LostboY 1057(@1o57) 's Twitter Profileg
LostboY 1057

@1o57

Red Team, always a hacker, a scientist, a musician, an engineer, a linguist and a mathematician. I’ve been accused of being creative. I’m just me.

ID:37433900

calendar_today03-05-2009 15:18:39

19,0K Tweets

12,2K Followers

1,0K Following

Off The Hook (@OffTheHook@hackers.town)(@HackerRadioShow) 's Twitter Profile Photo

'Off the Hook Overtime' is live and we want to hear from you! You'll be able to ping us either by phone - US phone number 1-802-321-4225 (1-802-321-HACK) or toll-free at 1-833-755-2600 - or via the live YouTube chat which we're monitoring.

youtube.com/watch?v=vUkIjX…

account_circle
SAINTCON(@SAINTCON) 's Twitter Profile Photo

Our Wednesday Keynote speaker presentation is at 9AM.

Nicole Beckwith Just Another Nerd is going to address The Trojan Within: Insider Threats and share stories and insight from a fascinating career.

Tune in on YouTube

Our Wednesday Keynote speaker presentation is at 9AM. Nicole Beckwith @NicoleBeckwith is going to address The Trojan Within: Insider Threats and share stories and insight from a fascinating career. Tune in on YouTube
account_circle
mRr3b00t(@UK_Daniel_Card) 's Twitter Profile Photo

twitter have rolled out audio calls on twitter using STUN.

Be warned if you call someone the recipient (and anyone in the traffic path) can see your egress IP.

Apple private relay does not cover this.

twitter have rolled out audio calls on twitter using STUN. Be warned if you call someone the recipient (and anyone in the traffic path) can see your egress IP. Apple private relay does not cover this.
account_circle
Robᵉʳᵗ Graham 𝕏(@ErrataRob) 's Twitter Profile Photo

One thing that the crazies do, and which I see rational people increasingly do, is point to a video 'You just need to watch this, it'll explain everything'.

No, that's not rational thing to ask of somebody, you've let your brain rot. You've let other people do the thinking for…

account_circle
Rachel Tobac(@RachelTobac) 's Twitter Profile Photo

*Sizzle Reel + Ransomware Song Debut!*
We just hit 500,000+ users for our SocialProof Security security awareness training video library 🤯🤘
To celebrate, here's a sizzle reel of our latest Spoken and Music Video content with the DEBUT of our Ransomware Song in the background --…

account_circle
Dave Luber(@NSA_CSDirector) 's Twitter Profile Photo

Our ‘Living off the Land’ advisory provides important context on Chinese intrusions into critical infrastructure. You can’t rely on IOCs and malware detection. You need to focus on tradecraft.

media.defense.gov/2023/May/24/20…

Our ‘Living off the Land’ advisory provides important context on Chinese intrusions into critical infrastructure. You can’t rely on IOCs and malware detection. You need to focus on tradecraft. media.defense.gov/2023/May/24/20…
account_circle
illuminatibot(@iluminatibot) 's Twitter Profile Photo

Italy Becomes First Nation To Ban Bill Gates' Fake Meat Due To Serious Health Concerns: thepeoplesvoice.tv/italy-becomes-…

account_circle
Dave Luber(@NSA_CSDirector) 's Twitter Profile Photo

We funded D3FEND to help provide a consistent framework and lexicon through which the community can view defensive measures, investments, etc. Learn more here:

account_circle
Phaedra(@PhaedraXTeddy) 's Twitter Profile Photo

Chinese star after asking people to stop torturing animals.

'Is it wrong for to call for people not to torture and kill animals? There is no mistake in public or private matters, internally or externally. This is the most basic human nature. Why was it blocked?…

Chinese star #canceled after asking people to stop torturing animals. 'Is it wrong for #YangDi to call for people not to torture and kill animals? There is no mistake in public or private matters, internally or externally. This is the most basic human nature. Why was it blocked?…
account_circle
Dave Luber(@NSA_CSDirector) 's Twitter Profile Photo

Releasing an exploit proof of concept is a hot debate. Some argue it’s educational, but it can also empower malicious actors. We see bulk exploitation rates explode after, but advanced compromises against key victims don’t change a lot. What’s your take?

Releasing an exploit proof of concept is a hot debate. Some argue it’s educational, but it can also empower malicious actors. We see bulk exploitation rates explode after, but advanced compromises against key victims don’t change a lot. What’s your take?
account_circle
PunkAB(@punk_ab) 's Twitter Profile Photo

Dave Luber LostboY 1057 Agreed. I did my doctoral research in phishing, deal with phishing attacks almost daily, and i would not consider myself immune to this type of attack.

account_circle
ᗩᒪETᕼE(@AletheDenis) 's Twitter Profile Photo

If you’re part of a DEFCON GROUP - Please ensure that current POC has received an email from the DEF CON Groups Board RE: Roll Call.

We are attempting to get organized & we need your help! If your groups didn’t get an email - please reach out!

All DEF CONgroups must respond

If you’re part of a DEFCON GROUP - Please ensure that current POC has received an email from the @defcon Groups Board RE: Roll Call. We are attempting to get organized & we need your help! If your groups didn’t get an email - please reach out! All @defcongroups must respond
account_circle
Whiskey Pirate Crew(@WhiskeyHackers) 's Twitter Profile Photo

Using PayPal left me violated, and as I won’t be a victim, I stopped using PayPal.

Cash App was an alternative, except now I can’t receive payments from friends and support is worse than useless.

“No further details to provide, no further action will be taken.”

Uninstalled.

account_circle
Dave Luber(@NSA_CSDirector) 's Twitter Profile Photo

Attackers will work to know your network better than you do. They will find shadow IT, misconfigurations, weak authentication and unpatched devices containing n-days. Discover and fix it before them.  

Attackers will work to know your network better than you do. They will find shadow IT, misconfigurations, weak authentication and unpatched devices containing n-days. Discover and fix it before them.  #KnowledgeIsPower #KnowledgeIsSecurity
account_circle
Dave Luber(@NSA_CSDirector) 's Twitter Profile Photo

I really believe that if your infrastructure can’t survive a user clicking a link, you are doomed. I’m the director of cybersecurity at NSA and you can definitely craft and email link I will click…

r.mtdv.me/TrustThis

I really believe that if your infrastructure can’t survive a user clicking a link, you are doomed. I’m the director of cybersecurity at NSA and you can definitely craft and email link I will click… r.mtdv.me/TrustThis
account_circle
SwiftOnSecurity(@SwiftOnSecurity) 's Twitter Profile Photo

I'm convinced this is what NSA does all day long to access any company on earth. Hack MMO companies, using anticheat surveil gamer base for elite IT staffers, start pushing 'alpha' builds to them with additional functionality in signed binaries.
It's what I would do. I would win.

account_circle