Toggle navigation
TWunroll
TWunroll
faq
Contact US
#InfoSec
Infosec Scarlett
infosec_scarlet
I have seen a lot of #pentesters struggle with tunneling and port-forwarding concepts. All #hackers should definitely understand these concepts for successful tests.This thread is dedicated to Tunneling/PortForwarding tricks.#infosec #pente
Read more
Kim Crawley
kim_crawley
If a trans person told me someone is a TERF, or if a Black person told me someone is racist, I would believe them.I wouldn't say, "Well, they're nice to
Read more
Sergio Caltagirone
cnoanalysis
#SolarWinds was an access operation, not an effects operation. Those saying "only an espionage campaign" and assigning early intent to such a large-scale access operation are mistaken. #ThreatIntel #infosec #cybersecurity
Read more
Lesley Carhart
hacks4pancakes
I’m kinda tired of all the, “Solarwinds had poor infosec policy and executive buy in” takes. Not because evidence doesn’t show that they absolutely did. Because most product companies that
Read more
Lesley Carhart
hacks4pancakes
I’m really tired of explaining that hacking into an individual device in a complex physical process does not in most cases equate to successfully and meaningfully tampering with the process.
Read more
Brian M Zimmer
brianmzimmer
2 tips for Sales Engineers / people presenting on a remote meeting:1) As everyone is on mute and there is probably a crowd, take a stop, after important sections and
Read more
🧘🏻♀️Lourdes M. Turrecha
LourdesTurrecha
@FTC-@zoom_us settlement decree requires robust #InfoSec programhttps://twitter.com/ftc/status/1325825131458027520 For the non-practitioners, if you’re tempted to protest the lack of fines against @zoom_us, this is just how it works with
Read more
Jacquelyn Schneider
JackieGSchneid
I agree with @RidT, but it has been illuminating to me how strong the divide is between natsec/policy types and infosec practitioners on this issue.https://twitter.com/RidT/status/1338537697560965120 Why is this important? Infosec
Read more
Kevin Beaumont
GossiTheDog
Linux security right now reminds me of Windows security in the 90s. Attackers are running around networks at scale and people don’t even realise. I realise that is not new,
Read more
Kevin Beaumont
GossiTheDog
Hey, do you know what happens when you take all your staff and have them work without web proxies and office firewalls and security appliances? You rely on every endpoint
Read more
Sergio Caltagirone
cnoanalysis
Government: "Country X is planning a cyber attack, be on the lookout to protect yourselves."3 million mid-sized and larger organizations now have to active their cybersecurity teams to watch and
Read more
Pwn All The Things
pwnallthethings
Ok, a slightly long-winded take on this (short answer is yes, I agree, the word "attack" is a bad choice here).But tl;dr is this is a problem of technical jargon
Read more
Katelyn Ilkani
cyberkatelyn
Are you stuck in some aspect of your life - personal or professional? You need a mentor. I’ve been spending an obsessive amount of time on this topic; let me
Read more
Kelly Shortridge
swagitda_
A “basic” infosec tool (2FA) is what alerted FireEye to nation state activity. There are a few things we can learn from this, and not just that my screaming into
Read more
Dino A. Dai Zovi
dinodaizovi
I saw some tweets in my TL about infosec burnout and such, so let's chat about that. I believe the core of burnout is not getting any traction for your
Read more
Alyssa Miller - 🌈Rainbow Teamer🌈
AlyssaM_InfoSec
Alright, so let's answer this. First I assume you're talking about Susan Mauldin who was the CSO (not CIO) of Equifax at the time of the 2017 breach. She did
Read more
‹
1
2
3
4
5
6
7
8
9
10
›
By continuing to use the site, you are consenting to the use of cookies as explained in our
Cookie Policy
to improve your experience.
I agree