Twitter | Search | |
Search Refresh
Prasoon Gupta 7h
I have released my bash tool for recon automation called "Deksterecon" which basically uses many open source tools and aggregate your data at one place for a broader attack surface. Let me know your feedback on it. For the community ❤️
Reply Retweet Like
Moix Security 22h
The mystery of the expiring Sectigo web certificate
Reply Retweet Like
Moix Security 21h
Hacker posts database stolen from Dark Net free hosting provider DH
Reply Retweet Like
we45 10h
There’s no one-size-fits-all in Automation. talks tailoring your pipeline to the platform you work on. Learn feedback loops, scalable , continuous appsec and more! Register:
Reply Retweet Like
WhiteHat Security 9h
shouldn’t be a burden to schools at this time. That's why we're offering free app scanning services to education institutions to support secure online learning. Learn more from :
Reply Retweet Like
StackHawk Jun 1
📰 ICYMI: StackHawk May Newsletter New features like support, findings management for your bugs, validation via curl, and more. Check it out!
Reply Retweet Like
Peerlyst 3h
Tying ZAP, Tweek both run in Docker containers together with glue to find code vulnerabilities before pushing them to production - a guide from
Reply Retweet Like
defensecode@defensecode.com Jun 2
Check out our new blog: Identifying Client-Side JavaScript Security Vulnerabilities in SAPUI5 Applications Using SAST
Reply Retweet Like
Root Cause 9h
Setting up Lab for Android Penetration Testing
Reply Retweet Like
OWASP Nagpur 13h
Do Join us and Give us a "Hi" live at OWASP Chapters All Day on 7th June 06:10 UTC / 11:40 IST !!
Reply Retweet Like
Secure Code Warrior 5h
It's vital that all developers are supported with security training in their preferred languages and frameworks, and this is especially important for legacy languages like (it still powers our finance industries!). Here's why:
Reply Retweet Like
Micro Focus 10h
Get a preview of our added features in Fortify 20.1 in our new webinar on June 16. Register here:
Reply Retweet Like
Hdiv Security Jun 2
Not all Interactive AST (IAST) in the Vulnerability Assessment market are the same. Actually, there is a big difference between the two main approaches. Learn the details in this post
Reply Retweet Like
AppSealing 22h
Like ‘silent killers’, Keyloggers monitor & record your keystrokes to give hackers easy access to your personal information, which is later sold on the dark web.
Reply Retweet Like
therealcipherking 5h
Where the King was born... after this episode we talked and suddenly I had a new name
Reply Retweet Like
IriusRisk 10h
Learn about the What, Why & How of Threat Modeling. Download our latest free e-book.
Reply Retweet Like
App-Ray Mobile Security 15h
Mitron app: Is it safe to download the TikTok alternative? Here's what you need to know before using the Mitron app.
Reply Retweet Like
IriusRisk Jun 2
DevOps understand security workflows without being trained specificly for Security. Easy and understandable interpretation of Risk paterns.
Reply Retweet Like
Moix Security Jun 1
White House says security incidents at US federal agencies went down in 2019
Reply Retweet Like
Moix Security Jun 1
Facebook to verify identities on accounts that churn out viral posts
Reply Retweet Like