JP Castellanos (@dragonkin37) 's Twitter Profile
JP Castellanos

@dragonkin37

Fmr DoD CND Threat Hunter, Director of Cyber Threat Intel @Binary_Defense, Gamer, Geek, Weeb, & Geopolitics opinions are my own. #WeAreNAFO #FUZZYSNUGGLYDUCK 🦆

ID: 170116593

calendar_today24-07-2010 00:08:29

17,17K Tweet

2,2K Followers

887 Following

Dwyer (@_dwyer_) 's Twitter Profile Photo

I had a great time replicating this exploit and even tho it’s being used for bad stuff you gotta appreciate the elegance of vuln chaining. However, we can’t ignore that while the vulns change the outcomes remain the same. binarydefense.com/resources/blog…

Gorilla Bloomberg (@gorillaosint) 's Twitter Profile Photo

OSINT accounts transitioning from Ukraine-Russia war experts, after their brief time as Syria, India-Pakistan, and Israel-Iran experts, to Thailand-Cambodia border dispute experts.

780th Military Intelligence Brigade (Cyber) (@780thc) 's Twitter Profile Photo

The Record: A cyber-espionage campaign linked to a sophisticated hacking group believed to be based in China compromising virtualization software globally | therecord.media/stealthy-china… The Record From Recorded Future News

U.S. Central Command (@centcom) 's Twitter Profile Photo

CENTCOM Forces Kill Senior ISIS Leader in Al Bab, Syria Early this morning in al Bab, Aleppo Governate, Syria, CENTCOM Forces conducted a raid resulting in the death of senior ISIS Leader, Dhiya’ Zawba Muslih al-Hardani, and his two adult ISIS-affiliated sons, Abdallah Dhiya

CENTCOM Forces Kill Senior ISIS Leader in Al Bab, Syria

Early this morning in al Bab, Aleppo Governate, Syria, CENTCOM Forces conducted a raid resulting in the death of senior ISIS Leader, Dhiya’ Zawba Muslih al-Hardani, and his two adult ISIS-affiliated sons, Abdallah Dhiya
Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Microsoft Threat Intelligence uncovered a macOS vulnerability, tracked as CVE-2025-31199, that could allow attackers to steal private data of files normally protected by Transparency, Consent, and Control (TCC), such as caches used by Apple Intelligence. msft.it/6015sHUoS

780th Military Intelligence Brigade (Cyber) (@780thc) 's Twitter Profile Photo

Maritime Sector Faces Surge in APT and Hacktivist Cyber Threats July 28, 2025, Cyble Research and Intelligence Labs cyble.com/blog/cyberatta… Cyble

780th Military Intelligence Brigade (Cyber) (@780thc) 's Twitter Profile Photo

Sonatype's automated malware detection systems uncovered a massive and ongoing infiltration of open source ecosystems by the North Korea-backed Lazarus Group | sonatype.com/blog/sonatype-… Sonatype

RUSI (@rusi_org) 's Twitter Profile Photo

Singapore has called out a Chinese-linked cyber threat actor for the first time. In the latest #RUSICommentary, Louise Marie Hurel examines the reasons behind — and the implications of — the decision to take the leap to public attribution. bit.ly/3U4FW12

780th Military Intelligence Brigade (Cyber) (@780thc) 's Twitter Profile Photo

Intelligence Specialist (Operations) GG-12 with the 781st Military Intelligence Battalion (Cyber), Vanguard, 780th Military Intelligence Brigade (Cyber) at Fort George G. Meade, Md. Open: July 31 to August 11, 2025, usajobs.gov/job/841770200. #ArmyPossibilities #ArmyCyber Army Cyber Command

Intelligence Specialist (Operations) GG-12 with the 781st Military Intelligence Battalion (Cyber), Vanguard, <a href="/780thC/">780th Military Intelligence Brigade (Cyber)</a> at Fort George G. Meade, Md. Open: July 31 to August 11, 2025, usajobs.gov/job/841770200.
#ArmyPossibilities  #ArmyCyber <a href="/ARCYBER/">Army Cyber Command</a>
780th Military Intelligence Brigade (Cyber) (@780thc) 's Twitter Profile Photo

The Axis of Upheaval: Gauging the Growing Military Cooperation Among Russia, China, Iran, and North Korea, assesses how military cooperation among these countries is likely to develop and identifies the key risks the U.S. and its allies will face | cnas.org/press/press-re… CNAS

Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Microsoft Threat Intelligence has uncovered a cyberespionage campaign by the Russian state actor we track as Secret Blizzard targeting embassies in Moscow using an adversary-in-the-middle (AiTM) position to deploy their custom ApolloShadow malware. msft.it/6019sJm1F

J⩜⃝mie Williams (@jamieantisocial) 's Twitter Profile Photo

even an --apex-predator APT --using home field advantage --to deliver malware from the ISP/Telco level still relies on multiple social engineering tricks to execute critical steps in their kill-chain

even an

--apex-predator APT

--using home field advantage

--to deliver malware from the ISP/Telco level

still relies on multiple social engineering tricks to execute critical steps in their kill-chain
Michael Kofman (@kofmanmichael) 's Twitter Profile Photo

An update on the war following a recent trip. As Russian offensive presume mounts, the front is not at risk of collapse, though salients have formed. More concerning is that Russian improvements in drone employment have reduced Ukraine’s advantages. Long thread. 1/

An update on the war following a recent trip. As Russian offensive presume mounts, the front is not at risk of collapse, though salients have formed. More concerning is that Russian improvements in drone employment have reduced Ukraine’s advantages. Long thread. 1/
Censys (@censysio) 's Twitter Profile Photo

New from Censys: Uncover attacker infrastructure hiding in plain sight. Our latest Threat Hunting upgrade adds Open Directory Intelligence, exposing files & tools - giving you early insights into future attack patterns. Learn more: hubs.ly/Q03zS4Nn0 #ThreatHunting

CyberWar - 싸워 (@cyberwar_15) 's Twitter Profile Photo

North Korean 🇰🇵-linked hacking group APT37 concealed malware within JPEG image files to carry out attacks. genians.co.kr/en/blog/threat…

North Korean 🇰🇵-linked hacking group APT37 concealed malware within JPEG image files to carry out attacks.

genians.co.kr/en/blog/threat…