Mark Manning
@antitree
Followers
3K
Following
39K
Media
158
Statuses
3K
Process isolationist, k8s hacker, แดo-prem pusher, syscall denier, container liberator ๐ธChainguard - Product Security ๐ธRochester 2600 ๐ธFormer: Snowflake, NCC
Rochester,NY
Joined May 2008
I'm releasing my latest project today: https://t.co/h7fZ26HBiT Ever wonder if your custom seccomp profile is secure? Or is it actually less secure than RuntimeDefault? https://t.co/KZFn4IVeOd
2
10
25
What GreyNoise Learned from Deploying MCP Honeypots
greynoise.io
GreyNoise deployed MCP honeypots to see what happens when AI middleware meets the open internet โ revealing how attackers interact with this new layer of AI infrastructure.
0
16
48
I don't really like these things. Not to take away from Vercel, they're an amazing company. But there's just no formula to making a billion dollar business. If you really want a formula, the only one I've seen that temporarily works is to lie cheat and steal. Beyond that it's a
7
2
28
3 new RUNC CVE's. Path today all my friends building RCEaaS in containers/k8s: https://t.co/wFsMiBgIim
1
1
2
See you Saturday morning at 9am if you're into container security -- I've got some new tricks.
The countdown Queen City Con 0x3 is on, mere days to go until the best #cybersecurity conference in the Midwest! Check out these awesome speakers and topics. There's still time to get tickets and join us Friday! https://t.co/AI0Jp9igWS We can't wait to see you Friday!
0
2
1
Does anyone have advice for tweaking a CFP for the BSidesSF reviewers? What kinds of details do they like to see? I have a deeper topic that I'm afraid it will be easy to skim through and ignore.
0
0
1
๐งโ๐ปAt work: "Please modify this function to validate the input and return an XML type" ๐On the weekends: "Yo! Here's my SSH key, log in and setup a k8s server and don't stop until you get logs. I'll be back in 30 minutes"
1
0
0
๐ ๐๐ ๐๐๐ญ๐๐ ๐๐จ๐๐๐๐ซ: new proof-of-concept tooling for red teams that uses AI to determine if it should run its payload. It first collects telemetry, applies a policy with an LLM, and then executes the malicious payload only when OPSEC rules are met.
1
1
9
I can confirm I very much enjoyed presenting at this con and meeting people through it. Oh and Iceland's not so bad either๐
We are happy to announce that the CFP for Bsides Reykjavik 2026 conference being held in March, is now open. Please submit your proposals before the deadline. You can apply by clicking the link below and following the instructions! https://t.co/8SwAGQXaM6
0
0
0
๐๐๐ ๐๐๐ ๐๐จ๐ง๐๐ฒ๐ฉ๐จ๐ญ ๐๐๐ฎ๐ ๐ก๐ญ ๐ ๐ซ๐๐๐ฅ ๐ญ๐ก๐ซ๐๐๐ญ ๐๐๐ญ๐จ๐ซ How an AI-powered honeypot can trick a threat actor into revealing their tactics and infrastructure. (+ tool GitHub link so you can try it)
2
3
21
๐ฅ Missed the action at @cloudvillage_dc during @defcon ? Weโve got you covered! All Day 1 talks are now live on our YouTube channel ๐บ Catch up on the insights, hacks, and cloud security deep dives you mightโve missed! ๐ Watch now: https://t.co/BdfgwntM8x
#defcon33 #defcon
youtube.com
Cloud village is an open space to meet folks interested in offensive and defensive aspects of cloud security. The village is home to various activities like ...
1
6
8
$30K for a Prompt that breaks AI? ๐ Google just launched its new AI Vulnerability Reward Program - where for the first time, prompt injection is treated like a real security exploit. Fair reward or a bargain for a billion-dollar risk? ๐ฎ Theyโre paying up to $30,000 for
3
15
149
Good to see folks at the @rocsecsummit for the short time I was there today. There's a good amount of work that goes into the TOOOL booth so thanks for those that donated money or time or interest.
0
0
3
Finally I was able to finish my script for Dark Web deanonimization!!! I let you the repo here for everyone to try it: https://t.co/tIgRKNmw5Q Thank you @zoomeye_team for your help! Those guys are amazing, and let me try a lot of different things with their services. And
github.com
Contribute to bash-bunny/dw_deanon development by creating an account on GitHub.
0
22
53
One of my favorite moleskine swags that I ever snagged is finally getting put into rotation. Capsule8 is now part of $BIGCOMPANY but at the time it was doing some cool, low level, defensive stuff using straight Linux kernel primitives before eBPF was even around.
0
0
7