Jamie Levy🦉
@gleeda
@Volatility Core Dev | Art of Memory Forensics co-author | Director of Adversary Tactics @HuntressLabs | #DFIR enthusiast/trainer | [email protected]
🚨 Two hours 'til Product Lab LIVE 🚨 Chris. Kyle. All 500+ Huntress employees from Summer Summit. You & other VIPs. We’re talking spicy AI opinions, roadmap reveals, product sneak peeks, and a live Q&A with the builders. Join in the fun: huntress.com/product-lab-ch…
The 13th annual @volatility #PluginContest is now OPEN! This is a meaningful way to contribute to open source forensics & gain community-wide visibility for your work. And, as always, winners get cash prizes! Submission Deadline: 31 December 2025 #dfir #memoryforensics
You can find full details in our latest blog post: volatilityfoundation.org/the-13th-annua…
That’s the best pentest report from the ransomware ops - deploy Huntress agent 💙
The FBI has put out a much more nuanced explanation of what CTI researchers have been tracking for years: ic3.gov/PSA/2025/PSA25… Completely different from what CISA put out in 2023 on “Scattered Spider” here: cisa.gov/news-events/cy… One is holistic, the other is DFIR focused.
Black Mass Volume III is available for free as a PDF and for sale as a physical copy on Amazon Locations available: US, UK, DE, FR, ES, IT, NL, PL, SE, JP, CA, AU Subsequent post contains link to US Amazon link. Use your countries Amazon domain to buy the book.
So stoked to be speaking alongside @birchb0y at #OBTS v8 this year. The caliber of speakers on this dais are stellar. Can't wait to hang out in Spain with the Mac security community. Don't miss our Blue's Clues themed talk - featuring Steve and Blue 🐾
📢 Just dropped: the full #OBTS v8 talk lineup! objectivebythesea.org/v8/talks.html And for the first time we'll have 3 full days of presentations! 🤩 Congrats to the selected speakers and mahalo to all who submitted. With ~100 submissions, selecting the final talks was a daunting task! 😫
im so pumped to be talking through some fun north korean malware with @stuartjash at #OBTS v8 🤠 it's truly a goated lineup and i'm very humbled to be speaking along side so many sick researchers (also dw i will be dressed up in a blues clues onesie for the talk)
📢 Just dropped: the full #OBTS v8 talk lineup! objectivebythesea.org/v8/talks.html And for the first time we'll have 3 full days of presentations! 🤩 Congrats to the selected speakers and mahalo to all who submitted. With ~100 submissions, selecting the final talks was a daunting task! 😫
The Call For Speakers for #FTSCon closes tomorrow! Make sure to submit your talks before the deadline! This is a great opportunity to share your #DFIR open source tools and investigation tales with leading experts in the field.
The Call for Presentations for From the Source 2025 is open! Our Makers Track is aimed at developers of open source DFIR tools and the Hunters track covers the best Threat Intel research of the past year. See the full details in our blog post: volatilityfoundation.org/announcing-fts…
Been thinking about this for a while and realised that I technically the Function Fluctuation technique can be used to do almost the same stuff minus the "overwrite previously executed stub" part. Maybe I will implement that next. Ref: github.com/whokilleddb/fu…
chinese.polymorphic.shellcode.
Hey @grok what was the best year of the OST offensive security tool debate on X. Who were the biggest players on either side.
Hey @grok what was the best year of the OST offensive security tool debate on X. Who were the biggest players on either side.
After noticing lack thereof any tracking over the cyber domain of the recent attack of Israel against Iran, I started putting together a minimal list of notable cyber attacks (that I've heard of). This is focused, for now, on IL>IR side. The credibility of notes varies of…
Just one day left to submit to the @BSidesNYC CFP. Don't miss out! bsidesnyc.org/cfp/
Even better is that if you just search "putty" in your start menu, the malicious ad is the one that pops up!
We’ve started seeing Crux ransomware, which seems to be related to / affiliated with BlackByte ransomware (maybe?). Since we haven’t really seen anything about them, we wrote up a bit of info: huntress.com/blog/crux-rans…
Red teamers, no need to “pull” clipboard data when Windows already saves it all on disk for you in a neat little file 🗿 (including past clipboard items) inversecos.com/2022/05/how-to…
Most red teamers ignore the clipboard. You can pull: – VPN creds – MFA tokens – AWS keys – Password manager dumps All from CTRL+C. Nobody checks it. Nobody clears it. But it’s always there. Use it. 👊🏾
awesome thread by @4n6lady on AWS DFIR!
I’m an Incident Responder on the AWS Customer Incident Response Team (CIRT). And I get asked a lot of questions, like: “Where do I even start with incident response in the cloud?” Here’s a beginner-friendly thread on AWS IR tips — with a few lessons I learned 🧵👇
Where did this go guy? He always posted funny memes and now he's gone
Where did this go guy? He always posted funny memes and now he's gone
Only one week left to submit your talk for #FTSCon 2025!
REMINDER: The Call for Speakers for #FTSCon is open! The deadline is July 23. See the full details in our blog post: volatilityfoundation.org/announcing-fts… #dfir #FTSCon