Vadim Gordas (@vgordas) 's Twitter Profile
Vadim Gordas

@vgordas

Head of InfoSec Risk,
opinions are my own.

ID: 2804490857

calendar_today04-10-2014 10:10:19

156 Tweet

99 Followers

785 Following

Vadim Gordas (@vgordas) 's Twitter Profile Photo

This is big news, and definitely curious about how advertising industry will adapt: businessinsider.com/google-to-stop…

Sam Stepanyan (@securestep9) 's Twitter Profile Photo

If you are using #F5 F5 kit - be aware of 4 CRITICAL CVEs just announced minutes ago with almost all versions of BIG-IP and BIG-IQ 7.x vulnerable. Unauthenticated #RCE. Patches released - do check out the knowledgebase article: support.f5.com/csp/article/K0… F5 Security

If you are using #F5 <a href="/F5Networks/">F5</a>  kit - be aware of 4 CRITICAL CVEs just announced minutes ago with almost all versions of BIG-IP and BIG-IQ 7.x vulnerable. 
Unauthenticated #RCE. Patches released - do check out the knowledgebase article: 

support.f5.com/csp/article/K0…

<a href="/F5Security/">F5 Security</a>
Troy Hunt (@troyhunt) 's Twitter Profile Photo

Just to add to this, look at ParkMobile’s password requirements then look at the cracked passwords and ask yourself: do those requirements help people make good passwords? No, of course not, that’s why we ditched that craziness years ago: troyhunt.com/passwords-evol…

Just to add to this, look at ParkMobile’s password requirements then look at the cracked passwords and ask yourself: do those requirements help people make good passwords? No, of course not, that’s why we ditched that craziness years ago: troyhunt.com/passwords-evol…
Chris Wysopal (@weldpond) 's Twitter Profile Photo

Syncing your phone to the car or having a built in GPS are privacy risks. Cars don’t have the data protection of a modern phone. jalopnik.com/the-feds-can-a…

Chris Krebs (@c_c_krebs) 's Twitter Profile Photo

Ransomware shuts down one of the most critical regional pipelines. This has gotten out of control. bloomberg.com/news/articles/…

Forrest Brazeal (@forrestbrazeal) 's Twitter Profile Photo

The recent "All the ways to run containers on AWS" threads have left me super confused so I made this flowchart to help. It's probably also wrong.

The recent "All the ways to run containers on AWS" threads have left me super confused so I made this flowchart to help. It's probably also wrong.
rik van duijn (@rikvduijn) 's Twitter Profile Photo

Wanted to do a quick blog on o365 audit logging and its quirks for a while now. Finally finished it. TLDR: enable it even if you dont monitor any of it. Atleast your incident responder will thank you. zolder.io/office-365-aud…

Sophos X-Ops (@sophosxops) 's Twitter Profile Photo

NEW: Conti affiliates use ProxyShell Exchange exploit in ransomware attacks ⚠️ In one of the ProxyShell-based attacks observed by Sophos, the Conti affiliates managed to gain access to the target’s network and set up a remote web shell in under a minute... 1/14

NEW: Conti affiliates use ProxyShell Exchange exploit in ransomware attacks ⚠️

In one of the ProxyShell-based attacks observed by Sophos, the Conti affiliates managed to gain access to the target’s network and set up a remote web shell in under a minute...

1/14
Lesley Carhart (@hacks4pancakes) 's Twitter Profile Photo

Tech people on Twitter be like, "just buy and install a pi hole to make your $2000 smart TV not play constant ads and narc on your viewing habits"

Mark Simos (@marksimos) 's Twitter Profile Photo

The long-awaited Microsoft Cybersecurity Reference Architectures (MCRA) update is now live! aka.ms/MCRA In addition to the latest products & names, this is the first MCRA version integrated into the Microsoft Security Adoption Framework (SAF). Share and Enjoy!

Sam Stepanyan (@securestep9) 's Twitter Profile Photo

#Android: At BlackHat Europe researchers demonstrated that most #password managers for Android (1Password, LastPass, Dashlane, Keepass etc) are vulnerable to #AutoSpill attack allowing to steal account credentials on Android during the autofill operation: bleepingcomputer.com/news/security/…

Sam Stepanyan (@securestep9) 's Twitter Profile Photo

CISA releases a Secure Software Development Attestation Form that will help ensure the software producers who partner with the US federal government leverage minimum secure development techniques and toolsets: cisa.gov/resources-tool…

Matt Zorich (@reprise_99) 's Twitter Profile Photo

One of our very smart Active Directory experts has been putting together a series of blog posts about hardening AD. Already into its 7th installment, it covers SMB hardening, disabling NTLMv1, least privilege and more. Check the series out - techcommunity.microsoft.com/tag/adhardening

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

For most of 2025, I was skeptical that AI was already playing a major operational role in real intrusions. Most public examples seemed limited to phishing and supporting tasks. This report by my friend Eyal Eyal lines up with what I have been hearing elsewhere, too - in recent