Official account of the State of Statecraft conference.
Coming October 22, 2026 - Brussels, Belgium
http://stateofstatecraft.com
THE AGENDA IS LIVE: https://stateofstatecraft.com/agenda
#what_is_sos
Independent journalist covering tech, culture, and politics @spitfirenews.com. Buy me a coffee: https://ko-fi.com/kattenbarge
Director of The Citizen Lab at the University of Toronto's Munk School of Global Affairs & Public Policy
Author of Chasing Shadows https://chasingshadowsbook.ca/
exploit completed, but no session was created
Android malware analysis. Ph0wn CTF founder. IoT hacking. Frequent speaker at Virus Bulletin, Insomnihack etc. Based in France.
Currently testing Bluesky. Otherwise on Mastodon.social.
military strategy, geopolitical analysis, CTI, avid photographer
Threat Detection & Research at Proofpoint
Malware Researcher @ @esetresearch.bsky.social
Your CTI Flight Crew — Anticipate, Don’t Chase.
alphahunt.io
by csirtgadgets.com
#AskYourTIP #AlphaHunt #ThreatIntel
@csirtgadgets.bsky.social
linkedin.com/company/csirtg
https://www.linkedin.com/in/wesyoung/
x.com/alphahunt_io
x.com/csirtgadgets
Hunt & Response @ Huntress
Author of Constructing Defense
🇨🇦
Co-Director, Virtual Routes (virtual-routes.org)
Managing Editor, Binding Hook (bindinghook.com)
Author of The Politics of Cybersecurity in the Middle East
Virtual Routes tackles the impact of digital and emerging technologies on global affairs. Also check out @bindinghook.bsky.social, our media outlet.
Cyber threat connoisseur at Google. Senior Research Associate at Virtual Routes / Associate Fellow at RUSI.
Check if you have an email address or password that has been compromised in a data breach. Created and maintained by
@troyhunt.com.
Creator of Have I Been Pwned. Microsoft Regional Director. Pluralsight author. Online security, technology and “The Cloud”. Australian.
Building a resilient digital society through highly specialised digital security consulting.
🌍 Trusted Threat Detection & Incident Response solutions. Experience the difference with our unmatched capabilities. #SIEM #APISecurity #LogManagement #InfoSec
Creators of BloodHound | Experts in Adversary Tradecraft | Leaders in Identity Attack Path Management
Real Intrusions by Real Attackers, the Truth Behind the Intrusion.
https://thedfirreport.com
By defenders. For defenders.
Peel back the layers of your network and make your adversaries cry.
https://www.securityonion.com
NFP with the mission of #crowdsourcing OSINT to help find #missingpersons while training members in the tradecraft of #OSINT | Contact us at info@tracelabs.org
| Visit our site for more info and Discord link: tracelabs.org
A semi-regular gathering for irregulars from the security research community to engage with Congressional staffers. Run by I Am The Cavalry, bridging the gap between the hacker and public policy communities since 2017.
End-to-end Cybersecurity consulting team leading the industry, supporting organizations, and giving back. #HackThePlanet
https://trustedsec.com/
Official account of the Volatility Memory Analysis Project and Windows Malware and Memory Forensics Training. http://volatilityfoundation.org
Penetration Testing, Purple Team, Red Team & Adversary Emulation.
Let our Offense, Prepare your Defense. https://redsiege.com
#weareoffensive
We're the Electronic Frontier Foundation. We're a nonprofit that fights for your privacy and free speech online. Find all of EFF's social media accounts at eff.org/social.
GreyNoise analyzes Internet background noise. Use GreyNoise to remove pointless security alerts, find compromised devices, or identify emerging threats.
MITRE ATT&CK® - A knowledge base for describing the behavior of adversaries. Replying/Following/Reposting ≠ endorsement.
Affordable and accessible cybersecurity training that doesn't suck.
Featuring cybersecurity practitioners, former SANS instructors, and industry recognized leaders from all over the world.
https://www.antisyphontraining.com
Specializing in pen testing, red teaming, and Active SOC. We share our knowledge through blogs, webcasts, open-source tools, and Backdoors & Breaches game.
blackhillsinfosec.com & poweredbybhis.com
Security tools and infrastructure on-demand. Use LimaCharlie to automate and manage security operations at scale.
Know. When it matters.
https://canary.tools
I find weird things on networks.
#PurpleTeam | Ex Raytheon MSSP, SCYTHE, & GD | Taught at BlackHat & DEFCON | #100DaysofSigma | Keep exploring, keep learning, and stay curious.
- Dad of two <3
- Co-founder Recon InfoSec
- SANS DFIR Instructor
- BlackHat Trainer
- IANS Faculty
- Trainer @digitaldefenseinstitute.com
- Blog: https://blog.ecapuano.com
- ⬡ ODESZA, Lane 8, Kasbo 🎧
- ❤ @whit.zip
Blog indipendente su http://dangelodario.it
La "casa dei retroscena" di politica e geopolitica.
Per iscriversi: https://steadyhq.com/it/dangelodario
Aka @c_c_krebs over there
Professional Googler of all the things / Husband & Dad / Do stuff @binarydefense.com / TTRPG / Vidya Games / Collector of Hobbies / Skeets are mine.
cybercrime connoisseur && exploitz engineering enthusiast | synapse fanboy | second breakfast enthusiast
Viss from twitter and mastodon.social.
startup founder, hotsauce guy, public speaker
eater of pineapple on pizza, listener of ska, flooper of quads
internet grandpa, former sysadmin turned infosec
https://phobos.io/rtg/
https://ravenholmspices.etsy.com
computer security person. former helpdesk
Lawyer working on human rights, technology, spyware, litigation, Russia and Eastern Europe.
Currently Senior Tech-Legal Counsel at Access Now. Formerly OSINT investigator and prosecutor.
Author | spooky trans athlete | Linux behavioral threat researcher | never hacked nobody
https://hexadecim8.com
#threatintel #dfir #osint #natsec and other secs. Downloading things from the Internet and looking at them. Views are my own Email: kamil@counterintelligence.pl
Spowiedź bezpieczeństwa AD 2026 - poznaj sekrety moich zabezpieczeń: https://z3s.pl/spowiedz
A security firm providing Incident Response, Proactive Threat Assessments, Trusted Advisory, and Threat Intelligence // volexity.com
National Security Reporter. Features in Politico, Rolling Stone, Wired, Foreign Policy. Working on a book on the history of deep cover for Penguin-Random House.
It’s always Berlin 1989 somewhere. Email: thebrushpass1@protonmail.com
writes citationneeded.news • runs @web3isgoinggreat.com and @followthecrypto.org • tech researcher and cryptocurrency industry critic • software engineer • wikipedian
support my work: citationneeded.news/signup
links: mollywhite.net/linktree
💗💜💙
Sharing updates about trust and safety on Bluesky.
This account’s mentions are not actively monitored. To report a post or account, use the in-app reporting feature.
Community Guidelines: https://bsky.social/about/support/community-guidelines
Cybersecurity novice sharing their education and professional development journey. Veteran. Avid fishkeeper 🎏
Scio me nihil scire. #ThreatIntel/#CTI now. #IncidentResponse/#IR prior. Humanities (AB in Φ & in Communication) grad, ex-seminarian (λόγος). Impostor Syndrome ∞. Opinions∴mine. Also me: x.com/iAngelus
oh great, now I’m on bluesky
Three Buddy Problem
https://securityconversations.com
Potential game show contestant.
Former Axios, The Hill, Passcode. Founder of the Codebook cybersecurity newsletter. Once got lost in a Starbucks.
Bellingcat is an independent investigative collective of researchers, investigators and citizen journalists brought together by a passion for open source research.
Want to support our charity? bellingcat.com/donate
Security editor, TechCrunch
Signal: zackwhittaker.1337
My stories: techcrunch.com/author/zack-whittaker
My newsletter/blog: this.weekinsecurity.com
@DistrictCon Founder. Harvard & Georgetown MPP/JD candidate. @CyberStatecraft / @BelferCenter fellow, ex-Google threat research. Dog mom. Opinions=my own 👩🏻💻
Journalist. Contact me here: https://raphae.li or and on Signal at: raphaelsatter.01
Join us in shaping the future of cyberlaw on Friday, February 28, 2025 in Arlington, VA.
Breaking cybersecurity and technology news, guides, and tutorials that help you get the most from your computer. DMs are open, so send us those tips!
Cyber, natsec and foreign affairs
https://bing-chris.medium.com/how-to-contact-me-d2fd4bd3ed7b
Security Research & Development
CISO by day. Batman by night. But really only if Batman was also working in InfoSec. Name is pronounced like Navy Seals, but instead of Navy, you say Dan.
Chief Magic Officer, Patch Club member, and PITRE ATT&CK wannabe. Senior Anomymous Incident Responder group member.
OSINT, SE, infosec, bananas, extremism, intel, more OSINT.
Also: bananas
Birb stalker. Cat tree. Cyber Threat Researcher. Recovering cyber and natsec reporter. Meme war and US Navy veteran.
@thepacketrat everywhere since 1994. These posts are not my employers’. https://falling-anvil.com
Data Hoarder of its majesty | CTI Dude | Father of DocIntel
CTI @ Workday, CTM-CMM Co-Author, former Sec Researcher @ Cisco Talos, Booz Allen Hamilton, Speaker, Leader
Brazil | OSINT | Cyber Threat Intel CTI
@MyLaocoon - Im a security geek. My tweets are my own. #xorlab - Orga of #Area41 #DC4131 - I break stuff, I have fun, I have fun breaking stuff ;
Now Google Threat Intelligence & doing fun things at DistrictCon, fmrly GreyNoiseIO and RecordedFuture, SAISHopkins MASCI alumna | ♡s & rts are my own, my employer definitely doesn’t like Taylor Swift that much
Malwares reversing, IT security, Ethical hacking, Unix like, ...
@futex@infosec.exchange
https://futex.re
it security & cyber guy, research @ https://ecrime.ch, friendly, swiss | Opinions are my own
Forensic Analyst, Reverse Engineer. Opinions mine
Binary and art recovery specialist. Aka “The White Glove”
Advanced Practices 🦅 @Google Threat Intelligence Group
Threat Attribution, Frontline Intelligence, Malware Analysis, Threat Hunting, Incident Response
#attributionmatters
Faculty at Johns Hopkins SAIS & the Alperovitch Institute | former Wilson Center; Stanford CISAC | PhD from UC Berkeley | cyber and national security; semis; 5G; AI | usual disclaimers apply
Coordinates: melissakgriffith.com
will analyze competing hypotheses 4 food
Silobreaker is an AI-native intelligence platform that unifies data and analytics to help security and risk teams identify threats faster and make smarter decisions with confidence.
New York | London | Stockholm
When these frail shadows we inhabit now have quit the stage, we'll meet and raise a glass again together in Valhalla.
Lead @ Microsoft Threat Intelligence Centre (MSTIC)
KY Boy—Cyber Threat Intelligence—Rockerboy—Blues, Punk, Heavy Metal—UUist—karateka—Intntnl Security—Comics, Fantasy, Sci Fi—Tattoo Collector—Bad Poet, Worse Guitarist—Sopranos Memes
Senior Intrusion Analyst @ CrowdStrike OverWatch
💻 Senior Staff Researcher @Lookout. 中文学习. China-Focused Threat Intelligence. Malware, Geopolitics, Human Rights. Opinions my own.
Threat Research | Threat Intelligence | PhD | European Commission Marie Curie Research Fellow 2011-2014 | https://milenkoski.com | Personal Profile
Cyb3rhawk leads threat hunting team. Interested in DE&TH, threat intel and DFIR. Always striving to make the daily grind of SOC analysts a breeze. Always eager to learn from others and lookout for new ways to streamline what I learn