stvemillertime Profile Banner
Steve YARA Synapse Miller Profile
Steve YARA Synapse Miller

@stvemillertime

Followers
17K
Following
19K
Media
802
Statuses
6K

threat intelligence @google writing & sharing on adversary tradecraft, malware, threat detection, ics/ot intel and all things #yara

121.5mhz
Joined January 2009
Don't wanna be here? Send us removal request.
@stvemillertime
Steve YARA Synapse Miller
1 day
@vtxproject Those ready for intelligence-as-code must have a firm grasp on what they are trying to capture & how they wish to use it. This requires immense commitment to structured taxonomies, ontologies, classification for a knowledge domain. Without those, no tech will make a difference.
0
1
6
@stvemillertime
Steve YARA Synapse Miller
1 day
Many are quick to dismiss my ravings, knowing I'm a @vtxproject Synapse stan, but this isn't about a specific technology choice. If your thinking on the subject is reduced to graph tech and storage systems, then you are probably not ready for intelligence-as-code.
1
0
3
@stvemillertime
Steve YARA Synapse Miller
1 day
Unstructured and informal expertise is great, albeit ephemeral. Knowledge itself must be codified and hammered into your org at the institutional level, otherwise, it leaves your company with your human assets.
@stvemillertime
Steve YARA Synapse Miller
1 year
Intelligence-as-code means that every insight, every assessment, every conclusion is preserved in a strongly typed, hierarchical, programmatically recallable manner. Each answer is a label and also a question that can be instantly asked at (or applied to) unlabeled data.
2
2
19
@stvemillertime
Steve YARA Synapse Miller
2 days
Lawyers and legal scholars tend to be some of the best writers in the world, probably because they spend so much time reading into the minutiae and dissecting the meaning of every little sentence.
1
0
10
@stvemillertime
Steve YARA Synapse Miller
9 days
Tweet media one
1
0
11
@stvemillertime
Steve YARA Synapse Miller
12 days
RT @HostileSpectrum: The PDB (or any other finished intelligence) is not a palimpsest, to be rewritten to please. It is intended to be a ve….
0
1
0
@stvemillertime
Steve YARA Synapse Miller
18 days
"process engineering" is typically used in the manufacturing of physical products, but it can be applied for other domains. What do you manufacture? Do you know the flows of all the inputs and outputs, do you deeply understand the end-to-end process of making what you make?.
1
2
8
@stvemillertime
Steve YARA Synapse Miller
23 days
"be a factory, not a warehouse" -- if you build your knowledge graph with the right strategy and technology, it won't just store what you know, it will *manufacture* new insights. I believe this is true for the intelligence field, but this def applies to many other realms.
@ImposeCost
Andrew Thompson
23 days
@theonejvo Creation of truly new knowledge is the new oil.
2
3
42
@stvemillertime
Steve YARA Synapse Miller
24 days
RT @notareverser: The inability or unwillingness of sandboxes to distinguish between network activity associated with the original file vs….
0
1
0
@stvemillertime
Steve YARA Synapse Miller
29 days
RT @cglyer: When I see discussion about AI in security (especially AI agents) - it’s often about how it will replace Tier 1 SOC analysts. I….
0
31
0
@stvemillertime
Steve YARA Synapse Miller
1 month
Those of you building modern edge devices, packet tools, network sensors, SSL decrypt, Suricata, etc -- it'll be a couple years yet, but your day will come again. Slow and steady like erosion, the attention, the investment, the market will come crawling back to you.
0
1
11
@stvemillertime
Steve YARA Synapse Miller
1 month
Imo the security product market is almost always a decade behind needs, but over time ends up being pulled to meet the adversary where they are operating. In the 2010s the market came late to the endpoint, in the 2020s late to the cloud, in the 2030s it'll be back to the network.
4
0
24
@stvemillertime
Steve YARA Synapse Miller
2 months
RT @hiddenlayersec: 🔐 Not all prompt injections are the same. We just released a taxonomy of adversarial prompt engineering, mapping the w….
Tweet card summary image
hiddenlayer.com
Explore HiddenLayer’s new taxonomy of adversarial prompt engineering, a structured framework to classify and combat LLM prompt attacks using attacker objectives, tactics, and techniques.
0
4
0
@stvemillertime
Steve YARA Synapse Miller
2 months
RT @4a696d: So this one has been a while coming. If you've seen any of the talks or workshops I've done recently you'll have heard me talki….
0
5
0
@stvemillertime
Steve YARA Synapse Miller
2 months
vibe decoding.
0
1
9
@stvemillertime
Steve YARA Synapse Miller
2 months
RT @stvemillertime: @_devonkerr_ @HackingLZ Data breach got you down? Bring in your 1.05 material cybersecurity incident disclosure and get….
0
3
0
@stvemillertime
Steve YARA Synapse Miller
2 months
RT @anton_chuvakin: A fun #AI read:
Tweet card summary image
ai-2027.com
A research-backed AI scenario forecast.
0
2
0
@stvemillertime
Steve YARA Synapse Miller
2 months
My top 5 movies about ~hacking probably say more about my age than anything else, but still:. #1 - Hackers (1995) .#2 - War Games (1983) .#3 - Johnny Mnemonic (1995).#4 - Ghost in the Shell (1995).#5 - Office Space (1999) <- surprisingly full of hacks.
5
0
17
@stvemillertime
Steve YARA Synapse Miller
3 months
RT @stvemillertime: The Wire: Cybercrime leaves you feeling hard and cynical, aghast at a world embroiled in chaos, yet somehow also incapa….
0
1
0
@stvemillertime
Steve YARA Synapse Miller
3 months
Plot synopsis thread for the first five seasons.
@stvemillertime
Steve YARA Synapse Miller
3 months
The Wire: Cybercrime - Season 1.Baltimore feds infiltrate a shadowy carding forum, connecting low-level crackers to a prominent ring of players making big money. As victims come forward, pressure mounts to identify the anonymous kingpins behind the operation.
0
0
5