Toggle navigation
TWunroll
TWunroll
faq
Contact US
#Hackers
Graadient
graadient
1/ After recent attacks, many complain that flash loans are evil. Yes, they're painful, but ultimately good for DeFi. With significant funds at stake, people WILL make significant efforts to
Read more
Jennifer Cohn ✍🏻 📢
jennycohn1
Honestly, have these people never read about Bush v Kerry in 2004 & how GOP operatives routed Ohio’s election night returns thru a back up server in TN? Before the
Read more
श्रीMurali🇮🇳
mayamadhava
If you are the one who is trending #EyeTwitter, then #READ.#DYK Hacking of Iris Scanners are hackers new target ?At the Black Hat cybersecurity conference in Vegas, Javier Galbally, a
Read more
Devon ☀️
devonzuegel
Thread of things I wish I knew when I began programming, so that I would've known that it wasn't *me* but rather the *environment* that was slowing me down
Read more
Peregrine Trader
peregreine
1) $SWI Russian hackers broke into SolarWind based software to enter governmental agencies, infrastructure backbone, and thousands of corporations. Malware loaded into some computers. $SWI closed @ $23.55 two Fridays
Read more
Stephen Diehl
smdiehl
Continuing on with the public awareness raising about the tragic costs of bitcoin ... today we'll explore the bitcoin killer app: Extortion.(1/) Previously I covered why it's bad that
Read more
Nicole Perlroth
nicoleperlroth
Close readers will note that I always put "water treatment plants" first in my line up of remotely hackable infrastructure. It's because this is the attack scenario that freaked me
Read more
Pauncho Rivera MacManus Jolicoeur Smith
Pauncho_Smith
WHAT BAR IS NANAKO DOJIMA?She's a box of Jello 1-2-3. Futaba is clearly a can of Mountain Dew Black Label. Mrs. Junpei Iori (Chidori) herself is a Kit Kat White.
Read more
BlackRoomSec
blackroomsec
I was asked last week what are some non tech skills that can be handy in learning cybersec hacking and I will repeat it here. This is my updated guidance
Read more
David Corn
DavidCornDC
1. It's been overshadowed by other matters (the pandemic, impeachment), but @realDonaldTrump's betrayal of the United States related to Putin's attack on American democracy should not be overlooked or forgotten
Read more
Cyber Statecraft
CyberStatecraft
Since 2010, there have been at least 31 distinct attacks targeting updates in the software supply chain, of which 17 compromised build servers or altered code. Of those, more than
Read more
Liam 💻
somenerdliam
How to DELETE 99.9% of your digital footprint from the internet [a thread] Step 1: Preliminary RequirementsGo through each email you can think of that you've used in the past
Read more
Bloke From Barnsley #Is #Sisu
NicolaJames007
1. Just over 4 weeks ago I was contacted by a LibDem PPC and asked for help.A number of people had come forward with allegations against a prominent Twitter user
Read more
Azeria
Fox0x01
Self-isolated hackers, assemble! 3 new tutorials and a new VM for you to play around with:Lab VM 2.0:https://azeria-labs.com/lab-vm-2-0/ Emulating Router Firmware: https://azeria-labs.com/emulating-arm-firmware/Stack Overflows: https:/
Read more
Kurt Wagner
KurtWagner8
NEW: Former Twitter security employees say the company has struggled for years to police the internal systems employees and contractors use to handle sensitive security issues, like resetting passwords. story
Read more
Ben Buchanan
BuchananBen
I’m hesitant to do this because everyone says how the SolarWinds hack confirms all their priors, but here goes. My PhD and first book argues the blurred lines between espionage
Read more
‹
1
2
...
4
5
6
7
8
9
10
...
27
28
›
By continuing to use the site, you are consenting to the use of cookies as explained in our
Cookie Policy
to improve your experience.
I agree