highmeh Profile Banner
Jayme (@highmeh) Profile
Jayme (@highmeh)

@highmeh

Followers
10K
Following
17K
Media
3K
Statuses
23K

Threat Operations | Social Engineering | Physical Security | Audentes Fortuna Iuvat | Tweets are infrequent and not employer opinions

East Coast
Joined November 2008
Don't wanna be here? Send us removal request.
@highmeh
Jayme (@highmeh)
4 months
I’d be lying if I said I didn’t have a little FOMO about not doing Blackhat trainings this year…but definitely looking forward to the briefings! See you this week, #BHUSA2025!
1
0
0
@highmeh
Jayme (@highmeh)
6 months
Hey infosec twitter - I’m looking for references to, articles on, or verified reports of APT or criminal groups linked to insider threat, IP theft, physical initial access, remote worker fraud, etc. Think the KnowBe4/DPRK breach scenarios. Please RT! #infosec #cti #insiderthreat
0
0
1
@highmeh
Jayme (@highmeh)
9 months
Taking the GIAC GSTRT (SANS LDR514/Strategic Leadership) this week, pleased to see that the author included a basic index in the supplemental materials. That’s an enormous change from past years.
0
0
0
@highmeh
Jayme (@highmeh)
1 year
Do I have any security/technical contacts at @reliancejio (Julio Infocomm)? DMs are open.
1
0
1
@highmeh
Jayme (@highmeh)
1 year
Under the Door Tools are cool and all, but how about a Straight Through the Door Tool?
@Rainmaker1973
Massimo
1 year
Firefighters using a Halligan bar and J-tool in emergency situations to open a door. [📹Greg Payeur / payeurg] https://t.co/tV4pxhwZgv
1
1
6
@Rainmaker1973
Massimo
1 year
Firefighters using a Halligan bar and J-tool in emergency situations to open a door. [📹Greg Payeur / payeurg] https://t.co/tV4pxhwZgv
96
211
5K
@sec_defcon
Social Engineering Community
1 year
One of the new surprises we have this year is the optional heart beat sensors the team can wear... no stress...
1
7
48
@a_greenberg
Andy Greenberg (@agreenberg at the other places)
1 year
Today at Defcon, security researchers plan to show it's possible to clone HID keycards by extracting highly protected authentication keys from HID's hardware, lowering the barrier to hackers spoofing cards to access secure areas in facilities worldwide.
Tweet card summary image
wired.com
A team of researchers have developed a method for extracting authentication keys out of HID encoders, which could allow hackers to clone the types of keycards used to secure offices and other areas...
3
105
272
@highmeh
Jayme (@highmeh)
1 year
Best quote of BlackHat: “Are there any regulations against you going after these ransomeware gangs?” “Pretty much every regulation, yes”
1
0
2
@highmeh
Jayme (@highmeh)
1 year
Day two teaching #FSSE at @BlackHatEvents with @_sn0ww - today we break into buildings 🤘🏻 @snowfensive
0
5
24
@highmeh
Jayme (@highmeh)
1 year
We’re hyped to be back for year 6 of teaching Full Scope Social Engineering at #BHUSA2024 - come join us! Seats still available at https://t.co/VtcGdbvM7w #blackhat
@_sn0ww
Snow
1 year
Just under a month till mine and @highmeh's Full Scope Social Engineering training at Black Hat, looking forward to it! There are still a couple seats left. https://t.co/iBsKyHQdY6
0
0
4
@sec_defcon
Social Engineering Community
2 years
Our website is now updated and ready to accept applications for: Competing in our live Social Engineering Competition! Pre-registering for our Youth Challenge! Volunteering Opportunities! Sponsorship Opportunities!
3
11
32
@_sn0ww
Snow
2 years
Finished our 4-day Full Scope Social Engineering course with @highmeh at @BlackHatUSA today! What an amazing week. Best students ever 🔥
1
3
40
@highmeh
Jayme (@highmeh)
2 years
Day Three teaching Full Scope Social Engineering and Physical Security with @_sn0ww at @BlackHatEvents - things are about to pop off! @snowfensive #Blackhat2023 #fsse2023
1
3
23
@_sn0ww
Snow
2 years
We (@highmeh and I) are excited to be back teaching Full Scope Social Engineering for the 5th year @BlackHatEvents If you're on the fence about taking a training and looking for the right one, check ours out! There are only a few more days to register. Learn more here:
0
6
26
@highmeh
Jayme (@highmeh)
2 years
Ready to learn phishing, vishing, physical security, OSINT, and social engineering theory? Come join @_sn0ww and myself for four days in Vegas! Spots are filling up quick!
@BlackHatEvents
Black Hat
2 years
In #BHUSA Training "Full Scope Social Engineering And Physical Security" students will take fundamental concepts into the next three phases by applying them to craft robust and captivating Vishing, Phishing, and Physical Security campaigns. Register now >>
0
2
8
@sec_defcon
Social Engineering Community
2 years
Notification emails went out to everyone who submitted a presentation. Big thanks to our awesome review board team for helping out by reviewing TONS of submissions! @vrain_ @cxstephens @highmeh @RachelTobac
0
4
17
@sec_defcon
Social Engineering Community
2 years
Our Call for Papers review board is putting in WORK, we've received tons of amazing submissions! @vrain_ @cxstephens @highmeh @RachelTobac ***If you submitted a presentation, you should be hearing back by June 18th!***
0
5
6
@sec_defcon
Social Engineering Community
3 years
Shout out to our dope CFP Review Board! We are lucky to have them. @vrain_ @cxstephens @highmeh @RachelTobac Do you have a presentation you want to share in the #SECommunity this year? Submissions are now open till June 2nd https://t.co/2vH5NRF6T3
0
9
26
@trbrtc
Christiaan Triebert
3 years
A breakthrough in our investigation came when the team identified a Steam profile in Airman Teixeira's name that led to an Instagram profile with photos of the exact location where leaked docs were photographed — a kitchen countertop in his childhood home. https://t.co/XQAZf2kNV7
220
1K
4K