Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social) Profile
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)

@ashl3y_shen

Followers
4K
Following
2K
Media
53
Statuses
754

Security researcher @TalosSecurity / Ex-Google TAG / Black Hat USA & HITCON Review Board / Organizer of @rhacklette41. My tweets are my own opinion.

Zurich, Switzerland
Joined March 2012
Don't wanna be here? Send us removal request.
@ashl3y_shen
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)
11 months
🚨 We discovered that some versions of WeChat were vulnerable to CVE-2023-3420 due to the outdated V8 engine in Xweb. We reported this to the vendor in April. WeChat users should update to the latest version to stay secure. More details in #vulnerability.
Tweet card summary image
blog.talosintelligence.com
While this issue was disclosed and patched in the V8 engine in June 2023, the WeChat Webview component was not updated, and still remained vulnerable when Talos reported it to the vendor.
0
25
48
@ashl3y_shen
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)
3 days
RT @natashenka: While most vendors ship timely patches for vulnerabilities reported by Project Zero, they don’t always reach users. Today,….
0
40
0
@ashl3y_shen
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)
3 days
Session information:
0
0
2
@ashl3y_shen
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)
3 days
Can’t believe it’s only a week away! Join us on Aug 6th at “Hacking the Status Quo” @BlackHatEvents USA with @chompie1337, @natashenka & @InfosecVandana. Truly honored to share the stage with such inspiring voices!.
@chompie1337
chompie
3 days
I’m honored to be joining some amazing women in cybersecurity at the #BHUSA panel “Hacking the Status Quo”. We’ll be sharing the journey of our careers: how we got started and what’s shaped us. Bring your questions and leave with fresh perspective 😊
1
2
18
@ashl3y_shen
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)
14 days
I shared my journey of how I started in cybersecurity in a @DarkReading interview highlighting women who have navigated and shaped the cybersecurity industry. Excited to dig deeper and meet you all at #BHUSA soon!.
@DarkReading
Dark Reading
16 days
Women Who 'Hacked the Status Quo' Aim to Inspire Cybersecurity Careers: by Elizabeth Montalbano.
0
0
5
@ashl3y_shen
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)
17 days
Excited to see another threat intel focused conference taking place in Europe, and it’s organized by threat analyst in the field! The CFP is opened until Sept 1st. Looking forward to see your amazing research!.#What_is_SOS #StateOfStatecraft.
@what_is_sos
State of Statecraft Conference
25 days
State of Statecraft (SOS) is a new security and intelligence conference purposed to bring together observers of espionage, sabotage, influence, and other unique forms of covert statecraft to share their work with a community hyper-focused on tackling state-sponsored ops.
Tweet media one
1
2
5
@ashl3y_shen
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)
22 days
Had a great time on the @malspace podcast with Julien talking about my PIVOTcon presentation from tracking compartmentalized attacks to thoughts on attribution. Fun convo (and I loved the theme song at the end!). 🎶 Thanks for having me!.
@malspace
Malspace
22 days
After 365 calendar duels…⏳.@ashl3y_shen on compartmentalized attacks, IAGs, attribution & Swiss cheese 🧀.🎧 #CyberSecurity #ThreatIntel #ThreatResearch.
0
5
10
@ashl3y_shen
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)
1 month
🧀 We are having a new Rhacklette event on July 11th! I’ll be giving a presentation on the world of spyware! The event is open to FINTA folks including non-members. #Rhacklette #womenincyber.
@rhacklette41
rhacklette
1 month
🌞 Save the Date: July 11th Rhacklette Summer Talk & Picnic! We're thrilled to invite you to our next Rhacklette event featuring @ashl3y_shen, who will take us "Into the World of Spyware". After the talk, we’ll head to the lake for a casual picnic! (1/2).
0
1
7
@ashl3y_shen
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)
2 months
I'm excited to return to Black Hat USA this year and have the opportunity to give away one briefings pass to the conference. If you're a student or someone who could use a little support to attend, I'd love to hear from you. DM me if you're interested! .#BHUSA
Tweet media one
4
6
73
@ashl3y_shen
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)
2 months
RT @silascutler: Really excited to see this research go live. We found 400 web based HMIs for US Water facilities open on Censys. With the….
0
66
0
@ashl3y_shen
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)
2 months
Looking forward to my week at @Botconf ! Please come say hi if you are around! #Botconf2025
Tweet media one
1
0
11
@ashl3y_shen
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)
3 months
RT @chompie1337: Me and the homies are dropping browser exploits on the red team engagement 😎. Find out how to bypass WDAC + execute native….
Tweet card summary image
ibm.com
Previously discovering a method for bypassing even the strictest WDAC policies by backdooring trusted Electron applications, the IBM X-Force Red team continued their research and can now bypass the...
0
238
0
@ashl3y_shen
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)
3 months
Huge thanks to @vtxproject for updating Synapse to support the new "relationship" context. We’re excited to see this research foster collaboration and push real change across the threat intelligence community.
Tweet media one
0
0
5
@ashl3y_shen
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)
3 months
In blog 2, we dive into the challenges of investigating compartmentalized campaigns. We share our approach to identifying them and propose an extended Diamond Model with a new "relationship" layer to close the analytical gaps.
Tweet card summary image
blog.talosintelligence.com
How do you profile actors and defend your systems when multiple threat actors are working together? In Part 2, Cisco Talos proposes an extended Diamond Model to analyze complex relationships between...
1
0
7
@ashl3y_shen
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)
3 months
📡New blogs out: Compartmentalized attacks are no longer limited to financially motivated actors, state-sponsored groups are adopting them too. We propose a new taxonomy for initial access groups to reflect broader motivations and affiliations.
Tweet card summary image
blog.talosintelligence.com
Threat actors are teaming up, splitting attacks into stages and making defense harder than ever. In Part 1, Cisco Talos examines their tactics and defines their motivations.
1
20
46
@ashl3y_shen
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)
3 months
Had an amazing time speaking at @pivot_con last week! Grateful for the chance to share insights and connect with the brilliant minds. PIVOTcon remains my favorite threat intel event in Europe. Huge thanks to the organizers for creating this community and the memorable experience.
Tweet media one
Tweet media two
0
5
39
@ashl3y_shen
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)
3 months
A lot of you have been asking, YES!.@HacksInTaiwan 2025 CFP is open! The conference will be host on August 15 - August 16. Submit your talk before June 8th. Looking forward to your submissions! #HITCON #HITCON2025 CFP:
@HacksInTaiwan
HITCON
3 months
HITCON 2025 - Call for Paper. 今年主題:Perimeter Security is Dead, Long Live Resilience. 隨著攻擊手法日益複雜,傳統邊界防禦機制已難全面阻擋威脅。如何讓系統適應新型攻擊、維持穩定運行,並在受攻擊後快速恢復,正是「Cyber Resilience 網路韌性」的核心精神。從
Tweet media one
0
4
5
@ashl3y_shen
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)
3 months
RT @_clem1: @0xAlexei Story behind CVE-2024-44308 and CVE-2024-44309 added in
Tweet card summary image
cloud.google.com
This Google Threat Intelligence Group report presents an analysis of detected 2024 zero-day exploits.
0
37
0
@ashl3y_shen
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)
3 months
RT @hasherezade: New #PEbear : 0.7.1: - is out! Updated with some important fixes.
Tweet media one
0
73
0
@ashl3y_shen
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)
3 months
I’ve seen companies set up detection pipelines that submit files to public sandboxing services 🤦‍♀️ It made me wonder, could attackers manipulate detections to trigger the pipeline? That might be an overlooked path to launch a supply chain-style attack causing sensitive data leaks.
@anyrun_app
ANY.RUN
3 months
🚨 Important: False positive from MS Defender XDR has led to 1,700+ sensitive docs being shared publicly via #ANYRUN alone. A couple of hours ago we saw a sudden inflow of Adobe Acrobat Cloud links being uploaded to ANYRUN's sandbox. After research, we've discovered that
Tweet media one
0
0
5
@ashl3y_shen
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)
3 months
We just published our investigation into a Cactus ransomware campaign, uncovering TOYMAKER, an IAB group using a custom backdoor LAGTOY. It’s still challenging to identify compartmentalized attacks. We’ll share our approach and solutions at @pivot_con in 2 weeks! #toymaker.
@TalosSecurity
Cisco Talos Intelligence Group
3 months
Talos uncovered a major compromise in a critical infrastructure enterprise by an IAB, ToyMaker, and a double extortion gang, Cactus. Learn how ToyMaker infiltrates vulnerable systems:
Tweet media one
1
8
24