Distinguished Malware Analyst @ Dragos.
Lead Analyst on TRISIS and PIPEDREAM.
He/Him
Aside from studying reverse engineering, I lift weights, play a lot of board games and try to keep my philosopher dog, Velma, entertained.
Here's an example of my work:
www.dragos.com/blog/analyzi...
This is not a supply chain attack in the traditional sense.
1/6
This is not a supply chain attack in the traditional sense.
1/6
“I live at 502 Westport Ave.”
“Sweet, I’m sending you a package.”
“Wait! If you talk to the mail carrier, my address is 501 Westport Ave.”
“Oh. So, you live at 501 Westport?”
(1/2)
“I live at 502 Westport Ave.”
“Sweet, I’m sending you a package.”
“Wait! If you talk to the mail carrier, my address is 501 Westport Ave.”
“Oh. So, you live at 501 Westport?”
(1/2)
I'm excited to share what I learn come February!
1/2
I'm excited to share what I learn come February!
1/2
1/3
1/3
You buy tasty popcorn, and the money funds the trip with an option to donate to teachers.
Check it out and support a good cause! I just bought a bunch for our weekly board game meetup :)
s.dgpopup.com/0o409evs/rp
You buy tasty popcorn, and the money funds the trip with an option to donate to teachers.
Check it out and support a good cause! I just bought a bunch for our weekly board game meetup :)
s.dgpopup.com/0o409evs/rp
@sam-hans0n.bsky.social and I share stories of malware we discovered while searching for ICS threats, and discuss our approach to assessing their reputation.
Don't Cry Wolf: Evidence-Based Assessment of ICS Threats
@sam-hans0n.bsky.social and I share stories of malware we discovered while searching for ICS threats, and discuss our approach to assessing their reputation.
Don't Cry Wolf: Evidence-Based Assessment of ICS Threats
So, save your old Windows ISOs and VMs, you might need them!
So, save your old Windows ISOs and VMs, you might need them!
ICYMI, we posted resources from our talk here:
gist.github.com/maya...
ICYMI, we posted resources from our talk here:
gist.github.com/maya...
deathmeta.bandcamp.com/album/malware
deathmeta.bandcamp.com/album/malware
Voting ends on Wednesday, October 8. If you haven’t voted yet, please consider it!
(I’m a finalist in the ICS category alongside some amazing industry leaders)
www.sans.org/about/awards...
Voting ends on Wednesday, October 8. If you haven’t voted yet, please consider it!
(I’m a finalist in the ICS category alongside some amazing industry leaders)
www.sans.org/about/awards...
github.com/xorhex/binja...
github.com/xorhex/binja...
Link below. Voting ends on Oct. 8.
Link below. Voting ends on Oct. 8.
CVE-2024-4577 exploits Windows’ Best Fit character conversion feature that auto-converts certain Unicode characters to ASCII equivalents.
1/3
CVE-2024-4577 exploits Windows’ Best Fit character conversion feature that auto-converts certain Unicode characters to ASCII equivalents.
1/3
hex-rays.com/blog/id...
#idapro #reverseengineering
hex-rays.com/blog/id...
#idapro #reverseengineering
Original post: hachyderm.io/@mweagle/115...
Original post: hachyderm.io/@mweagle/115...
#ICS #OTSecurity
#ICS #OTSecurity
Looking forward to seeing the use case spotlights that they’ll be publishing.
youtu.be/IaOucXb033Q
#idapro #reverseengineering
Looking forward to seeing the use case spotlights that they’ll be publishing.
youtu.be/IaOucXb033Q
#idapro #reverseengineering
- Microcontroller Exploits - Goodspeed
- Hack to the Future - Crose
- Hardware Hacker - bunnie
- Hardware Hacking Handbook - Van Woudenberg + O’Flynn
- Art of Mac Malware (Vol 1+2) - Wardle
- Microcontroller Exploits - Goodspeed
- Hack to the Future - Crose
- Hardware Hacker - bunnie
- Hardware Hacking Handbook - Van Woudenberg + O’Flynn
- Art of Mac Malware (Vol 1+2) - Wardle
www.zdnet.com/article/arch...
www.zdnet.com/article/arch...
I'm looking for new work opportunities
strongest areas are data analysis & threat hunting. I love SQL, regex, anomaly detection, data wrangling
experienced designing & using honeypot systems. have created novel techniques
I use python a lot, but can use whatever a situation calls for
tysm💓
Cyberattacks against water is a troubling trend. Access to clean water is fundamental, and these types of attacks are direct threats to public health and safety.
#ICS #OTsecurity
www.reuters.com/en/p...
Cyberattacks against water is a troubling trend. Access to clean water is fundamental, and these types of attacks are direct threats to public health and safety.
#ICS #OTsecurity
www.reuters.com/en/p...
- Malware and software dev in Python, C/C++, Go, Android (lang unspecified), and others.
1/3
- Malware and software dev in Python, C/C++, Go, Android (lang unspecified), and others.
1/3