Drunk Binary
banner
drunkbinary.bsky.social
Drunk Binary
@drunkbinary.bsky.social
Principal Adversary Hunter @dragosinc, Army Veteran,
Cocktail Scientist, APT Researcher | #FSD
https://infosec.exchange/web/@DrunkBinary
https://twitter.com/DrunkBinary
Reposted by Drunk Binary
Foreign trade missions and the lobbyists and PR firms working for the Andurils of the world are single-handedly propping up the DMV's escort market right now
November 3, 2025 at 10:18 PM
Reposted by Drunk Binary
USMC SAW gunner, 2026, in full kit:
“Ew, Starbucks?! Really, bro? The coffee at Exquisite Creatures on Ash Street is so much better than Starbucks!”

Me in Kabul, 2012, holding a monkey’s paw:
“I wish the military didn’t have to always deploy to shit holes.”
October 2, 2025 at 12:36 AM
September 15, 2025 at 2:59 PM
Reposted by Drunk Binary
northrop grumman was smoking louds when designing this
August 16, 2025 at 11:55 PM
Reposted by Drunk Binary
Robot Jox needs a reboot/remake
a man and a robot are reaching out to touch each other 's hands .
ALT: a man and a robot are reaching out to touch each other 's hands .
media.tenor.com
May 2, 2025 at 10:42 PM
Reposted by Drunk Binary
Tracing...
March 10, 2025 at 7:32 PM
Reposted by Drunk Binary
I will be speaking at @kernelcon.bsky.social on Fri, Apr 3rd. The talk will cover previously-unreported features of the sedexp Linux malware found in the wild - including loading of a memory-only rootkit! Talk will cover how the rootkit was discovered & how to analyze with @volatilityfoundation.org
kernelcon.org
March 7, 2025 at 6:47 PM
December 21, 2024 at 3:41 AM
December 5, 2024 at 8:32 PM
Reposted by Drunk Binary
MSTIC is hiring! Current roles in US and AU.

The Microsoft Threat Intelligence Center (MSTIC) is recruiting experienced nation-state threat hunters with highly honed threat intel analysis skills. MSTIC is responsible for delivering timely threat intelligence across our product & services teams.
December 5, 2024 at 6:22 PM
Reposted by Drunk Binary
State actors have a hard requirement to have access into telecoms, ISPs, and cloud providers of interest – always and forever

If you aren’t actively finding and evicting them on a regular basis, you’ve missed them

If you do successfully evict them, they will try again

Access is their steady state
Senior CISA and FBI officials just held a background call to brief reporters on the status of their investigation into Chinese hacking of U.S. and foreign telecom companies.

It sounds like telecoms are a long way from being able to evict the Chinese hackers from their networks.
December 3, 2024 at 6:08 PM
Me climbing my ladder to hang Christmas lights today:
November 28, 2024 at 9:01 PM
Reposted by Drunk Binary
Underrated swag from @cyberwarcon.bsky.social
November 28, 2024 at 3:54 PM
Reposted by Drunk Binary
It was bread in captivity
New Orleans out here innovating in bread shapes. Say hello to the challigator.
November 28, 2024 at 3:57 PM
Reposted by Drunk Binary
Elon’s habitual underinvestment in security is about catch up to him

The mentality of “we will go faster than the speed of IP theft” can work when it’s manufacturing with exotic metallurgy, producing terrible cars, or tanking a social media platform

Adding a telecom to your ISP is a ticket to pain
November 27, 2024 at 1:52 AM
Reposted by Drunk Binary
Cyber threats to critical infrastructure are rising!

Join Casey Brooks & Kyle O'Meara at #CYBERWARCON to explore tactics by CyberArmyofRussia_Reborn, CyberAv3ngers, and VOLTIZITE targeting water, energy, and telecom.

Don’t miss this ICS & OT security talk!💡
🎟️ www.cyberwarcon.com/registration
November 18, 2024 at 10:43 PM
Reposted by Drunk Binary
The unfortunate reality of most software developers writing CRUD apps.
November 20, 2024 at 10:25 PM
Reposted by Drunk Binary
@volexity.bsky.social has published a blog post detailing variants of LIGHTSPY & DEEPDATA malware discovered in the summer of 2024, including exploitation of a vulnerability in FortiClient to extract credentials from memory. Read more here: www.volexity.com/blog/2024/11...
BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA
In July 2024, Volexity identified exploitation of a zero-day credential disclosure vulnerability in Fortinet’s Windows VPN client that allowed credentials to be stolen from the memory of the client’s ...
www.volexity.com
November 15, 2024 at 8:02 PM
Reposted by Drunk Binary
CISA Adds Two Known Exploited Vulnerabilities to Catalog
buff.ly
November 10, 2024 at 3:12 AM
Reposted by Drunk Binary
I can fix her
Neon Genesis Evangelion
Episode 2
Unfamiliar Ceilings
The Beast
October 11, 2024 at 6:43 PM
Reposted by Drunk Binary
GRU Unit 74455 operators arguing about the minimum reading requirement to be a certified “Sandworm” operator:
August 10, 2023 at 10:09 PM
Reposted by Drunk Binary
😂🤣
(courtesy of @drunkbinary.bsky.social’s twitter)
June 24, 2023 at 3:39 AM
May 5, 2023 at 3:38 PM