Twitter | Search | |
Search Refresh
Jose Monteagudo Oct 25
6 challenges to managing unstructured data sets when standard protection no longer works: For further information on cyber topics & innovation:
Reply Retweet Like
Rahul Raj Rai Oct 22
Turns out you don't even need 197 IQ or 15% of his password to know 100% of his password 🤦🏻‍♂️
Reply Retweet Like
Omar Espino Oct 20
How to extract urls,srcs and hrefs from all HTML elements in any website? Open DevTools and run urls = [] $$('*').forEach(element => { urls.push(element.src) urls.push(element.href) urls.push(element.url) }); console.log(...new Set(urls))
Reply Retweet Like
CyberSaint Security 6s
We are thrilled to be named one of Boston’s hottest startups by Bostinno in the annual Inno on Fire Awards! Read the announcement:
Reply Retweet Like
Dab-it_Fegurgur🇬🇺🤙🏼💻📓 Oct 24
Who agrees twitter people. I certain do.
Reply Retweet Like
Fernando Huaman Oct 25
Multiple popular mobile browsers found vulnerable to address bar spoofing flaws, leaving doors open for spear-phishing and malware attacks.
Reply Retweet Like
Dab-it_Fegurgur🇬🇺🤙🏼💻📓 7m
Happy Tuesday Twitter folks. Keep your head up and just know that your not alone in this world.
Reply Retweet Like
TEAM CYMRU 2m
Singapore's worst-ever prompted the nation to bolster its defences
Reply Retweet Like
blueteamblog Oct 25
Do you have detailed email logs in your SIEM? Look for attachments with multiple extensions. Attackers commonly use this for obfuscation. For example, attachment matches regex pattern .*\.\w+\.\w+$ will find any attachment which has 2 extensions.
Reply Retweet Like
FlynnUnplugged Oct 25
Yeah. Right. Seriously pedestrian effort.
Reply Retweet Like
RansomUpdates Oct 25
Reply Retweet Like
sritak@home 🍁🍂 1m
Reply Retweet Like
TEAM CYMRU Oct 25
Vaccine-Maker Shuts Global Plants After
Reply Retweet Like
Digital News Stream 35s
Reply Retweet Like
siLLyDaddy Oct 26
📢 AMA #15 Our next guest is :- 🥳 Calum Boal 🥳 Senior pentester at OnSecurity Ask him anything related to etc Oct 27-28
Reply Retweet Like
Hakin9 Oct 25
Reply Retweet Like
Quanterion Solutions Oct 24
Reply Retweet Like
Threat Collect 29m
Flaws in Winston Privacy Devices Can Expose Networks to Remote Attacks
Reply Retweet Like
Philip van Dalen Oct 25
Reply Retweet Like
✇ 🛡 Cyb≡rMaterial 💯⚪ Oct 24
Reply Retweet Like