I look for ICS threats, and spend a lot of time reverse engineering.
Distinguished Malware Analyst @ Dragos.
Lead Analyst on TRISIS and PIPEDREAM.
He/Him
Started in infosec, co-authored the kill chain paper, dabbled in countering influence operations at Meta, and now back to infosec. Lover of command line, python, and rust.
CYBERWARCON is a one-day conference in Arlington, VA focused on the specter of destruction, disruption, and malicious influence on our society through cyber capabilities.
cyberwarcon.com
Volatility Core developer, Dir. of Research Volexity, LSU Cyber
Official account of the Volatility Memory Analysis Project and Windows Malware and Memory Forensics Training. http://volatilityfoundation.org
Threat Intel @volexity.com n stuff.
London, UK.
Writer for WIRED. Author of SANDWORM. Latest book, TRACERS IN THE DARK: The Global Hunt for the Crime Lords of Cryptocurrency, out now. agreenberg@wired.com. Andy.01 on Signal.
VP and founding member @Volexity. Incident Response/DFIR/Targeted threat analysis.
Distinguished Threat Researcher, Research Lead @SentinelOne.
Advisor with @ValidinLLC.
Research Archive: https://tomhegel.com/blog.html
@volatilityfoundation.org Core Dev | Art of Memory Forensics co-author | DFIR trainer and enthusiast | Director of Adversary Tactics @huntress.com
A security firm providing Incident Response, Proactive Threat Assessments, Trusted Advisory, and Threat Intelligence // volexity.com
official Bluesky account (check username👆)
Bugs, feature requests, feedback: support@bsky.app