Steve YARA Synapse Miller(@stvemillertime) 's Twitter Profileg
Steve YARA Synapse Miller

@stvemillertime

cyber-physical intel @google

writing & sharing on adversary tradecraft, dfir, malware, threat detection, ics/ot intel and all things #yara

ID:19564532

linkhttps://keybase.io/stvemillertime calendar_today26-01-2009 23:03:07

5,5K Tweets

14,9K Followers

1,2K Following

Follow People
Jared Atkinson(@jaredcatkinson) 's Twitter Profile Photo

From 'Principles of Categorization.' Rosch describes 'cognitive economy' where we use categories to simply the process of information gathering, but the higher the resolution of the category (think granny smith vs. apple vs. fruit) the greater the cost on our finite cognitive…

From 'Principles of Categorization.' Rosch describes 'cognitive economy' where we use categories to simply the process of information gathering, but the higher the resolution of the category (think granny smith vs. apple vs. fruit) the greater the cost on our finite cognitive…
account_circle
LABScon(@labscon_io) 's Twitter Profile Photo

Check this Microsoft x PwC research collab, coming to

labscon.io/speakers/adrie…
labscon.io/speakers/bendi…

account_circle
Steve YARA Synapse Miller(@stvemillertime) 's Twitter Profile Photo

Thank you Phil Stokes ⫍🐠⫎ for this awesome macOS research and TTP-focused YARA ruleset github.com/SentineLabs/ma…

(and props for putting all the in one single file, this facilitates a much easier analyst user experience)

account_circle
Steve YARA Synapse Miller(@stvemillertime) 's Twitter Profile Photo

Things ebb and flow, but this week I am reminded of my good fortune, and I am feeling especially grateful to be part of an amazing team full of impassioned, clever and humble analysts, engineers and hackers.

account_circle
Steve YARA Synapse Miller(@stvemillertime) 's Twitter Profile Photo

Adaptation requires deliberate, consistent exposure. That thing you want to be stronger, faster, better at? Build a routine and train on it regularly. I've gotten pretty good at stuff I do every day: guitar, YARA, pullups, etc. The compounding effect of regular training is huge.

account_circle
Aaron Stephens(@x04steve) 's Twitter Profile Photo

A lot of my work involves shuttling data around to and from various APIs, and so often I run into the same issues with them that I think it’s slowly but surely killing me. So for my own catharsis, here’s a short list of the most common offenses.

account_circle
Steve YARA Synapse Miller(@stvemillertime) 's Twitter Profile Photo

Great opportunity to work on detections at an epic scale across a variety of data, threats, technologies, plus Jack is pretty cool

account_circle
Nick Carr(@ItsReallyNick) 's Twitter Profile Photo

How most ransomware incidents actually work 🔻
Access brokers sell access to compromised networks to ransomware-as-a-service affiliates, who conduct the intrusions.
Ransomware-as-a-service affiliates prioritize targets based on intended impact or perceived profit
Intrusion…

How most ransomware incidents actually work 🔻 Access brokers sell access to compromised networks to ransomware-as-a-service affiliates, who conduct the intrusions. Ransomware-as-a-service affiliates prioritize targets based on intended impact or perceived profit Intrusion…
account_circle