Advertisement · 728 × 90

Posts by Jamie Levy 🦉

Principal Threat Intel Incident Commander United States of America

We're looking for a Principal Threat Intel Incident Commander here at @huntress.com ! Do you love to:

🔍 Conduct #DFIR analysis?
đź‘€ Track threat actors?
🕸️ Work with others across different departments?
✍️ Write about your findings?
👩‍💼 Present your work?

Apply!: job-boards.greenhouse.io/huntress/job...

2 months ago 5 2 0 0
daendeleon 2d
@ Threads
Greg Bovino was asked how he felt about his demotion today. "Well, obviously, I'm not happy", he replied.
Someone in the crowd shouted back, "So which one are you?"

daendeleon 2d @ Threads Greg Bovino was asked how he felt about his demotion today. "Well, obviously, I'm not happy", he replied. Someone in the crowd shouted back, "So which one are you?"

just choked on my beverage

2 months ago 18452 3211 57 519
Staff Threat Intelligence Analyst Remote US

Details can be found here:

job-boards.greenhouse.io/huntress/job...

🤔 Reach out if you have questions.

5 months ago 1 0 0 0

There's an open role for a Staff CTI Analyst on my team here
@huntress.com
📢💫

✨Do you love doing correlations between different incidents, sometimes digging into them, or doing malware analysis?

✨Do you like doing data analysis, and using this to make threat reports? 👇

5 months ago 7 5 1 0
Preview
Joe Grand's Hardware Hacking Basics [FTSCon 2025] This two-day comprehensive course teaches fundamental hardware hacking concepts and techniques used to explore, manipulate, and exploit electronic devices.

We are excited to announce that we are hosting a second training course for #FTSCon week! Join @joegrand.bsky.social as he leads his popular 2-day Hardware Hacking Basics course on Oct. 21-22 in Arlington VA! Registration is now OPEN!

8 months ago 4 5 1 0

We are so excited to have @joegrand.bsky.social keynoting at #FTSCon 2025! Come join us on October 20th!

7 months ago 2 3 0 0
Preview
From The Source 2025 Learn Directly from the World’s Leading Digital Investigators: On Monday, October 20, 2025, the Volatility Foundation is hosting From The Source, a one-day summit, in Arlington, VA, followed by fou…

We are counting down to #FTSCon 2025! We have a slate of great speakers—you don't want to miss this event!


If you haven't registered yet, register here: events.humanitix.com/from-the-sou....

Stay tuned for speaker spotlights!

7 months ago 0 3 0 0
Post image

#FTSCon Speaker Spotlight: Juan Andrés Guerrero-Saade is presenting “From Threat Hunting to Threat Gathering” in the HUNTER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

7 months ago 1 4 0 0
Advertisement
Post image

#FTSCon Speaker Spotlight: Toni de la Fuente is presenting “Open Cloud Security, lessons learned building Prowler” in the MAKER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

7 months ago 0 3 0 0
Post image

#FTSCon Speaker Spotlight: Wesley Shields (@wxs.bsky.social) is presenting “COLDRIVER: NOROBOT/YESROBOT/MAYBEROBOT” in the HUNTER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

7 months ago 4 6 0 1
Post image

#FTSCon Speaker Spotlight: Aleksandra Doniec (@hasherezade.bsky.social) is presenting “Uncovering Malware's Secrets with TinyTracer” in the MAKER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

7 months ago 2 6 0 0
Post image

#FTSCon Speaker Spotlight: Joseph Edwards (@eflags.bsky.social) is presenting “The Forensics of Zoom's Remote Control” in the HUNTER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

7 months ago 1 4 0 1
Post image

#FTSCon Speaker Spotlight: Andrew Case (@attrc.bsky.social) is presenting “Detection and Analysis of Memory-Only Linux Rootkits” in the MAKER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

7 months ago 2 4 0 0

Excited to speak at FTSCon next month!

7 months ago 3 2 0 0
Post image

#FTSCon Speaker Spotlight: Joe FitzPatrick (@securelyfitz.bsky.social) is presenting “Rethinking DMA Attacks with Erebus” in the MAKER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

7 months ago 1 5 0 0
Post image

#FTSCon Speaker Spotlight: Daniel Gordon (@validhorizon.bsky.social) is presenting “When the AppleJeus GitHub is Worth the Squeeze: Citrine Sleet Investigation” in the HUNTER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

7 months ago 6 3 0 1
Post image

#FTSCon Speaker Spotlight: Denis Bueno is presenting “CTADL: Customizable Static Taint Analysis” in the MAKER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

7 months ago 0 4 0 0
Advertisement
Post image

#FTSCon Speaker Spotlight: Michael Horka is presenting “Lilac Typhoon aboard the Indigo Train - The Current State of Chinese Obfuscation Networks” in the HUNTER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

7 months ago 6 5 0 0
Preview
An Attacker’s Blunder Gave Us a Look Into Their Operations | Huntress An attacker installed Huntress onto their operating machine, giving us a detailed look at how they’re using AI to build workflows, searching for tools like Evilginx, and researching targets like software development companies.

An incredible firsthand glimpse into threat actor operations from Huntress:

7 months ago 5 2 0 0
Post image

CYBERWARCON is back.

🗓️ Wednesday, Nov 19, 2025 | Crystal City + virtual
đź”— cyberwarcon.com

8 months ago 13 5 1 2
Call for Presentations. Deadline is 11:59PM ET Friday, August 15th. October 10-11 Arlington, Virginia. sessionize.com/bsidesnova-2025. #BSidesNoVA

Call for Presentations. Deadline is 11:59PM ET Friday, August 15th. October 10-11 Arlington, Virginia. sessionize.com/bsidesnova-2025. #BSidesNoVA

Last chance to be a part of *THE* premier #InfoSec event in Northern Virginia, #BSidesNoVA!

Submit a talk or workshop by 11:59PM ET tonight, August 15th.
sessionize.com/bsidesnova-2...

8 months ago 2 3 0 0
Preview
Active Exploitation of SonicWall VPNs | Huntress A likely zero-day vulnerability in SonicWall VPNs is being actively exploited to bypass MFA and deploy ransomware. Huntress advises disabling the VPN service immediately or severely restricting access...

We've seen quite a lot of intrusions involving SonicWall devices here at @huntress.com

We decided to write a bit about what attacker tradecraft we've seen on the other end of these intrusions:

🔎 www.huntress.com/blog/exploit...

8 months ago 3 1 0 0
Post image

BSidesNYC thanks @gleeda.bsky.social and the rest of the 0x05 Technical CFP Committee, @cyb3rkitties.bsky.social, Cesar Vargas, Jase English, Jamie Williams, Jessica Hyde, @rmettig.com, and Stephanie Aceves for volunteering their time to review talks. Many thanks for curating our programming.

8 months ago 2 2 0 0
Post image

The BSidesNYC call for papers is still open. Submit your topic today! bsidesnyc.org

9 months ago 3 4 0 0
Advertisement

This is the first of a series of posts we're doing on some of the vulns found as part of the HackerOne work – we have lots more fun ones coming up about some great SSRF, SQLi, and RCE vulns it discovered, with very clever exploit techniques :)

9 months ago 8 3 0 0
Preview
Inside the BlueNoroff Web3 macOS Intrusion Analysis | Huntress Learn how DPRK's BlueNoroff group executed a Web3 macOS intrusion. Explore the attack chain, malware, and techniques in our detailed technical report.

excited bc today @huntress.com is releasing our analysis of a gnarly intrusion into a web3 company by the DPRK's BlueNoroff!! 🤠

we've observed 8 new pieces of macOS malware from implants to infostealers! and they're actually good (for once)!

www.huntress.com/blog/inside-...

10 months ago 29 19 1 2
Preview
Phishing for Codes: Russian Threat Actors Target Microsoft 365 OAuth Workflows Since early March 2025, Volexity has observed multiple suspected Russian threat actors conducting highly targeted social engineering operations aimed at gaining access to the Microsoft 365 (M365) acco...

@volexity.com #threatintel: Multiple Russian threat actors are using Signal, WhatsApp & a compromised Ukrainian gov email address to impersonate EU officials. These phishing attacks abuse 1st-party Microsoft Entra apps + OAuth to compromise targets.

www.volexity.com/blog/2025/04...

#dfir

11 months ago 18 12 0 1

Congratulations to all of the Volatility contributors - this was no small feat! We are proud to be a sustaining sponsor of this important open-source project that remains the world’s most widely used memory forensics platform. #dfir

11 months ago 10 7 0 0
Preview
Announcing FTSCon 2025 & In-person Malware and Memory Forensics Training! Mark your calendars for Monday, October 20, 2025! We will again be hosting FTSCon in Arlington, Virginia.You can read more event details here. Registration is now open!

We are excited to announce FTSCon 2025 on October 20, 2025, in Arlington VA! Registration is now OPEN + we have a Call for Speakers.

Following FTSCon will be a 4-day Malware & Memory Forensics Training course with Volatility 3.

See the full details here: volatilityfoundation.org/announcing-f...

10 months ago 7 9 0 2
Video

It’s raining, and feeding time, so what do we do? Sheep and goat dance set!!!

💣💥 turn up the volume! 🔊🔊

10 months ago 5 0 0 0