Steve YARA Synapse Miller
@stvemillertime.bsky.social
1.9K followers 240 following 61 posts
threat intelligence @google writing & sharing on adversary tradecraft, malware, threat detection, ics/ot + cyber physical intel, and of course all things #yara
Posts Media Videos Starter Packs
stvemillertime.bsky.social
Hang on gotta pump up the valuation so my series B folks can exit
stvemillertime.bsky.social
Those of you building modern edge devices, packet tools, network sensors, SSL decrypt, Suricata, etc -- it'll be a couple years yet, but your day will come again. Slow and steady like erosion, the attention, the investment, the market will come crawling back to you.
stvemillertime.bsky.social
Imo the security product market is almost always a decade behind needs, but over time ends up being pulled to meet the adversary where they are operating. In the 2010s the market came late to the endpoint, in the 2020s late to the cloud, in the 2030s it'll be back to the network.
stvemillertime.bsky.social
My top 5 movies about ~hacking probably say more about my age than anything else, but still:

#1 - Hackers (1995)
#2 - War Games (1983)
#3 - Johnny Mnemonic (1995)
#4 - Ghost in the Shell (1995)
#5 - Office Space (1999) <- surprisingly full of hacks
stvemillertime.bsky.social
The Wire, but a cybercrime version of it
stvemillertime.bsky.social
imo, great defenders think like attackers
and great attackers think like defenders
and great security folks think like both
and great intelligence folks think like neither
beep boop
computers
stvemillertime.bsky.social
I used to secretly judge folks that don't *love* music. But I learned that not everyone has the same ability to _detect_ musical features (pitch, rhythm, harmony etc). This happens not in the ear but in the brain. W/ diff neuro wiring & genes, folks don't always hear what I hear.
stvemillertime.bsky.social
"The game is out there, and it's either play or get played." - Omar
stvemillertime.bsky.social
Which of the Warhammer 40K races and factions should I get into? Sisters of Battle? Space Wolves? Henry Cavill?
Reposted by Steve YARA Synapse Miller
gabagool.ing
Excellent breakdown of the “Rogue RDP” TTP we’ve seen susp Russian APT UNC5837 using in their campaigns written by my colleague Rohit (@IzySec over on X)
Windows Remote Desktop Protocol: Remote to Rogue | Google Cloud Blog
A novel phishing campaign by Russia-nexus espionage actors targeting European government and military organizations.
cloud.google.com
stvemillertime.bsky.social
"NIST to purge 'wasteful' algorithms, return to using DES"
stvemillertime.bsky.social
We most definitely trained at the same dojo! and lots of folks rotated through it over the years, I think there is a hybrid 100DoY-fu slowly developing :D
Reposted by Steve YARA Synapse Miller
dwmetz.bsky.social
Seeing these scrips run brings me joy. #DFIR #MalwareAnalysis #Python #YARA
Reposted by Steve YARA Synapse Miller
stvemillertime.bsky.social
Do not despair, my friends, the only way out is through;
And the climate will probably kill us all pretty soon anyway
stvemillertime.bsky.social
One rule's FP is another rule's FN.
stvemillertime.bsky.social
SSH is the cyber blood magick of both the world's most stalwart orgs and the world's toughest adversaries.
Reposted by Steve YARA Synapse Miller
wylienewmark.bsky.social
You’re an MSS or SVR cyber targeter who’s spent years trying to find an access vector into SPS/PAM; then suddenly a pack of high-profile, right-wing, edgelord zoomers — who will definitely click on any link they think will get them laid — just get admin access. Prepositioning acquisition speedrun.