Twitter | Search | |
Search Refresh
Don't Panic. May 21
If you're in , however you got here, welcome. We need you. There are a ton of opportunities and we need great people to solve them. Being a gatekeeper for the community based on your path isn't one of them, however.
Reply Retweet Like
Megan Roddie 9h
peeps, working on a new talk and wanted to do a quick survey. If you speak at conferences, write blog posts, do podcasts, or any other method of teaching infosec, why do you do it?
Reply Retweet Like
Omar Espino 11h
can somebody read your passwd file with: "/???/?at /???/????w?" ? yes. bypass blacklisted words filter (or firewalls) via bash wildcards. /b'i'n/c'a't /e't'c/p'a's's'w'd' /???/?at /???/????w? /usr/b'i'n/'n'c 2130706433 80 /???/???/n? 2130706433 80
Reply Retweet Like
InfoSteph May 22
I’m having another tech-a-thon this weekend, but’s it’s inclusive! So anyone who’s interested in labbing virtually, let me know!
Reply Retweet Like
¯\_(ツ)_/¯ - staticeffect 3h
Hey fam, anyone have any leads on around AppSec Engineer/Manager, Web Pen testing, or the like that is remote? Asking for a friend.
Reply Retweet Like
Orcan Intelligence May 19
Reply Retweet Like
Alec Muffett May 21
In 2013 I posted on my blog a warning re: the threat of regulatory overreach, that the Internet could be harmed by (say) restricting the practice of to qualified and licensed persons, regulating job titles, etc. Friends pooh-poohed the idea. Argentina has just done it.
Reply Retweet Like
AverageSecurityGuy May 21
consulting is like public school. 1 in 10 clients are here because they want to be, the rest are here because of compulsory attendance.
Reply Retweet Like
Anson McCade AUS May 18
Reply Retweet Like
Michael Fisher May 18
What are 8 ways that can help protect myself from ? [Infographic]
Reply Retweet Like
Michael Fisher May 22
Reply Retweet Like
Ankit Anubhav May 21
We just received EDB 43143 (DLink router exploit) on our honeypots. One needs to POST a request on hedwig.cgi and put the credential file name in <service> tag to get the credentials. Seems as someone blindly copied the POC as uid ="whatever", same as POC code.
Reply Retweet Like
Michael Fisher 12h
Reply Retweet Like

Related searches

@fisher85m · @antgrasso · @mikequindazzi
🅵🅴🅵🅵🅸 23h
Got my new and shiny tools! 😎
Reply Retweet Like
Jurijs Rapoports May 18
Reply Retweet Like
Alpheric Inc 16h
Reply Retweet Like
¯\_(ツ)_/¯ - staticeffect 4h
Hey fam, Infosec Dumpster Fire (Now with even more SOC Analyst tears) will be making an appearance at ... you have been warned....
Reply Retweet Like
Michael Fisher May 21
Reply Retweet Like
Michael Fisher 2h
Reply Retweet Like
Michael Fisher May 22
Reply Retweet Like