Instacyber
banner
instacyber.bsky.social
Instacyber
@instacyber.bsky.social
Reveals APTs with one easy application! | Artificial amateurs, aren't at all amazing // Analytically, I assault, animate things
Reposted by Instacyber
MORPHEUS: They're coming for you, Neo. I can guide you, but you must do exactly as I say. Take the elevator to the lobby and go to the CVS across the street. Purchase 5 Steam gift cards at $200 each. Scratch off the protective coating on the back and tell me the fifteen digit redemption codes. Hurry
August 23, 2025 at 9:57 PM
This research was a banger, with pretty broad targeting albeit some that falls within the expected profile for the TA group.

Despite the large initial reach, I expect overall infection rates were hampered by relatively low Firefox market share. Fingers crossed they don’t get a Chrome 0-day..
November 27, 2024 at 1:06 PM
Diligent intel producers should always be mindful of tracking report readership and gathering feedback.

As a “cyber Intel” practitioner, I’ve found the lowest friction way to achieve the former is just to publish and watch telemetry as a stream of customers start pinging adversary infrastructure 😅
November 27, 2024 at 12:37 PM
Reposted by Instacyber
Can't really beat this advice. One additional (but related) layer that has been helpful for me: people aren't interested in how you came to your conclusions. Your finished product needs to reflect how you think of the project at the end, not the journey of how you got there.
The best writing advice I've ever gotten is to remember that the first draft is where you explain it all to yourself and then the second draft is where you explain it all to your readers.
Academic writing thought:

That it was hard for YOU to figure something out does not mean you should make it hard for the READER to get it

Explain as simply & clearly as you can

You do not need to take the reader through your lengthy journey to clarity

Work that took months may end up a footnote
September 3, 2024 at 5:11 PM
I really liked this article.

My addition is that major offensive cyber campaigns are only really useful as a first strike capability and rapidly lose meaningful utility when conflict moves towards tactical requirements. @moore.bsky.social notes the speed of cyber in his first claim.
A year ago I published Offensive Cyber Operations, and it ended up being quite the year for cyber-warfare. Did I get it right about Russia? China? Joint operations? Tactical cyber?

I revisit some of the biggest swings I took with the book in this Binding Hook paper.
Daniel Moore revisits findings on offensive cyber
A year since Daniel Moore published his book on offensive cyber operations, he revisits his main tenets…
bindinghook.com
November 7, 2023 at 4:30 PM