clintgibler Profile Banner
Clint Gibler Profile
Clint Gibler

@clintgibler

Followers
22K
Following
5K
Media
1K
Statuses
9K

๐Ÿ—ก๏ธ Head of Security Research @semgrep ๐Ÿ“š Creator of https://t.co/xwtIAI0CuJ newsletter

Join 90,000+ readers โ†’
Joined July 2012
Don't wanna be here? Send us removal request.
@clintgibler
Clint Gibler
2 years
Your company is rushing to build product features that use AI. How do you do that securely?. There are MANY ways things can go wrong. ๐Ÿšจ @ramimacisabird's deep dive is BY FAR the best guide I've seen ๐Ÿšจ. Learn the latest attacks and defenses in one ๐Ÿงต.
Tweet card summary image
tldrsec.com
A Practitionerโ€™s Guide to Consuming AI
4
44
138
@clintgibler
Clint Gibler
1 day
๐Ÿ› ๏ธ Two JAMF Security Tools.๐‰๐š๐ฆ๐Ÿ๐‡๐จ๐ฎ๐ง๐ - Ingest JAMF attack paths into BloodHound.๐„๐ฏ๐ž - A JAMF exploitation toolkit. 1๏ธโƒฃ JamfHound by @SpecterOps . A Python tool that collects and identifies attack paths in Jamf Pro tenants by analyzing object permissions and outputting
Tweet media one
1
37
117
@clintgibler
Clint Gibler
2 days
๐Ÿ”ฅ ๐€๐๐“ ๐ƒ๐จ๐ฐ๐ง - ๐“๐ก๐ž ๐๐จ๐ซ๐ญ๐ก ๐Š๐จ๐ซ๐ž๐š ๐…๐ข๐ฅ๐ž๐ฌ.New Phrack article analyzing files from the computer of a North Korean hacker. Plus a script to scan your Gmail to see if you've interacted with NK IT workers. The article discusses tools, techniques, and targets
Tweet media one
0
1
6
@clintgibler
Clint Gibler
2 days
โ˜๏ธ Using AWS tags to enumerate cloud resources.Bleon Proko on how attackers can use tags to enumerate AWS resources with minimal permissions, avoiding detection. And a tool release: ๐“๐š๐ ๐๐š๐›๐ˆ๐ญ. TagNabIt is a tool that exploits the fact that tag-related API calls can reveal
Tweet media one
0
1
13
@321Gang
321 Gang, LLC
6 days
Your cloud spend is a treasure chest waiting to be opened. Cut waste. Optimize usage. Unlock business value with 321 Gang!.
0
2
25
@clintgibler
Clint Gibler
4 days
โ˜๏ธ ๐€๐–๐’ ๐ข๐ง 2025: ๐“๐ก๐ž ๐’๐ญ๐ฎ๐Ÿ๐Ÿ ๐˜๐จ๐ฎ ๐“๐ก๐ข๐ง๐ค ๐˜๐จ๐ฎ ๐Š๐ง๐จ๐ฐ ๐“๐ก๐š๐ญ'๐ฌ ๐๐จ๐ฐ ๐–๐ซ๐จ๐ง๐ .Corey Quinn shares a bunch of ways AWS services have changed over the years across EC2, S3, Networking, Lambda, DynamoDB, Authentication, . Tons of great stuff in the post,
Tweet media one
0
2
6
@clintgibler
Clint Gibler
6 days
๐Ÿ“Š ๐‚๐จ๐ฌ๐ญ ๐จ๐Ÿ ๐š ๐ƒ๐š๐ญ๐š ๐๐ซ๐ž๐š๐œ๐ก ๐‘๐ž๐ฉ๐จ๐ซ๐ญ 2025: ๐“๐ก๐ž ๐€๐ˆ ๐Ž๐ฏ๐ž๐ซ๐ฌ๐ข๐ ๐ก๐ญ ๐†๐š๐ฉ.31 page report from IBM based on 600 organizations impacted by data breaches between March 2024 and February 2025. Global average cost of a data breach: $4.44M. Added breach cost
Tweet media one
0
1
5
@clintgibler
Clint Gibler
6 days
๐Ÿ“š tl;dr sec 293 . ๐Ÿค– MCP Security, .โ˜๏ธ AWS Enumeration, .๐Ÿ›ก๏ธ North Korean Hacker's Files Leaked. various write-ups on vulnerabilities in MCP servers!.
tldrsec.com
Critical vulnerabilities in MCPs, stealthily enumerating AWS resources, a North Korean government hacker's computer was pwned, backdoors & campaigns leaked
0
0
4
@clintgibler
Clint Gibler
6 days
Keep up with security research in 7min/week:. ๐Ÿ“บ Talks .๐Ÿ› ๏ธ Tools and Blog posts.๐Ÿงช Research Projects . Join 90,000+ security professionals: Follow me @clintgibler for more!.
Tweet card summary image
tldrsec.com
The best way to keep up with cybersecurity research. Join >90,000 security professionals getting the best tools, talks, and resources right in their inbox for free.
0
0
0
@clintgibler
Clint Gibler
6 days
๐Ÿ“ข Sponsor: Thousands of MCP servers are already live, but most security teams donโ€™t have a clear strategy yet. Download this practical guide to MCP for security teams.
Tweet media one
1
0
0
@clintgibler
Clint Gibler
7 days
Putting EDRs in Their Place: Killing and Silencing EDR Agents Like an Adversary.@defcon workshop by Ryan Chapman and Aaron Rosenmund. Hands-on labs in a VM, pre-loaded tools, samples, & EDR emulator, covering:. Topics:. ๐Ÿ” Investigate a live EDR agent: discover its hooks, logs,
Tweet media one
0
1
9
@clintgibler
Clint Gibler
7 days
๐Ÿ˜ˆ ChromeAlone - Transform Chromium browsers into a C2 Implant. A la Cobalt Strike or Meterpreter. @defcon talk and tool release by @praetorianlabs' Michael Weber. ChromeAlone contains a number of out of the box components, including:. - A malicious Chrome extension that can
Tweet media one
0
32
97
@clintgibler
Clint Gibler
8 days
How @Google handles insider risk. FACADE: High-Precision Insider Threat Detection Using Contrastive Learning.Black Hat slides + OSS tool release. Neat talk by Alex Kantchelian, Elie Bursztein, Casper Neo et al on Googleโ€™s internal AI system for detecting malicious insiders.
Tweet media one
2
5
35
@RedBalloonWork
RedBalloon | Free to Work
3 days
๐ŸšจNew survey reveals minimum tariff concerns amid growing economic momentum. A new nationwide August survey of Americaโ€™s Main Street small businesses revealed muted concerns about the @POTUS Administrationโ€™s tariff actions, as business owners prepare for coming growth.
Tweet media one
5
10
14
@clintgibler
Clint Gibler
8 days
3 Black Hat talks on applying AI to SAST. Here's what they covered (+ links to abstracts/slides). 1๏ธโƒฃ More Flows, More Bugs: Empowering SAST with LLMs and Customized DFA. Using LLMs to automatically identify sources and sinks in open source frameworks, which allowed CodeQL to
Tweet media one
Tweet media two
0
0
27
@clintgibler
Clint Gibler
13 days
Keep up with security research in 7min/week:. ๐Ÿ“บ Talks .๐Ÿ› ๏ธ Tools and Blog posts .๐Ÿงช Research projects. Join 90,000+ security professionals: Follow me @clintgibler for more!.
Tweet card summary image
tldrsec.com
The best way to keep up with cybersecurity research. Join >90,000 security professionals getting the best tools, talks, and resources right in their inbox for free.
0
0
0
@clintgibler
Clint Gibler
13 days
๐Ÿ“ข Sponsor: MFA is essential but not enough. Attackers are bypassing it with Business Email Compromise and social engineering. @MaterialSec adds detection and response after login to Google Workspace: visibility, policy enforcement, and proactive remediation. Learn more โ†’
Tweet media one
1
0
0
@clintgibler
Clint Gibler
13 days
๐Ÿ“š tl;dr sec 292. ๐Ÿง‘๐Ÿปโ€๐Ÿ’ป HTTP/1.1 must die, AI + SAST.๐Ÿ›ก๏ธ Google's Insider Threat Detection Tool.๐Ÿšจ More interesting talks and/or tools from Hacker Summer Camp .
Tweet card summary image
tldrsec.com
James Kettle argues HTTP/1.1 can never be fully secured, augmenting static analysis with LLMs, Google's talk + OSS tool for detecting malicious insiders
1
0
5
@barstoolsports
Barstool Sports
5 days
RT @PardonMyTake: Tuesday night max woke Big Cat up with a flashlight at 2am because he thought we were going to get sued. @forthepeople htโ€ฆ.
0
18
0
@clintgibler
Clint Gibler
13 days
RT @mattjay: We tried to recreate an old photo. But just happy to hang with legends either way. @clintgibler @Jhaddix @rez0__ @DanielMiessโ€ฆ.
0
4
0
@clintgibler
Clint Gibler
14 days
Google (@Google) shares initial results from running their AI-based "Deep Sleep" vulnerability finding system powered by Gemini at scale. 20 vulnerabilities across imagemagick, ffmpeg, redis, QuickJS, and more.
Tweet media one
0
7
24
@clintgibler
Clint Gibler
14 days
Security products make you safer. right? ๐Ÿ˜… . DEF CON: Zero Trust, Total Bust - Breaking into 1000s of cloud-based VPNs.Critical bugs in Zero Trust solutions from Zscaler, Netskope, and Check Point. DEF CON 2025 talk by AmberWolfโ€™s David Cash and Rich W. They discuss the
Tweet media one
Tweet media two
0
2
13