Binarywishes (@binarywishes) 's Twitter Profile
Binarywishes

@binarywishes

Infosec.Ajumah Mama Bear. Army veteran. All opinions and comments are my own. @[email protected]

ID: 4813506614

calendar_today25-01-2016 18:56:27

799 Tweet

279 Takipçi

704 Takip Edilen

The Hacker News (@thehackersnews) 's Twitter Profile Photo

Researchers find that an Iranian #hacking group was behind a series of politically motivated disruptive cyberattacks against #Albanian government services in mid-July 2022. Read details: thehackernews.com/2022/08/irania… #infosec #cyberattack

VetConActual (@vetconactual) 's Twitter Profile Photo

Don't forget to pack your 80s themed attire for #VETCON next Saturday. There will be judged contests for both 80s culture and 80s military. Or...if you're in the Navy, just come in uniform... #defcon #DEFCON30 #Veterans

Don't forget to pack your 80s themed attire for #VETCON next Saturday. There will be judged contests for both 80s culture and 80s military. Or...if you're in the Navy, just come in uniform...

#defcon #DEFCON30 #Veterans
MG (@_mg_) 's Twitter Profile Photo

3 years ago I was selling out of my backpack at DEF CON. This year, OMG is on the front cover. 😎 I’ll be seeing you at the vendor area with Hak5 Lots more to come, including what’s inside this catalog!

3 years ago I was selling out of my backpack at <a href="/defcon/">DEF CON</a>. This year, OMG is on the front cover. 😎

I’ll be seeing you at the vendor area with <a href="/Hak5/">Hak5</a>

Lots more to come, including what’s inside this catalog!
Wild West Hackin' Fest (@wwhackinfest) 's Twitter Profile Photo

This'll make ya hoot 'n holler... Nick Powers and Steven will be at Deadwood 2022 talkin' 'bout "Less SmartScreen More Caffeine – ClickOnce (Ab)Use for Trusted Code Execution"! What're you waitin' for? Grab your tickets today! → wildwesthackinfest.com/deadwood/

This'll make ya hoot 'n holler... <a href="/zyn3rgy/">Nick Powers</a> and <a href="/0xthirteen/">Steven</a> will be at Deadwood 2022 talkin' 'bout "Less SmartScreen More Caffeine – ClickOnce (Ab)Use for Trusted Code Execution"!

What're you waitin' for? Grab your tickets today! → wildwesthackinfest.com/deadwood/
Andreas (@bin4rydigit) 's Twitter Profile Photo

Due to many people contacting me and asking about droneID removal. I just want to remind you that this exists: github.com/MAVProxyUser/C… It was tested on almost all DJI drones up to Mavic 3 fw300, which was the most recent version back then.

uɐpʇou@ ✸ (@notdan) 's Twitter Profile Photo

Do you like "Printables" to carry with you just in case you feel like doing party tricks? Here's a fun one I made from this paper on Hacking Cars. Enjoy! cs.tufts.edu/comp/116/archi…

Do you like "Printables" to carry with you just in case you feel like doing party tricks? Here's a fun one I made from this paper on Hacking Cars. Enjoy! cs.tufts.edu/comp/116/archi…
Karsten Hahn (@struppigel) 's Twitter Profile Photo

As a malware analyst I sometimes receive Microsoft files which have been manipulated. E.g. infected by a virus and cleaned afterwards. Here are some indicators to recognize PE file manipulation. 🧵

Rachel Tobac (@racheltobac) 's Twitter Profile Photo

I’ve seen an increase in the New Hire SMS Phish attack method recently: - new hire starts at org, they or the org announce new role on LinkedIn - attacker looks up new hire’s phone number on data brokerage sites - sends SMS phish pretending to be Exec to new hire in first month

Nicky (@nickieyey) 's Twitter Profile Photo

Search Engines for Pentesters #Pentesting #CyberSec #cyberawarness #cybersecuritytips #informationsecurity #infosec #ethicalhacking #bugbounty #bugbountytips #AWS #hacking

Search Engines for Pentesters

#Pentesting #CyberSec #cyberawarness #cybersecuritytips #informationsecurity #infosec #ethicalhacking #bugbounty #bugbountytips #AWS #hacking
vx-underground (@vxunderground) 's Twitter Profile Photo

Hi - vx-underground malware database is back online and functional - We have begun sharing daily samples with Bazaar - We are resuming paper translations Blah, blah, blah we are doing stuff and more stuff on top of stuff We are taking the weekend off. See you nerds on Monday

GreyNoise (@greynoiseio) 's Twitter Profile Photo

We are actively researching claims of 0-day vulnerabilities in Microsoft Exchange Server. There are currently two 0-Day Initiative allocations for related vulns, with no known associated CVEs. We are tracking based on indications in this original document www-gteltsc-vn.translate.goog/blog/canh-bao-…

Mysk 🇨🇦🇩🇪 (@mysk_co) 's Twitter Profile Photo

We confirm that iOS 16 does communicate with Apple services outside an active VPN tunnel. Worse, it leaks DNS requests. #Apple services that escape the VPN connection include Health, Maps, Wallet. We used Proton VPN and #Wireshark. Details in the video: #CyberSecurity #Privacy

Yamato Security Tools (@securityyamato) 's Twitter Profile Photo

Yamato Security's Ultimate Windows Event Log Configuration Guide For DFIR And Threat Hunting (especially for sigma users) github.com/Yamato-Securit… & github.com/Yamato-Securit…

Yamato Security's Ultimate Windows Event Log Configuration Guide For DFIR And Threat Hunting (especially for sigma users)
github.com/Yamato-Securit…
&amp;
github.com/Yamato-Securit…