bk (Ben Koehl) Profile
bk (Ben Koehl)

@bkMSFT

Followers
3K
Following
2K
Media
27
Statuses
458

Partner Director of Threat Intelligence at @Microsoft Threat Intelligence Center (MSTIC).

Everywhere
Joined March 2018
Don't wanna be here? Send us removal request.
@bkMSFT
bk (Ben Koehl)
5 years
4
0
37
@what_is_sos
State of Statecraft Conference
6 months
State of Statecraft (SOS) is a new security and intelligence conference purposed to bring together observers of espionage, sabotage, influence, and other unique forms of covert statecraft to share their work with a community hyper-focused on tackling state-sponsored ops.
3
27
48
@MalwareRE
Ramin Nafisi
6 months
Do you find analyzing Rust binaries/malware tedious and unpleasant? You’re not alone! If you’re attending #REcon this year, our own @hackingump1 will be unveiling #RIFT today at 2PM EST (not at REcon? We got you covered, stay tuned). We have been using RIFT internally for some
cfp.recon.cx
Malware analysts alike agree: Rust reverse engineering is hard. Several skilled researchers shared their difficulties in reverse engineering Rust at RECON and other technical conferences. Consequen...
@hackingump1
Andreas Klopsch
8 months
Presenting "Unveiling RIFT: Advanced Pattern Matching for Rust Libraries" at RECON Montreal 2025! Sharing research on discovering Rust dependencies in compiled binaries. See you there! 🚀 #RECON2025 #RustLang #ReverseEngineering
0
14
37
@Xbow
XBOW
6 months
For the first time in history, the #1 hacker in the US is an AI. (1/8)
36
148
681
@FBI
FBI
8 months
In 2024, FBI and our partners raised the alarm about China’s hacking of US telecommunications infrastructure. This year, we’re going after the individuals responsible for the intrusions. If you have information about Salt Typhoon, we want to hear from you: https://t.co/zbcWCAtMvr
262
831
3K
@JohnLaTwC
John Lambert
8 months
Come help me create mechanical advantage in defense. If you love threat hunting, learning from incidents, building new ways to find attackers, and empowering others, this may be the perfect job for you. Help expand defense from the relational world of hunting to graphs,
0
27
54
@HacksInTaiwan
HITCON
9 months
SINCON 2025 is coming! 🚀 As a proud partner of HITCON, we invite you to explore cutting-edge cybersecurity at SINCON 2025! 📅 22-23 May 2025 | 📍 voco Orchard, SG 💡 Use “SINCON25-SUPPORTER” for S$100 off! 🔗 https://t.co/4wtxtDlSoM
0
1
5
@bkMSFT
bk (Ben Koehl)
1 year
. @JohnHultquist we need more #cyberwarcon
@bkMSFT
bk (Ben Koehl)
2 years
@CYBERWARCON time for a two-day conference?
2
0
11
@bkMSFT
bk (Ben Koehl)
1 year
Come work with me and the team! We have a large global team focused on extremely interesting work with a large opportunity to have impact. Principal Security Researcher (US) https://t.co/SmZ7rqdCyn Do you enjoy security research?
@ItsReallyNick
Nick Carr
1 year
I'm told we are hiring in MSTIC: https://t.co/r1IFJfzQif Come for the data, stay for the data. Creative problem solvers have the most impact. If we've worked together, I'm happy to refer you. But...
2
19
42
@bkMSFT
bk (Ben Koehl)
1 year
When in Taipei…. Enjoy a good cocktail and shellcode at https://t.co/vVOgxRctp8
1
1
25
@CYBERWARCON
CYBERWARCON
1 year
🚨 Speaker Spotlight 🚨 Join us at #CYBERWARCON to hear from James Elliott, a seasoned expert with 25+ years of experience! Currently at MSTIC, James has built threat intel teams for the DoD and private sector. 🎟️ Don't miss out! Get your tickets now: https://t.co/12b29mbC52
1
8
32
@bkMSFT
bk (Ben Koehl)
1 year
Cyber intel reunion / epic conference 2024 👇
@CYBERWARCON
CYBERWARCON
1 year
CYBERWARCON is coming!!! Registration and CFP are now open for this year’s #CYBERWARCON! This year’s keynote will be given by the NSA’s @adamski_morgan. The in-person event is in Arlington, VA on Nov. 22nd and virtual tickets are available. 1/x
0
1
8
@BakedSec
Austin Baker
1 year
It simplifies the process of keeping analyst work and notes in a structured and queryable format AND allows that work to be reflected to analysts perusing the same data as soon as it's recorded. Tag, bag, comment, feed to automation - whatever your needs are.
1
4
14
@billyleonard
billy leonard
1 year
🆕🚨 analysis from @Google on APT42 activity against 🇺🇸 and 🇮🇱. A ton of work from folks over the past few months dedicated to protecting users disrupting campaigns, and making life hard for the actors. More to come! https://t.co/rFocbBqXXv
Tweet card summary image
blog.google
Google’s Threat Analysis Group shares insights on APT42, an Iranian government-backed threat actor.
2
69
146
@CYBERWARCON
CYBERWARCON
1 year
🗓️ SAVE THE DATE: 11.22.24 #CYBERWARCON is a one-day conference focused on the specter of destruction, disruption, and malicious influence on our society through cyber capabilities. ⚡ For CFP updates, sign up to subscribe on our website: https://t.co/12b29mbC52!
9
55
132
@bkMSFT
bk (Ben Koehl)
1 year
Persistent: Gingham Typhoon has continuously targeted Australia for years. They also ebb and flow to different countries in the region as strategically important issues drive collection efforts. You may run into activity Raspberry Typhoon during the same investigations as both
0
3
24
@reprise_99
Matt Zorich
2 years
The very awesome people from Microsoft DART have put together a collection of one-page Windows forensics guides to help you understand various artefacts you can use during your investigations. Check them out - https://t.co/HhBI1A6Rgt
6
173
527
@SLEUTHCON
SLEUTHCON
2 years
We're excited to share our full speaker lineup for #SLEUTHCON 2024! 🎉 Visit https://t.co/ebz2wiiSJB for more reasons to get your tix!
0
21
54
@bkMSFT
bk (Ben Koehl)
2 years
@intrusion_truth also did good research here
Tweet card summary image
intrusiontruth.wordpress.com
0
0
2