sydney

752 posts

sydney

sydney

@letswastetime

`thrunter` | opinions != employers | she/her | search "thrunting soundtrack" | eval link="https://t.co/7EA1367cqG"

Arizona, USA Katılım Nisan 2007
361 Takip Edilen565 Takipçiler
sydney
sydney@letswastetime·
"The More I Learn, The Less I Know." The hardest part of getting into cybersecurity isn't the technical skills. It's picking a direction when every path branches into three more. Our @THOR_Collective Dispatch guest, Bella San Lorenzo nails it. 👉 dispatch.thorcollective.com/p/the-more-i-l…
sydney tweet media
English
1
1
2
44
sydney
sydney@letswastetime·
OpenClaw isn't malware. It's a legitimate tool that store credentials, retain memory, and act autonomously. That's what makes it dangerous when misused. Full behavioral breakdown in our latest Hunt Mode post. 🦀 nebulock.io/blog/hunting-o…
English
2
0
3
124
sydney
sydney@letswastetime·
“I’m not a developer” is a self-imposed limit. If you’ve written a query, a script, or an automation to fix a problem, you’re already building. In the latest @THOR_Collective Dispatch, we talk about why building is a core security skill. dispatch.thorcollective.com/p/why-you-shou…
sydney tweet media
English
1
1
2
49
sydney retweetledi
AISecHub
AISecHub@AISecHub·
The Agentic Threat Hunting Framework - Learn → Observe → Check → Keep - github.com/Nebulock-Inc/a… Meet the Agentic Threat Hunting Framework (ATHF) that changes this approach by introducing structure. You follow the same pattern in every hunt. You record every lesson. You make every hypothesis searchable. AI tools use that structure to recall and reason across your entire hunting history instead of guessing. For hunters using the PEAK framework, ATHF builds on the foundations of how to hunt by giving you structure, memory, and continuity. PEAK guides the work. ATHF ensures you capture the work, organize it, and reuse it across future hunts. Once you add that structure and continuity, you still need a shared workflow. You need a consistent loop that both humans and AI can follow without drifting or reinventing steps.
English
3
56
268
15.6K
sydney
sydney@letswastetime·
DigitStealer is an excellent example of where macOS malware is heading: multi-stage, modular, and using legit macOS tools like it belongs there. Detect the attack, not the sample. Shoutout @JamfSoftware Threat Labs 🙌 nebulock.io/blog/hunting-d…
sydney tweet media
English
1
0
2
96