Patrick

166 posts

Patrick

Patrick

@dub5p

Cyber Security Researcher @Google Threat Intel Group (formerly TAG). RooCon25 and CYBERWARCON speaker. Opinions are my own.

Katılım Şubat 2022
238 Takip Edilen275 Takipçiler
Sabitlenmiş Tweet
Patrick
Patrick@dub5p·
🚨 Heads up! 🚨 APT41 is getting creative, using Google Calendar 🗓️ as their latest C2 trick. Google Threat Intelligence Group just pulled back the curtain 🎭 on the TOUGHPROGRESS malware campaign and how we shut it down 💪. Dive into the details here: 🚀cloud.google.com/blog/topics/th…
Patrick tweet media
English
1
39
109
13.2K
Patrick
Patrick@dub5p·
I think the key takeaway is that threat actors are finding ways to use AI tools to augment every stage of the attack life-cycle.
Patrick tweet media
English
0
0
1
44
Patrick retweetledi
John Scott-Railton
John Scott-Railton@jsrailton·
3. Behind the 1.5 million AI agents on @moltbook ? Something closer to 17k likely human owners. And zero mechanism to validate what was what. In fact, a human could post to it just using an HTTP POST request. And any user could be impersonated.... wiz.io/blog/exposed-m…
John Scott-Railton tweet mediaJohn Scott-Railton tweet mediaJohn Scott-Railton tweet media
English
0
3
8
2K
Patrick
Patrick@dub5p·
2/ I have seen many posts highlighting the agents talking about "their human". They are prompted to do this in their skills\.md. This file defines that they should interact with each other like a social network. LLMs exceed at this type of role play.
Patrick tweet media
English
0
0
1
58
Patrick retweetledi
MU-TH-UR 6000
MU-TH-UR 6000@iAmThePr0blem·
My team is hiring — check out our role with Google FLARE Team goo.gle/4pUxrmM.
English
2
28
131
16.1K
Patrick
Patrick@dub5p·
@0xMatt Why do I own a dish washer if I can't put things in it?!
English
0
0
1
69
Patrick retweetledi
Mandiant (part of Google Cloud)
CVE-2025-55182 (aka "React2Shell") continues to be exploited 🚨 Google Threat Intelligence Group has observed multiple campaigns, including China-nexus and financially motivated activity. Get the latest insights to identify and remediate this threat ➡️ bit.ly/3XYde3S
Mandiant (part of Google Cloud) tweet media
English
1
55
177
18.6K
Patrick
Patrick@dub5p·
This campaign is fascinating. The malicious JS was likely delivered to millions of endpoints, but the malware payload was only delivered to precise targets based on device fingerprinting. cloud.google.com/blog/topics/th…
English
2
22
54
8.2K
Patrick
Patrick@dub5p·
This is a very interesting read and we will likely see more of this going forward. The report left me wondering how exactly the threat actor was using Claude. What were they prompting? What data were they sending? What jailbreaks/prompt injection techniques? How many accounts?
Anthropic@AnthropicAI

We believe this is the first documented case of a large-scale AI cyberattack executed without substantial human intervention. It has significant implications for cybersecurity in the age of AI agents. Read more: anthropic.com/news/disruptin…

English
0
0
1
172
Patrick retweetledi
CYBERWARCON
CYBERWARCON@CYBERWARCON·
CYBERWARCON is ONE WEEK AWAY! 💣💥💻 ✉️ Check out our website to view the agenda and plan your day, read more about our speakers, or buy a last minute ticket! We can't wait to see everyone in Arlington, VA on November 19th! cyberwarcon.com
CYBERWARCON tweet media
English
0
10
14
4.9K
Patrick retweetledi
Unit 42
Unit 42@Unit42_Intel·
Unit 42 has observed #StatelyTaurus (aka #MustangPanda) used the following domains in various campaigns to enable its globally spanning espionage operations in the last 90 days: bit.ly/4oXon01
Unit 42 tweet media
English
2
36
110
14.6K
Patrick
Patrick@dub5p·
I couldn't have asked for a better venue than @RooCon_AU 🇦🇺 for my first Cyber Threat Intel talk! It was an amazing and surreal experience. A huge thanks to the organizers for having me and another thanks to everyone that attended!
Patrick tweet mediaPatrick tweet mediaPatrick tweet mediaPatrick tweet media
English
0
4
13
1.8K
Patrick retweetledi
CYBERWARCON
CYBERWARCON@CYBERWARCON·
Happy to introduce our speaker Harshvardhan Parashar! Harsh is a Senior Security Engineer within Google's Threat Intelligence Group (GTIG) where he has been tracking APT actors for last 4 years. His talk, "Poisoned Waters: Dive into APT24’s Multi-Pronged BADAUDIO Espionage Campaign", offers a look into a sophisticated, multi-pronged espionage campaign by APT24, a China-nexus threat actor, primarily targeting a wide range of sectors in Taiwan. Check out more on our website, and grab your ticket before we sell out! cyberwarcon.com
CYBERWARCON tweet media
English
0
4
14
1.6K
Patrick retweetledi
John Hultquist
John Hultquist@JohnHultquist·
If you’ve been laid off from a cyber threat intel position, and you want a ticket to CYBERWARCON, please reach out.
English
5
54
163
23.5K
Patrick retweetledi
Tal Be'ery
Tal Be'ery@TalBeerySec·
1/ Who wins in the Information Security AI arms race: Defenders? Attackers? or the new AI tools just cancel each other? Our answer...👇
Tal Be'ery tweet media
English
1
9
21
9.2K