Andrew Case

20.5K posts

Andrew Case banner
Andrew Case

Andrew Case

@attrc

@Volatility Core developer, Dir. of Research @Volexity, @lsucyber, The Art Of Memory Forensics Co-Author

New Orleans, LA Katılım Mart 2010
4.5K Takip Edilen27.4K Takipçiler
Sabitlenmiş Tweet
Andrew Case
Andrew Case@attrc·
With Volcano, security teams can automate the entire workflow of acquisition of memory and select files to deep analysis to automated alerts that directly point to signs of memory only malware and attacker activity throughout RAM and key artifacts sources from disk.
Volexity@Volexity

.@Volexity Volcano Server & Volcano One v25.09.21 adds memory analysis support for ARM64 Linux, macOS 26 (Tahoe) & Windows 25H2, as well as 75+ new YARA rules, 10+ new IOCs, analysis of udev rules, and rolling upgrades for managed endpoints. [1/2]

English
0
5
12
7.8K
Andrew Case retweetledi
volatility
volatility@volatility·
We have announced the winners of the 2025 @volatility #PluginContest! And the First Place is: Daniel Baier for XFRM Inspector Read the full Contest Results in our blog post: volatilityfoundation.org/the-2025-volat… Congrats to all winners & thank you to all participants! #DFIR #memoryforensics
volatility tweet media
volatility@volatility

The 2025 @volatility #PluginContest review is complete! We received 8 submissions from 7 different countries that included 20 plugins! We will be highlighting each #Contender & the winners will be announced on Friday! #DFIR #memoryforensics

English
0
6
11
3.1K
Andrew Case retweetledi
Jamie Levy🦉
Jamie Levy🦉@gleeda·
🧵 We recently had an incident that involved a MuddyWater hands-on attacker who couldn't spell "administrators" Full timeline breakdown below. 1/
Jamie Levy🦉 tweet media
English
14
74
362
54.3K
Andrew Case retweetledi
volatility
volatility@volatility·
We are excited to announce the 2025 @volatility #PluginContest First Place winner is: Daniel Baier for XRFM Inspector See the full Contest Results: volatilityfoundation.org/the-2025-volat… Congrats to all winners & thank you to all participants! #DFIR #memoryforensics
volatility tweet media
volatility@volatility

The 2025 @volatility #PluginContest review is complete! We received 8 submissions from 7 different countries that included 20 plugins! We will be highlighting each #Contender & the winners will be announced on Friday! #DFIR #memoryforensics

English
1
7
12
3.3K
Andrew Case
Andrew Case@attrc·
We (@Volexity) are looking to hire for two roles in our rapidly growing software engineering team and ecosystem. The first role is for a Group Product Manager and the second a Senior Product Manager. Both roles will be on-site in Silver Spring, Maryland. volexity.com/company/career…
English
0
4
7
1.2K
Andrew Case retweetledi
Andrew Case
Andrew Case@attrc·
With Volcano, security teams can automate the entire workflow of acquisition of memory and select files to deep analysis to automated alerts that directly point to signs of memory only malware and attacker activity throughout RAM and key artifacts sources from disk.
Volexity@Volexity

.@Volexity Volcano Server & Volcano One v25.09.21 adds memory analysis support for ARM64 Linux, macOS 26 (Tahoe) & Windows 25H2, as well as 75+ new YARA rules, 10+ new IOCs, analysis of udev rules, and rolling upgrades for managed endpoints. [1/2]

English
0
5
12
7.8K
Andrew Case retweetledi
BSidesPGH
BSidesPGH@BSidesPGH·
We’re accepting presentation proposals for BSidesPGH on July 10, and we’d love to hear what you’re working on, learning, or passionate about. CFP is open now through April 15 so you’ve got time to polish your abstract and hit submit. Submission details at bsidespgh.com
English
1
1
2
413
Andrew Case retweetledi
Army Counterintelligence Command (ACIC)
It doesn't take a mathematician to figure out "10 + 5 = honeytrap." Report suspicious behavior. (Graphic made with AI)
Army Counterintelligence Command (ACIC) tweet media
English
581
1.4K
9.1K
1.6M
Andrew Case retweetledi
Jamie Levy🦉
Jamie Levy🦉@gleeda·
We're looking for a Principal Threat Intel Incident Commander here at @HuntressLabs ! Do you love to: 🔍 Conduct #DFIR analysis? 👀 Track threat actors? 🕸️ Work with others across different departments? ✍️ Write about your findings? 👩‍💼 Present your work? 👇
English
4
33
93
17.4K
Max Harley
Max Harley@0xdab0·
I'm really proud of what Shane and I did here. I'm biased, but from the results I've seen, this is a hugely scalable way to improve offsec models. It took a ton of engineering work to get it working, but the results speak for itself.
dreadnode@dreadnode

We fine-tuned an 8B model to pop a GOAD domain…using only synthetic training data. No real networks. No frontier model distillation. Just a world model that simulates AD environments and generates realistic pentesting trajectories. See how @shncldwll and @0xdab0 did it: dreadnode.io/blog/worlds-a-…

English
6
14
68
8K
Andrew Case
Andrew Case@attrc·
@0xdab0 It is really nice work! I have been performing some research on the opposite direction, for automated detection creation, and it will be fun to eventually observe both sides (attack and defense) when automated like this.
English
1
0
1
180
Andrew Case retweetledi
kernelcon
kernelcon@_kernelcon_·
REPOST! NEW WORKSHOP! 4.8 ONLY Hands-on Ham Radio Workshop - expand your comm skills & explore a critical tech that bridges emergency response, sec, and off-grid comms. Upon completion, attendees will be qualified to test for their HAM radio license! #ham-radio-workshop" target="_blank" rel="nofollow noopener">kernelcon.org/training#ham-r…
kernelcon tweet media
English
1
3
3
683
Andrew Case retweetledi
J. A. Guerrero-Saade
J. A. Guerrero-Saade@juanandres_gs·
There’s no need to suffer through the rough patch of indeterministic Claude Code behaviors. Here’s my config to get you started w proper planning, implementation, and review, phased development, decision point documentation, git worktrees, and consensus deep research implemented w deterministic hooks. It’s a WIP. Hope it helps! github.com/juanandresgs/c…
English
4
27
161
22.2K