randy@infosec.exchange (@rpargman) 's Twitter Profile
[email protected]

@rpargman

Слава Україні! Most important job: being Dad; I also love to help people deny attackers the opportunity to break and steal all the things. Pronouns: He/him

ID: 35102393

calendar_today25-04-2009 01:20:51

10,10K Tweet

4,4K Followers

4,4K Following

Christopher Glyer (@cglyer) 's Twitter Profile Photo

Most enterprise intrusions that I’ve analyzed in my career have had alerts generated by some security product along the way. The issue/blocker has been figuring out which ones to get in front of a human to realize importance/significance to mobilize action by an org to mitigate

DEATHCon (@deathcon2025) 's Twitter Profile Photo

DEATHCon 2025 merch is now available! deathcon.io/merch.html This year, 100% of the proceeds goes straight to KC7 - Cyber detective game Foundation to provide free, game-based cybersecurity education to everyone! We <3 U KC7

Olaf Hartong (@olafhartong) 's Twitter Profile Photo

While the first batch of online tickets is (almost) sold out, there are still tickets available for most on-site locations. Amsterdam tickets are at half capacity, we'd love to welcome you there. Be quick if you're interested, at this rate they'll be sold out soon.

Scoubi (@scoubimtl) 's Twitter Profile Photo

Tickets for #DEATHcon in Montreal are on sale now! Book now to secure your place. FYI, Virtual Tickets for round 1 are already Sold Out! eventbrite.ca/e/deathcon-mon… Additional info (like workshops) for the con can be found here : DEATHcon.io Please retweet for reach

Sarah Young (@_sarahyo) 's Twitter Profile Photo

Do you want to learn how to red team AI? Of course you do! The amazing Amanda and Gary have recorded their AI red team 101 training for you to enjoy! You can then use our AI red team labs to practice what you learned. aka.ms/AIRT101 youtu.be/DwFVhFdD2fs?si…

randy@infosec.exchange (@rpargman) 's Twitter Profile Photo

If you want to sign up, you've got to be quick! Workshops are free (if you have a DEF CON ticket) and you can register at precisely noon PDT on July 15: reddit.com/r/Defcon/comme…

neils (@midwestneil) 's Twitter Profile Photo

Turns out you can just hack any train in the USA and take control over the brakes. This is CVE-2025-1727 and it took me 12 years to get this published. This vulnerability is still not patched. Here's the story:

neils (@midwestneil) 's Twitter Profile Photo

These devices are also on passenger rail operations! With that said: DO NOT TRY THIS AT HOME. YOU WILL PROBABLY GET SOMEONE HURT.

Tib3rius (@0xtib3rius) 's Twitter Profile Photo

The year is 2021. I suffer from severe social anxiety. I've avoided cons for years. I have my ticket booked for DEF CON, but the day before I'm due to leave, I tell a friend "I can't go, I'm having panic attacks." The next day, I go anyway. I have the most fun I've had in years.

randy@infosec.exchange (@rpargman) 's Twitter Profile Photo

Register tomorrow (July 15) at noon PDT for #defcon workshops! Here's the link if you want to come to the evasive malware workshop taught by Kyle Cucci and me: Defeating Malware Evasion: Techniques and Countermeasures events.humanitix.com/dc33ws-n258-09p

Squiblydoo (@squiblydooblog) 's Twitter Profile Photo

1337 entries in Cert Central. This represents ~1300* unique code-signing certificates issued to cybercriminals for abuse; a lot of disrupted malware delivery; a lot of wasted money; and a lot of headaches for cybercriminals. Thank you all for your support. *see thread for note

1337 entries in Cert Central.
This represents ~1300* unique code-signing certificates issued to cybercriminals for abuse; a lot of disrupted malware delivery; a lot of wasted money; and a lot of headaches for cybercriminals.

Thank you all for your support. 

*see thread for note
Jason Lang (@curi0usjack) 's Twitter Profile Photo

In terms of offsec, I have significant respect for technical skill, but a truly great practitioner knows to deliver information tactfully, and can carefully "read the room" (and the customer), tweaking the message on the fly to achieve not only the desired impact for the target

RussianPanda 🐼 🇺🇦 (@russianpanda9xx) 's Twitter Profile Photo

AI + reversing. I use it all quite a lot. Not because I can’t do the work, but because it enables me to work faster when reversing is not my primary job. When the sample fails to run in the sandbox and you need the IOCs during an active engagement. I’ll drop it in a

NEXA AI (@nexa_ai) 's Twitter Profile Photo

AI PCs are here - yet we still lose 500+hrs/yr chasing scattered files and buried insights. Cloud AI risks your sensitive data. On device AI doesn't. Meet Hyperlink - the fully offline AI agent that instantly searches local folders and unlocks missed ideas with in-text

flux (@0xfluxsec) 's Twitter Profile Photo

Introducing: Hells Hollow - Thought rootkit SSDT hooking was dead? Following my previous work, I have managed to essentially reintroduce SSDT hooks, capable of modifying the *original* KTRAP_FRAME and more! Whitepaper: fluxsec.red/hells-hollow-a… #infosec #cybersecurity

Introducing: Hells Hollow - Thought rootkit SSDT hooking was dead? Following my previous work, I have managed to essentially reintroduce SSDT hooks, capable of modifying the *original* KTRAP_FRAME and more!

Whitepaper: fluxsec.red/hells-hollow-a…

#infosec #cybersecurity