Paul MARTY (@0xpaulm) 's Twitter Profile
Paul MARTY

@0xpaulm

AppSec and bug bounty @doctolib

ID: 35809490

linkhttps://yeswehack.com/programs/doctolib-public-bug-bounty-program calendar_today27-04-2009 18:00:14

106 Tweet

384 Takipçi

3,3K Takip Edilen

Katie🌻Moussouris (she/her/she-ra/she-hulk) 🪷 (@k8em0) 's Twitter Profile Photo

Security Comms fail: If you have enough info to know I’m not affected, don’t send a security notice. Doing so trains users to click through & take no action. Don’t do it. Example of unnecessary security communication that will drive target users to ignore warnings over time:

Security Comms fail:

If you have enough info to know I’m not affected, don’t send a security notice.

Doing so trains users to click through & take no action.
Don’t do it.

Example of unnecessary security communication that will drive target users to ignore warnings over time:
Clint Gibler (@clintgibler) 's Twitter Profile Photo

💰 How to make cyber crime more profitable thaddeus e. grugq describes how FIN7's operational innovations (resources/personnel), not technical ones, made them more 💸 * Scaling your attacks across many targets * JIRA used to track victims * and more sec.okta.com/articles/2020/…

Hash Miser (@h_miser) 's Twitter Profile Photo

Threat level: very préoccupé CVE-2020-16947 - Microsoft Outlook RCE Vulnerability” allows attackers to send specially crafted emails that can execute commands when opened in the Microsoft Outlook software. This attack also works when an email is viewed in the preview pane.

nilØx42 🚫 (@nil0x42) 's Twitter Profile Photo

ReconNote - Modern target recon automation for bug-bounty hunters 🤩 github.com/0xdekster/Reco… - by Prasoon Gupta #AttackSurface #InfoSec #hacking #bugbounty #bugbountytips

Jack Rhysider 🏴‍☠️ (@jackrhysider) 's Twitter Profile Photo

Me: Here you go boss. Boss: What's this? Me: This is the best I could do with the security budget you gave me. Maybe next quarter we can make it better.

Me: Here you go boss.
Boss: What's this?
Me: This is the best I could do with the security budget you gave me. Maybe next quarter we can make it better.
Rohit (@sec_r0) 's Twitter Profile Photo

Web Authentication Methods, there are a lot of them. The most confusing one is OAuth. I have it covered in my Zine. Here is the Teaser, Releasing soon. Follow for updates. 😉 #infosec #security #BugBountyTips #BugBounty #bugbountytip #web #webcomics

Web Authentication Methods, there are a lot of them. 
The most confusing one is OAuth.
I have it covered in my Zine. Here is the Teaser, Releasing soon.
Follow for updates. 😉

#infosec #security #BugBountyTips #BugBounty #bugbountytip #web #webcomics
Quentin '🐧' ADAM (@waxzce) 's Twitter Profile Photo

Biscuit, the foundation for your authorization systems clever-cloud.com/blog/engineeri… // This is the future of authentication and authorization at Clever Cloud and we open source everything around it :-)

Biscuit, the foundation for your authorization systems clever-cloud.com/blog/engineeri… // This is the future of authentication and authorization at <a href="/clever_cloud/">Clever Cloud</a> and we open source everything around it :-)
Andy Greenberg (@agreenberg at the other places) (@a_greenberg) 's Twitter Profile Photo

In 2011, RSA was hacked by Chinese spies, who stole the "seed" values used to generate codes on SecurID 2fa tokens, shocking the security world. Now, after 10 years, the NDAs of the staff involved have expired. This is the untold story they shared with me: wired.com/story/the-full…

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

If you work in a SOC, print out this screenshot & pin it to a wall in your office Two important observations 1. Generic rule matches can uncover unknown threats 2. It’s hard to distinguish threats from legitimate software (mainly b/c the latter is often crap)

Arnaud Héritier (@aheritier) 's Twitter Profile Photo

If you have a blue screen of the death at startup time with @Doctolib on iOS 17 , let us know if 17.0.1 solves it. We don’t (yet) reproduce the issue internally and it seems it could be a safari issue (dirty caches or similar)

YesWeHack ⠵ (@yeswehack) 's Twitter Profile Photo

Have you noticed? Doctolib has doubled the max reward for its public #BugBounty program to €50K in October! Perfect timing to share our must-watch interview with CISO Cedric Voisin & Senior Product Security Engineer Paul MARTY on #Doctolib’s five-year Bug Bounty journey ⤵

Zach Morris Wilson (@eczachly) 's Twitter Profile Photo

Six years ago, I worked for InfoSec at Netflix making over $500k/year in cash salary when I was 24. I won’t work in cybersecurity again for the following reasons: - Unclear measurements of success Best case scenario in cybersecurity is nothing bad happens. Measuring nothing

Six years ago, I worked for InfoSec at Netflix making over $500k/year in cash salary when I was 24. 

I won’t work in cybersecurity again for the following reasons: 

- Unclear measurements of success
Best case scenario in cybersecurity is nothing bad happens. Measuring nothing