@0xjbr Profile picture

Saud Aljabri ๐Ÿ“ˆ

@0xjbr

Cyber Security specialist and blogger at #0xjbr sharing the latest in #CyberSecurity and #InfoSec. Follow for tips and news.

Joined February 2022
Similar User
ูˆู„ุงุก | ๐Ÿ‘ฉ๐Ÿปโ€๐Ÿ’ป photo

@WALAA_cs

ูุงุทู…ู‡ photo

@fAlSarrar

ู….ุฃู†ุณ ุขู„ ู…ุงู†ุน photo

@Anasalmana55

๐Ÿ‡ต๐Ÿ‡ธ๐Ÿ‡ธ๐Ÿ‡ฆ Faris Hijazi (e/acc) photo

@theeFaris

Haifa Al-Ruwaili๐Ÿ‡ธ๐Ÿ‡ฆ photo

@4uiioi

Mohammed Al Mallahi || ู…ุญู…ุฏ ุงู„ู…ู„ุงุญูŠ photo

@DR_Keif

LU$ER ๐Ÿ‡ธ๐Ÿ‡ฆ photo

@lus33r

. photo

@g0v76

Ghaleb Al-otaibi photo

@Patri1ck

๐Ÿƒ photo

@SA33DLafi

Asaad AlHarthy photo

@0xBl4ck

ุฑูŠู…ุง ุนุจูŠุฏ๐ŸŒŠ. photo

@RE_1224

ุฎู„ูˆุฏ ุฅุจุฑุงู‡ูŠู… photo

@Khuludibrahim_

cyber_saudi | Abdullah Aloqla photo

@cyber_Saudii

Naif Al-fardan photo

@ffqqf

The first website ever from 1991 is still up: TheProject.html

The first website in history, "info.cern.ch," was created by Tim Berners-Lee and launched on August 6, 1991. #WorldWideWeb #TimBernersLee



The first website in history, "info.cern.ch," was created by Tim Berners-Lee and launched on August 6, 1991. #WorldWideWeb #TimBernersLee


Explore The New York Times archives from 1851 to 2024! ๐Ÿ—ž๏ธ๐Ÿ“… Find articles from every year in one place nytimes.com/sitemap #NYTimes


Quality is not an act; it is a habit.


HTML, or HyperText Markup Language. It was created by a developer named Tim Berners-Lee in 1991. Today, every website in the world uses HTML! As the name suggests, HTML is a markup language; it marks up every piece of content on a web page and defines its type. Pretty simpleโ€ฆ

ุงุณุงุณูŠุงุช ุจุฑู…ุฌุฉ ูˆุชุตู…ูŠู… ู…ูˆู‚ุน ุงู„ูƒุชุฑูˆู†ูŠ.

Tweet Image 1
Tweet Image 2


Saud Aljabri ๐Ÿ“ˆ Reposted

God forbid a VC be asked to do anything remotely resembling work, likeโ€ฆ (checks notes)โ€ฆ clicking on something. Frankly, these bullshit examples teach young founders to forego common sense (like information security) that puts their company at risk. If, as an investor, youโ€ฆ


Cyberspace is the crazy world in which cybersecurity professionals work.


Absolutely. The digital world is much more than just a network of computer systems. Itโ€™s where people do business, live, love, and ultimately are immortalized. Securing it is essential. ๐Ÿ”๐ŸŒ

That's why securing this space is very important ๐Ÿ”๐Ÿซก



Cyberspace is the interconnected network of IT infrastructure, including the Internet, telecoms, computer systems, and IoT devices. It can also refer to the virtual world as an experience or concept.


What You Need to Know in 2024! ๐Ÿšจ Data breach costs hit a record average of $4.35M globally. ๐Ÿ’ธ Cybercrime losses could reach $8T in 2024, making it the 3rd largest "economy" globally. ๐ŸŒ๐Ÿ’€ Recovery time from a cyberattack averages 287 days. โณ 1 in 3,000 emails stillโ€ฆ


The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable.

Two protocols hacked this week via phishing attacks. Both protocols were clients of my company, Gaslite. I frequently post about exposing North Korean engineers. Is the DPRK just going down my client list and hitting them 1 by 1? The (tinfoil) hat stays on.



Types of malware: Viruses ๐Ÿฆ  Worms ๐Ÿชฑ Scareware ๐Ÿ˜ฑ Ransomware ๐Ÿ’ธ Botnets ๐Ÿค– Trojan Horse ๐Ÿด Spyware ๐Ÿ•ต๏ธโ€โ™‚๏ธ Rootkit ๐ŸŒฑ KeyLogger โŒจ๏ธ Logical Bomb ๐Ÿ’ฃ


Can you be a malware analyst without reverse engineering? The answer is yes, and you can be a reverse engineer without being a malware analyst.

Malware ๐Ÿ‘พ = Malicious software. All malware is used for malicious purposes, the exact goal of the malware may differ from one threat actor to another. The most common goals : โ€ข Disrupting host system operations โ€ข Data theft โ€ข Espionage โ€ข sending spam โ€ข Utilizing theโ€ฆ



Malware ๐Ÿ‘พ = Malicious software. All malware is used for malicious purposes, the exact goal of the malware may differ from one threat actor to another. The most common goals : โ€ข Disrupting host system operations โ€ข Data theft โ€ข Espionage โ€ข sending spam โ€ข Utilizing theโ€ฆ


My morning routine โ˜€๏ธ

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4

Tweet Image 1

ุณูŠุช ุงุจ ุณุนูˆุฏูŠ ๐Ÿ‡ธ๐Ÿ‡ฆ๐Ÿ‡ธ๐Ÿ‡ฆ๐Ÿ‘‡๐Ÿป

Tweet Image 1


Cyber Security Concepts: CIA - Confidentiality, Integrity, Availability. AAA - Authentication, Authorization, Accounting. Security Controls Category - Technical controls, Managerial controls, Operational controls, Physical Controls. Security Controls Types - Preventive,โ€ฆ


Loading...

Something went wrong.


Something went wrong.