Thomas Roccia 

1.6K Followers
146 Following
394 Posts
Sr. Security Researcher at Microsoft
Websitehttps://SecurityBreak.io
Unprotecthttps://unprotect.it
Threat Actor Profiling: A 6-Step Framework for CTI Teams | TI Essentials | Feedly

Threat Intelligence Essentials - Best Practices for CTI Pros
awesome-dfir-skills/skills/analysis/threat-actor-profiling/SKILL.md at main Β· tsale/awesome-dfir-skills

A curated collection of DFIR skills and workflows for InfoSec practitioners. - tsale/awesome-dfir-skills

GitHub

πŸ€“ Threat intelligence is all about processing raw data to make it useful for the business. Coupled with AI you can industrialize your pipelines and make it great.

But most of the solutions out there will give you lengthy paragraphs of text. But honestly who wants to read AI generated text?

No one.

We do not want more text.

We either want unique insight crafted by a real human or we want a nice visual that gives us directly the information we look for.

I recently came across a nice post published on Feedly by Ondra Rojčík, who talks about the process of profiling threat actors using 5W1H and the Diamond Model.

I loved it. I wanted to incorporate it into my pipeline.

So I created an Agent Skill but not to generate another lengthy report that I will never read.

It actually creates a nice visual in no time using Claude custom visuals.

Check out what you can do with it. πŸ‘‡

πŸ€“ Sekoia recently uncovered a new Phishing as a Service platform called EvilTokens that automates Business Email Compromise at scale!

The tool use AI to:

- Automate the analysis of large volumes of emails to identify exploitable financial exposure

- Map payment workflows and key contacts

- Automatically generate realistic BEC scenarios based on target profile

- Draft emails that match writing style, context, and urgency

Sekoia also contributed the Adversarial Prompts they uncovered to PromptIntel privately, so the trusted community can benefit from the intel without exposing the raw instructions.

πŸ‘‰ https://blog.sekoia.io/eviltokens-an-ai-augmented-phishing-as-a-service-for-automating-bec-fraud-part-2/

πŸ’₯ Supply chain nightmare continues! Axios a widely used HTTP client got compromised.

Malicious versions:
- axios 1.14.1 (latest)
- axios 0.30.4 (legacy)
- plain-crypto-js 4.2.x (postinstall backdoor)

NPM supply chain attacks are becoming more common, so I put together a short cheat sheet you can keep around to secure your pipeline.

πŸ€“ In February, I created MoltThreats the first open source threat feed for AI agents.

So what is it exactly?

Through the MoltThreats Skill I created, your AI agent can connect to the feed and poll it daily or weekly. Once connected, your agent can automatically report any threats it detects.

Every reported threat is reviewed and approved by a human.

All connected agents receive real time updates from the feed and can act immediately.

Check it out and start protecting your agents! Threats targeting AI agents are reported daily!

πŸ‘‰ https://promptintel.novahunting.ai/molt

🐍 @sleuthcon 2026 Keynote. Let's go!

Super excited to be part of this event and to share the stage with Sleuthy, this is a huge honor! I will share more details on the topic soon but expect something at the intersection of AI and threat intelligence.

If you are going, come say hi! 🀩

πŸ€– New threat reported by my agent during the night on MoltThreats!

Check this out and update your agent! πŸ‘‡

https://promptintel.novahunting.ai/molt/df3493c8-54a0-4e7c-abd1-6cdd02754640

πŸ€– Four new threats added by agents in MoltThreat!

Check this out πŸ‘‡
https://promptintel.novahunting.ai/molt

πŸ€“ A month ago I published a blog post on how to monitor Claude Code sessions using hooks and NOVA Protector!

At the time, no one was really talking about this. Coding agents were being handed full access to your machine and people were just trusting the output blindly.

The post covers how I built NOVA Tracer, a security monitoring layer that traces every action Claude Code takes, detects prompt injection, and generates a full HTML audit report at the end of each session.

Since then, Marco Pedrinazzi and FrΓ©dΓ©ric Baguelin joined and contributed to the Tracer to make it even better!

If you missed it, you can read it below πŸ‘‡

https://blog.securitybreak.io/coding-agents-the-insider-threat-you-installed-yourself-35644a1d5409?sk=cfa768d0125e1e7e971bebdbadd2615a

Coding Agents. The Insider Threat You Installed Yourself

Stop Running AI Coding Assistants Blindly

Medium