Similar User
동글동글 photo

@eDwbmSQMGx3qmYI

aispirits photo

@AiSpirits_Inc

cpl photo

@casandraviolet1

Obito photo

@YusuffAmen

mr.ab photo

@since_bitcoin

castro photo

@novacashtro

ctrine photo

@muk_1028

b0br photo

@0xb0br

TIKIR photo

@champ4136

RevealGuess 🧡 Ordzaar Tabi 🟧 photo

@RevealsGuess

🦀Captain Crab🦀 photo

@LL92447843

Whplus Technology photo

@whplus

nuri photo

@nuri_chang

Brett Kelly photo

@krettbelly

Baylor Myers photo

@BaylorMyers

KP Reposted

New writeup from @_specters_ and I: we're finally allowed to disclose a vulnerability reported to Kia which would've allowed an attacker to remotely control almost all vehicles made after 2013 using only the license plate. Full disclosure: samcurry.net/hacking-kia


KP Reposted

Ok, huge news. Fabric is now migrated to Go! So now, rather than wallowing in Python dependency hell—you can just install Fabric using one command: go install github.com/danielmiessler… 1,000,049 thanks to @xssdoctor for all his work on getting this out!


KP Reposted

🚀We did a thing! The all-new CTI-CMM.org is live! We're thrilled to unveil the new industry inspired, industry led, CTI maturity model (CTI-CMM), designed to help the intel community no matter where you are in your maturity journey. #cticmm


KP Reposted

This morning, we published the Root Cause Analysis (RCA) detailing the findings, mitigations and technical details of the July 19, 2024, Channel File 291 incident. We apologize unreservedly and will use the lessons learned from this incident to become more resilient and better…


KP Reposted

With Chrome 127 on Windows, we're introducing enhanced encryption to protect sensitive data, starting with your cookies🍪! This helps protect your personal information and keeps your online accounts secure from hackers. Read more about this protection: security.googleblog.com/2024/07/improv…

Tweet Image 1

KP Reposted

More intelligence on threat actors abusing the incident last week to distribute malware. This latest is a python infostealer. crowdstrike.com/blog/threat-ac…


KP Reposted

GitHub - decalage2/awesome-security-hardening: A collection of awesome security hardening guides, tools and other resources github.com/decalage2/awes…


KP Reposted

Reminiscing about May and the amazing sessions at BSidesSF?! All talks are live on our YouTube channel! Check them out: youtube.com/playlist?list=… #BSidesSF2024 #infosec #cybersecurity


KP Reposted

You broke records made threes won championships and most importantly you showed us the heart of a Warrior. Klay, you're forever a legend in The Bay.


KP Reposted

.@JNJMedTech completed its acquisition of @ShockwaveIVL, a pioneer in the development of transformational technologies for the treatment of cardiovascular disease. Click here for more information: social.jnj.com/3VnOPEc


KP Reposted

The sophistication levels of online scammers that are targeting individuals and families is hitting an all time level. Just dealt with a friend that drained all their bank accounts, SIM cloning, and had full voice cloning (to remove accents + sound perfect) and kept them on…


KP Reposted

So Apple has introduced a new system called “Private Cloud Compute” that allows your phone to offload complex (typically AI) tasks to specialized secure devices in the cloud. I’m still trying to work out what I think about this. So here’s a thread. 1/


KP Reposted

Source code and documentation for the BSidesSF 2024 Badge Challenge, located here: github.com/BSidesSF/badge… #bsidessf #BSidesSF2024 #infosec

Tweet Image 1

KP Reposted

Welcome to the first Huntress Threat Report 🚨🦸‍♀️ An in-depth review of real world intrusions @ small & mid-sized businesses. Follow @HuntressLabs for more. huntress.com/hubfs/SMB-Thre…

Tweet Image 1

KP Reposted

🚨🔥The 7th annual Hackerone Security Report is out. I always love this report because it's based on tens of thousands of REAL findings and vulnerabilities AND input from real hackers who are finding those vulns everyday. Here's all the highlights.

Tweet Image 1

KP Reposted

A quick blog post by @subT3e on how our canarytokens are used to detect when your websites are cloned (and how this defense¹ holds up against new-style reverse-proxy attacks). blog.thinkst.com/2023/09/cloned… __ ¹ This token is also available free at canarytokens.org


KP Reposted

Hacking GTA V RP Servers Using Web Exploitation Techniques by @blastbots nullpt.rs/hacking-gta-se…

Tweet Image 1

KP Reposted

jsluice - by @TomNomNom 🎥 youtube.com/watch?v=BnQBp8… 🔗 github.com/BishopFox/jslu… 🖳 alias jsurls='curl -k -s "$1" > /tmp/temp.js && jsluice urls /tmp/temp.js && rm /tmp/temp.js' 🏃 jsurls hackerone.com/sites/default/…


KP Reposted

The recent WhatsApp accounts takeover is simple and genius. This is how it works: You're sleeping. A "hacker" tries to login to your account via WhatsApp. You get a text message with a pincode that says "Do not share this". You don't share it, yet you still get hacked. How?


Loading...

Something went wrong.


Something went wrong.