gothburz Profile Banner
Peter Girnus πŸ¦… Profile
Peter Girnus πŸ¦…

@gothburz

Followers
47K
Following
10K
Media
1K
Statuses
13K

Cyber Populist | Hacker @theZDI | CVEs in AI, ML & Enterprise Software | Inventor | Fighting PTSD & burnout with LOLs | Up & to the right πŸš€πŸ“ˆπŸ”₯

Austin, Texas
Joined December 2017
Don't wanna be here? Send us removal request.
@gothburz
Peter Girnus πŸ¦…
26 days
Last quarter I rolled out Microsoft Copilot to 4,000 employees. $30 per seat per month. $1.4 million annually. I called it "digital transformation." The board loved that phrase. They approved it in eleven minutes. No one asked what it would actually do. Including me. I
5K
25K
166K
@gothburz
Peter Girnus πŸ¦…
10 hours
Credit to the Genians Security Center threat intel team for the original research. https://t.co/lrbyaqCOFr
1
2
9
@gothburz
Peter Girnus πŸ¦…
10 hours
The lesson for 2026? If you're still relying on signatures and known IOCs, you're already compromised. Behavioral detection at the endpoint or nothing. Korean-language environments and NK policy orgs - this is your threat model now.
2
0
7
@gothburz
Peter Girnus πŸ¦…
10 hours
This connects directly to their March 2025 Operation ToyBox Story. Same TTPs. Same infrastructure patterns. Same cloud accounts. APT37 iterates. They don't reinvent.
1
0
0
@gothburz
Peter Girnus πŸ¦…
10 hours
They hide payloads in JPEG images using steganography. Your DLP isn't flagging an image file. Multi-stage XOR decryption chains unpack once it lands. Runs entirely in memory. No file drops. No signatures to match.
2
0
2
@gothburz
Peter Girnus πŸ¦…
10 hours
Their C2? Yandex Cloud. pCloud. Dropbox. All legitimate services. All encrypted traffic. Blends with normal business activity perfectly. Try explaining to your SOC why blocking Dropbox is the move.
1
0
1
@gothburz
Peter Girnus πŸ¦…
10 hours
The clever part? DLL side-loading using Microsoft Sysinternals tools. ShellRunas.exe. AccessEnum.exe. VolumeId.exe. Your EDR sees signed Microsoft binaries doing their thing. Nothing triggers. Meanwhile RoKRAT payload drops in memory.
1
0
1
@gothburz
Peter Girnus πŸ¦…
10 hours
APT37 weaponized HWP files. That's Korean Word Processor - daily software for their targets. They embedded OLE objects in docs about North Korean affairs. Recipients opened them because the content was relevant to their actual work.
1
0
2
@gothburz
Peter Girnus πŸ¦…
10 hours
What APT37's (North Korea Hackers) Operation Artemis Teaches Us About Cyber Espionage in 2026 πŸ‡°πŸ‡·πŸ‡°πŸ‡΅ A thread on why your signature-based detection is worthless against modern nation-state ops.🧡
3
3
20
@gothburz
Peter Girnus πŸ¦…
14 hours
I've been reading about our activation strategy and I have some thoughts. The board was impressed when I explained how we "sunset" phone activation. That's a word I learned at Davos. It means remove a 25-year-old feature without telling anyone. My gut says: if users need to
13
11
120
@gothburz
Peter Girnus πŸ¦…
18 hours
I am the Director of User Experience at Microsoft. We designed Settings. To be intuitive. Very intuitive. The search bar is there. It searches. For everything. Except what you want. You type "make cursor bigger." It suggests "change mouse pointer." You click. It loops.
@rfleury
Ryan Fleury
1 day
This is not a real company
112
128
2K
@gothburz
Peter Girnus πŸ¦…
20 hours
Someone sent me a message recently that I feel compelled to addressβ€”not to call them out, but because the idea itself is dangerous enough that others are probably thinking the same thing. The pitch: Deploy AI as "psychological support" through an avatar with a human-sounding
16
19
109
@gothburz
Peter Girnus πŸ¦…
1 day
UPDATE: I asked Copilot to summarize my blog post about AI slop. It summarized a different blog post. From 2019. By someone named Steve. The cognitive amplification is amplifying.
23
54
1K
@gothburz
Peter Girnus πŸ¦…
1 day
I am the CEO of a $3 trillion company. Last week I started a blog. I called it "sn scratchpad." The "sn" stands for my initials. The "scratchpad" means I'm just thinking out loud. Like a regular person. Who happens to control the future of computing. In my first post, I
41
67
545
@gothburz
Peter Girnus πŸ¦…
1 day
I can't comment on this. Legal reasons. But my course drops next week. Code: CARACAS. Alpha Doesn't Sleep.
@BigTimeBryan8
Bryan J.
1 day
@Rothbard1776 Someone also placed a large bet on Polymarket on Friday that Maduro would be captured on Saturday.
1
2
20
@gothburz
Peter Girnus πŸ¦…
1 day
He turned $30K into $408K betting on Maduro's capture. The night before special forces hit Caracas. From his couch. In pajamas. "Some call it luck. I call it conviction." His course "Regime Change Alpha: Profiting From Global Instability" drops next week. Code: CARACAS. This
2
0
8
@gothburz
Peter Girnus πŸ¦…
1 day
"How I Turned $30,000 Into $408,000 While You Were Sleeping" I woke up 1,260% richer this morning. Let me tell you how. Six days ago, I created a Polymarket account. Five days ago, I started researching emerging markets. Venezuela, specifically. The prediction market had
18
10
148
@gothburz
Peter Girnus πŸ¦…
2 days
Putin watching the Maduro situation unfold. Maduro: seized Putin: πŸ‘€ Navy SEALs: πŸ‘οΈπŸ‘οΈ
6
3
39
@gothburz
Peter Girnus πŸ¦…
2 days
I pasted your GitHub into ChatGPT and it said the string β€˜rustfs rpc’ is a CRITICAL 9.8 hardcoded credential that violates PCI-DSS, OWASP, NIST, SOC 2, GDPR, and CCPA
0
0
11
@gothburz
Peter Girnus πŸ¦…
2 days
CVE-2025-68926 - CVSS 9.8 (Critical) The BIG question. How did this get a CVE? The finding? A distributed storage system uses a static token for internal node-to-node gRPC communication. That’s it. That’s the whole vulnerability. Internal cluster traffic has a service
@h4x0r_dz
H4x0r.DZ πŸ‡°πŸ‡΅
2 days
wtf I'm seeing here? CVE-2025-68926 gRPC Hardcoded Token Authentication Bypass https://t.co/n4L0e4JWuk
5
4
32