security_craig's profile picture. Head of Threat Intelligence Engineering @ Amazon | Former Director Talos | Distinguished Speaker Hall of Fame | Reformed Podcaster | Bug Hunter | My Opinions

Craig

@security_craig

Head of Threat Intelligence Engineering @ Amazon | Former Director Talos | Distinguished Speaker Hall of Fame | Reformed Podcaster | Bug Hunter | My Opinions

Amazon remains committed to protecting the internet by actively hunting for and disrupting threat actors 🥳 🥳 aws.amazon.com/blogs/security…


Someone is excited to hear about the latest email bugs @CYBERWARCON 🦎

security_craig's tweet image. Someone is excited to hear about the latest email bugs  @CYBERWARCON 🦎

Getting the team ready for @SLEUTHCON again!

security_craig's tweet image. Getting the team ready for @SLEUTHCON again!

Now Hiring: Senior SDE (Level 5) in Austin! Join Amazon's Cyber Threat Intelligence team building mission-critical systems to protect Amazon's global infrastructure & customers. Scale, architecture, security - all the good stuff Apply: amazon.jobs/jobs/2897028


Join the Amazon Threat Intelligence Team. We are hiring a Software Development Engineer (SDE) to support our engineering platforms. We build threat intelligence tools for all of Amazon. Made a difference at scale. Details - amazon.jobs/en/jobs/287944…


🎄🤖🥳

Christmas Robot was easily the favorite song in our holiday light show this year. It's an earworm!



Always interesting to see old techniques cross streams with modern technology

Unusual Android malware distribution vector - physical analog letter ✉️ Fake letters were sent to people at their home addresses to download "Severe Weather Warning App" via the attached QR code. #Coper AKA #Octo2 banking malware is downloaded instead ncsc.admin.ch/ncsc/en/home/a…

androidmalware2's tweet image. Unusual Android malware distribution vector - physical analog letter ✉️

Fake letters were sent to people at their home addresses to download "Severe Weather Warning App" via the attached QR code. #Coper AKA #Octo2 banking malware is downloaded instead
ncsc.admin.ch/ncsc/en/home/a…


Join Amazon's Threat Intelligence Team as an SDE. Build platforms using diverse tech to support security missions. Work with analysts, understand customer needs, and contribute to Amazon's security culture. Help protect our customers. amazon.jobs/en/jobs/269812…


My personal view is that it depends. If the machines are broadly vulnerable they are already targeted. The trick is most of the time in order to be effective across a baddie campaign this must be done @ scale. That's really where gov assistance and industry partnerships can shine

I hear hack back as a solution to intrusions, and disagree. Compromised machines in friendly/ neutral countries will be targeted, risking harm to innocents. The diplomatic implications are already severe. Hack back is inherently a governmental function. Cyber doesn’t stop cyber.



Join Amazon's Threat Intelligence team! We're hiring an SDE to build platforms that power security missions, understand customer needs, and enhance Amazon's security culture. Leverage open-source, AWS, and vendor tech to protect customers. Apply now! amazon.jobs/en/jobs/269812…


Is there a god of uptime?


Join the Amazon threat intelligence team. Help us build epic automation and data pipelines to make our tools more effective in hunting threats and adversaries. amazon.jobs/en/jobs/269812…


Spoiler - screen time is not intended to protect against device manipulation and thus this isn’t a security issue

My 11 year old found yet another full screen time bypass. I submitted it for her. Anyone know if they give a bounty or a shout out for these? The previous one was known by the time I submitted it for her.



My 11 year old found yet another full screen time bypass. I submitted it for her. Anyone know if they give a bounty or a shout out for these? The previous one was known by the time I submitted it for her.


Craig memposting ulang

Always great to be on the Risky Business podcast! YouTube: youtu.be/u9G4Ov5cXw4?si… Podcast: risky.biz/RB765/

RGB_Lights's tweet card. Risky Business Weekly (765): The Kaspersky switcheroo, with special...

youtube.com

YouTube

Risky Business Weekly (765): The Kaspersky switcheroo, with special...

My 11 year old found yet another full screen time bypass. I submitted it for her. Anyone know if they give a bounty or a shout out for these? The previous one was known by the time I submitted it for her.



My kid figured out another screen time bypass. The time setting is not a protected option. At 10pm you can set it to 7am and unlock the device 🙄


Loading...

Something went wrong.


Something went wrong.