Jamie Levy🦉 (@gleeda) 's Twitter Profile
Jamie Levy🦉

@gleeda

@Volatility Core Dev | Art of Memory Forensics co-author | Director of Adversary Tactics @HuntressLabs | #DFIR enthusiast/trainer | [email protected]

ID: 17885888

linkhttps://gleeda.org calendar_today05-12-2008 01:20:47

15,15K Tweet

9,9K Followers

5,5K Following

Greg Lesnewich (@greglesnewich) 's Twitter Profile Photo

Fun crossover blog about TA829 (RomCom) & TransferLoader with my ecrime pals it’s got everything: 🛰️ Popped routers for sending phish 📊 ACH on attribution 👾 custom protocols 👽 cool malware 🕵️ crime 🎯 espionage ❔many unanswered questions proofpoint.com/us/blog/threat…

Huntress (@huntresslabs) 's Twitter Profile Photo

Business Email Compromise (BEC) costs enterprises $2.9 billion every year. Here's how attackers do it👇 ✅ Logins via suspicious User Agents: These are tools and apps that attackers use to impersonate legitimate browsers or email clients. Red flag detection helps us spot them.

Business Email Compromise (BEC) costs enterprises $2.9 billion every year. Here's how attackers do it👇

✅ Logins via suspicious User Agents: These are tools and apps that attackers use to impersonate legitimate browsers or email clients. Red flag detection helps us spot them.
LSU Research (@lsuresearch) 's Twitter Profile Photo

This August, LSU Cybersecurity students will teach cybersecurity experts how to use volatility to fight malware at DEF CON, the world’s largest and longest-running hacking conference. lsu.edu/blog/2025/06/c… LSU Engineering LSU CCT #LSU #ScholarshipFirst #WBTTW Andrew Case Volexity

This August, <a href="/LSUCyber/">LSU Cybersecurity</a> students will teach cybersecurity experts how to use <a href="/volatility/">volatility</a> to fight malware at <a href="/defcon/">DEF CON</a>, the world’s largest and longest-running hacking conference.
lsu.edu/blog/2025/06/c…
<a href="/LSUEngineering/">LSU Engineering</a> <a href="/LSUCCT/">LSU CCT</a> #LSU #ScholarshipFirst #WBTTW <a href="/attrc/">Andrew Case</a> <a href="/Volexity/">Volexity</a>
Wietze (@wietze) 's Twitter Profile Photo

🆕 Recent additions to LOLBAS-Project.github.io: • shell32.dll,#44 for DLL execution • PhotoViewer.dll for INetCache download • winget.exe for AWL Bypass • mmc.exe for download (via GUI) • cipher.exe for anti-forensics ➕: the #LOLBAS project now supports dark mode 😎

🆕 Recent additions to LOLBAS-Project.github.io:

• shell32.dll,#44 for DLL execution
• PhotoViewer.dll for INetCache download
• winget.exe for AWL Bypass
• mmc.exe for download (via GUI)
• cipher.exe for anti-forensics

➕: the #LOLBAS project now supports dark mode 😎
Andrew Case (@attrc) 's Twitter Profile Photo

With Volcano, security teams can automate the entire workflow of acquisition of memory and select files to deep analysis to automated alerts that directly point to signs of malware and attacker activity throughout RAM and key artifacts sources from disk.

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

Microsoft’s new user-mode security initiative looks, on the surface, like a necessary response to a widespread architectural risk. But take a closer look, and you’ll see it’s mostly optics. The narrative implies that the ability for security solutions to run outside the Windows

Jamie Levy🦉 (@gleeda) 's Twitter Profile Photo

While some people debate on which EDU programs in Cybersecurity are worth pursuing, LSU is building an empire led by real practitioners and making sure that their students get some real hands-on experience. hats off to Golden G. Richard III and team! 🥳🥳🥳

Thomas Roccia 🤘 (@fr0gger_) 's Twitter Profile Photo

🤓 Over the past few months I was asked many times how I stay updated and experiment so quickly with AI in cybersecurity. So I tried to break down my process into the RAW method: Research, Apply, Weaponize. Nothing crazy but if it can help others then it is worth sharing. 🙂

🤓 Over the past few months I was asked many times how I stay updated and experiment so quickly with AI in cybersecurity.

So I tried to break down my process into the RAW method: Research, Apply, Weaponize.

Nothing crazy but if it can help others then it is worth sharing. 🙂
Huntress (@huntresslabs) 's Twitter Profile Photo

"I'll create a GUI interface using Visual Basic" Sometimes it feels like producers are actually competing to see who can get away with the most ridiculous hacking scene. What did we leave off the list?

"I'll create a GUI interface using Visual Basic"

Sometimes it feels like producers are actually competing to see who can get away with the most ridiculous hacking scene.

What did we leave off the list?