Wesley McGrew

1.2K Followers
954 Following
90 Posts
Senior Cybersecurity Fellow at
MartinFed . Penetration Testing; Red Team; Analytic Tradecraft; Cyber Warfare; NatSec; Photography; DJ. Twitter: @McGrewSecurity
TwitterMcGrewSecurity
Email[email protected]
DiscordDrMcGrew#1950
With all the ruckus the balloon is causing, they may send the next device around up a bit higher
Again, this is not how the exploit worked. It didn’t auto-spread, and it certainly didn’t have any ransomware functionality built into it. This was all added by others after the release.
I’m reading James Bamford’s new book on counterintelligence failures, Spyfail. It’s okay so far, but I would think any kind of technical review would have addressed this: I think it’s a significant error to equate an exploit to a virus/worm that uses it.
Someone in infosec literally paid for an ad to support the rule changes on Twitter.
Even saying “I’m on defcon.social as ‘mcgrew’” in my profile is considered “malware” by Twitter now. No mention of Mastadon at all, so I guess they have a list of instance names including defcon.social.
TLP:PUCE-NOBADGUYSALLOWED
😂 I’m on AT&T LTE
The rest of the script is boring but it really opened well
I asked ChatGPT to cast me as a guest star in an episode of Bluey
When the door dash driver is named Wesley