tomchop
            
            @tomchop.me
          
          810 followers
          370 following
          130 posts
        
          Cybersecurity nerd; #DFIR @ Google by day; FOSS, threat intel and malware analysis by night. Investigator, coder, terrible sense of humor.
https://yeti-platform.io and more (github.com/tomchop)
views are my own • he/him • tomchop.me
            
      
        Posts
        Media
        Videos
        Starter Packs
      
    
        
      Reposted by tomchop
    
  
  
        
      Reposted by tomchop
    
  
  
          
              tomchop
              @tomchop.me
          
              · Apr 2
        
        
          
      
    
          
              tomchop
              @tomchop.me
          
              · Jan 29
        
        
          
      OpenAI says it has evidence China’s DeepSeek used its model to train competitor
https://www.ft.com/content/a0dfedd1-5255-4fa9-8ccc-1fe01de87ea6
      
          https://www.ft.com/content/a0dfedd1-5255-4fa9-8ccc-1fe01de87ea6
OpenAI says it has evidence China’s DeepSeek used its model to train competitor
          White House AI tsar David Sacks raises possibility of alleged intellectual property theft
        
          
          www.ft.com
        
      
  
        
      Reposted by tomchop
    
  
          
              Johan Berggren
              @jbn.the4711.net
          
              · Jan 7
        
        
          
      I had a look at #OpenRelik last year and wrote a couple workers that might be useful:
* github.com/tomchop/open...: Scan memory images using @volatilityfoundation.org plugins. Supports Yara rules
* github.com/tomchop/open... - Run Yara rules on a directory. Supports third-party systems like #Yeti!
        * github.com/tomchop/open...: Scan memory images using @volatilityfoundation.org plugins. Supports Yara rules
* github.com/tomchop/open... - Run Yara rules on a directory. Supports third-party systems like #Yeti!
        
      Reposted by tomchop
    
  
          
              tomchop
              @tomchop.me
          
              · Dec 12
        
        
          
      When i see trends that ask me to post about movies that came out the year i was born or photos from the city i was born in or anything asking for information that could be used to crack a password I remember the golden rule:
Don't share any information Ron Swanson wouldn't share
      
          Don't share any information Ron Swanson wouldn't share
a man with a mustache is holding a cup and saying i like saying " no " .
          Alt: a man with a mustache is holding a cup and saying i like saying " no " .
        
          
          media.tenor.com
        
      
  
          
              tomchop
              @tomchop.me
          
              · Dec 4
        
        
      
    
          
              tomchop
              @tomchop.me
          
              · Nov 29
        
        
      
    
          
              tomchop
              @tomchop.me
          
              · Nov 27
        
        
      
    
          
              tomchop
              @tomchop.me
          
              · Nov 26
        
        
        
            The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access
            In early February 2022, notably just ahead of the Russian invasion of Ukraine, Volexity made a discovery that led to one of the most fascinating and complex incident investigations Volexity had ever w...
          
            
            www.volexity.com
          
        
      
    
        
      Reposted by tomchop
    
  
          
              Hash Miser ✊🇺🇦
              @hash-miser.bsky.social
          
              · Nov 23
        
        
        
            The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access
            In early February 2022, notably just ahead of the Russian invasion of Ukraine, Volexity made a discovery that led to one of the most fascinating and complex incident investigations Volexity had ever w...
          
            
            www.volexity.com
          
        
      
    
        
      Reposted by tomchop
    
  
          
              danielroe 🇺🇦
              @danielroe.dev
          
              · Nov 23
        
        
      
    
          
              tomchop
              @tomchop.me
          
              · Nov 23
        
        
      
    
          
              tomchop
              @tomchop.me
          
              · Nov 21
        
        
      
    
          
              tomchop
              @tomchop.me
          
              · Nov 19
        
        
          
      #PIVOTcon25 registration is now OPEN 🤟📥📥📥 
pivotcon.org
#CTI #ThreatResearch #ThreatIntel
Please read carefully the whole 🧵 for the rules about invite -> registration (1/5)
      
          pivotcon.org
#CTI #ThreatResearch #ThreatIntel
Please read carefully the whole 🧵 for the rules about invite -> registration (1/5)
two men are standing next to each other with the words " we open it up " on the screen
          ALT: two men are standing next to each other with the words " we open it up " on the screen
        
          
          media.tenor.com
        
      
  
          
              tomchop
              @tomchop.me
          
              · Nov 19
        
        
      
    
          
              tomchop
              @tomchop.me
          
              · Nov 18
        
        
          
          
              tomchop
              @tomchop.me
          
              · Nov 15
        
        
      
    
        
      Reposted by tomchop
    
  
      This might be the best executed supply chain attack we've seen described in the open, and it's a nightmare scenario: malicious, competent, authorized upstream in a widely used library.
Looks like this got caught by chance. Wonder how long it would have taken otherwise.
        Looks like this got caught by chance. Wonder how long it would have taken otherwise.
      Woah. Backdoor in liblzma targeting ssh servers.
www.openwall.com/lists/oss-se...
It has everything: malicious upstream, masterful obfuscation, detection due to performance degradation, inclusion in OpenSSH via distro patches for systemd support…
Now I’m curious what it does in RSA_public_decrypt
  www.openwall.com/lists/oss-se...
It has everything: malicious upstream, masterful obfuscation, detection due to performance degradation, inclusion in OpenSSH via distro patches for systemd support…
Now I’m curious what it does in RSA_public_decrypt
        
      Reposted by tomchop
    
  
          
              tomchop
              @tomchop.me
          
              · Nov 14