BogeyBackdoor
bogeybackdoor.bsky.social
BogeyBackdoor
@bogeybackdoor.bsky.social
I break into banks, spy on threats, drive a golf cart and play Lorcana

VGhlIEFuYWx5c3QgZm9ybWVybHkga25vd24gYXMgWW9zaGk=
Reposted by BogeyBackdoor
Mohammad wanted to get back at his enemies in the regime, by leaking their secrets to me. And he wanted to rekindle his relationship with the CIA, which had not ended on good terms. He was angry. He was determined. And he was desperate. www.theatlantic.com/magazine/202...
A Double Agent in Tehran
Mohammad Tajik claimed to be an Iranian intelligence officer and promised to reveal his country’s secrets. But first he had a game to play.
www.theatlantic.com
December 8, 2025 at 5:23 PM
How many phishing sims have you triaged since I've left?
December 8, 2025 at 4:44 PM
That is a super cool lunch box
December 5, 2025 at 1:36 PM
I'm wondering if there's some nexus of KnowYourCustomer that will allow access into gatekept versions of the models.
December 3, 2025 at 5:01 PM
We've all been there.
a stop sign that says i stand against bullying on it
Alt: a sign that Saher needs to read that says i stand against bullying
media.tenor.com
November 5, 2025 at 5:07 PM
Reposted by BogeyBackdoor
true analytic rigor comes from only opening your mouth when you have to and qualifying basically everything you say.
October 28, 2025 at 11:33 PM
PR professionals hate this one trick...

Refusing to speculate past the published analysis makes for really "fun" media interviews
October 29, 2025 at 12:43 PM
Talk to me when you've led a convoy of miniature Trader Joe's shopping carts on a successful supply run for apples and veggie straws
October 27, 2025 at 8:29 PM
Reposted by BogeyBackdoor
The tool has been released in the Proofpoint Emerging Threats public #GitHub for other defenders to leverage.

Learn more about it here: brnw.ch/21wWSH0

#PDF #threatdetection #cyberthreat
Proofpoint releases innovative detections for threat hunting: PDF Object Hashing | Proofpoint US
Key findings Proofpoint created a new open-source tool for creating threat detection rules based on unique characteristics in PDFs called “PDF Object Hashing”.  This technique can
brnw.ch
October 23, 2025 at 6:05 PM
Wearing my NIMUC ribbon from my time with the Bureau on my Army dress uniform is one of my most niche flexes I have. Please respect my service.
October 15, 2025 at 1:53 PM
ooof. here, they can't be legally driven on any road with a speed limit over 35 mph so it keeps them off the high ways
October 14, 2025 at 12:54 PM
What if @greg-l.bsky.social is our favorite threat actor?
August 26, 2025 at 6:51 PM