@lowk3y "Investigation and recourse rely on knowledge of the whole system"
RT @firstname.lastname@example.org: Paul Vixie on stage at #Hacklu!
RT @email@example.com: BREAKING: @TWITTER@twitter.com just published the full dataset of tweets from the Russian and Iranian troll farms.
9 million Russian tweets. 1 million Iranian tweets. #motherlode
They gave @DFRLab@twitter.com a look ahead of time.
Thread on the findings to follow.
RT @OWASP_MSTG@twitter.com: We graduated to OWASP Lab status! Look at our shiny new badges at https://github.com/OWASP/owasp-mstg ;-) . We would like to thank our reviewers, contributors and sponsors that made this project happen!
RT @CSObservatory@twitter.com: The Israel CyberSlide! Available in high resolution for download:
We are calling on #Aviation, #Healthcare, #Rail, #ICS cybersecurity startups.
Please get in touch at:
firstname.lastname@example.org #CyberSecurity #InfoSec #CyberStartupObservatory
RT @LukasStefanko@twitter.com: How mobile spyware is spread via Facebook.
1) Fake hot girl profile starts to chat with you.
2) When chat gets intimate, they want to move to more secure chat platform.
3) They send you link to chatting app.
4) Chatting app is spyware.
RT @email@example.com: this month in #space #hacking - @NASA@twitter.com launched the #Pioneer1 60 years ago, intending a flyby of the moon. Programming errors shortened the flight to 43 hours in space. Still brought home some useful data, and looked very future-cool doing it.
RT @IntelTechniques@twitter.com: My new OSINT Search Portal is now online here: https://inteltechniques.com/menu.html | Full details here: https://inteltechniques.com/blog/2018/10/17/new-osint-search-portal/ | #OSINT
RT @Aimee_Laycock@twitter.com: Happy Cyber Security Awareness Month! @firstname.lastname@example.org 2018 report #measuretoimprove studies 20,000+ employees in 7 languages, shares the latest #industrybenchmarks, and looks at #securityculture changes. PLUS it's free! https://get.clt.re/report
RT @KeithRParsons@twitter.com: RT @email@example.com: The faces of the 13 CWNEs at @Aerohive - #WiFiTrek
That is way impressive!
RT @Nick_Lowe@twitter.com: @firstname.lastname@example.org @GregorVucajnk@twitter.com It doesn't seem the CAPWAP information returned is currently a basis to be able to give a richer error message.
RT @email@example.com: HTTP status ranges in a nutshell:
1xx: hold on
2xx: here you go
3xx: go away
4xx: you fucked up
5xx: I fucked up
RT @firstname.lastname@example.org: My opening joke at today's work offsite: "I was going to tell you all a UDP joke, but you might not get it."
The only person that laughed was @email@example.com
RT @firstname.lastname@example.org: What puzzles me about this libssh vuln:
1) USERAUTH_REQUEST is used for specifying the user you want to authenticate as. If you don't send it, who are you authenticated as?
2) The patch (https://www.libssh.org/security/patches/stable-0.6_CVE-2018-10933.jmcd.patch01.txt) introduces (not replaces!) state checking. Was there none before? https://twitter.com/dlitchfield/status/1052296941436989440
Hacker|critical thinker|philosopher|BOFH|co-founder of @Cyberpipe hackerspace|@BSidesLjubljana organizer|FOSS enthusiast|infrastructure solution architect
Follow friends and discover new ones. Publish anything you want: links, pictures, text, video. This server is run by the main developers of the Mastodon project. Everyone is welcome as long as you follow our code of conduct!