Atredis Profile Banner
Atredis Partners Profile
Atredis Partners

@Atredis

Followers
3K
Following
275
Statuses
591

Atredis is a team of world-renowned security researchers and consultants. We do risk-centric, research-driven security testing and consulting.

All over North America
Joined August 2013
Don't wanna be here? Send us removal request.
@Atredis
Atredis Partners
6 months
Ransomware continues to bring critical infrastructure and large enterprises to a standstill. In part two of a series, our Risk team continues the conversation about what your organization needs to know to adequately respond to an event.
Tweet media one
0
2
2
@Atredis
Atredis Partners
6 months
We're excited to announce that Atredis is 100% employee owned and operated. Here's Shawn with a post about how we got there.
0
17
56
@Atredis
Atredis Partners
7 months
Here's Chris' slides from his REcon talk on the DA1469x BootROM!
0
9
12
@Atredis
Atredis Partners
8 months
Here's Chris with some advanced LLM training techniques, exploring the process of fine-tuning a small local model to do the work of much larger models!
Tweet media one
0
18
25
@Atredis
Atredis Partners
10 months
Last year, Brandon and Ali went looking for new attack surface area in Microsoft Exchange. Ultimately, they were able to crash the Exchange file scanner by simply sending an email. Read more on our blog:
Tweet media one
0
25
42
@Atredis
Atredis Partners
11 months
We're excited to see our ChromeOS paper go public! 🎉🥳 We did a deep comparative analysis of ChromeOS' security posture vs MacOS and Windows, with full autonomy to make our own independent conclusions. Paper: ChromeOS blog:
1
26
33
@Atredis
Atredis Partners
1 year
Here's Chris on his process of reversing the Plixer Scrutinizer network monitoring appliance and finding a big pile of RCEs, as detailed in an advisory last year.
0
10
11
@Atredis
Atredis Partners
1 year
ICYMI: Jordan (@jordan9001) put together an awesome tutorial on getting started with LibAFL on our blog! Also, be sure to check out his symbolic execution training at RingZer0 (virtual) the week of February 10:
Tweet media one
0
4
6
@Atredis
Atredis Partners
1 year
Jordan (@jordan9001) put together an awesome tutorial on getting started with LibAFL on our blog! Also, be sure to check out his symbolic execution training at RingZer0 in Austin (and virtually) the week of February 10:
Tweet media one
0
6
15
@Atredis
Atredis Partners
2 years
There's still time to register for our own Jordan Whitehead's remote training on practical symbolic execution! Jordan's a terrific trainer and his course will absolutely help you hone your craft as a bughunter or vuln researcher. Head over to to sign up!
Tweet media one
0
12
14
@Atredis
Atredis Partners
2 years
Here's @jordan9001 with some deep thoughts on symbolic execution, check out the great symbex training he's put together as well!
Tweet media one
0
14
22
@Atredis
Atredis Partners
2 years
In part 1 of a series from the Risk and Advisory team, we discuss sometimes overlooked questions that organizations should be thinking about well in advance of an actual ransomware attack. Read the full post for the details:
Tweet media one
0
5
8
@Atredis
Atredis Partners
3 years
If you've ever wanted to shell out on a Jumbotron, Brandon Perry (@BrandonPrry) has you covered! He got hold of a mountain of gear and spent some time poking around.
Tweet media one
0
7
13
@Atredis
Atredis Partners
3 years
You'll still always be an Atredian, fam. We'll see you downriver. 💞
0
0
5
@Atredis
Atredis Partners
3 years
Brandon Perry (@BrandonPrry) recently found dozens of crashes in @Apple's GarageBand and Logic Pro X. Two of these were CVE-worthy (CVE-2022-22657 and CVE-2022-22664). Here's a quick write-up:
Tweet media one
1
21
46
@Atredis
Atredis Partners
3 years
And we're happy to have you, fam!
@wvuuuuuuuuuuuuu
wvu
3 years
I am happy to say that I'll be starting at @Atredis next week. :)
0
2
8
@Atredis
Atredis Partners
3 years
During personal research, Brandon Perry (@brandonprry) found a chain of issues in SysAid ITIL that ended in remote code execution. Resulting CVEs include: CVE-2021-43971, CVE-2021-43972, CVE-2021-43973, CVE-2021-43974. Read the full post for the details:
Tweet media one
0
11
23
@Atredis
Atredis Partners
3 years
Today we are releasing a new project that will be useful for learning and exploring vulnerabilities in automotive systems (Unified Diagnostic Services). Read about it here:
Tweet media one
0
12
16
@Atredis
Atredis Partners
3 years
We don't often get to talk about our gigs, so we're excited @uchi_mata from @SalesforceEng wrote about working with @_tomsteele and @0xJDow on multi-tenancy and the @kubernetesio Control Plane! Blog: || Our report and config data:
Tweet media one
0
21
22
@Atredis
Atredis Partners
3 years
nathan: shawn, i only see winning here, no failing shawn: i suggest we demand a retraction from justin
0
0
3