User Overview

Followers and Following

Followers
Following
Trendsmap

History

Total Followers - Last Year
Daily Follower Change - Last Year
Daily Tweets - Last Year

Tweet Stats

Analysed 4,793 tweets, tweets from the last 179 weeks.
Tweets Day of Week (UTC)
Tweets Hour of Day (UTC)
Key:
Tweets
Retweets
Quotes
Replies
Tweets Day and Hour Heatmap (UTC)

Tweets

Last 50 tweets from @780thC
AvengerCon VII (11/30 & 12/01): Event registration closes Nov. 27! This is a hybrid conference put on by
@780thC for DoD personnel and those supporting them. avengercon.com pic.twitter.com/tVd6AsjCf4
Replying to @780thC
Very excited about our AvengerCon VII presentations (avengercon.com/presentations/); Workshops (hacktheuniverse.tech/avengerconvii-…); and CTF (avengercon.com/ctf/)... Thank you Prof. T.J. O'Connor, the Florida Institute of Technology and our AvengerCon volunteers!
 
AvengerCon VII (11/30 & 12/01): Event registration closes Nov. 27! This is a hybrid conference put on by
@780thC for DoD personnel and those supporting them. avengercon.com pic.twitter.com/tVd6AsjCf4
Replying to @780thC
At this year's AvengerCon, we are honored to host @k8em0 (CEO & Founder, Luta Security), TJ O'Connor (LTC Ret. and Professor, Florida Institute of Technology) and Colin Ahern (Chief Cyber Officer, New York State) for a panel discussion covering "Crowdsourcing Security"!
 
AvengerCon VII (11/30 & 12/01): Event registration closes Nov. 27! This is a hybrid conference put on by
@780thC for DoD personnel and those supporting them. avengercon.com pic.twitter.com/tVd6AsjCf4
Replying to @780thC
We are honored to be hosting Peiter @dotMudge "Mudge" Zatko and Sarah Zatko as our keynote speakers for AvengerCon VII! The keynote is scheduled as the first presentation of the event on Thursday, 01 December 2022. avengercon.com
 
AvengerCon VII (11/30 & 12/01): Event registration closes Nov. 27! This is a hybrid conference put on by
@780thC for DoD personnel and those supporting them. avengercon.com
 
As you gather with family and friends, please reflect on all we have to be thankful for. Spare a moment for those deployed and away from their Families, and those we have lost and the loved ones they have left behind. Talk to those around you so that no one will be forgotten.
 
Supervisory Intelligence Specialist (Operations) GG-13 w/ Detachment-Texas, 782d MI Battalion, 780th MI Brigade, San Antonio, Texas, responsible for providing situational awareness and understanding of the Cyber threats. Open: Nov. 11 to Dec 1, 2022 usajobs.gov/job/690271100
 
Supervisory Intelligence Specialist (Operations) GG-14 with the 782d MI Battalion, 780th MI Brigade (Cyber), Fort Gordon, GA, developing analytical work to support planning, synchronization, and execution of Cyberspace Operations. Open: Nov. 21 to 30, 2022 usajobs.gov/job/690041700
 
Intelligence Specialist (Operations) GG-13 w the 782d Military Intelligence Battalion, 780th MI Brigade (Cyber), Fort Gordon, GA, responsible for developing capabilities in support of Joint and National Cyber Warfare requirements. Open: Nov. 21 to 30, 2022 usajobs.gov/job/689984600 pic.twitter.com/EB5fvXNnv5
Replying to @780thC
IT Cybersecurity Specialist (APPSW) GG-13 with the 782nd Military Intelligence (MI) Battalion, 780th MI Brigade (Cyber), Fort Gordon, GA. Opening & Closing Dates: 11/21/2022 to 11/30/2022 usajobs.gov/job/690010400
IT Cybersecurity Specialist (APPSW)
usajobs.gov
 
Intelligence Specialist (Operations) GG-13 w the 782d Military Intelligence Battalion, 780th MI Brigade (Cyber), Fort Gordon, GA, responsible for developing capabilities in support of Joint and National Cyber Warfare requirements. Open: Nov. 21 to 30, 2022 usajobs.gov/job/689984600 pic.twitter.com/EB5fvXNnv5
Replying to @780thC
Interdisciplinary (Computer Engineer or Computer Scientist) GG-13 with the 782nd Military Intelligence (MI) Battalion, 780th MI Brigade (Cyber), Fort Gordon, GA. Opening & Closing Dates: 11/21/2022 to 11/30/2022 usajobs.gov/job/690002000
Interdisciplinary (Computer Engineer or Computer Scientist)
usajobs.gov
 
Intelligence Specialist (Operations) GG-13 w the 782d Military Intelligence Battalion, 780th MI Brigade (Cyber), Fort Gordon, GA, responsible for developing capabilities in support of Joint and National Cyber Warfare requirements. Open: Nov. 21 to 30, 2022 usajobs.gov/job/689984600
 
Intelligence Specialist (Operations) GG-12 with the 782nd Military Intelligence Battalion, 780th MI Brigade (Cyber), Fort Gordon, GA, conducting digital network intelligence analysis in support Cyber Warfare activities. Open: Nov. 21 to 30, 2022 usajobs.gov/job/690072300
 
Intelligence Specialist (Operations) GG-9 w/ the 781st Military Intelligence Battalion, 780th MI Brigade (Cyber), Fort Meade, MD, responsible for developing capabilities in support of Joint and National Cyber Warfare requirements. Open: Nov. 18 to 28, 2022 usajobs.gov/job/689654200 pic.twitter.com/DB7z95hu5t
Replying to @780thC
IT Cybersecurity Specialist (APPSW) with the 781st Military Intelligence (MI) Battalion, 780th MI Brigade (Cyber), Fort Meade, MD. Opening & Closing Dates: 11/18/2022 to 11/28/2022 usajobs.gov/job/689714600
 
Intelligence Specialist (Operations) GG-9 w/ the 781st Military Intelligence Battalion, 780th MI Brigade (Cyber), Fort Meade, MD, responsible for developing capabilities in support of Joint and National Cyber Warfare requirements. Open: Nov. 18 to 28, 2022 usajobs.gov/job/689654200 pic.twitter.com/DB7z95hu5t
Replying to @780thC
Interdisciplinary (Computer Engineer or Computer Scientist) with the 781st Military Intelligence (MI) Battalion, 780th MI Brigade (Cyber), Fort Meade, MD. Opening & Closing Dates: 11/18/2022 to 11/28/2022 usajobs.gov/job/689701400
 
Intelligence Specialist (Operations) GG-9 w/ the 781st Military Intelligence Battalion, 780th MI Brigade (Cyber), Fort Meade, MD, responsible for developing capabilities in support of Joint and National Cyber Warfare requirements. Open: Nov. 18 to 28, 2022 usajobs.gov/job/689654200
 
Budget Analyst GG-13 with the 780th MI Brigade (Cyber), Fort Meade, MD, responsible for establishing and maintaining an integrated system of services which ensures effective financial control over program operations. Open: November 17 to 28, 2022 usajobs.gov/job/689482500
 
Intelligence Specialist (Operations) GG-12 with the 782nd Military Intelligence (MI) Battalion, 780th MI Brigade (Cyber), Kunia, Hawaii, conducting digital network intelligence analysis in support Cyber Warfare activities. Open Nov. 16 to 28, 2022 usajobs.gov/job/688711500
 
On November 11, Veterans Day, we honor and thank all our nation's military veterans of the United States Armed Forces.
 
Supervisory Intelligence Specialist (Operations) GG-13 w/ the 782nd MI Battalion, 780th MI Brigade (Cyber), Kunia, Hawaii, developing analytical work to support planning, synchronization, and execution of Cyberspace Operations. Open: Nov. 9 to 21, 2022 usajobs.gov/job/688592300
 
SEVERN, Md. – Soldiers and Civilians of the 780th Military Intelligence Brigade (Cyber) volunteered to participate in an Annapolis Area Christian School STEM EXPO, November 3. The team developed a CTF and Password Cracking interactive event to encourage the teens’ interest.
 
Supervisory Intelligence Specialist (Operations) GG-13 with the 782d MI Battalion, 780th MI Brigade (Cyber), Ft. Gordon, GA, developing analytical work to support planning, synchronization, and execution of Cyberspace Operations. Open: Nov. 1 to 11, 2022 usajobs.gov/job/684695900
 
Security Specialist GG-12 w/ 781st MI Battalion, 780th MI Brigade (Cyber), Ft. Meade, MD, overseeing, administering, managing, implementing, and enforcing one or more of the DCIPS Intelligence-related Security disciplines | Open: Oct. 31 to Nov. 9, 2022 usajobs.gov/job/686065300
 
In reply to @780thC
1/2 "If you see information that's on the internet, you're not sure whether it's true, be critical about it, ask questions, look at the source, investigate it and don't spread that information any more broadly and basically give foreign adversaries a chance to manipulate...
Replying to @780thC
2/2 Americans and to sow discord and to create lack of confidence in our elections." Transcript: CISA Director Jen Easterly on “Face the Nation” cbsnews.com/news/jen-easte…
 
"We've seen Russia, we've seen Iran, we've seen China use the playbook for influence operations. That's why it's so important that Americans realize that they need to build resilience against that." @CISAJen cbsnews.com/news/midterms-… @CBSNews
Replying to @780thC
1/2 "If you see information that's on the internet, you're not sure whether it's true, be critical about it, ask questions, look at the source, investigate it and don't spread that information any more broadly and basically give foreign adversaries a chance to manipulate...
 
"We've seen Russia, we've seen Iran, we've seen China use the playbook for influence operations. That's why it's so important that Americans realize that they need to build resilience against that." @CISAJen cbsnews.com/news/midterms-… @CBSNews
CISA chief sees no "specific or credible threats" to election infrastructure
cbsnews.com
 
In reply to @780thC
I’m just curious, why would you put this information online?
Replying to @ilanoMs
I don't speak for @US_CYBERCOM; however these are direct quotes from MG William J Hartman, commander of the U.S. Cyber National Mission Force, and partnerships are critical to success.
 
Sky News reports on Ukraine's internet army of 'fellas' using dog memes to fight Russian propaganda. @SkyNews
It may be NATO sending missiles and tanks to Ukraine, but on social media an information war is being fought by a rowdy band of online comrades called NAFO. Meet the fellas trib.al/e0uZGoU
 
US Cyber Command offers an insight into what the Russians, or others, are up to, particularly since it works closely with the National Security Agency. bbc.com/news/uk-633283…
Replying to @780thC
"We continue to share information with the Ukrainians, they continue to share information with us," explains Gen Hartman. "That's really the whole idea of that enduring partnership."
 
US Cyber Command offers an insight into what the Russians, or others, are up to, particularly since it works closely with the National Security Agency. bbc.com/news/uk-633283…
 
Citizen Soldiers protecting our nation’s most critical cybersecurity infrastructure | The 127th Cyber Protection Battalion (CPB) completes the sixth and the 125th CPB begins the seventh iterations of Task Force Echo. dvidshub.net/r/426jrb
 
Citizen Soldiers protecting our nation’s most critical cybersecurity infrastructure | The 127th Cyber Protection Battalion (CPB) completes the sixth and the 125th CPB begins the seventh iterations of Task Force Echo. dvidshub.net/r/426jrb
Citizen Soldiers protecting our nations most critical cybersecurity infrastructure
dvidshub.net
 
Citizen Soldiers protecting our nation’s most critical cybersecurity infrastructure | The 780th MI Brigade (Cyber) hosted a ceremony between two Army National Guard formations whereby one battalion transitioned with another to continue the TF Echo cyberspace mission, Oct. 28
 
In reply to @780thC
UNC3524: Eye Spy on Your Email | The NSA has previously reported automated password spraying using Kubernetes, Exchange Exploitation, and REGEORG as associated with APT28. mandiant.com/resources/blog… @Mandiant
Replying to @780thC
Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments media.defense.gov/2021/Jul/01/20… @NSACyber
 
Actor Symantec calls Cranefly (aka UNC3524) uses dropper (Trojan.Geppei) to install another piece of hitherto undocumented malware (Trojan.Danfuan) and other tools. symantec-enterprise-blogs.security.com/blogs/threat-i… @symantec
Replying to @780thC
UNC3524: Eye Spy on Your Email | The NSA has previously reported automated password spraying using Kubernetes, Exchange Exploitation, and REGEORG as associated with APT28. mandiant.com/resources/blog… @Mandiant
 
Actor Symantec calls Cranefly (aka UNC3524) uses dropper (Trojan.Geppei) to install another piece of hitherto undocumented malware (Trojan.Danfuan) and other tools. symantec-enterprise-blogs.security.com/blogs/threat-i… @symantec
Cranefly: Threat Actor Uses Previously Unseen Techniques and Tools in Stealthy Campaign
symantec-enterprise-blogs.security.com
 
Flashpoint’s coverage of Advanced Persistent Threat groups and nation-state hackers. Multiple government authorities such as @CISAgov have linked attacks to APT groups w/ some having ties to specific nation-states. flashpoint.io/blog/advanced-… @FlashpointIntel
Advanced Persistent Threat (APT) Groups: What Are They and Where Are They Found
flashpoint.io
 
If you refuse to use a password manager, at least follow these CISA tips and protect your accounts:
cisa.gov/uscert/ncas/ti…
 
 
Analysis by Georgetown University's CSET on "China’s Advanced AI Research Monitoring China's Paths to "General" Artificial Intelligence cset.georgetown.edu/publication/ch… @CSETGeorgetown
China's Advanced AI Research - Center for Security and Emerging Technology
cset.georgetown.edu
 
“I have fought the good fight, I have finished the race, I have kept the faith.”

As the sun sets on my last night in command I have peace that the @CpbHunters is a group of good people left in good hands.
Replying to @Gonzo_Dawg_Fan @COL_Gonzo_Dawg and 1 otherfalse
Best wishes and thank you for your support and vision!
 
Israeli President Isaac Herzog brought the evidence—multiple photographs of drones in Ukraine that matched Iranian models. atlanticcouncil.org/blogs/new-atla… @AtlanticCouncil
 
Mandiant has recently observed DRAGONBRIDGE, an influence campaign they assess with high confidence to be operating in support of the political interests of the People’s Republic of China (PRC) | mandiant.com/resources/blog… @Mandiant
Replying to @780thC
A Pro-China Disinfo Campaign Is Targeting US Elections—Badly | wired.com/story/us-midte… @WIRED
 
Flashpoint Blog: While some groups (“XakNet”) have consistently denied that they are working together with the Russian government, even in the face of evidence, other threat groups have been openly seeking opportunities for cooperation. flashpoint.io/blog/pro-kreml… @FlashpointIntel
Pro-Kremlin Hacktivist Groups Seeking Impact By Courting Notoriety
flashpoint.io
 
According to Intel 471 Russian media reports have described attempts to round up men without relevant experience, including those ineligible for service due to medical reasons. intel471.com/blog/russian-s… @Intel471Inc
Russian-speaking actors offer unique perspectives on Putin's military
intel471.com
 
In September (alone), Google TAG terminated 6957 YouTube channels and 144 Blogger blogs as part of our ongoing investigation into coordinated influence operations linked to China. blog.google/threat-analysi… @Google
 
Mandiant has recently observed DRAGONBRIDGE, an influence campaign they assess with high confidence to be operating in support of the political interests of the People’s Republic of China (PRC) | mandiant.com/resources/blog… @Mandiant
 
NSA’s new ‘nerve center’ ready to scan the world for threats to America - go.shr.lc/3f0k2ex - @washtimes
 
Col. Candice Frost, commander of the Joint Intelligence Operations Center at U.S. Cyber Command, discusses how her organization collects threat intelligence and what it does with it (9:50). defensescoop.com/radio/a-new-le… @DefenseScoop
A new leader for a new office in OSD; Cyber Commands cyber intel operations
defensescoop.com
 
As the nation’s cyber warriors, USCYBERCOM operates daily in cyberspace against capable adversary nations and non-state actors, such as terrorist groups and transnational criminal gangs. cybercom.mil/Media/News/Art… @US_CYBERCOM
 
In reply to @780thC
Replying to @Disruptionsz @aacpl and 1 otherfalse
The girl who took 1st place came back after losing to someone else at the last event (although she started an hour after him). We made the CTF harder (changed it) because we knew she was coming back. She won. In her spare time? She ethically hacks her school computers.
 
In reply to @780thC
@780thC hosts Hackathon II event with County Library to encourage teen interest in Cybersecurity dvidshub.net/news/432007/br…
Replying to @780thC
This was the fifth Hackathon event the brigade and library have collaborated on, and this year’s event included a Capture-the-Flag competition, as well as a Password Cracking, OSINT (open-source intelligence) Tools, and Basic Development / Python and Linux Scripting stations.
 
 
For access to this functionality a Trendsmap Explore subscription is required.

A Trendsmap Explore subscription provides full access to all available timeframes

Find out more

Thanks for trying our Trendsmap Pro demo.

For continued access, and to utliise the full functionality available, you'll need to subscribe to a Trendsmap Pro subscription.

Find out more

This account is already logged in to Trendsmap.
Your subscription allows access for one user. If you require access for more users, you can create additional subscriptions.
Please Contact us if you are interested in discussing discounts for 3+ users for your organisation, or have any other queries.