
Clint Gibler
@clintgibler
Followers
22K
Following
5K
Media
1K
Statuses
9K
๐ก๏ธ Head of Security Research @semgrep ๐ Creator of https://t.co/xwtIAI0CuJ newsletter
Join 90,000+ readers โ
Joined July 2012
Your company is rushing to build product features that use AI. How do you do that securely?. There are MANY ways things can go wrong. ๐จ @ramimacisabird's deep dive is BY FAR the best guide I've seen ๐จ. Learn the latest attacks and defenses in one ๐งต.
tldrsec.com
A Practitionerโs Guide to Consuming AI
4
44
138
๐ ๏ธ Two JAMF Security Tools.๐๐๐ฆ๐๐๐จ๐ฎ๐ง๐ - Ingest JAMF attack paths into BloodHound.๐๐ฏ๐ - A JAMF exploitation toolkit. 1๏ธโฃ JamfHound by @SpecterOps . A Python tool that collects and identifies attack paths in Jamf Pro tenants by analyzing object permissions and outputting
1
37
117
๐ฅ ๐๐๐ ๐๐จ๐ฐ๐ง - ๐๐ก๐ ๐๐จ๐ซ๐ญ๐ก ๐๐จ๐ซ๐๐ ๐
๐ข๐ฅ๐๐ฌ.New Phrack article analyzing files from the computer of a North Korean hacker. Plus a script to scan your Gmail to see if you've interacted with NK IT workers. The article discusses tools, techniques, and targets
0
1
6
โ๏ธ Using AWS tags to enumerate cloud resources.Bleon Proko on how attackers can use tags to enumerate AWS resources with minimal permissions, avoiding detection. And a tool release: ๐๐๐ ๐๐๐๐๐ญ. TagNabIt is a tool that exploits the fact that tag-related API calls can reveal
0
1
13
โ๏ธ ๐๐๐ ๐ข๐ง 2025: ๐๐ก๐ ๐๐ญ๐ฎ๐๐ ๐๐จ๐ฎ ๐๐ก๐ข๐ง๐ค ๐๐จ๐ฎ ๐๐ง๐จ๐ฐ ๐๐ก๐๐ญ'๐ฌ ๐๐จ๐ฐ ๐๐ซ๐จ๐ง๐ .Corey Quinn shares a bunch of ways AWS services have changed over the years across EC2, S3, Networking, Lambda, DynamoDB, Authentication, . Tons of great stuff in the post,
0
2
6
๐ ๐๐จ๐ฌ๐ญ ๐จ๐ ๐ ๐๐๐ญ๐ ๐๐ซ๐๐๐๐ก ๐๐๐ฉ๐จ๐ซ๐ญ 2025: ๐๐ก๐ ๐๐ ๐๐ฏ๐๐ซ๐ฌ๐ข๐ ๐ก๐ญ ๐๐๐ฉ.31 page report from IBM based on 600 organizations impacted by data breaches between March 2024 and February 2025. Global average cost of a data breach: $4.44M. Added breach cost
0
1
5
๐ tl;dr sec 293 . ๐ค MCP Security, .โ๏ธ AWS Enumeration, .๐ก๏ธ North Korean Hacker's Files Leaked. various write-ups on vulnerabilities in MCP servers!.
tldrsec.com
Critical vulnerabilities in MCPs, stealthily enumerating AWS resources, a North Korean government hacker's computer was pwned, backdoors & campaigns leaked
0
0
4
Keep up with security research in 7min/week:. ๐บ Talks .๐ ๏ธ Tools and Blog posts.๐งช Research Projects . Join 90,000+ security professionals: Follow me @clintgibler for more!.
tldrsec.com
The best way to keep up with cybersecurity research. Join >90,000 security professionals getting the best tools, talks, and resources right in their inbox for free.
0
0
0
Putting EDRs in Their Place: Killing and Silencing EDR Agents Like an Adversary.@defcon workshop by Ryan Chapman and Aaron Rosenmund. Hands-on labs in a VM, pre-loaded tools, samples, & EDR emulator, covering:. Topics:. ๐ Investigate a live EDR agent: discover its hooks, logs,
0
1
9
๐ ChromeAlone - Transform Chromium browsers into a C2 Implant. A la Cobalt Strike or Meterpreter. @defcon talk and tool release by @praetorianlabs' Michael Weber. ChromeAlone contains a number of out of the box components, including:. - A malicious Chrome extension that can
0
32
97
Abstract and slides links: GitHub:
github.com
Contribute to google/facade development by creating an account on GitHub.
0
2
10
How @Google handles insider risk. FACADE: High-Precision Insider Threat Detection Using Contrastive Learning.Black Hat slides + OSS tool release. Neat talk by Alex Kantchelian, Elie Bursztein, Casper Neo et al on Googleโs internal AI system for detecting malicious insiders.
2
5
35
๐จNew survey reveals minimum tariff concerns amid growing economic momentum. A new nationwide August survey of Americaโs Main Street small businesses revealed muted concerns about the @POTUS Administrationโs tariff actions, as business owners prepare for coming growth.
5
10
14
Keep up with security research in 7min/week:. ๐บ Talks .๐ ๏ธ Tools and Blog posts .๐งช Research projects. Join 90,000+ security professionals: Follow me @clintgibler for more!.
tldrsec.com
The best way to keep up with cybersecurity research. Join >90,000 security professionals getting the best tools, talks, and resources right in their inbox for free.
0
0
0
๐ข Sponsor: MFA is essential but not enough. Attackers are bypassing it with Business Email Compromise and social engineering. @MaterialSec adds detection and response after login to Google Workspace: visibility, policy enforcement, and proactive remediation. Learn more โ
1
0
0
๐ tl;dr sec 292. ๐ง๐ปโ๐ป HTTP/1.1 must die, AI + SAST.๐ก๏ธ Google's Insider Threat Detection Tool.๐จ More interesting talks and/or tools from Hacker Summer Camp .
tldrsec.com
James Kettle argues HTTP/1.1 can never be fully secured, augmenting static analysis with LLMs, Google's talk + OSS tool for detecting malicious insiders
1
0
5
RT @PardonMyTake: Tuesday night max woke Big Cat up with a flashlight at 2am because he thought we were going to get sued. @forthepeople htโฆ.
0
18
0
RT @mattjay: We tried to recreate an old photo. But just happy to hang with legends either way. @clintgibler @Jhaddix @rez0__ @DanielMiessโฆ.
0
4
0
Google (@Google) shares initial results from running their AI-based "Deep Sleep" vulnerability finding system powered by Gemini at scale. 20 vulnerabilities across imagemagick, ffmpeg, redis, QuickJS, and more.
0
7
24