☕
Threat Intel Engineer, runs Sources & Methods newsletter and blog
- United States
- sourcesmethods.com
- @mattreduce.com
Russell Jurney
rjurney
LLMs meet Knowledge Graphs, graph AI, GNNs, applied research, entrepreneur, CTO.
QA -> full_stack -> viz_eng -> data scientist & engineer -> graph ML engineer
Graphlet AI San Francisco, CA
LaurieWired
Reverse engineer specializing in cross-platform malware analysis with a focus on mobile threats.
The Art of Data Journalism
The-Art-of-Data-Journalism
Code, data and resources supporting the tools to teach data journalism.
United States of America
Mark @ OSINT-Research
OSINTResearch
OSINT Researcher
Finds it!
#osint #socmint #geoint #opsec #python
David Greenwood
himynamesdave
I build products that make threat intelligence analysts go; "Wow! That's what I need!".
dogesec
alden
ald3ns
sr detection engineer @ huntress | interested in reverse engineering, malware analysis, detection engineering, and threat research
Huntress
Model Context Protocol
modelcontextprotocol
An open protocol that enables seamless integration between LLM applications and external data sources and tools.
signalblur
signalblur
Cloud Threat Detection @ Fortune 50
#DFIR #Python #Yara #SIEM #Infosec
@Magonia-Research 127.0.0.1
Data and Research Center – DARC
dataresearchcenter
The Data and Research Center (DARC) is an independent organization providing bespoke data and research services for investigative teams.
Randall Hettinger
Permiso-Randall
Helping you unleash the cloud security hero inside you!
Permiso Vancouver, Canada
Rachel James
cybershujin
Never hard to get me to talk threat intelligence. Just hard to get me to stop.
James Bell
abstract-base-method
Technology People Leader, Software Engineer, occasional production incident
@hashicorp USA
The MITRE Corporation
mitre
Open Source Software from the MITRE Corporation
United States of America
Cobalt Strike
Cobalt-Strike
The official public repository for Cobalt Strike related projects.
ProjectDiscovery
projectdiscovery
Monitor your infrastructure. Real vulnerabilities. Zero noise.
PreviousNext