Ryan

1.3K posts

Ryan banner
Ryan

Ryan

@Haus3c

Director of Research @BeyondTrust @btphantomlabs. Former @SpecterOps; @Microsoft. "Old man yells at cloud" vibes

Charlotte, NC Katılım Kasım 2015
354 Takip Edilen6.7K Takipçiler
Ryan
Ryan@Haus3c·
I genuinely don't think people are talking about this enough. --sdk-url is a non-documented Claude Code argument that circumvents your corporate Claude 'remote control' policy and allows outbound connections to any server. Claude can quite literally be considered a C2 framework.
Origin@originhq

Claude Code's remote control protocol lets developers orchestrate instances programmatically. @tyholms reverse engineered it and found an undocumented flag that redirects any instance to attacker-controlled infrastructure, silently bypassing all permission checks. originhq.com/blog/reversing…

English
2
4
27
3.9K
Ryan
Ryan@Haus3c·
After doing just cloud stuff for so long, I figured I should hop on the AI train, so this is my first dive into AI security research beyondtrust.com/blog/entry/cla…
English
1
7
23
1.8K
Ryan
Ryan@Haus3c·
I'm looking for a senior/staff level researcher to join my team @btphantomlabs. I'm looking for someone who: - Has research experience in the Cloud, identity, and/or AI space - Understands attack path management + graph theory - Active directory knowledge is a plus - History of making blog posts/webinars/conference talks/etc. is also a huge plus This is a full time research role on a dedicated research team. Fully remote, competitive salary. Apply here: beyondtrust.com/company/career…
English
0
7
11
1.2K
Ryan retweetledi
BeyondTrust Phantom Labs™
BeyondTrust Phantom Labs™@btphantomlabs·
Breaking: Newly uncovered OpenAI Codex vuln enables command injection via GitHub branch names in task creation requests. Attackers could steal GitHub user access tokens & sensitive data. Full breakdown by Tyler Jespersen: lnkd.in/ewdTaiEa #OpenAI #BTPhantomLabs
BeyondTrust Phantom Labs™ tweet media
English
4
33
122
211.5K
Microsoft Threat Intelligence
Microsoft Threat Intelligence@MsftSecIntel·
Microsoft Threat Intelligence has observed threat actors actively experimenting with techniques to bypass or “jailbreak” AI safety controls. By reframing malicious requests, chaining instructions across multiple interactions, and misusing system‑ or developer‑style prompts, threat actors can coerce models into generating restricted content that bypasses built‑in safeguards. These techniques demonstrate how generative AI models are probed, shaped, and redirected to support reconnaissance, malware development, and social engineering while minimizing friction from moderation. AI guardrails have become dynamic surfaces that attackers test and manipulate to sustain operational advantage. As AI becomes more deeply embedded in enterprise workflows, understanding how attackers test and manipulate these guardrails is critical for defenders. Learn more about securing generative AI models on Azure AI Foundry: msft.it/6013Qs5oX
English
61
51
311
1M
Ryan retweetledi
Origin
Origin@originhq·
Introducing Praxis, an adversarial framework for discovering, controlling, and orchestrating computer-use agents running on endpoints. Announcement → originhq.com/blog/praxis-an… Get Praxis → praxis.originhq.com
English
3
18
62
13.6K
Jonny Johnson
Jonny Johnson@JonnyJohnson_·
I'd really like to take a moment and give a shoutout to @zodiacon. Over the past several months (and continuing this year) I have had a private mentorship with Pavel where we go over Windows Internals, Systems Programming, etc. This mentorship has helped me significantly in understanding Windows better, as well as making me a more confident researcher/programmer. A reminder: You will never know it all, and you should always push yourself to cover knowledge gaps😃
English
3
3
28
6.3K
Ryan
Ryan@Haus3c·
🦀🦀In the beginning was the Prompt, and the Prompt was with the Void, and the Prompt was Light. 🦀🦀 jpcaparas.medium.com/ai-agents-now-… Easily the funniest thing I've read so far this year
English
0
0
3
618
Ryan
Ryan@Haus3c·
I wanted to write something since it's been years, but I would constantly shut myself down because I had no CVEs, new tooling, etc., to share. Then I remembered someone I highly respect once said "If you find it interesting, then it's worth writing about. That's all that matters"
English
2
0
7
589
Ryan
Ryan@Haus3c·
Fun fact: If you're forwarding events from Azure to Log Analytics, the TenantId field isn't your EntraID tenant. It's the Log Analytics workspace ID. Because that makes sense.
Ryan tweet media
English
0
0
2
621
Ryan
Ryan@Haus3c·
@0xdab0 clemson still aint winning the natty
English
0
0
0
62
Max Harley
Max Harley@0xdab0·
It will happen when the weather cools
English
2
0
0
224
Ryan
Ryan@Haus3c·
@0xdab0 @_xpn_ Sounds like drowning it in the river will fix it
English
0
0
2
60
Max Harley
Max Harley@0xdab0·
@_xpn_ It really is. I've searched Apple docs and nobody has a great way to fix it
English
1
0
0
198
Max Harley
Max Harley@0xdab0·
If this notification doesn't stop, I will drown this laptop in the river
Max Harley tweet media
English
1
0
2
835
Max Harley
Max Harley@0xdab0·
I want stickers to be a first class citizen on every platform. I want the same sticker packs on iMessage, Signal, Slack, and Discord Although there's some Signal sticker packs I would never want to leave Signal
English
2
0
6
584
Ryan
Ryan@Haus3c·
@HackingLZ Then you remember the front
Ryan tweet media
English
1
0
1
140
Justin Elze
Justin Elze@HackingLZ·
Whenever someone talks about 996 here this is all I think of
Justin Elze tweet media
English
4
0
28
2.8K
Ryan retweetledi
Dirk-jan
Dirk-jan@_dirkjan·
I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…
English
140
903
3.2K
472.7K
Ryan
Ryan@Haus3c·
@corg_e Probably the most overrated book I've read. I thought the ending would be crazy or something and it ended up being worse than the rest of the book.
English
0
0
1
200