gleeda

@gleeda@infosec.exchange

https://infosec.exchange/@volatility Core Dev | Art of Memory Forensics co-author | #DFIR trainer and enthusiast | Director of R&D at https://infosec.exchange/@huntress

This profile is from a federated server and may be incomplete. Browse more on the original instance.

gleeda, to random

I’m looking to hire a Principal Threat Intelligence Analyst here at @huntress . You’ll get to build a new program focused on the small business space (those that fall below the cybersecurity poverty line). Please feel free to reach out to me if you have questions or think you might be a good fit:

https://boards.greenhouse.io/huntress/jobs/5856974003

gleeda, to infosec

As a manager you should be open to constructive criticism just as you expect ICs to be. Expecting to only broadcast your criticisms while remaining beyond reproach is setting everyone including yourself up for failure. Take the time to listen.

gleeda, to Cybersecurity

The @huntress team identified abuse of the One-to-Many relationship between a pharmaceutical vendor and their Pharmacy/Health Clinic users.

Attacks via the Software Supply Chain leave end customers at risk. Read our full blog for the complete story.

https://www.huntress.com/blog/third-party-pharmaceutical-vendor-linked-to-pharmacy-and-health-clinic-cyberattack

jerry, to random

I’ve never been to a restaurant that has a pool before. This one has a massive screen for people to watch football

gleeda,

@jerry do you swim before eating? Or after?

gleeda, to random

In light of all the news about qakbot being dismantled, it’s time to let people know about something we did at @huntress :
@JohnHammond discusses the qakbot “vaccine” we used to prevent the spread of qakbot in our customer base:

https://www.huntress.com/blog/qakbot-malware-takedown-and-defending-forward

briannawu, to random
@briannawu@mstdn.social avatar

Women of Mastodon! How do you deal with men talking over you in a professional setting?

gleeda,

@briannawu depends on how bad it is. I’ve often called it out- “I know you’re excited about this topic, but please let me finish first”. “You’ll get your turn here in a minute”. “excuse me, I was speaking”. “I’m not done talking”. “Are you done?” Wait for them to finish and then continue “As I was saying…”.

Sometimes I’ve talked louder over the person (maybe that’s not the best way though 😂🤣)

gleeda, to opensource

This shit is why people stop contributing to open source and releasing open source projects: predatory companies taking open source projects and calling them their own with little or not contributions back. It burns innovation and demoralizes creators who keep pushing the needle.

As hard as it is for people to break into infosec, people often release open source projects to prove their worth. This kind of shit can ruin that spirit. As a long time member of the open source community, I feel like I need to call BS where I see it. Companies must be held accountable and should abide by licensing and contribute back as warrented by said licensing. I hope to see some contributions and good faith back to https://cipp.app/

https://www.linkedin.com/posts/matthe_so-excited-about-this-one-microsoft-365-activity-7080485615812653056-7UXq

gleeda,

@dostalcody it’s difficult to make companies like this course correct. And unfortunately it’s difficult to enforce some of these open source licenses when the offenders outweigh you as well

gleeda,
catvalente, to random

Made my own for the first time and hoooo boy this is the bestness (drizzled with Szechuan chili oil because life is short and there are no rules)

gleeda,

@catvalente @melissabeartrix looks amazing 🤩

gleeda, to random

I am happy to announce that I will be giving a training at @defcon this summer on Windows Memory Forensics!

This class demonstrates the importance of including Volatile memory in your investigations by covering several attack methodologies that we’ve seen in the field. It also includes an overview of the most widely used memory forensics tool, Volatility, by one of its developers.

Students will leave the class with the ability to investigate modern malware techniques, and quickly answer questions posed in DFIR investigations and help get to root cause of an attack.

https://training.defcon.org/products/jamie-levy-windows-memory-forensics

Viss, to random
@Viss@mastodon.social avatar

pepperoni, pineapple, artichoke heart, red onion, jalapeno (a hot one!), aome cherry tomatoes to line the crust, parmesean and red peper flakes after.
nom :D

gleeda,

@Viss that looks beautiful

patrickcmiller, to random

The brilliant @hacks4pancakes and the rest of the panel at the sandbox panel and beer bash.

gleeda,

@patrickcmiller @hacks4pancakes I see @JohnHammond there too! Looks like fun 🤩

  • All
  • Subscribed
  • Moderated
  • Favorites
  • provamag3
  • kavyap
  • DreamBathrooms
  • cisconetworking
  • magazineikmin
  • InstantRegret
  • Durango
  • thenastyranch
  • Youngstown
  • rosin
  • slotface
  • mdbf
  • khanakhh
  • tacticalgear
  • JUstTest
  • everett
  • modclub
  • Leos
  • cubers
  • ngwrru68w68
  • ethstaker
  • osvaldo12
  • GTA5RPClips
  • anitta
  • megavids
  • normalnudes
  • tester
  • lostlight
  • All magazines