Twitter | Search | |
Search Refresh
Top news story
Sabe Barker 16h
Scotiabank leaked online a trove of its internal source code, as well as some of its private login keys to backend systems by accidentally leaving Github repos public!
Reply Retweet Like
Joseph Steinberg Sep 18
Reply Retweet Like
Data Privacy Sep 16
LastPass bug leaks credentials from previous site
Reply Retweet Like
Kevin Lim Sep 16
Reply Retweet Like
IAM Platform Sep 13
IAM Platform Curated Tweet: Biometrics research briefs: global growth, fraud detection and voice recognition – Biometric Update
Reply Retweet Like
Nicholas Fearn Sep 18
I’m looking for a expert to comment on a story.
Reply Retweet Like
Joy •Cyber Security Newbie• Sep 16
👩🏾‍💻 It’s Day 2 of my challenge. I want to encourage you, even if you haven’t started, you still have time. 106 days left until 2020, let’s work.
Reply Retweet Like
CMT Consulting, LLC Sep 16
This is why Identity and Access Governance is important to health care systems.
Reply Retweet Like
IAM Platform Sep 13
IAM Platform Curated Tweet: Government Biometrics Month: ID Goes Biometric – findBIOMETRICS
Reply Retweet Like
Rey Montero 6h
Most Cyber Attacks Focus on Just Three TCP Ports
Reply Retweet Like
Joy •Cyber Security Newbie• Sep 16
Reply Retweet Like
gbolahan 8h
The only truly secure system is one that is powered off, cast in a block o concrete and sealed in a lead-line room with armed guards - and even then I have my doubts - Eugene H. Spafford .... I also have my doubts
Reply Retweet Like
IAM Platform Sep 13
IAM Platform Curated Tweet: Respected biometrics researcher Anil Jain criticized for China connections – Biometric Update
Reply Retweet Like
Joy •Cyber Security Newbie• Sep 16
👩🏾‍💻 Day 2 in the books. 👩🏾‍💻 Focus tonight was Lists & Dictionaries in . I use append, pop, sort, and reverse to name a few. 👩🏾‍💻 ITF+ studies underway
Reply Retweet Like
Assyl Haidar 46m
prediction: US elections to become World Cup of hacking where competitors vie for their preferred outcome
Reply Retweet Like
PhishFindR 38m
🎣 PhishFindR Found: 2 NEW 🌐 @ 18:13:12 > 🌐 Found Today: 445 > 2019-09-19 🦈
Reply Retweet Like
Aaron Keith Hackney 50m
Reply Retweet Like
Assyl Haidar 1h
in security, your adversaries are active. They will adjust paths every time you make gains. Humans are also weakest links in cyber attacks. 2FA needed when the boss gives an instruction to transfer $$?
Reply Retweet Like
Joy •Cyber Security Newbie• 14h
Day 4️⃣ complete. 1. Today I split my challenge into two 30 minute slots. 2. Built upon numbers & importing modules for more functions. 3. User input & writing code to access that info.
Reply Retweet Like
Joy •Cyber Security Newbie• 17h
Reply Retweet Like
Joy •Cyber Security Newbie• Sep 18
Reply Retweet Like