, would have caused all of 13 seconds of delay before they would have created another account. Attackers are moving at AI speed. Defense needs to move too. Good thing is
1
0
0
@ambuj0
Ambuj Kumar
2 months
Step 5 -- Ransom Now was the time to send a ransom note. And, you can only imagine the glee on the attacker's face when they would have promoted Claude to write a nice ransom note! They asked for $500k in BTC. You can only imagine the rest of the story.
1
0
0
@ambuj0
Ambuj Kumar
2 months
Step 4 -- Steal the data At this point, attackers typically encrypt all your sensitive data and ask for ransom. But, Claude had a better idea. How about we move the data out and threat to leak unless they paid the ransom? This is brilliant because not only orgs were left
1
0
0
@ambuj0
Ambuj Kumar
2 months
Step 3 -- install a foothold with a malware Following the successful intrusion, attackers need to persist so they can carry out their deeds without getting detected. Claude was mind-blowingly powerful here. It created malware that could evade sophisticated security tools * Used
1
0
0
@ambuj0
Ambuj Kumar
2 months
Step 2 -- Breach the castle aka Intrude Once the target is identified, the next step is to get inside. Among the thousands of different techniques, which one should be applied first? And, how to navigate the attack based on the results? Claude was the co-pilot here, selecting
1
0
0