Christopher Glyer (@cglyer) 's Twitter Profile
Christopher Glyer

@cglyer

Microsoft Threat Intelligence Center - Former Incident Responder & Chief Security Architect @Mandiant

ID: 61583693

calendar_today30-07-2009 20:02:36

3,3K Tweet

23,23K Followers

147 Following

John Lambert (@johnlatwc) 's Twitter Profile Photo

Creating on-the-fly graphs with #Kusto is nice via make-graph, but what if Kusto could natively handle graphs as a data source just like it does with tables? Meet Persistent Graphs, now in preview: 📎learn.microsoft.com/en-us/kusto/ma… ➡️ azure.microsoft.com/en-us/updates/…

Sysinternals (@sysinternals) 's Twitter Profile Photo

We've released Procmon for Linux, Sysmon for Linux, and SysinternalsEBPF with Azure Linux 3.0 support! Get the tools at sysinternals.com. See what's new on the Sysinternals Blog: techcommunity.microsoft.com/blog/Sysintern…

Thomas Rid (@ridt) 's Twitter Profile Photo

Fun little experiment: are LLMs trained on leaked but still classified data? (And/or good at retrieving knowledge from those leaked primary source documents)? Test: "What was CROSSBONES in an NTOC context?" Answer is 100% classified, not in blogs or press coverage.

Baptiste Robert (@fs0c131y) 's Twitter Profile Photo

Google Threat Intelligence Group published technical documentation on UNC6040, a financially motivated threat cluster specializing in voice phishing campaigns targeting Salesforce environments. 📍 "UNC6040 has demonstrated repeated success in breaching networks by having its

Google Threat Intelligence Group published technical documentation on UNC6040, a financially motivated threat cluster specializing in voice phishing campaigns targeting Salesforce environments.

📍 "UNC6040 has demonstrated repeated success in breaching networks by having its
Brian in Pittsburgh (@arekfurt) 's Twitter Profile Photo

Well... that's one way to address the threat of the PRC hacking into your infrastructure to steal your wiretap intercepts. I guess.

Rob Joyce (@rgb_lights) 's Twitter Profile Photo

Wow. Spain is putting salt typhoon out of business. They are just going to hand it all to them: Huawei contracted to manage their wiretaps…. therecord.media/spain-awards-c…

Matt Zorich (@reprise_99) 's Twitter Profile Photo

New in the Defender XDR advanced hunting platform, GraphApiAuditEvents - any blue team, threat hunter or those working on detections should make sure they get familiar with this data, it can be key for detecting malicious activity in your environment. It shows information about

Justin Elze (@hackinglz) 's Twitter Profile Photo

Speakeasy is still one of my favorite tools. I needed a quick way to validate keying techniques on some C payloads and whammy github.com/mandiant/speak…