Alexander Bittner (@alexanderbttnr) 's Twitter Profile
Alexander Bittner

@alexanderbttnr

there's always more to explore 🦇

ID: 2429327496

linkhttps://alexanderbittner.com calendar_today05-04-2014 19:00:56

670 Tweet

133 Takipçi

546 Takip Edilen

Arda Büyükkaya (@whichbufferarda) 's Twitter Profile Photo

I created a simple Group Policy (GPO) to automatically fix CrowdStrike BSOD (Blue screen of death) issue. gist.github.com/whichbuffer/78…

Sheel Mohnot (@pitdesi) 's Twitter Profile Photo

German discount grocer Lidl built their own cloud infrastructure because of German data laws, and now has a ~$2B revenue business selling it to others (a la AWS) They spent $700M acquiring an Israeli cyber security company (XM cyber)

Matthew Green is on BlueSky (@matthew_d_green) 's Twitter Profile Photo

My fear is that Telegram, in its infinite wisdom, is going to make itself the precedent-setting case study in messenger privacy. Which is hideous because they’ve never really offered it — by their own very deliberate choice.

Dave Kennedy (@hackingdave) 's Twitter Profile Photo

Damn, Israel may have just pulled off one of the largest kinetic extensions of cyber to the battlefield we may have ever seen. Controlling the multi-faceted intelligence/HUMINT requirements coupled with supply chain and leveraging tech for targeted operations is no easy feat.

LaurieWired (@lauriewired) 's Twitter Profile Photo

Your files are dying. That SSD you keep in the closet, the one from your old system "just in case". Yup, degrading as we speak. SSDs are *shockingly* bad at power off retention, esp if it's near it's endurance rating. The JEDEC standard only requires 1 year of unpowered data

Your files are dying.

That SSD you keep in the closet, the one from your old system "just in case".  Yup, degrading as we speak.

SSDs are *shockingly* bad at power off retention, esp if it's near it's endurance rating.

The JEDEC standard only requires 1 year of unpowered data
Jack Rhysider 🏴‍☠️ (@jackrhysider) 's Twitter Profile Photo

Threat detection strategies: Junior analyst: Uses fancy AI tools you never heard of Senior analyst: Uses complex SIEM rules that they traded for in an underground ISAC Ancient wizard: 'Something feels off about that IP'