Twitter | Search | |
This is the legacy version of twitter.com. We will be shutting it down on 15 December 2020. Please switch to a supported browser or device. You can see a list of supported browsers in our Help Center.
Search Refresh
CyberDefenders 4h
A new windows forensics challenge has been released. Authored by , one of the most active communities. It'll be followed by some exciting challenges -mobile forensics, OSX, and . Stay tuned!
Reply Retweet Like
Vector Consulting 7m
online training Automotive is very much sought-after. Join and find out why it is such a success for attendees +++ GUARANTEED date: December 8 – 9, 2020 +++ Online, interactive with best practices from Vector projects worldwide!
Reply Retweet Like
STÖK ✌️ 16h
Had a great creative flow today, and will be dropping a fresh bounty Thursday’s episode every Thursday until New Years. FUEGO!
Reply Retweet Like
petercavicchia 17h
Risk reduction can go a long way, but no solution will be airtight, and there will always be a need to have a strong response plan in place:
Reply Retweet Like
MedTech Breakthrough 16h
Reply Retweet Like
UN University 4m
Read our latest research and commentary on , , and public , and explore a variety of opportunities to learn and with us in the November 2020 edition of INSIGHTS newsletter below.
Reply Retweet Like
Sharik Khan 12h
Won Bugcrowd October Challenge Week 1 and Week 2. Won a limited Edition Bugcrowd T-Shirt for week 1 and a Bugcrowd Hoodie for week 2. Thanks Almighty
Reply Retweet Like
Morning Tick 12h
Reply Retweet Like
CyberM8 14h
Fingerprint unlock is also one of the safest way to protect your information in any of your devices, always try to use it often!
Reply Retweet Like
Håkon Olsen 10h
I started a small collection of practices here: . Feel free to use, share and contribute. The content is open source - very limited today, but will hopefully grow into a useful collection over time.
Reply Retweet Like
Priya E. Abraham 18m
The massive and abrupt shift to is bound to give rise to new challenges in . Now is the moment to quick-start your Cyberpower by taking our online course: Enrol and get started today!
Reply Retweet Like
Rob Rothwell 🏴󠁧󠁢󠁳󠁣󠁴󠁿 13h
Time to chill after presenting at my first conference today :)
Reply Retweet Like
The Hacker News 2h
Interpol arrests 3 Nigerian BEC scammers for compromising over 500,000 government and private sector companies in more than 150 countries. Read details:
Reply Retweet Like

Related searches

#infosec · #dfir · #osint · #ransomware
LlC Rhyngwladol / WG International 🏴󠁧󠁢󠁷󠁬󠁳󠁿 16h
Wales is a leading hub in the fast-growing sector. Find out how researchers have developed a key tool to identify malicious activity on smart devices in our homes and improve their and our safety.
Reply Retweet Like
PentestSky 6h
Finally, we are a family of 100+ . It would not be possible without your immense support and encouragement. Thanks to all community members and keep supporting .
Reply Retweet Like
petercavicchia 13h
Implementing measures is often more straightforward than cultivating within an organization, but both are of key importance in minimizing the damage from attempted :
Reply Retweet Like
Recorded Future 9h
Our Geopolitical Intelligence Module accelerates critical decision-making with contextual OSINT data on geopolitical threats and trends — empowering analysts to understand shifting dynamics in relevant geographic areas:
Reply Retweet Like
DeepFriedCyber 4h
How consumers feel about retail data breaches
Reply Retweet Like
Next Dimension Inc. 16h
It’s imperative to have the right balance between security and usability to build a cyber-resilient digital organization. Don't fall victim to these common challenges:
Reply Retweet Like
Climb w/ Kyle (@ 🏡) 12h
With the threats changing extremely fast you’ll need to pick a solution dedicated to keeping you protected. Reach out and see why has stayed at the top of the for so long.
Reply Retweet Like