#cybersecurity search results

🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev) Not beginner fluff — real material: • AV/EDR bypass • Buffer overflow • AD attacks • OSINT & recon • Bug bounty • SOC & threat hunting Download 👇 drive.google.com/drive/folders/… #CyberSecurity #EthicalHacking

VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking
VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking
VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking
VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking

🌐Database Search Engine 🗄️16,443,023,451 rows over 1,343 databases 🔗osint.lolarchiver.com/database_lookup 🔖#infosec #cybersecurity #hacking #pentesting #security #OSINT

Anastasis_King's tweet image. 🌐Database Search Engine

🗄️16,443,023,451 rows over 1,343 databases

🔗osint.lolarchiver.com/database_lookup

🔖#infosec #cybersecurity #hacking #pentesting #security #OSINT

NSA supports @FBI PSA on Russian GRU cyber actors exploiting routers. Take action today to stay secure. To learn more and for best practices, read NSA’s press release. nsa.gov/Press-Room/Pre… #Cybersecurity #NSA #NetworkDefense #RouterSecurity


⚔️Top 15 Vulnerability Scanners 🔹Nuclei 🔹Sn1per 🔹Metasploit - Framework 🔹Nikto 🔹Arachni 🔹Jaeles 🔹Retire.js 🔹Osmedeus 🔹Getsploit 🔹Flan 🔹Findsploit 🔹Blackwidow 🔹Backslash-powered-scanner 🔹Eagle 🔹Cariddi 🔖#infosec #cybersecurity #hacking #pentesting #security

Anastasis_King's tweet image. ⚔️Top 15 Vulnerability Scanners

🔹Nuclei
🔹Sn1per
🔹Metasploit - Framework
🔹Nikto
🔹Arachni
🔹Jaeles
🔹Retire.js
🔹Osmedeus
🔹Getsploit
🔹Flan
🔹Findsploit
🔹Blackwidow
🔹Backslash-powered-scanner
🔹Eagle
🔹Cariddi

🔖#infosec #cybersecurity #hacking #pentesting #security

AI-driven development is reshaping risk, CISO said during a @CR_Collab roundtable. Security must be embedded in workflows, align with developer incentives, and evolve beyond legacy models to keep pace with modern code. #cybersecurity #infosec #CISO bit.ly/4dIK5ml


15 types of cyber attacks you should know 🔐 Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual. Cybersecurity = business resilience. Credit: Cybersecurity Insights #CyberSecurity #InfoSec #CyberAttacks #TechRisk

ingliguori's tweet image. 15 types of cyber attacks you should know 🔐

Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual.

Cybersecurity = business resilience.

Credit: Cybersecurity Insights

#CyberSecurity #InfoSec #CyberAttacks #TechRisk

🔑 Optimize SOC access with Microsoft Sentinel! 👥 Role-based permissions for analysts 📊 Granular visibility across resources ⚙️ Secure collaboration with Defender portal Start here 👉 msft.it/6019Q2pvJ #Azure #CyberSecurity #SOC

AzureSupport's tweet image. 🔑 Optimize SOC access with Microsoft Sentinel!
👥 Role-based permissions for analysts
📊 Granular visibility across resources
⚙️ Secure collaboration with Defender portal
Start here 👉 msft.it/6019Q2pvJ
#Azure #CyberSecurity #SOC

🚨 Iranian-affiliated cyber actors are targeting internet-connected OT devices, including Rockwell Automation/Allen-Bradley PLCs, across #CriticalInfrastructure sectors. Review our joint #Cybersecurity Advisory for IOCs & mitigations. 👉 go.dhs.gov/iFo

CISACyber's tweet image. 🚨 Iranian-affiliated cyber actors are targeting internet-connected OT devices, including Rockwell Automation/Allen-Bradley PLCs, across #CriticalInfrastructure sectors. Review our joint #Cybersecurity Advisory for IOCs & mitigations. 👉 go.dhs.gov/iFo

📢 Stay informed on the latest vulnerabilities with @CISAgov's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: cisa.gov/news-events/bu… #Cybersecurity #InfoSec #VulnerabilityManagement

CISACyber's tweet image. 📢 Stay informed on the latest vulnerabilities with @CISAgov's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: cisa.gov/news-events/bu… #Cybersecurity #InfoSec #VulnerabilityManagement

One unnoticed vulnerability can stop an entire operation. 🔐 AI-powered cybersecurity helps detect vulnerabilities early and protect operations around the clock. From reactive defense to proactive resilience. #Cybersecurity #AI #IndustrialSecurity


"Cisco is joining the world's most critical cyber defenders to confront the most consequential shift in the history of our industry." Learn about @AnthropicAI's Project #Glasswing from SVP & Chief Security & Trust Officer Anthony Grieco ➡️ cs.co/6018B6v7Qg #cybersecurity


A fake email. A cloned voice. A synthetic face on a Zoom call. Each one realistic. Each one preventable. ATOC trains your team to recognize the attacks that slip past every filter. Learn more at atoc.guide #CyberSecurity #Phishing #Deepfake #SecurityAwareness


Security is more important than profit in crypto. One mistake can erase years of progress. #Crypto #CyberSecurity #Blockchain #Web3 #Tech #PrivacyMatters #BuildInPublic


Funds at risk — exploit in progress. How long before the next one? #CyberSecurity #DataBreach


Finished the Containment room on TryHackMe 🔐 Big takeaway: containment is a race against time—knowing what to isolate and when makes all the difference. Wrote a quick walkthrough + lessons learned 👇 medium.com/@timiphil9/con… #CyberSecurity #TryHackMe #BlueTeam


The takeaway. Trust is no longer the default for AI safety. We have entered the Audit Era, where the "Kill-Switch" is as important as the "Inference Engine." 🏗️ #ProjectGlasswing #ClaudeMythos #CyberSecurity #AIAuditing #SovereignIntelligence


Социал инженерчлэл бол хамгийн аюултай хулгайч. Тэд танд итгэл олж авч мэдээлэл дээр гарз учруулдаг. Анхаарал болгоомжтой бай, хийхээрээ яасан бодож эхлэх нь чухал! 🔒⚠️ #CyberSecurity #SocialEngineering #DigitalSafety


⚠️ Accessing these sites may result in your device becoming infected, personal data being stolen, and financial loss. #cybersecurity #computersafety #securityalert #internetsecurity #onlinesafety #cyberthreat #threatalert #informationsafety

secweai's tweet image. ⚠️ Accessing these sites may result in your device becoming infected, personal data being stolen, and financial loss.

#cybersecurity #computersafety #securityalert #internetsecurity #onlinesafety #cyberthreat #threatalert #informationsafety
secweai's tweet image. ⚠️ Accessing these sites may result in your device becoming infected, personal data being stolen, and financial loss.

#cybersecurity #computersafety #securityalert #internetsecurity #onlinesafety #cyberthreat #threatalert #informationsafety

⚡ BREAKING: Vercel says it detected unauthorized access to internal systems after hacker ShinyHunters claimed breach on BreachForums #Vercel #Cybersecurity


The threat landscape evolves constantly—staying informed helps you anticipate and prepare for new attack methods. 📰 RiskAware's newsletter delivers weekly cybersecurity insights, threat intelligence, and practical guidance straight to your inbox. #CyberSecurity #Newsletter

riskawareco's tweet image. The threat landscape evolves constantly—staying informed helps you anticipate and prepare for new attack methods. 📰 

RiskAware's newsletter delivers weekly cybersecurity insights, threat intelligence, and practical guidance straight to your inbox. 

#CyberSecurity #Newsletter

Day 84/100 Security isn’t just tools, it starts with policies. Key security policies; • Data Handling • Password • Acceptable Use (AUP) • BYOD • Privacy • Change Management They must be clear, enforced, and signed by users #100DaysOfCyber #phcybergiants #Cybersecurity

VictoryOkechuk3's tweet image. Day 84/100

Security isn’t just tools, it starts with policies.

Key security policies; 

• Data Handling
• Password
• Acceptable Use (AUP)
• BYOD
• Privacy
• Change Management

They must be clear, enforced, and signed by users

#100DaysOfCyber #phcybergiants #Cybersecurity

📅 19/04/2026 ✨ JOB ALERT ✨ 🏢 Postmedia 💼 Security Analyst 👔 Not specified 📍 Nigeria 💰 Salary not disclosed ✅ Apply: bit.ly/Sydicom #CyberSecurity #Nigeria #JobAlert


Нууц үгийн менежер ашиглах нь аюулгүй байдлыг хангахад чухал! 🔒 Нууц үгээ санах зайлшгүй хэрэгтэй, гэхдээ нэг нууц үг нь олон системд ашиглах нь эрсдэлтэй. Тэр оронд нууц үгийн менежер ашигла — нууц үгээ аюулгүй байлгана, дэвшилтэт технологид тулгуурласан. #CyberSecurity


Continuous threat exposure management (CTEM) is emerging as the operating model for modern #cybersecurity, but adoption remains uneven. At #EXPOSURE26, Gartner® Analyst Mitchell Schneider will discuss what it takes to bridge the gap between theory and... ow.ly/jOJl106xqYz

Trej0Jass's tweet image. Continuous threat exposure management (CTEM) is emerging as the operating model for modern #cybersecurity, but adoption remains uneven. At #EXPOSURE26, Gartner® Analyst Mitchell Schneider will discuss what it takes to bridge the gap between theory and... ow.ly/jOJl106xqYz

SmokedHam e UNC2465: il backdoor dei ransomware operator che si nasconde nei tool IT più usati dagli amministratori il blog: insicurezzadigitale.com/smokedham-e-un… #cybersecurity #backdoor #cybercrime #infosec #malvertising #malware #unc2465

nuke86's tweet image. SmokedHam e UNC2465: il backdoor dei ransomware operator che si nasconde nei tool IT più usati dagli amministratori
il blog: insicurezzadigitale.com/smokedham-e-un…

#cybersecurity #backdoor #cybercrime #infosec #malvertising #malware #unc2465

🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev) Not beginner fluff — real material: • AV/EDR bypass • Buffer overflow • AD attacks • OSINT & recon • Bug bounty • SOC & threat hunting Download 👇 drive.google.com/drive/folders/… #CyberSecurity #EthicalHacking

VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking
VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking
VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking
VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking

🔑 Optimize SOC access with Microsoft Sentinel! 👥 Role-based permissions for analysts 📊 Granular visibility across resources ⚙️ Secure collaboration with Defender portal Start here 👉 msft.it/6019Q2pvJ #Azure #CyberSecurity #SOC

AzureSupport's tweet image. 🔑 Optimize SOC access with Microsoft Sentinel!
👥 Role-based permissions for analysts
📊 Granular visibility across resources
⚙️ Secure collaboration with Defender portal
Start here 👉 msft.it/6019Q2pvJ
#Azure #CyberSecurity #SOC

🔐 Control access smarter with Microsoft Sentinel! 👥 Resource-based RBAC for fine-grained permissions 📊 Limit data visibility by team needs ☁️ Secure logs via Azure Monitor Learn how 👉 msft.it/6019Q2pKX #Azure #RBAC #CyberSecurity

AzureSupport's tweet image. 🔐 Control access smarter with Microsoft Sentinel!
👥 Resource-based RBAC for fine-grained permissions
📊 Limit data visibility by team needs
☁️ Secure logs via Azure Monitor
Learn how 👉 msft.it/6019Q2pKX
#Azure #RBAC #CyberSecurity

🌐Database Search Engine 🗄️16,443,023,451 rows over 1,343 databases 🔗osint.lolarchiver.com/database_lookup 🔖#infosec #cybersecurity #hacking #pentesting #security #OSINT

Anastasis_King's tweet image. 🌐Database Search Engine

🗄️16,443,023,451 rows over 1,343 databases

🔗osint.lolarchiver.com/database_lookup

🔖#infosec #cybersecurity #hacking #pentesting #security #OSINT

Some of my recent @YesWeHack bounties from the past few weeks. 3 High severity vulnerabilities still pending payment. Hunting for red 🦈 #YesWeRHackers #bugbounty #cybersecurity

h0rus3c's tweet image. Some of my recent @YesWeHack bounties from the past few weeks.

3 High severity vulnerabilities still pending payment.

Hunting for red 🦈

#YesWeRHackers #bugbounty #cybersecurity
h0rus3c's tweet image. Some of my recent @YesWeHack bounties from the past few weeks.

3 High severity vulnerabilities still pending payment.

Hunting for red 🦈

#YesWeRHackers #bugbounty #cybersecurity
h0rus3c's tweet image. Some of my recent @YesWeHack bounties from the past few weeks.

3 High severity vulnerabilities still pending payment.

Hunting for red 🦈

#YesWeRHackers #bugbounty #cybersecurity
h0rus3c's tweet image. Some of my recent @YesWeHack bounties from the past few weeks.

3 High severity vulnerabilities still pending payment.

Hunting for red 🦈

#YesWeRHackers #bugbounty #cybersecurity

🚀 From Zero to Ethical Hacker: A Clear Roadmap Stop consuming random content. Follow a structured path: Networking → OS → Programming → Security → Tools → Practice Consistency beats everything. #CyberSecurity #EthicalHacking #InfoSec

VivekIntel's tweet image. 🚀 From Zero to Ethical Hacker: A Clear Roadmap

Stop consuming random content. Follow a structured path:
Networking → OS → Programming → Security → Tools → Practice

Consistency beats everything.
#CyberSecurity #EthicalHacking #InfoSec

Here are some portable devices commonly used in penetration testing😎👇 Find a high-res pdf ebook with all my cybersecurity related infographics from study-notes.org/cybersecurity-… #cybersecurity #hacking #infosec #ethicalhacker #pentesting

xmodulo's tweet image. Here are some portable devices commonly used in penetration testing😎👇

Find a high-res pdf ebook with all my cybersecurity related infographics from study-notes.org/cybersecurity-…

#cybersecurity #hacking  #infosec #ethicalhacker #pentesting

🚨 Iranian-affiliated cyber actors are targeting internet-connected OT devices, including Rockwell Automation/Allen-Bradley PLCs, across #CriticalInfrastructure sectors. Review our joint #Cybersecurity Advisory for IOCs & mitigations. 👉 go.dhs.gov/iFo

CISACyber's tweet image. 🚨 Iranian-affiliated cyber actors are targeting internet-connected OT devices, including Rockwell Automation/Allen-Bradley PLCs, across #CriticalInfrastructure sectors. Review our joint #Cybersecurity Advisory for IOCs & mitigations. 👉 go.dhs.gov/iFo

Apache Log4j 2.25.4 fixes 4 "silent" flaws, including TLS bypasses and log injection. Secure your infrastructure—upgrade now to prevent data loss. #Log4j #CyberSecurity #InfoSec #Vulnerability #Java #ThreatIntel securityonline.info/log4j-2-vulner…

the_yellow_fall's tweet image. Apache Log4j 2.25.4 fixes 4 "silent" flaws, including TLS bypasses and log injection. Secure your infrastructure—upgrade now to prevent data loss.

#Log4j #CyberSecurity #InfoSec #Vulnerability #Java #ThreatIntel
securityonline.info/log4j-2-vulner…

🛡️ Secure smarter with Microsoft Sentinel! ✨ Cloud-native SIEM & SOAR ✨ AI-powered threat detection ✨ Automated response playbooks Start protecting now 👉 msft.it/6014Q2TJi #Azure #CyberSecurity #SIEM

AzureSupport's tweet image. 🛡️ Secure smarter with Microsoft Sentinel!
✨ Cloud-native SIEM & SOAR
✨ AI-powered threat detection
✨ Automated response playbooks
Start protecting now 👉 msft.it/6014Q2TJi
#Azure #CyberSecurity #SIEM

⚔️Top 15 Vulnerability Scanners 🔹Nuclei 🔹Sn1per 🔹Metasploit - Framework 🔹Nikto 🔹Arachni 🔹Jaeles 🔹Retire.js 🔹Osmedeus 🔹Getsploit 🔹Flan 🔹Findsploit 🔹Blackwidow 🔹Backslash-powered-scanner 🔹Eagle 🔹Cariddi 🔖#infosec #cybersecurity #hacking #pentesting #security

Anastasis_King's tweet image. ⚔️Top 15 Vulnerability Scanners

🔹Nuclei
🔹Sn1per
🔹Metasploit - Framework
🔹Nikto
🔹Arachni
🔹Jaeles
🔹Retire.js
🔹Osmedeus
🔹Getsploit
🔹Flan
🔹Findsploit
🔹Blackwidow
🔹Backslash-powered-scanner
🔹Eagle
🔹Cariddi

🔖#infosec #cybersecurity #hacking #pentesting #security

🛡️ We added Ivanti Endpoint Manager Mobile code injection vulnerability CVE-2026-1340 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q for more information. #Cybersecurity #InfoSec

CISACyber's tweet image. 🛡️ We added Ivanti Endpoint Manager Mobile code injection vulnerability CVE-2026-1340 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q for more information. #Cybersecurity #InfoSec

StegoForge 🧠🔍: El kit híbrido de esteganografía + forense con MLOculta datos en imágenes, audio, vídeo, docs y paquetes de red. Detecta con 11 motores avanzados (incluyendo CNNs). Ideal para CTFs y red teaming. Solo uso autorizado. #steganography #forensics #cybersecurity #ctf

EsGeeks's tweet image. StegoForge 🧠🔍: El kit híbrido de esteganografía + forense con MLOculta datos en imágenes, audio, vídeo, docs y paquetes de red. Detecta con 11 motores avanzados (incluyendo CNNs). Ideal para CTFs y red teaming. Solo uso autorizado.
#steganography #forensics #cybersecurity #ctf

🌍 Design smarter with Microsoft Sentinel! 🏢 Multi-tenant & multi-region setups ☁️ Single tenant across clouds 🔐 Centralized SOC security Explore sample architectures 👉 msft.it/6017Q2TNc #Azure #CyberSecurity #Cloud

AzureSupport's tweet image. 🌍 Design smarter with Microsoft Sentinel!
🏢 Multi-tenant & multi-region setups
☁️ Single tenant across clouds
🔐 Centralized SOC security
Explore sample architectures 👉 msft.it/6017Q2TNc
#Azure #CyberSecurity #Cloud

Loading...

Something went wrong.


Something went wrong.