holisticinfosec Profile Banner
Russ McRee Profile
Russ McRee

@holisticinfosec

Followers
5K
Following
3K
Media
255
Statuses
3K

Director, GCP Cyber Defense Center, @Google, former @MSFT MSRC, PhD, GSE, dissertation chair @captechu, @SANS_ISC handler, music via @russmcree

Seattle
Joined June 2009
Don't wanna be here? Send us removal request.
@holisticinfosec
Russ McRee
9 months
RT @GoogleVRP: We're sending a HUGE thank you to our incredible community of bughunters ! 🙏 Your passion for finding vulnerabilities keeps….
0
38
0
@holisticinfosec
Russ McRee
10 months
As part of our continued commitment to security & transparency on vulnerabilities found in our products & services, effective today we will be issuing CVEs for critical Google Cloud vulnerabilities, even when we do not require customer action or patching.
Tweet card summary image
cloud.google.com
As part of our commitment to security and transparency on vulnerabilities found in our products and services, we now will issue CVEs for critical Google Cloud vulnerabilities.
0
1
3
@grok
Grok
5 days
What do you want to know?.
322
194
1K
@holisticinfosec
Russ McRee
10 months
Mandatory MFA is coming to Google Cloud. We will be implementing mandatory MFA for Google Cloud in a phased approach that will roll out to all users worldwide during 2025.
Tweet card summary image
cloud.google.com
To help keep our customers secure, starting in 2025 we will require them to use MFA when accessing Google Cloud.
0
0
2
@holisticinfosec
Russ McRee
10 months
Big Sleep LLM agent found an exploitable stack buffer underflow in SQLite, the database engine. This is believed to be the first public example of an AI agent finding a previously unknown exploitable memory-safety issue in widely used real-world software.
0
0
2
@holisticinfosec
Russ McRee
10 months
Google's approach to the 7 Secure by Design goals include focus on MFA, default passwords, reducing entire classes of vulnerability, security patches, vulnerability disclosure (VRP), CVEs & evidence of intrusions. Stayed tuned for more re Cloud VRP & CVEs!
Tweet card summary image
blog.google
Today, Google published a white paper that shows how we’ve incorporated seven goals from our Secure by Design Pledge.
0
0
3
@holisticinfosec
Russ McRee
10 months
Announcing the launch of @googlecloud Vulnerability Reward Program (VRP), dedicated to products & services that are part of Google Cloud. GC VRP focuses on coordinating new vulnerabilities and compensating security researchers. Top award: $101,010.
Tweet card summary image
cloud.google.com
0
0
7
@holisticinfosec
Russ McRee
11 months
While cloud providers can support customers in restoring access to their environments or activate backups, cloud providers generally lack the visibility & access to customer environments needed to perform customer incident response & remediation at scale.
Tweet card summary image
cloud.google.com
In a guest column, Google Cloud experts explain how CISOs can work with cloud providers to improve their organization’s incident preparedness.
0
0
1
@holisticinfosec
Russ McRee
11 months
Our CVR team performed vuln research on GCP’s AI Platform, Vertex AI & considered potential attack scenarios across Google & industry. They discovered unknown vulns that not remediated potentially could have allowed exfil of Gemini 1.0 Pro model @amlweems
Tweet card summary image
bughunters.google.com
This blog post describes Google's approach to vulnerability research on our Cloud AI Platform, Vertex AI. We're sharing this so that external researchers can learn from our work and to help them...
0
2
5
@holisticinfosec
Russ McRee
11 months
While working with Project Zero, #NickGalloway found an integer overflow in the dav1d AV1 video decoder. He received questions about issue discovery as dav1d is already being fuzzed by oss-fuzz. This is a useful case study in constructing fuzzers 4 effect.
0
0
1
@holisticinfosec
Russ McRee
11 months
RT @CraigHRowland: The bad news is there is a vulnerability in the CUPS printer system on Linux. The good news is nobody has ever gotten th….
0
704
0
@holisticinfosec
Russ McRee
11 months
At Google, we continually evolve security capabilities & practices to make our cloud the most trusted cloud. To help protect from stolen creds, cookie theft & accidental creds loss, announcing general availability of cert-based access in our IAM portfolio.
Tweet card summary image
cloud.google.com
To help protect your organization from credential theft and accidental credential loss, we’re excited to announce the general availability of certificate-based access in our Identity and Access...
0
1
3
@holisticinfosec
Russ McRee
1 year
Google's Cloud Vulnerability Research team (CVR) presents vulnerabilities in the 3rd party image library Kakadu, outlining challenges external attackers face exploiting vulnerabilities in unknown environments. @scannell_simon @amlweems @epereiralopez
Tweet card summary image
bughunters.google.com
In this document, Google's Cloud Vulnerability Research team (CVR) presents vulnerabilities in a third-party JPEG 2000 image library called Kakadu. Exploiting memory corruption vulnerabilities...
0
0
1
@holisticinfosec
Russ McRee
1 year
RT @InfoSecMap: The @BlueTeamVillage at #DEFCON32 had lots of defender-focused activities, and the best pool party! 💙 🛡️. Shoutout to @RayR….
0
6
0
@holisticinfosec
Russ McRee
1 year
Looking forward to seeing folks tomorrow at our BTV panel in LVCC W3 10 from 3-4p. With over 80 years of SOC experience, we cut the buzzword bingo & get real. We’ll be discussing topics like how to get value with threat intel beyond IOC matching, and more!
0
0
0
@holisticinfosec
Russ McRee
1 year
Tweet media one
0
3K
0
@holisticinfosec
Russ McRee
1 year
I'm excited to be on a panel at the Defcon Blue Team Village on hot topics in security operations with Carson Zimmerman, Enoch Long, and Eric Lippart at 3:00pm Pacific on Saturday in room W310. See you there! #Defcon #BlueTeamVillage #SecurityOperations Hope to see you there!.
0
0
2
@holisticinfosec
Russ McRee
1 year
I teach my teams this simple mantra: measurability == survivability. “Use specific, quantifiable metrics to showcase improvements in security posture and ops efficiency.” Reductions in vulnerability remediation time, decreases in IR costs, and latency too.
0
0
1
@holisticinfosec
Russ McRee
1 year
Cirrus: a command-line tool written in Python to facilitate environment access & evidence collection across Google Cloud & is composed of two scripts:.Assistant: automate Google Cloud access setup & cleanup.Collector: collect log, configuration & user data
Tweet card summary image
github.com
Contribute to SygniaLabs/Mirage development by creating an account on GitHub.
0
0
3
@holisticinfosec
Russ McRee
1 year
0
0
0