#cybersecurity search results

🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev) Not beginner fluff — real material: • AV/EDR bypass • Buffer overflow • AD attacks • OSINT & recon • Bug bounty • SOC & threat hunting Download 👇 drive.google.com/drive/folders/… #CyberSecurity #EthicalHacking

VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking
VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking
VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking
VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking

🔐 Control access smarter with Microsoft Sentinel! 👥 Resource-based RBAC for fine-grained permissions 📊 Limit data visibility by team needs ☁️ Secure logs via Azure Monitor Learn how 👉 msft.it/6019Q2pKX #Azure #RBAC #CyberSecurity

AzureSupport's tweet image. 🔐 Control access smarter with Microsoft Sentinel!
👥 Resource-based RBAC for fine-grained permissions
📊 Limit data visibility by team needs
☁️ Secure logs via Azure Monitor
Learn how 👉 msft.it/6019Q2pKX
#Azure #RBAC #CyberSecurity

Some of my recent @YesWeHack bounties from the past few weeks. 3 High severity vulnerabilities still pending payment. Hunting for red 🦈 #YesWeRHackers #bugbounty #cybersecurity

h0rus3c's tweet image. Some of my recent @YesWeHack bounties from the past few weeks.

3 High severity vulnerabilities still pending payment.

Hunting for red 🦈

#YesWeRHackers #bugbounty #cybersecurity
h0rus3c's tweet image. Some of my recent @YesWeHack bounties from the past few weeks.

3 High severity vulnerabilities still pending payment.

Hunting for red 🦈

#YesWeRHackers #bugbounty #cybersecurity
h0rus3c's tweet image. Some of my recent @YesWeHack bounties from the past few weeks.

3 High severity vulnerabilities still pending payment.

Hunting for red 🦈

#YesWeRHackers #bugbounty #cybersecurity
h0rus3c's tweet image. Some of my recent @YesWeHack bounties from the past few weeks.

3 High severity vulnerabilities still pending payment.

Hunting for red 🦈

#YesWeRHackers #bugbounty #cybersecurity

🔓Best Password Cracking Tools 🔹Medusa 🔹Aircrack-ng 🔹Wfuzz 🔹OphCrack 🔹LophtCrack 🔹Hashcat 🔹Cain & Abel 🔹Rainbow Crack 🔹Brutus 🔹THC Hydra 🔹John the Ripper 🔖#infosec #cybersecurity #hacking #pentesting #security

Anastasis_King's tweet image. 🔓Best Password Cracking Tools

🔹Medusa
🔹Aircrack-ng
🔹Wfuzz
🔹OphCrack
🔹LophtCrack
🔹Hashcat
🔹Cain & Abel
🔹Rainbow Crack
🔹Brutus
🔹THC Hydra
🔹John the Ripper

🔖#infosec #cybersecurity #hacking #pentesting #security

15 types of cyber attacks you should know 🔐 Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual. Cybersecurity = business resilience. Credit: Cybersecurity Insights #CyberSecurity #InfoSec #CyberAttacks #TechRisk

ingliguori's tweet image. 15 types of cyber attacks you should know 🔐

Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual.

Cybersecurity = business resilience.

Credit: Cybersecurity Insights

#CyberSecurity #InfoSec #CyberAttacks #TechRisk

Got rewarded $3,200 yesterday for a Critical (9.6) vulnerability on @Hacker0x01 Stacking Criticals one by one 📈 #BugBounty #HackerOne #CyberSecurity

h0rus3c's tweet image. Got rewarded $3,200 yesterday for a Critical (9.6) vulnerability on @Hacker0x01 

Stacking Criticals one by one 📈

#BugBounty #HackerOne #CyberSecurity

🌐Database Search Engine 🗄️16,443,023,451 rows over 1,343 databases 🔗osint.lolarchiver.com/database_lookup 🔖#infosec #cybersecurity #hacking #pentesting #security #OSINT

Anastasis_King's tweet image. 🌐Database Search Engine

🗄️16,443,023,451 rows over 1,343 databases

🔗osint.lolarchiver.com/database_lookup

🔖#infosec #cybersecurity #hacking #pentesting #security #OSINT

15 types of cyber attacks you should know 🔐 Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual. Cybersecurity = business resilience. Credit: Cybersecurity Insights #CyberSecurity #InfoSec #CyberAttacks #TechRisk

ingliguori's tweet image. 15 types of cyber attacks you should know 🔐

Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual.

Cybersecurity = business resilience.

Credit: Cybersecurity Insights

#CyberSecurity #InfoSec #CyberAttacks #TechRisk

With the help of Allah❤️ This week was full of hard working at Hackerone Public & Private Bug Bounty Programs. I hope hearing good news It's my fist report to PayPal. I hope Allah keep duplicates way from me🙏 Recon and Manual testing always wins :) #cybersecurity

wadgamaraldeen's tweet image. With the help of Allah❤️

This week was full of hard working at Hackerone Public & Private Bug Bounty Programs. I hope hearing good news

It's my fist report to PayPal.

I hope Allah keep duplicates way from me🙏

Recon and Manual testing always wins :)

#cybersecurity

Bluesky suffered a 24-hour DDoS attack, with a pro-Iran group claiming responsibility. This event underscores the increasing intersection of cyber warfare and geopolitical tensions. Vigilance is paramount. #Cybersecurity #Geopolitics #News


I have just completed the Active Directory Enumeration academy.hackthebox.com/achievement/13… #hackthebox #htbacademy #cybersecurity


Looking for a keynote, Professional Development for your school or event? Contact me to schedule sessions on #AI AI and the Law, #cybersecurity #generativeAI #edtech, #SEL, #STEM, #STEMEd #artificialintelligence & more via Contact Form at Rdene915.com @thriveinedu


🚨 Anthropic says its Mythos model was accessed by unauthorized users on launch day. A spokesperson confirmed the company is investigating the breach during early testing access rollout, according to Bloomberg. #AI #Anthropic #Cybersecurity #MachineLearning #TechNews

timescryptonews's tweet image. 🚨 Anthropic says its Mythos model was accessed by unauthorized users on launch day.

A spokesperson confirmed the company is investigating the breach during early testing access rollout, according to Bloomberg.

#AI #Anthropic #Cybersecurity #MachineLearning #TechNews

🚨 SystemBC C2 server exposed over 1,570 victims in the Gentlemen ransomware operation! 🤯 A massive breach reveals the scale of this attack. thehackernews.com/2026/04/system… #Ransomware #Cybersecurity


Farewell to probabilistic security. 🛡️ ​My TrustFlow-Agent just cleared a 35-case full-suite stress test with 100% success rate. ​⚡️ Latency: 0.0016 ms (ARM64/Termux) 🛡️ Logic: Deterministic O(1) matching ✅ Cases: 35/35 Passing ​ #AI #CyberSecurity @DanBiederman @IntelSoftware


La mayoría pierde tiempo haciendo recon manual… Yo hago esto en segundos: WHOIS DNS IP + reputación SSL + headers Todo en un solo lugar 👇 osintdomain.com ⚡ Ideal para bug bounty y OSINT rápido ¿Qué añadirías tú? #Pentesting #OSINT #CyberSecurity #BugBounty #InfoSec

NievaG33317's tweet image. La mayoría pierde tiempo haciendo recon manual…

Yo hago esto en segundos:

WHOIS
DNS
IP + reputación
SSL + headers

Todo en un solo lugar 👇
osintdomain.com
⚡ Ideal para bug bounty y OSINT rápido
¿Qué añadirías tú?
#Pentesting  #OSINT #CyberSecurity #BugBounty #InfoSec

Informative piece from Psono that debunks the top 10 password security myths. Even without a password manager, strong passwords can protect online accounts. #infosec #cybersecurity api.cyfluencer.com/s/top-10-passw…


CISA - A Practical Approach Certified Information Systems ⏱️ 5.6 hours 👥 2 🔄 Mar 2026 💰 $14.99 → 100% OFF comidoc.com/udemy/cisa-a-p… #CISA #ISACA #CyberSecurity #udemy

comidoc's tweet image. CISA - A Practical Approach Certified Information Systems

⏱️ 5.6 hours
👥 2
🔄 Mar 2026
💰 $14.99 → 100% OFF

comidoc.com/udemy/cisa-a-p…

#CISA #ISACA #CyberSecurity #udemy

RFC 1178 (1990): Choosing a Name for Your Computer. Three decades later, the advice still holds. #cybersecurity #infosec #security #rfc #rfc1178

676e696f7028378's tweet image. RFC 1178 (1990): Choosing a Name for Your Computer.
Three decades later, the advice still holds. #cybersecurity #infosec #security #rfc #rfc1178

What if MSPs—not internal teams—were the real stress test for software design? In this @DevProJournal article by Barracuda’s Sean Butler, he explains why building MSP‑first leads to more resilient, scalable solutions. devprojournal.com/software-devel… #MSP #cybersecurity

BarracudaMSP's tweet image. What if MSPs—not internal teams—were the real stress test for software design? In this @DevProJournal article by Barracuda’s Sean Butler, he explains why building MSP‑first leads to more resilient, scalable solutions. devprojournal.com/software-devel…

#MSP #cybersecurity

🚨 CVE-2026-33518 — CVSS 9.8/10 ██████████ An incorrect privilege assignment vulnerability exists in Esri Portal for ArcGIS 11.5 in Windows and Linux that allows... Severity: CRITICAL Patch now. #cybersecurity #CVE

OrizonCyber's tweet image. 🚨 CVE-2026-33518 — CVSS 9.8/10

██████████

An incorrect privilege assignment vulnerability exists in Esri Portal for ArcGIS 11.5 in Windows and Linux that allows...

Severity: CRITICAL

Patch now.
#cybersecurity #CVE

আগামী দিনে সাইবার হুমকি মোকাবিলায় বিভিন্ন সংস্থা, ক্ষেত্র এবং রাষ্ট্রীয় কর্তৃপক্ষের মধ্যে সহযোগিতা অপরিহার্য।বিশেষজ্ঞ- সৌম্য অবস্থি #Cybersecurity or-f.org/38258


NSW strata firm Strata Republic allegedly hit by Kairos ransomware — 441 GB of data including TFNs and driver's licences. What every NSW strata manager should check this week: allitservices.com.au/nsw-strata-fir… #CyberSecurity #AusIT #Strata


⚠️ Risk: Attackers can use it for pass-the-hash, relay attacks, or credential cracking 🛡️ Fix now: ✅ Install April 2026 patches ✅ Block outbound SMB (port 445) ✅ Stay cautious with unknown links #CyberSecurity #Windows #CVE2026 #Infosec #SecurityAlert


🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev) Not beginner fluff — real material: • AV/EDR bypass • Buffer overflow • AD attacks • OSINT & recon • Bug bounty • SOC & threat hunting Download 👇 drive.google.com/drive/folders/… #CyberSecurity #EthicalHacking

VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking
VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking
VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking
VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking

Deep dive into bypassing firmware encryption on ESP32 courk.cc/breaking-flash… #cybersecurity

0xor0ne's tweet image. Deep dive into bypassing firmware encryption on ESP32

courk.cc/breaking-flash…

#cybersecurity
0xor0ne's tweet image. Deep dive into bypassing firmware encryption on ESP32

courk.cc/breaking-flash…

#cybersecurity

🌐Database Search Engine 🗄️16,443,023,451 rows over 1,343 databases 🔗osint.lolarchiver.com/database_lookup 🔖#infosec #cybersecurity #hacking #pentesting #security #OSINT

Anastasis_King's tweet image. 🌐Database Search Engine

🗄️16,443,023,451 rows over 1,343 databases

🔗osint.lolarchiver.com/database_lookup

🔖#infosec #cybersecurity #hacking #pentesting #security #OSINT

Got rewarded $3,200 yesterday for a Critical (9.6) vulnerability on @Hacker0x01 Stacking Criticals one by one 📈 #BugBounty #HackerOne #CyberSecurity

h0rus3c's tweet image. Got rewarded $3,200 yesterday for a Critical (9.6) vulnerability on @Hacker0x01 

Stacking Criticals one by one 📈

#BugBounty #HackerOne #CyberSecurity

Some of my recent @YesWeHack bounties from the past few weeks. 3 High severity vulnerabilities still pending payment. Hunting for red 🦈 #YesWeRHackers #bugbounty #cybersecurity

h0rus3c's tweet image. Some of my recent @YesWeHack bounties from the past few weeks.

3 High severity vulnerabilities still pending payment.

Hunting for red 🦈

#YesWeRHackers #bugbounty #cybersecurity
h0rus3c's tweet image. Some of my recent @YesWeHack bounties from the past few weeks.

3 High severity vulnerabilities still pending payment.

Hunting for red 🦈

#YesWeRHackers #bugbounty #cybersecurity
h0rus3c's tweet image. Some of my recent @YesWeHack bounties from the past few weeks.

3 High severity vulnerabilities still pending payment.

Hunting for red 🦈

#YesWeRHackers #bugbounty #cybersecurity
h0rus3c's tweet image. Some of my recent @YesWeHack bounties from the past few weeks.

3 High severity vulnerabilities still pending payment.

Hunting for red 🦈

#YesWeRHackers #bugbounty #cybersecurity

Progress Software warns of 5 critical MOVEit WAF & ADC flaws. RCE and WAF bypass risks allow total system hijack. Upgrade to v7.2.63.0 now to stay secure. #MOVEitWAF #ProgressSoftware #CyberSecurity #RCE #WAFBypass #InfoSec securityonline.info/moveit-waf-pro…

the_yellow_fall's tweet image. Progress Software warns of 5 critical MOVEit WAF & ADC flaws. RCE and WAF bypass risks allow total system hijack. Upgrade to v7.2.63.0 now to stay secure.

#MOVEitWAF #ProgressSoftware #CyberSecurity #RCE #WAFBypass #InfoSec
securityonline.info/moveit-waf-pro…

5 Common Web Vulnerabilities You Must Know 🌐 Understanding vulnerabilities like SQLi, XSS, CSRF, IDOR, and broken authentication is essential for anyone serious about web security and safe development practices. Comment WEB 🌐👇 #websecurity #cybersecurity #infosec

Anastasis_King's tweet image. 5 Common Web Vulnerabilities You Must Know 🌐

Understanding vulnerabilities like SQLi, XSS, CSRF, IDOR, and broken authentication is essential for anyone serious about web security and safe development practices.

Comment WEB 🌐👇

#websecurity #cybersecurity #infosec
Anastasis_King's tweet image. 5 Common Web Vulnerabilities You Must Know 🌐

Understanding vulnerabilities like SQLi, XSS, CSRF, IDOR, and broken authentication is essential for anyone serious about web security and safe development practices.

Comment WEB 🌐👇

#websecurity #cybersecurity #infosec
Anastasis_King's tweet image. 5 Common Web Vulnerabilities You Must Know 🌐

Understanding vulnerabilities like SQLi, XSS, CSRF, IDOR, and broken authentication is essential for anyone serious about web security and safe development practices.

Comment WEB 🌐👇

#websecurity #cybersecurity #infosec
Anastasis_King's tweet image. 5 Common Web Vulnerabilities You Must Know 🌐

Understanding vulnerabilities like SQLi, XSS, CSRF, IDOR, and broken authentication is essential for anyone serious about web security and safe development practices.

Comment WEB 🌐👇

#websecurity #cybersecurity #infosec

🛡️ Secure smarter with Microsoft Sentinel! ✨ Cloud-native SIEM & SOAR ✨ AI-powered threat detection ✨ Automated response playbooks Start protecting now 👉 msft.it/6014Q2TJi #Azure #CyberSecurity #SIEM

AzureSupport's tweet image. 🛡️ Secure smarter with Microsoft Sentinel!
✨ Cloud-native SIEM & SOAR
✨ AI-powered threat detection
✨ Automated response playbooks
Start protecting now 👉 msft.it/6014Q2TJi
#Azure #CyberSecurity #SIEM

🗝️Beginner intro to cryptography concepts with practical examples in Linux (openssl) 🔹Part 1: sergioprado.blog/introduction-t… 🔹Part 2: sergioprado.blog/a-hands-on-app… 🔹Part 3: sergioprado.blog/asymmetric-key… 🔹Part 4: sergioprado.blog/what-are-rando… 🔖#infosec #cybersecurity #hacking #pentesting #security

Anastasis_King's tweet image. 🗝️Beginner intro to cryptography concepts with practical examples in Linux (openssl)

🔹Part 1:
sergioprado.blog/introduction-t…
🔹Part 2: sergioprado.blog/a-hands-on-app…
🔹Part 3: sergioprado.blog/asymmetric-key…
🔹Part 4: sergioprado.blog/what-are-rando…

🔖#infosec #cybersecurity #hacking #pentesting #security

Linux Threat Detection Essentials Learn how Linux threat detection improves visibility across processes, logs, and system activity. Monitoring early indicators is key for faster response and stronger defense. Comment LINUX 🐧👇 #linux #cybersecurity #threatdetection

Anastasis_King's tweet image. Linux Threat Detection Essentials

Learn how Linux threat detection improves visibility across processes, logs, and system activity. Monitoring early indicators is key for faster response and stronger defense.

Comment LINUX 🐧👇

#linux #cybersecurity #threatdetection

🔑 Optimize SOC access with Microsoft Sentinel! 👥 Role-based permissions for analysts 📊 Granular visibility across resources ⚙️ Secure collaboration with Defender portal Start here 👉 msft.it/6019Q2pvJ #Azure #CyberSecurity #SOC

AzureSupport's tweet image. 🔑 Optimize SOC access with Microsoft Sentinel!
👥 Role-based permissions for analysts
📊 Granular visibility across resources
⚙️ Secure collaboration with Defender portal
Start here 👉 msft.it/6019Q2pvJ
#Azure #CyberSecurity #SOC

🚪 Offboard with confidence in Microsoft Sentinel! 🗑️ Remove data connectors safely 🔒 Disconnect workspaces securely ⚙️ Clean up automation rules Step-by-step guide 👉 msft.it/6013Q2pel #Azure #CyberSecurity #Cloud

AzureSupport's tweet image. 🚪 Offboard with confidence in Microsoft Sentinel!
🗑️ Remove data connectors safely
🔒 Disconnect workspaces securely
⚙️ Clean up automation rules
Step-by-step guide 👉 msft.it/6013Q2pel
#Azure #CyberSecurity #Cloud

🔓Best Password Cracking Tools 🔹Medusa 🔹Aircrack-ng 🔹Wfuzz 🔹OphCrack 🔹LophtCrack 🔹Hashcat 🔹Cain & Abel 🔹Rainbow Crack 🔹Brutus 🔹THC Hydra 🔹John the Ripper 🔖#infosec #cybersecurity #hacking #pentesting #security

Anastasis_King's tweet image. 🔓Best Password Cracking Tools

🔹Medusa
🔹Aircrack-ng
🔹Wfuzz
🔹OphCrack
🔹LophtCrack
🔹Hashcat
🔹Cain & Abel
🔹Rainbow Crack
🔹Brutus
🔹THC Hydra
🔹John the Ripper

🔖#infosec #cybersecurity #hacking #pentesting #security

15 types of cyber attacks you should know 🔐 Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual. Cybersecurity = business resilience. Credit: Cybersecurity Insights #CyberSecurity #InfoSec #CyberAttacks #TechRisk

ingliguori's tweet image. 15 types of cyber attacks you should know 🔐

Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual.

Cybersecurity = business resilience.

Credit: Cybersecurity Insights

#CyberSecurity #InfoSec #CyberAttacks #TechRisk

اپنی آن لائن شناخت، ذاتی اور مالی معلومات کے تحفظ کے لیے ہوشیار رہیں۔جعلی کالز، مشکوک لنکس اور دھوکہ دہی پر مبنی پیغامات سے بچاؤ کے لیے احتیاطی تدابیر اختیار کرنا نہایت ضروری ہے۔ #OnlineScamAlert #CyberSecurity #StaySafeOnline #ScamAwareness #ProtectYourIdentity #FraudPrevention

PTAofficialpk's tweet image. اپنی آن لائن شناخت، ذاتی اور مالی معلومات کے تحفظ کے لیے ہوشیار رہیں۔جعلی کالز، مشکوک لنکس اور دھوکہ دہی پر مبنی پیغامات سے بچاؤ کے لیے احتیاطی تدابیر اختیار کرنا نہایت ضروری ہے۔
#OnlineScamAlert #CyberSecurity #StaySafeOnline #ScamAwareness #ProtectYourIdentity #FraudPrevention

Loading...

Something went wrong.


Something went wrong.