#infosec search results

🚀 Just launched a new version of wpsecurityanalyzer.com -- Non-intrusive, read-only surface scan. We hit public endpoints the same way a browser would — no login, no payload, no stress on your origin. #websecurity #perimetralscan #infosec #WebDevelopment


Finally @AnthropicAI approved my cyber use case in just 2h 25min upon submission For people getting rejected provide your profile: @Hacker0x01, @Bugcrowd, and a project with one of your github repos. Much appreciated, Anthropic team 🤎 #InfoSec #Anthropic #BugBounty

Tur24Tur's tweet image. Finally @AnthropicAI approved my cyber use case in just 2h 25min upon submission  For people getting rejected  provide your profile: @Hacker0x01, @Bugcrowd, and a project with one of your github repos. Much appreciated, Anthropic team 🤎 #InfoSec #Anthropic #BugBounty
Tur24Tur's tweet image. Finally @AnthropicAI approved my cyber use case in just 2h 25min upon submission  For people getting rejected  provide your profile: @Hacker0x01, @Bugcrowd, and a project with one of your github repos. Much appreciated, Anthropic team 🤎 #InfoSec #Anthropic #BugBounty

Banned from Claude Code in 30 Minutes The plan was simple: probe Claude Code APIs through Burp Suite (TLS checks off) and responsibly disclose anything interesting via HackerOne. My custom AI agent was also testing Claude Code's APIs in the background, so it was a joint effort

Tur24Tur's tweet image. Banned from Claude Code in 30 Minutes

The plan was simple: probe Claude Code APIs through Burp Suite (TLS checks off) and responsibly disclose anything interesting via HackerOne. My custom AI agent was also testing Claude Code's APIs in the background, so it was a joint effort


Elon Musk SCAM - alert #infosec -LoL

HackersOIHEC's tweet image. Elon Musk SCAM - alert #infosec -LoL

Cyber threats in India are up 30%—yet many still rely on basic firewalls. Here are 5 costly cybersecurity mistakes we see weekly in Eastern India—and how to fix them. . . A quick thread every IT leader should read 👇 #CyberSecurity #NetworkSecurity #InfoSec #SkytelTeleServices

skytel_social's tweet image. Cyber threats in India are up 30%—yet many still rely on basic firewalls.
Here are 5 costly cybersecurity mistakes we see weekly in Eastern India—and how to fix them.
.
.
A quick thread every IT leader should read 👇 #CyberSecurity #NetworkSecurity #InfoSec #SkytelTeleServices

📢 Stay informed on the latest vulnerabilities with @CISAgov's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: cisa.gov/news-events/bu… #Cybersecurity #InfoSec #VulnerabilityManagement

CISACyber's tweet image. 📢 Stay informed on the latest vulnerabilities with @CISAgov's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: cisa.gov/news-events/bu… #Cybersecurity #InfoSec #VulnerabilityManagement

snoop: A syscall tracer for Linux, built on eBPF. Like strace but with a live TUI, smart filters, and argument decoding you can actually read. github.com/pandaadir05/sn… #linux #ebpf #infosec #informationsecurity #cybersecurity

blackstormsecbr's tweet image. snoop:

A syscall tracer for Linux, built on eBPF. Like strace but with a live TUI, smart filters, and argument decoding you can actually read.

github.com/pandaadir05/sn…

#linux #ebpf #infosec #informationsecurity #cybersecurity

🚀 From Zero to Ethical Hacker: A Clear Roadmap Stop consuming random content. Follow a structured path: Networking → OS → Programming → Security → Tools → Practice Consistency beats everything. #CyberSecurity #EthicalHacking #InfoSec

VivekIntel's tweet image. 🚀 From Zero to Ethical Hacker: A Clear Roadmap

Stop consuming random content. Follow a structured path:
Networking → OS → Programming → Security → Tools → Practice

Consistency beats everything.
#CyberSecurity #EthicalHacking #InfoSec

👁️ THIS TOOL SEES WHAT OTHERS CAN’T… 😳 Shodan isn’t just a search engine… It’s a map of the entire internet. Share and Comment "SHODAN" 🔥👇 #cybersecurity #shodan #infosec #osint #ethicalhacking #privacy #recon

Anastasis_King's tweet image. 👁️ THIS TOOL SEES WHAT OTHERS CAN’T… 😳

Shodan isn’t just a search engine…
It’s a map of the entire internet.

Share and Comment "SHODAN" 🔥👇

#cybersecurity #shodan #infosec #osint #ethicalhacking #privacy #recon
Anastasis_King's tweet image. 👁️ THIS TOOL SEES WHAT OTHERS CAN’T… 😳

Shodan isn’t just a search engine…
It’s a map of the entire internet.

Share and Comment "SHODAN" 🔥👇

#cybersecurity #shodan #infosec #osint #ethicalhacking #privacy #recon
Anastasis_King's tweet image. 👁️ THIS TOOL SEES WHAT OTHERS CAN’T… 😳

Shodan isn’t just a search engine…
It’s a map of the entire internet.

Share and Comment "SHODAN" 🔥👇

#cybersecurity #shodan #infosec #osint #ethicalhacking #privacy #recon
Anastasis_King's tweet image. 👁️ THIS TOOL SEES WHAT OTHERS CAN’T… 😳

Shodan isn’t just a search engine…
It’s a map of the entire internet.

Share and Comment "SHODAN" 🔥👇

#cybersecurity #shodan #infosec #osint #ethicalhacking #privacy #recon

Wow, GLM-5 just suggested a one-click-install tool for LAM (Large Avatar Model) through my Hermes agent. Had a look and got suspicious: archive contains a 60kb Python file with a PyArmor wrapped/encrypted blob which doesn't exist in the upstream repository. #infosec #devops #oss


Become a Certified Cybersecurity Expert™ 🛡️ Learn ethical hacking, threat analysis & security frameworks. Start your journey in cybersecurity today! #Cybersecurity #EthicalHacking #InfoSec #Tech #BITNIAN #ETHEREUM #ERC20 $BITNIAN

Bitnian_Bitnian's tweet image. Become a Certified Cybersecurity Expert™ 🛡️
Learn ethical hacking, threat analysis & security frameworks.
Start your journey in cybersecurity today!
#Cybersecurity #EthicalHacking #InfoSec #Tech #BITNIAN #ETHEREUM #ERC20 $BITNIAN

Stay ahead of threats with proactive security, protect your systems, data, and operations before risks become problems. #CyberSecurity #DataProtection #InfoSec #SecureBusiness #ITSecurity #RiskManagement #DigitalSafety

CompCenterTz's tweet image. Stay ahead of threats with proactive security, protect your systems, data, and operations before risks become problems.

#CyberSecurity #DataProtection #InfoSec #SecureBusiness #ITSecurity #RiskManagement #DigitalSafety

Your SIEM shouldn’t be the weakest link.CVE-2026-40050 in CrowdStrike LogScale exposes sensitive files via unauthenticated access. Read: zyberwalls.com/2026/04/crowds… #CyberSecurity #InfoSec #ThreatIntel #Vulnerability


Ransomware isn’t slowing down, and perimeter-based security just isn’t enough anymore. 🔐 Learn how to stay ahead and protect your business: 👉 procomme.com/blog/ransomwar… #ZeroTrust #InfoSec #DataProtection #NetworkSecurity #DigitalTransformation #ProtectWithProCom

ProcomTech786's tweet image. Ransomware isn’t slowing down, and perimeter-based security just isn’t enough anymore.

🔐 Learn how to stay ahead and protect your business:
👉 procomme.com/blog/ransomwar…

#ZeroTrust #InfoSec #DataProtection #NetworkSecurity #DigitalTransformation #ProtectWithProCom

My Bugcrowd account (Mr_binu_bb) was suspended for 30 days. Time is over but still no access. Some bounties are pending too. Ticket #155237 @Bugcrowd @BugcrowdSupport please check 🙏 Please repost 🔁 @lostsec_ @NullSecurityX @theXSSrat #bugbounty #infosec

CypherBinu's tweet image. My Bugcrowd account (Mr_binu_bb) was suspended for 30 days. Time is over but still no access.

Some bounties are pending too.

Ticket #155237
@Bugcrowd @BugcrowdSupport please check 🙏

Please repost 🔁
@lostsec_  
@NullSecurityX
@theXSSrat

#bugbounty #infosec
CypherBinu's tweet image. My Bugcrowd account (Mr_binu_bb) was suspended for 30 days. Time is over but still no access.

Some bounties are pending too.

Ticket #155237
@Bugcrowd @BugcrowdSupport please check 🙏

Please repost 🔁
@lostsec_  
@NullSecurityX
@theXSSrat

#bugbounty #infosec
CypherBinu's tweet image. My Bugcrowd account (Mr_binu_bb) was suspended for 30 days. Time is over but still no access.

Some bounties are pending too.

Ticket #155237
@Bugcrowd @BugcrowdSupport please check 🙏

Please repost 🔁
@lostsec_  
@NullSecurityX
@theXSSrat

#bugbounty #infosec
CypherBinu's tweet image. My Bugcrowd account (Mr_binu_bb) was suspended for 30 days. Time is over but still no access.

Some bounties are pending too.

Ticket #155237
@Bugcrowd @BugcrowdSupport please check 🙏

Please repost 🔁
@lostsec_  
@NullSecurityX
@theXSSrat

#bugbounty #infosec

🔐 Cyber Insight The most effective cyber attacks are often the simplest. Complex systems fail because of simple mistakes. 👉 Focus on basics — they matter most. Stay alert. Stay secure. — Sambitek #CyberSecurity #InfoSec #DigitalSecurity


Abuses clipboard to encourage execution of the curl|bash combo. Read more 👉 lttr.ai/Aqi9Z #phishing #Security #Infosec

lbhuston's tweet image. Abuses clipboard to encourage execution of the curl|bash combo.

Read more 👉 lttr.ai/Aqi9Z

#phishing #Security #Infosec

Wow, GLM-5 just suggested a one-click-install tool for LAM (Large Avatar Model) through my Hermes agent. Had a look and got suspicious: archive contains a 60kb Python file with a PyArmor wrapped/encrypted blob which doesn't exist in the upstream repository. #infosec #devops #oss


A $100 login. A St. Petersburg back-room. $10.7M out of Citibank — over X.25, before "the internet" was a thing. The world's first online bank robbery is one of the wildest stories in security history — and almost nobody tells it right. #infosec #cybersecurity #hackinghistory

Th0mas_Sh316y's tweet image. A $100 login.
A St. Petersburg back-room.
$10.7M out of Citibank — over X.25, before "the internet" was a thing.
The world's first online bank robbery is one of the wildest stories in security history — and almost nobody tells it right.

#infosec #cybersecurity #hackinghistory

Linux is not immune : linuxteck.com/linux-ransomwa… Most attacks succeed because of: weak access control missing updates no backups Fix the basics, reduce most risk. #Linux #Infosec #CyberSecurity #SysAdmin #DevOps #LinuxTeck

linuxteck's tweet image. Linux is not immune : linuxteck.com/linux-ransomwa…

Most attacks succeed because of:

weak access control
missing updates
no backups

Fix the basics, reduce most risk.

#Linux #Infosec #CyberSecurity #SysAdmin #DevOps #LinuxTeck

Already cycled through 400+ vectors. Looking for a wizard to bypass this response filtering or pivot via OOB exfiltration. #BugBounty #InfoSec #SSRF #RedTeam #CyberSecurity


Las empresas siguen siendo blanco fácil porque confían demasiado en las herramientas Teams, Outlook, WhatsApp Business… todas pueden ser el vector de entrada. Comparte esto para que tu empresa no sea la próxima víctima 🔁 #CiberSeguridad #México #InfoSec #MicrosoftTeams #Malware


PRC national Xu Zewei extradited to the US for HAFNIUM intrusions and targeting COVID-19 research. He faces a 9-count indictment for state-sponsored hacks. #HAFNIUM #CyberSecurity #InfoSec #PRC #DOJ #FBI #Espionage #MicrosoftExchange securityonline.info/hafnium-hacker…

the_yellow_fall's tweet image. PRC national Xu Zewei extradited to the US for HAFNIUM intrusions and targeting COVID-19 research. He faces a 9-count indictment for state-sponsored hacks.

#HAFNIUM #CyberSecurity #InfoSec #PRC #DOJ #FBI #Espionage #MicrosoftExchange
securityonline.info/hafnium-hacker…

OpenSSH flaw allowing full root shell access lurked for 15 years before discovery. Security debt compounds silently. The systems you trust today were built when the threat model was different. #Cybersecurity #InfoSec

battista212's tweet image. OpenSSH flaw allowing full root shell access lurked for 15 years before discovery. Security debt compounds silently. The systems you trust today were built when the threat model was different. #Cybersecurity #InfoSec

A 2017 Equifax breach exposed 147M people's data. 🔒 Confidentiality: wrong people got access. ✏️ Integrity: breach undetected for 76 days. ⚡ Availability: response systems weren't ready This is the CIA Triad. Every security decision starts here. #infosec #security #cybersafe

adumbirec's tweet image. A 2017 Equifax breach exposed 147M people's data.
🔒 Confidentiality: wrong people got access. 
✏️ Integrity: breach undetected for 76 days. 
⚡ Availability: response systems weren't ready
This is the CIA Triad. Every security decision starts here.
#infosec #security #cybersafe

#infosec Lately, I have been noticing certain negative things happening around me. When I go out I always look over my shoulders fearing for my life. People have been lying about my character for some time.


No results for "#infosec"

15 types of cyber attacks you should know 🔐 Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual. Cybersecurity = business resilience. Credit: Cybersecurity Insights #CyberSecurity #InfoSec #CyberAttacks #TechRisk

ingliguori's tweet image. 15 types of cyber attacks you should know 🔐

Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual.

Cybersecurity = business resilience.

Credit: Cybersecurity Insights

#CyberSecurity #InfoSec #CyberAttacks #TechRisk

📢 Stay informed on the latest vulnerabilities with @CISAgov's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: cisa.gov/news-events/bu… #Cybersecurity #InfoSec #VulnerabilityManagement

CISACyber's tweet image. 📢 Stay informed on the latest vulnerabilities with @CISAgov's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: cisa.gov/news-events/bu… #Cybersecurity #InfoSec #VulnerabilityManagement

Every pentester should have these in their toolkit 👇🔥 From Shodan to crt.sh, this list covers servers, OSINT, attack surface, code search & threat intel Did I miss anything? Drop your favorite tools in the comments 👇 #BugBounty #CyberSecurity #Infosec

obscaries's tweet image. Every pentester should have these in their toolkit 👇🔥

From Shodan to crt.sh,  this list covers servers, OSINT, attack surface, code search & threat intel

Did I miss anything? Drop your favorite tools in the comments 👇

#BugBounty #CyberSecurity #Infosec

New Spring Boot flaws (CVSS 9.1) bypass security filters and enable RCE via timing attacks. Impacting versions 2.7.x to 4.0.x—secure your Java apps now. #SpringBoot #JavaSecurity #InfoSec #RCE #CyberSecurity #CVE202640976 #SpringFramework #PatchNow securityonline.info/spring-boot-vu…

the_yellow_fall's tweet image. New Spring Boot flaws (CVSS 9.1) bypass security filters and enable RCE via timing attacks. Impacting versions 2.7.x to 4.0.x—secure your Java apps now.

#SpringBoot #JavaSecurity #InfoSec #RCE #CyberSecurity #CVE202640976 #SpringFramework #PatchNow
securityonline.info/spring-boot-vu…

Finally @AnthropicAI approved my cyber use case in just 2h 25min upon submission For people getting rejected provide your profile: @Hacker0x01, @Bugcrowd, and a project with one of your github repos. Much appreciated, Anthropic team 🤎 #InfoSec #Anthropic #BugBounty

Tur24Tur's tweet image. Finally @AnthropicAI approved my cyber use case in just 2h 25min upon submission  For people getting rejected  provide your profile: @Hacker0x01, @Bugcrowd, and a project with one of your github repos. Much appreciated, Anthropic team 🤎 #InfoSec #Anthropic #BugBounty
Tur24Tur's tweet image. Finally @AnthropicAI approved my cyber use case in just 2h 25min upon submission  For people getting rejected  provide your profile: @Hacker0x01, @Bugcrowd, and a project with one of your github repos. Much appreciated, Anthropic team 🤎 #InfoSec #Anthropic #BugBounty

Banned from Claude Code in 30 Minutes The plan was simple: probe Claude Code APIs through Burp Suite (TLS checks off) and responsibly disclose anything interesting via HackerOne. My custom AI agent was also testing Claude Code's APIs in the background, so it was a joint effort

Tur24Tur's tweet image. Banned from Claude Code in 30 Minutes

The plan was simple: probe Claude Code APIs through Burp Suite (TLS checks off) and responsibly disclose anything interesting via HackerOne. My custom AI agent was also testing Claude Code's APIs in the background, so it was a joint effort


🚀 From Zero to Ethical Hacker: A Clear Roadmap Stop consuming random content. Follow a structured path: Networking → OS → Programming → Security → Tools → Practice Consistency beats everything. #CyberSecurity #EthicalHacking #InfoSec

VivekIntel's tweet image. 🚀 From Zero to Ethical Hacker: A Clear Roadmap

Stop consuming random content. Follow a structured path:
Networking → OS → Programming → Security → Tools → Practice

Consistency beats everything.
#CyberSecurity #EthicalHacking #InfoSec

📢 Stay informed on the latest vulnerabilities with @CISAgov's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: cisa.gov/news-events/bu… #Cybersecurity #InfoSec #VulnerabilityManagement

CISACyber's tweet image. 📢 Stay informed on the latest vulnerabilities with @CISAgov's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: cisa.gov/news-events/bu… #Cybersecurity #InfoSec #VulnerabilityManagement

🔐 RESOURCES: Secure Code Review(SCR) Learning Resources! YouTube SCR Series: youtube.com/playlist?list=… Rules: rules.sonarsource.com OWASP SCR Guide: owasp.org/www-project-co… Snippets: securitycipher.com/docs/security/… #infosec

mqst_'s tweet image. 🔐 RESOURCES: Secure Code Review(SCR) Learning Resources!

YouTube SCR Series: youtube.com/playlist?list=… Rules: rules.sonarsource.com
OWASP SCR Guide: owasp.org/www-project-co…
Snippets: securitycipher.com/docs/security/…

#infosec

Loading...

Something went wrong.


Something went wrong.