tlansec Profile
tlansec

@tlansec

Followers
3K
Following
4K
Media
69
Statuses
3K

Threat Intel @Volexity. Find me on 𝐁𝐥𝐮𝐞Sky

London, UK
Joined October 2013
Don't wanna be here? Send us removal request.
@tlansec
tlansec
1 year
In the DC-area? You'd be hard-pressed to find a better use of your time than to attend #FTSCon on 🗓️ October 21 in Arlington VA. It's packed with info on the latest security tools 🔧 and 🎯 insights from incident response #threatintel #memoryforensics
0
2
7
@greglesnewich
Greg Lesnewich
5 days
🚨 New threat intelligence engineering role in our org Do you wanna help build tools to find, block, and disrupt ecrime, fraud, and espionage activity? This role may be for you! https://t.co/mV1PBPYKSq
0
14
41
@shaneharris
Shane Harris
7 days
I've waited nearly ten years to tell this story: In 2016, I developed a source in Iranian intelligence named Mohammad Hossein Tajik. He told me he came from a politically connected family. That he had led Iran's cyber army. And that he had secretly worked for the CIA. 🧵
34
307
2K
@blackorbird
blackorbird
7 days
#OceanLotus Group Targeting The indigenized Xinchuang system (a Chinese framework for building secure, self-reliant IT ecosystems using domestic hardware and software). 1. Spear-Phishing Lures Desktop Lures Desktop files on ICT innovation platforms, similar to LNK files on
0
11
65
@tlansec
tlansec
10 days
On the plus side, everytime there's a Cloudflare outage 1000s of threat actors around the world have their malware C2 go down for a few hours.
0
0
7
@Volexity
Volexity
11 days
.@Volexity #threatintel tracks a wide variety of threat actors abusing Device Code & OAuth authentication workflows to phish credentials. And these techniques continue to see success due to creative social engineering. [1/2]
1
10
17
@SafeguardDefend
Safeguard Defenders (保护卫士)
11 days
⚠️ Thai Human Rights Commission condemns Thailand’s deportation of 40 Uyghurs to China in Feb 2025 Deportations were “unlawful, undermined international confidence in the country and affected its global economic & trade relations.” https://t.co/1BPpFepU9M
Tweet card summary image
safeguarddefenders.com
On February 27, 2025, Thailand returned 40 Uyghur refugees to China despite staggering amounts of evidence indicating they were at high risk of torture, enforced disappearance, and other inhuman...
0
12
13
@CISAgov
Cybersecurity and Infrastructure Security Agency
11 days
🚨 PRC state-sponsored APT actors are using BRICKSTORM malware, a sophisticated backdoor, to target govt & #CriticalInfrastructure. Our 🆕 Malware Analysis Report, derived from an #IncidentResponse engagement, details IOCs & mitigation steps. Act now! https://t.co/SksUqLbhp0
9
77
206
@_xpn_
Adam Chester 🏴‍☠️
24 days
New blog post is up exploring a vuln I found in Claude Code (CVE-2025-64755) allowing arbitrary file write without a consent prompt. New tech is always fun to explore, hopefully this post gives you some hints as to future research :)
Tweet card summary image
specterops.io
This blog post explores a bug, (CVE-2025-64755), I found while trying to find a command execution primitive within Claude Code to demonstrate the risks of web-hosted MCP to a client.
10
91
364
@iamdevloper
I Am Devloper
27 days
Now I am become Death, the destroyer of worlds.
@iamdevloper
I Am Devloper
27 days
I don't think we realise how good CloudFlare truly is
7
29
411
@FFmpeg
FFmpeg
1 month
One last thing: Google boasted to the media about its AI detected vulnerabilities before FFmpeg volunteers were able to send fixes. A dozen AI vulnerability reports were dumped on FFmpeg volunteers at the same time Google was boasting to @TechCrunch Is Google Security really
66
157
2K
@tlansec
tlansec
1 month
Enhance your CyberChef experience with GeoCities mode!
0
0
2
@pivot_con
PIVOTcon
1 month
#PIVOTcon26 registration is now OPEN 🤟📷 #ThreatResearch #ThreatIntel 📷 https://t.co/O5LJfr5JlT Please read carefully the whole 🧵 for the rules about invite -> registration (1/6)🌐
1
13
17
@arekfurt
Brian in Pittsburgh
1 month
The replies and quote tweets to this...🥵 If I were an executive in Redmond, reading them would put an uneasy feeling in the pit of my stomach. I'd start trying to figure out whether overall Windows customer sentiment may actually be taking an alarmingly sharp downward turn.
@pavandavuluri
Pavan Davuluri
1 month
Windows is evolving into an agentic OS, connecting devices, cloud, and AI to unlock intelligent productivity and secure work anywhere. Join us at #MSIgnite to see how frontier firms are transforming with Windows and what’s next for the platform. We can’t wait to show you!
7
4
27
@arekfurt
Brian in Pittsburgh
1 month
Honestly, here's what I'd like to see with the future of enterprise security in general. At least for organizations who genuinely want to try to make it a priority🧵: 1. Finally accepting detection + response importantly backstops solid prevention but cannot substitute for it.
2
11
32
@NVISOsecurity
NVISO
1 month
Our NVISO #IncidentResponse Team has been tracking #VShell campaigns worldwide! More than 1,500 active VShell servers were uncovered, each capable of giving attackers remote control over compromised networks. Read the report here 👇 https://t.co/XjAIIe99UH
3
14
30
@CYBERWARCON
CYBERWARCON
2 months
@stevenadair is back again at CYBERWARCON! He is the Founder + President of Volexity, and leads a team of experts that deal with advanced and complex cyber intrusions from nation-state level intruders. His talk will cover a Chinese APT actor that Volexity currently tracks as
1
7
12
@what_is_sos
State of Statecraft Conference
2 months
Reposting but this time Bart speaks French.
@what_is_sos
State of Statecraft Conference
2 months
There's only 15 tickets left to the SOS conference on October 28. Either we sell out or close the registration randomly this week so we can make it to printers in time. For some, a different type of "boogeyman" or "boogeymen." https://t.co/dq23ep9VFH
1
1
4
@greglesnewich
Greg Lesnewich
2 months
If you like: - writing sigs in yara/clamav - File formats - browser or windows internals - Finding clever ways to fingerprint malware - stopping the hottest email initial access methods Then this detection engineering role might be for you! https://t.co/kAGcZMqaWp
9
16
49
@volatility
volatility
2 months
We had a great day yesterday at #FTSCon 2025! FTSCon Week continues with @joegrand’s Hardware Hacking Basics + @volatility Malware & Memory Forensics training with @attrc, @iMHLv2 & @superponible.
0
5
10