#infosecjupyterthon résultats de recherche

@streamlit been popular this year at #InfosecJupyterThon @lmeyerov demonstrating Notebook + #Graphistry + Streamlit stack . Very Interesting. 🤩

ashwinpatil's tweet image. @streamlit been popular this year at #InfosecJupyterThon  @lmeyerov demonstrating Notebook + #Graphistry + Streamlit stack . 
Very Interesting. 🤩

YES! Dogs + Python + Graphs + Generative AI! 😂 #InfosecJupyterthon 🔴Happening now: aka.ms/JupyterthonLiv…

Cyb3rWard0g's tweet image. YES! Dogs + Python + Graphs + Generative AI! 😂 #InfosecJupyterthon 

🔴Happening now: aka.ms/JupyterthonLiv…
Cyb3rWard0g's tweet image. YES! Dogs + Python + Graphs + Generative AI! 😂 #InfosecJupyterthon 

🔴Happening now: aka.ms/JupyterthonLiv…
Cyb3rWard0g's tweet image. YES! Dogs + Python + Graphs + Generative AI! 😂 #InfosecJupyterthon 

🔴Happening now: aka.ms/JupyterthonLiv…

Notebooks and Responsible AI Harms... 🤖 also, you can use them to orchestrate some other techniques such as PAIR 🙈 #InfosecJupyterthon

Cyb3rWard0g's tweet image. Notebooks and Responsible AI Harms... 🤖 also, you can use them to orchestrate some other techniques such as PAIR 🙈 #InfosecJupyterthon
Cyb3rWard0g's tweet image. Notebooks and Responsible AI Harms... 🤖 also, you can use them to orchestrate some other techniques such as PAIR 🙈 #InfosecJupyterthon

Ensuring benign prompts do not produce un-intended harms to users 📣 ... Using notebooks to execute a few techniques -> User Prompt Injection Attacks #InfosecJupyterthon

Cyb3rWard0g's tweet image. Ensuring benign prompts do not produce un-intended harms to users 📣 ... Using notebooks to execute a few techniques -> User Prompt Injection Attacks  #InfosecJupyterthon
Cyb3rWard0g's tweet image. Ensuring benign prompts do not produce un-intended harms to users 📣 ... Using notebooks to execute a few techniques -> User Prompt Injection Attacks  #InfosecJupyterthon

🚀 Using notebooks to create a few variations of specific prompt injections attacks ... #InfosecJupyterthon

Cyb3rWard0g's tweet image. 🚀 Using notebooks to create a few variations of specific prompt injections attacks ... #InfosecJupyterthon
Cyb3rWard0g's tweet image. 🚀 Using notebooks to create a few variations of specific prompt injections attacks ... #InfosecJupyterthon
Cyb3rWard0g's tweet image. 🚀 Using notebooks to create a few variations of specific prompt injections attacks ... #InfosecJupyterthon
Cyb3rWard0g's tweet image. 🚀 Using notebooks to create a few variations of specific prompt injections attacks ... #InfosecJupyterthon

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢 Guardians of Identity: OKTA's Underworld 🌟@kaiiyer, Security Engineering @EYCanada 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢 Guardians of Identity: OKTA's Underworld
🌟@kaiiyer, Security Engineering @EYCanada   

👉 Register: aka.ms/JupyterthonReg…

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢 From Idea to Action: Building Data-Driven Security Tools with Streamlit 🌟@ashwinpatil, Senior Security Researcher @Microsoft 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢 From Idea to Action: Building Data-Driven Security Tools with Streamlit
🌟@ashwinpatil, Senior Security Researcher @Microsoft 

👉 Register: aka.ms/JupyterthonReg…

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢 Comparison of collaboration methods between MSTICpy and Splunk SIEM 🌟@T_8ase, Threat Hunter 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢 Comparison of collaboration methods between MSTICpy and Splunk SIEM
🌟@T_8ase, Threat Hunter

👉 Register: aka.ms/JupyterthonReg…

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢 MISP playbooks, common use-cases to interact with the MISP threat intelligence platform 🌟@cudeso, Security Analyst 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢 MISP playbooks, common use-cases to interact with the MISP threat intelligence platform
🌟@cudeso, Security Analyst

👉 Register: aka.ms/JupyterthonReg…

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢 Cybersecurity: Data, the Seeds of Chaos 🌟@ulcamilo, Senior Data Scientist @Globant 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢 Cybersecurity: Data, the Seeds of Chaos
🌟@ulcamilo, Senior Data Scientist @Globant 

👉 Register: aka.ms/JupyterthonReg…

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢 Enable Vulnerabilities with Audit Vulnerabilities 🌟@rezaduty, Security Researcher, @Hadess_security 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢 Enable Vulnerabilities with Audit Vulnerabilities
🌟@rezaduty, Security Researcher, @Hadess_security 

👉 Register: aka.ms/JupyterthonReg…

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢 Unveiling the Power of Google Dorks: A Stealthy Approach to Employee and Email Discovery in OSINT 🌟@hck4fun, Cybersecurity Engineer @i2CAT 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢 Unveiling the Power of Google Dorks: A Stealthy Approach to Employee and Email Discovery in OSINT
🌟@hck4fun, Cybersecurity Engineer @i2CAT 

👉 Register: aka.ms/JupyterthonReg…

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢Jupyter Universe: Buckle Up for Notebooks Exploration! 🌟@fr0gger_, Senior Threat Researcher @Microsoft 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢Jupyter Universe: Buckle Up for Notebooks Exploration!
🌟@fr0gger_, Senior Threat Researcher @Microsoft

👉 Register: aka.ms/JupyterthonReg…

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢 Ghostly privileged - Tale of Transitive privileges on Azure 🌟Pallavi Kumari Jha, SEC DETECTION & ANALYTICS ENG @Microsoft 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢 Ghostly privileged - Tale of Transitive privileges on Azure
🌟Pallavi Kumari Jha, SEC DETECTION & ANALYTICS ENG @Microsoft 

👉 Register: aka.ms/JupyterthonReg…

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢Keynote: Infosec Generative AI: Python Notebooks are Dead, Long Live Python Notebooks! 🌟@lmeyerov, CEO @Graphistry 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢Keynote: Infosec Generative AI: Python Notebooks are Dead, Long Live Python Notebooks!
🌟@lmeyerov, CEO @Graphistry 

👉 Register: aka.ms/JupyterthonReg…

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢Applying Risk scoring to Atomic Signals 🌟@swaruppattnaik, Leader Cyber Defense Operations @brightdrop 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢Applying Risk scoring to Atomic Signals
🌟@swaruppattnaik, Leader Cyber Defense Operations @brightdrop 

👉 Register: aka.ms/JupyterthonReg…

🔑 Keynote Spotlight at #InfosecJupyterthon! 🔑 @detectdotdev talking about adoption journey, challenges, innovative solutions to address.

jupyterthon's tweet image. 🔑 Keynote Spotlight at #InfosecJupyterthon! 🔑

@detectdotdev talking about adoption journey, challenges, innovative solutions to address.
jupyterthon's tweet image. 🔑 Keynote Spotlight at #InfosecJupyterthon! 🔑

@detectdotdev talking about adoption journey, challenges, innovative solutions to address.
jupyterthon's tweet image. 🔑 Keynote Spotlight at #InfosecJupyterthon! 🔑

@detectdotdev talking about adoption journey, challenges, innovative solutions to address.
jupyterthon's tweet image. 🔑 Keynote Spotlight at #InfosecJupyterthon! 🔑

@detectdotdev talking about adoption journey, challenges, innovative solutions to address.

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢Keynote: Barn Raising: Building a Community Around Jupyter Notebooks for DFIR, SecOps, and Detection Engineering Teams 🌟@detectdotdev, Principal Security Researcher @Secureworks 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢Keynote: Barn Raising: Building a Community Around Jupyter Notebooks for DFIR, SecOps, and Detection Engineering Teams
🌟@detectdotdev, Principal Security Researcher @Secureworks 

👉 Register: aka.ms/JupyterthonReg…


🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢 Winbindex Oracle - Predicting Windows Binary Download Links with Jupyter Notebooks 🌟@clearbluejar, Security Researcher @clearseclabs 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢 Winbindex Oracle - Predicting Windows Binary Download Links with Jupyter Notebooks
🌟@clearbluejar, Security Researcher @clearseclabs 

👉 Register: aka.ms/JupyterthonReg…

Join us in 10 mins for our last talk of the day @jupyterthon with @clearbluejar ! Also, we will have a panel with some of the speakers right after 🚀 #InfosecJupyterthon 🔴 Live: aka.ms/JupyterthonLiv…

Cyb3rWard0g's tweet card. Infosec Jupyterthon 2024 Day 2

youtube.com

YouTube

Infosec Jupyterthon 2024 Day 2

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢 Winbindex Oracle - Predicting Windows Binary Download Links with Jupyter Notebooks 🌟@clearbluejar, Security Researcher @clearseclabs 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢 Winbindex Oracle - Predicting Windows Binary Download Links with Jupyter Notebooks
🌟@clearbluejar, Security Researcher @clearseclabs 

👉 Register: aka.ms/JupyterthonReg…


Demo Time @jupyterthon #InfosecJupyterthon 🔥 @Graphistry 1⃣ Natural Language querying of @splunk and multi-step actions 2⃣ Automatic UMAP embedding + visualization of rich table loom.com/share/0b598a3d…

Cyb3rWard0g's tweet card. splunk avr 59k single-cluster umap

loom.com

splunk avr 59k single-cluster umap


@streamlit been popular this year at #InfosecJupyterThon @lmeyerov demonstrating Notebook + #Graphistry + Streamlit stack . Very Interesting. 🤩

ashwinpatil's tweet image. @streamlit been popular this year at #InfosecJupyterThon  @lmeyerov demonstrating Notebook + #Graphistry + Streamlit stack . 
Very Interesting. 🤩

YES! Dogs + Python + Graphs + Generative AI! 😂 #InfosecJupyterthon 🔴Happening now: aka.ms/JupyterthonLiv…

Cyb3rWard0g's tweet image. YES! Dogs + Python + Graphs + Generative AI! 😂 #InfosecJupyterthon 

🔴Happening now: aka.ms/JupyterthonLiv…
Cyb3rWard0g's tweet image. YES! Dogs + Python + Graphs + Generative AI! 😂 #InfosecJupyterthon 

🔴Happening now: aka.ms/JupyterthonLiv…
Cyb3rWard0g's tweet image. YES! Dogs + Python + Graphs + Generative AI! 😂 #InfosecJupyterthon 

🔴Happening now: aka.ms/JupyterthonLiv…

🚨 @kaiiyer is next "Guardians of Identity: OKTA’s Underworld" #InfosecJupyterthon 🔴 Happening now: aka.ms/JupyterthonLiv…

jupyterthon's tweet image. 🚨 @kaiiyer is next "Guardians of Identity: OKTA’s Underworld" #InfosecJupyterthon 

🔴 Happening now: aka.ms/JupyterthonLiv…
jupyterthon's tweet image. 🚨 @kaiiyer is next "Guardians of Identity: OKTA’s Underworld" #InfosecJupyterthon 

🔴 Happening now: aka.ms/JupyterthonLiv…

🚨 @ashwinpatil talking about the complexity of creating data applications and his experience with @streamlit to find a solution🚀 #InfosecJupyterthon He also is talking about practical use cases in security ... 🔴 Happening now: aka.ms/JupyterthonLiv…

jupyterthon's tweet image. 🚨 @ashwinpatil talking about the complexity of creating data applications and his experience with @streamlit to find a solution🚀 #InfosecJupyterthon 

He also is talking about practical use cases in security ...

🔴 Happening now: aka.ms/JupyterthonLiv…
jupyterthon's tweet image. 🚨 @ashwinpatil talking about the complexity of creating data applications and his experience with @streamlit to find a solution🚀 #InfosecJupyterthon 

He also is talking about practical use cases in security ...

🔴 Happening now: aka.ms/JupyterthonLiv…
jupyterthon's tweet image. 🚨 @ashwinpatil talking about the complexity of creating data applications and his experience with @streamlit to find a solution🚀 #InfosecJupyterthon 

He also is talking about practical use cases in security ...

🔴 Happening now: aka.ms/JupyterthonLiv…
jupyterthon's tweet image. 🚨 @ashwinpatil talking about the complexity of creating data applications and his experience with @streamlit to find a solution🚀 #InfosecJupyterthon 

He also is talking about practical use cases in security ...

🔴 Happening now: aka.ms/JupyterthonLiv…

Notebooks and Responsible AI Harms... 🤖 also, you can use them to orchestrate some other techniques such as PAIR 🙈 #InfosecJupyterthon

Cyb3rWard0g's tweet image. Notebooks and Responsible AI Harms... 🤖 also, you can use them to orchestrate some other techniques such as PAIR 🙈 #InfosecJupyterthon
Cyb3rWard0g's tweet image. Notebooks and Responsible AI Harms... 🤖 also, you can use them to orchestrate some other techniques such as PAIR 🙈 #InfosecJupyterthon

🚀 Using notebooks to create a few variations of specific prompt injections attacks ... #InfosecJupyterthon

Cyb3rWard0g's tweet image. 🚀 Using notebooks to create a few variations of specific prompt injections attacks ... #InfosecJupyterthon
Cyb3rWard0g's tweet image. 🚀 Using notebooks to create a few variations of specific prompt injections attacks ... #InfosecJupyterthon
Cyb3rWard0g's tweet image. 🚀 Using notebooks to create a few variations of specific prompt injections attacks ... #InfosecJupyterthon
Cyb3rWard0g's tweet image. 🚀 Using notebooks to create a few variations of specific prompt injections attacks ... #InfosecJupyterthon

Ensuring benign prompts do not produce un-intended harms to users 📣 ... Using notebooks to execute a few techniques -> User Prompt Injection Attacks #InfosecJupyterthon

Cyb3rWard0g's tweet image. Ensuring benign prompts do not produce un-intended harms to users 📣 ... Using notebooks to execute a few techniques -> User Prompt Injection Attacks  #InfosecJupyterthon
Cyb3rWard0g's tweet image. Ensuring benign prompts do not produce un-intended harms to users 📣 ... Using notebooks to execute a few techniques -> User Prompt Injection Attacks  #InfosecJupyterthon

Finish your week strong 💪 👉 with some #InfosecJupyterthon magic 🪄

🚀🎉 The #InfosecJupyterthon is NOW LIVE! 🚀🎉 📺 Catch all the action LIVE on YouTube! 🌐✨ 👉 Join us, interact, and be part of this thrilling journey. 🛡️💥 aka.ms/JupyterthonLiv… #CyberSecurity #LiveNow #Jupyterthon

jupyterthon's tweet image. 🚀🎉 The #InfosecJupyterthon is NOW LIVE! 🚀🎉

📺 Catch all the action LIVE on YouTube!  🌐✨

👉 Join us, interact, and be part of this thrilling journey.  🛡️💥

aka.ms/JupyterthonLiv…

#CyberSecurity #LiveNow #Jupyterthon


🔥 Up Next at #InfosecJupyterthon: Graphing ransomware trends 🔒 @th3_protoCOL exploring the depths of data leak sites with RansomWatch's open-source data. 📊🔓 📈 Using Plotly, crafting interactive visualizations like heatmaps to reveal ransomware attack trends. 🌍💡

jupyterthon's tweet image. 🔥 Up Next at #InfosecJupyterthon: Graphing ransomware trends

🔒 @th3_protoCOL exploring the depths of data leak sites with RansomWatch's open-source data. 📊🔓 📈 Using Plotly, crafting interactive visualizations like heatmaps to reveal ransomware attack trends. 🌍💡
jupyterthon's tweet image. 🔥 Up Next at #InfosecJupyterthon: Graphing ransomware trends

🔒 @th3_protoCOL exploring the depths of data leak sites with RansomWatch's open-source data. 📊🔓 📈 Using Plotly, crafting interactive visualizations like heatmaps to reveal ransomware attack trends. 🌍💡
jupyterthon's tweet image. 🔥 Up Next at #InfosecJupyterthon: Graphing ransomware trends

🔒 @th3_protoCOL exploring the depths of data leak sites with RansomWatch's open-source data. 📊🔓 📈 Using Plotly, crafting interactive visualizations like heatmaps to reveal ransomware attack trends. 🌍💡
jupyterthon's tweet image. 🔥 Up Next at #InfosecJupyterthon: Graphing ransomware trends

🔒 @th3_protoCOL exploring the depths of data leak sites with RansomWatch's open-source data. 📊🔓 📈 Using Plotly, crafting interactive visualizations like heatmaps to reveal ransomware attack trends. 🌍💡

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢Graphing Ransomware & Data Leak Sites Trends with Plotly 🌟@th3_protoCOL, Threat Intelligence Analyst @Sophos 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢Graphing Ransomware & Data Leak Sites Trends with Plotly
🌟@th3_protoCOL, Threat Intelligence Analyst @Sophos 

👉 Register: aka.ms/JupyterthonReg…


🌟Happy to see the community coming together and taking some of their time from their busy schedules to share and learn something new with others ❤️ #InfosecJupyterthon @OTR_Community Join us! 🚀 🔴Day 1 Live Stream: aka.ms/JupyterthonLiv… 🎤 Agenda: infosecjupyterthon.com/2024/agenda.ht…

@Cyb3rWard0g 🌍🔍 Breaking Down Our Attendees at #Jupyterthon by industries, experience levels, locations

jupyterthon's tweet image. @Cyb3rWard0g 🌍🔍 Breaking Down Our Attendees at #Jupyterthon by industries, experience levels, locations
jupyterthon's tweet image. @Cyb3rWard0g 🌍🔍 Breaking Down Our Attendees at #Jupyterthon by industries, experience levels, locations
jupyterthon's tweet image. @Cyb3rWard0g 🌍🔍 Breaking Down Our Attendees at #Jupyterthon by industries, experience levels, locations


🔑 Keynote Spotlight at #InfosecJupyterthon! 🔑 @detectdotdev talking about adoption journey, challenges, innovative solutions to address.

jupyterthon's tweet image. 🔑 Keynote Spotlight at #InfosecJupyterthon! 🔑

@detectdotdev talking about adoption journey, challenges, innovative solutions to address.
jupyterthon's tweet image. 🔑 Keynote Spotlight at #InfosecJupyterthon! 🔑

@detectdotdev talking about adoption journey, challenges, innovative solutions to address.
jupyterthon's tweet image. 🔑 Keynote Spotlight at #InfosecJupyterthon! 🔑

@detectdotdev talking about adoption journey, challenges, innovative solutions to address.
jupyterthon's tweet image. 🔑 Keynote Spotlight at #InfosecJupyterthon! 🔑

@detectdotdev talking about adoption journey, challenges, innovative solutions to address.

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢Keynote: Barn Raising: Building a Community Around Jupyter Notebooks for DFIR, SecOps, and Detection Engineering Teams 🌟@detectdotdev, Principal Security Researcher @Secureworks 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢Keynote: Barn Raising: Building a Community Around Jupyter Notebooks for DFIR, SecOps, and Detection Engineering Teams
🌟@detectdotdev, Principal Security Researcher @Secureworks 

👉 Register: aka.ms/JupyterthonReg…


🚀🎉 The #InfosecJupyterthon is NOW LIVE! 🚀🎉 📺 Catch all the action LIVE on YouTube! 🌐✨ 👉 Join us, interact, and be part of this thrilling journey. 🛡️💥 aka.ms/JupyterthonLiv… #CyberSecurity #LiveNow #Jupyterthon

jupyterthon's tweet image. 🚀🎉 The #InfosecJupyterthon is NOW LIVE! 🚀🎉

📺 Catch all the action LIVE on YouTube!  🌐✨

👉 Join us, interact, and be part of this thrilling journey.  🛡️💥

aka.ms/JupyterthonLiv…

#CyberSecurity #LiveNow #Jupyterthon

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢 Winbindex Oracle - Predicting Windows Binary Download Links with Jupyter Notebooks 🌟@clearbluejar, Security Researcher @clearseclabs 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢 Winbindex Oracle - Predicting Windows Binary Download Links with Jupyter Notebooks
🌟@clearbluejar, Security Researcher @clearseclabs 

👉 Register: aka.ms/JupyterthonReg…

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢 Cybersecurity: Data, the Seeds of Chaos 🌟@ulcamilo, Senior Data Scientist @Globant 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢 Cybersecurity: Data, the Seeds of Chaos
🌟@ulcamilo, Senior Data Scientist @Globant 

👉 Register: aka.ms/JupyterthonReg…

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢 Enable Vulnerabilities with Audit Vulnerabilities 🌟@rezaduty, Security Researcher, @Hadess_security 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢 Enable Vulnerabilities with Audit Vulnerabilities
🌟@rezaduty, Security Researcher, @Hadess_security 

👉 Register: aka.ms/JupyterthonReg…

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢Applying Risk scoring to Atomic Signals 🌟@swaruppattnaik, Leader Cyber Defense Operations @brightdrop 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢Applying Risk scoring to Atomic Signals
🌟@swaruppattnaik, Leader Cyber Defense Operations @brightdrop 

👉 Register: aka.ms/JupyterthonReg…

Aucun résultat pour "#infosecjupyterthon"

@streamlit been popular this year at #InfosecJupyterThon @lmeyerov demonstrating Notebook + #Graphistry + Streamlit stack . Very Interesting. 🤩

ashwinpatil's tweet image. @streamlit been popular this year at #InfosecJupyterThon  @lmeyerov demonstrating Notebook + #Graphistry + Streamlit stack . 
Very Interesting. 🤩

YES! Dogs + Python + Graphs + Generative AI! 😂 #InfosecJupyterthon 🔴Happening now: aka.ms/JupyterthonLiv…

Cyb3rWard0g's tweet image. YES! Dogs + Python + Graphs + Generative AI! 😂 #InfosecJupyterthon 

🔴Happening now: aka.ms/JupyterthonLiv…
Cyb3rWard0g's tweet image. YES! Dogs + Python + Graphs + Generative AI! 😂 #InfosecJupyterthon 

🔴Happening now: aka.ms/JupyterthonLiv…
Cyb3rWard0g's tweet image. YES! Dogs + Python + Graphs + Generative AI! 😂 #InfosecJupyterthon 

🔴Happening now: aka.ms/JupyterthonLiv…

Notebooks and Responsible AI Harms... 🤖 also, you can use them to orchestrate some other techniques such as PAIR 🙈 #InfosecJupyterthon

Cyb3rWard0g's tweet image. Notebooks and Responsible AI Harms... 🤖 also, you can use them to orchestrate some other techniques such as PAIR 🙈 #InfosecJupyterthon
Cyb3rWard0g's tweet image. Notebooks and Responsible AI Harms... 🤖 also, you can use them to orchestrate some other techniques such as PAIR 🙈 #InfosecJupyterthon

Ensuring benign prompts do not produce un-intended harms to users 📣 ... Using notebooks to execute a few techniques -> User Prompt Injection Attacks #InfosecJupyterthon

Cyb3rWard0g's tweet image. Ensuring benign prompts do not produce un-intended harms to users 📣 ... Using notebooks to execute a few techniques -> User Prompt Injection Attacks  #InfosecJupyterthon
Cyb3rWard0g's tweet image. Ensuring benign prompts do not produce un-intended harms to users 📣 ... Using notebooks to execute a few techniques -> User Prompt Injection Attacks  #InfosecJupyterthon

🚀 Using notebooks to create a few variations of specific prompt injections attacks ... #InfosecJupyterthon

Cyb3rWard0g's tweet image. 🚀 Using notebooks to create a few variations of specific prompt injections attacks ... #InfosecJupyterthon
Cyb3rWard0g's tweet image. 🚀 Using notebooks to create a few variations of specific prompt injections attacks ... #InfosecJupyterthon
Cyb3rWard0g's tweet image. 🚀 Using notebooks to create a few variations of specific prompt injections attacks ... #InfosecJupyterthon
Cyb3rWard0g's tweet image. 🚀 Using notebooks to create a few variations of specific prompt injections attacks ... #InfosecJupyterthon

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢 From Idea to Action: Building Data-Driven Security Tools with Streamlit 🌟@ashwinpatil, Senior Security Researcher @Microsoft 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢 From Idea to Action: Building Data-Driven Security Tools with Streamlit
🌟@ashwinpatil, Senior Security Researcher @Microsoft 

👉 Register: aka.ms/JupyterthonReg…

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢 Comparison of collaboration methods between MSTICpy and Splunk SIEM 🌟@T_8ase, Threat Hunter 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢 Comparison of collaboration methods between MSTICpy and Splunk SIEM
🌟@T_8ase, Threat Hunter

👉 Register: aka.ms/JupyterthonReg…

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢 Guardians of Identity: OKTA's Underworld 🌟@kaiiyer, Security Engineering @EYCanada 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢 Guardians of Identity: OKTA's Underworld
🌟@kaiiyer, Security Engineering @EYCanada   

👉 Register: aka.ms/JupyterthonReg…

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢 MISP playbooks, common use-cases to interact with the MISP threat intelligence platform 🌟@cudeso, Security Analyst 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢 MISP playbooks, common use-cases to interact with the MISP threat intelligence platform
🌟@cudeso, Security Analyst

👉 Register: aka.ms/JupyterthonReg…

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢 Enable Vulnerabilities with Audit Vulnerabilities 🌟@rezaduty, Security Researcher, @Hadess_security 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢 Enable Vulnerabilities with Audit Vulnerabilities
🌟@rezaduty, Security Researcher, @Hadess_security 

👉 Register: aka.ms/JupyterthonReg…

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢 Unveiling the Power of Google Dorks: A Stealthy Approach to Employee and Email Discovery in OSINT 🌟@hck4fun, Cybersecurity Engineer @i2CAT 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢 Unveiling the Power of Google Dorks: A Stealthy Approach to Employee and Email Discovery in OSINT
🌟@hck4fun, Cybersecurity Engineer @i2CAT 

👉 Register: aka.ms/JupyterthonReg…

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢Jupyter Universe: Buckle Up for Notebooks Exploration! 🌟@fr0gger_, Senior Threat Researcher @Microsoft 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢Jupyter Universe: Buckle Up for Notebooks Exploration!
🌟@fr0gger_, Senior Threat Researcher @Microsoft

👉 Register: aka.ms/JupyterthonReg…

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢Keynote: Infosec Generative AI: Python Notebooks are Dead, Long Live Python Notebooks! 🌟@lmeyerov, CEO @Graphistry 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢Keynote: Infosec Generative AI: Python Notebooks are Dead, Long Live Python Notebooks!
🌟@lmeyerov, CEO @Graphistry 

👉 Register: aka.ms/JupyterthonReg…

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢 Ghostly privileged - Tale of Transitive privileges on Azure 🌟Pallavi Kumari Jha, SEC DETECTION & ANALYTICS ENG @Microsoft 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢 Ghostly privileged - Tale of Transitive privileges on Azure
🌟Pallavi Kumari Jha, SEC DETECTION & ANALYTICS ENG @Microsoft 

👉 Register: aka.ms/JupyterthonReg…

🚨 @kaiiyer is next "Guardians of Identity: OKTA’s Underworld" #InfosecJupyterthon 🔴 Happening now: aka.ms/JupyterthonLiv…

jupyterthon's tweet image. 🚨 @kaiiyer is next "Guardians of Identity: OKTA’s Underworld" #InfosecJupyterthon 

🔴 Happening now: aka.ms/JupyterthonLiv…
jupyterthon's tweet image. 🚨 @kaiiyer is next "Guardians of Identity: OKTA’s Underworld" #InfosecJupyterthon 

🔴 Happening now: aka.ms/JupyterthonLiv…

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢Applying Risk scoring to Atomic Signals 🌟@swaruppattnaik, Leader Cyber Defense Operations @brightdrop 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢Applying Risk scoring to Atomic Signals
🌟@swaruppattnaik, Leader Cyber Defense Operations @brightdrop 

👉 Register: aka.ms/JupyterthonReg…

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢 Winbindex Oracle - Predicting Windows Binary Download Links with Jupyter Notebooks 🌟@clearbluejar, Security Researcher @clearseclabs 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢 Winbindex Oracle - Predicting Windows Binary Download Links with Jupyter Notebooks
🌟@clearbluejar, Security Researcher @clearseclabs 

👉 Register: aka.ms/JupyterthonReg…

🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴 📢 Cybersecurity: Data, the Seeds of Chaos 🌟@ulcamilo, Senior Data Scientist @Globant 👉 Register: aka.ms/JupyterthonReg…

jupyterthon's tweet image. 🚨Mark your 🗓️ Feb 15-16! #InfosecJupyterthon Online🔴

📢 Cybersecurity: Data, the Seeds of Chaos
🌟@ulcamilo, Senior Data Scientist @Globant 

👉 Register: aka.ms/JupyterthonReg…

Loading...

Something went wrong.


Something went wrong.


United States Trends