Jake Williams(@MalwareJake) 's Twitter Profileg
Jake Williams

@MalwareJake

Breaker of software | GSE #150 | CTI/DFIR | @ians_security faculty | Bookings: jake at malwarejake dot com | He/him

ID:77346069

calendar_today26-09-2009 00:02:32

98,5K Tweets

130,5K Followers

1,8K Following

Follow People
Corey Quinn(@QuinnyPig) 's Twitter Profile Photo

Seems a lot of folks donโ€™t know that bucket names show up by default in the Certificate Transparency logs.

account_circle
tim: zionism is genocide ๐Ÿ‡ต๐Ÿ‡ธ(@elchefe) 's Twitter Profile Photo

If you build your infrastructure without an extraction plan, you are trapping yourself.

If you donโ€™t think thatโ€™s a problem, go back and look at Broadcomโ€™s strategy for VMWare and get back to me.

account_circle
Kelsey Hightower(@kelseyhightower) 's Twitter Profile Photo

The Serverless cliff.

Proprietary platforms are ok, but make sure you have a migration path, even if it's not perfect. You can hedge your bets by using platforms backed by open standards, think email and SMTP. Enjoy the initial benefits but don't get trapped by them.

account_circle
tim: zionism is genocide ๐Ÿ‡ต๐Ÿ‡ธ(@elchefe) 's Twitter Profile Photo

I had to break this news *many* times when I was at Duckbill.

At scale, lambda is almost always going to be more expensive than running persistent jobs in containers or VMs.

And running compute & block storage in a cloud provider is going to be more expensive than on prem.

account_circle
Jake Williams(@MalwareJake) 's Twitter Profile Photo

I endorse this message.

Seriously, come check out what we're doing at IANS to help our clients navigate the security struggle bus of securing the generative AI solutions business stakeholders are demanding.

account_circle
TentacleOps ( ;,;) ๐Ÿดโ€โ˜ ๏ธ ๐Ÿ™ ๐ŸŒฎ(@Cthulhu_Answers) 's Twitter Profile Photo

Someone asked why not use the same technique used to suspend my account against those who targeted me? Itโ€™s easy, Iโ€™m not a fraud, nor do we need to commit criminal acts to expose frauds and assholes. These acts are for the desperate and depraved. When they go low we get high.

account_circle
Corey Quinn(@QuinnyPig) 's Twitter Profile Photo

The real horror here is that when OP enabled CloudTrail for S3 data events each of those $1300 worth of S3 requests started charging them 20x more. Or, y'know. $26K for the month.

account_circle
Brynn Tannehill(@BrynnTannehill) 's Twitter Profile Photo

With dogs in the news, and handling of behavioral issues, I thought I'd talk about our experience with difficult dog breeds. Namely: the Siberian husky.

And not just any huskies: every one of ours are behavioral surrenders. 1/n

With dogs in the news, and handling of behavioral issues, I thought I'd talk about our experience with difficult dog breeds. Namely: the Siberian husky. And not just any huskies: every one of ours are behavioral surrenders. 1/n
account_circle
Dave Kennedy(@HackingDave) 's Twitter Profile Photo

What nyxgeek found was epic and should definitely read this blog.

We had to sit on this for almost a year for a fix - and it is huge one.

Ability to endlessly enumerate and password spray any Azure/Entra tenant across the globe - completely undetected. Unlimited threads for

account_circle
Joseph Cox(@josephfcox) 's Twitter Profile Photo

Today the FCC has fined US telcos $200 million for illegally sharing phone location data. This comes after a NYTimes investigation into how corrupt law enforcement were using this data, and then my investigation on bounty hunters being able to buy it docs.fcc.gov/public/attachmโ€ฆ

Today the FCC has fined US telcos $200 million for illegally sharing phone location data. This comes after a NYTimes investigation into how corrupt law enforcement were using this data, and then my investigation on bounty hunters being able to buy it docs.fcc.gov/public/attachmโ€ฆ
account_circle
Jake Williams(@MalwareJake) 's Twitter Profile Photo

Nothing in security is easy.

Anyone who tells you otherwise is misinformed, outright delusional, or selling you something.

account_circle