Transhackerism
@transhackerism
CyberSec, Futurist, Techno Artist, Metaverse, AI, Privacy, w00x2, Public Speaker, Change Agent, Synth Nut, Freedom Lover, Protector, Connector, Hacker
You might like
Necessity is the mother of all things.
First Sophos and now PaloAlto?!? I think we have entered a new era. It’s the “Hack Back” era.
Absolutely killer CMMC online workshop! No cost, just show up this Wednesday and walk away with a baseline, plan, gaps identified, and access to the same tracking tool we use ourselves! linkedin.com/posts/trustedi… #CMMC #workshop #online #NIST #DFARS
INTRODUCING: Agentic Security - LLM Security Scanner! 🔍 🔑 Features: Scans for prompt injections, jailbreaking & more. Provides detailed reports & options to customize attack rules. 🔗access the GitHub Link ↓
Today the United States Securities and Exchange Commission charged four companies for intentionally misleading investors about the severity of the SolarWinds breach. In or around September 2019, APT29 a/k/a Cozy Bear a/k/a Turla Group compromised United States-based network…
And here we thought humans were better at machines in thinking outside of the box during a red team...
Fucking wild. @OpenAI's new o1 model was tested with a Capture The Flag (CTF) cybersecurity challenge. But the Docker container containing the test was misconfigured, causing the CTF to crash. Instead of giving up, o1 decided to just hack the container to grab the flag inside.…
The new publication from @DefSecSentinel explores the DPRK’s use of Python and social engineering for initial access. Check out the detailed breakdown here: go.es.io/3ZtSYsS #ElasticSecurityLabs #DPRK #Python
Why is no one talking about how, if the comms supply chain was THAT compromised on so many levels, how that likely impacted the confidentiality and geo locations of Hezbollah just as much as this kinetic attack? Probably more than just explosives put in those devices.
we're gone for 30 minutes and now people are turning walkie talkies into bombs wtf
After 30 years of cyber, I can say that someday on my gravestone, I hope someone spray paints a groundhog.
Microsoft is being criticized (again) because Administrator-to-Kernel mode execution is not considered a security boundary. Researchers noted that home users, who often run as administrator, could be a victim of this lack-of security boundary. Researchers asked Microsoft why?
Ransomware Operator Claims - Week 3 2024 dbdigest.com/2024/01/ransom… #databreach #databreaches #databreachesdigest #dataprivacy #GDPR #cybersec #cybersecurity #infosec #informationsecurity #cyberattack #hacked #malware #phishing #ransomware #ROCreport
Update: Over 1,700 Ivanti VPN appliances have been hit by zero-day attacks, including government, military, telecom, defense, tech, finance, consulting, aerospace, and engineering sectors. Read: thehackernews.com/2024/01/nation… #infosec
@Akamai recently released a cool blog just about this topic akamai.com/blog/security-…
United States Trends
- 1. #SmackDown 38.8K posts
- 2. Giulia 12.7K posts
- 3. Caleb Wilson 4,821 posts
- 4. #BostonBlue 4,016 posts
- 5. #OPLive 1,751 posts
- 6. Supreme Court 172K posts
- 7. Rockets 19.6K posts
- 8. Tulane 2,956 posts
- 9. #TheLastDriveIn 2,425 posts
- 10. Northwestern 4,401 posts
- 11. #Dateline N/A
- 12. Lash Legend 5,203 posts
- 13. Podz 1,528 posts
- 14. Justice Jackson 3,451 posts
- 15. Chelsea Green 5,529 posts
- 16. NBA Cup 8,942 posts
- 17. Harrison Barnes N/A
- 18. Reed 23.8K posts
- 19. Justice Ketanji Brown Jackson 2,110 posts
- 20. Sengun 4,019 posts
Something went wrong.
Something went wrong.