Alex Teixeira (@ateixei) 's Twitter Profile
Alex Teixeira

@ateixei

I design and build #SIEM content for a living. Editor at detect.fyi #DetectionEngineering & Research, #ML #Stats x-Splunk

ID: 210995291

linkhttp://opstune.com calendar_today02-11-2010 00:37:37

12,12K Tweet

3,3K Takipçi

919 Takip Edilen

Global Property Guide (@globalpropguide) 's Twitter Profile Photo

🏠 10-Year Global House Price Change, Inflation-Adjusted: Portugal: 151.3% Hungary: 129.7% Croatia: 61.0% Ireland: 59.9% Bulgaria: 59.3% Netherlands: 57.8% Slovenia: 56.6% Romania: 56.0% Czechia: 54.9% Malta: 53.7% Slovakia: 48.6% Mexico: 47.3% Poland: 44.3% USA: 43.4%

sysxplore (@sysxplore) 's Twitter Profile Photo

Matrix👨‍💻 while :;do echo $LINES $COLUMNS $((RANDOM%COLUMNS)) "$(printf "\U$((RANDOM%500+1000))")";sleep 0.05;done|gawk '{a[$3]=0;for(x in a){o=a[x];a[x]=a[x]+1;c=int(rand()*5);if(c==0)col="\033[1;32m";else if(c==1)col="\033[0;32m";else if(c==2)col="\033[1;36m";else

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

Red Hat Consulting breach puts over 5000 high profile enterprise customers at risk - in detail by Kevin doublepulsar.com/red-hat-consul…

FreeBSD Frau (@freebsdfrau) 's Twitter Profile Photo

What what WHAT?! I thought I knew it all when it came to regex (including all of PCRE) and now I discover this gem? What a time to be alive! I say … -oP plus \K for the ever-lovin’ win!

What what WHAT?! I thought I knew it all when it came to regex (including all of PCRE) and now I discover this gem? What a time to be alive! I say … -oP plus \K for the ever-lovin’ win!
ReliaQuest Threat Research (@reliaquesttr) 's Twitter Profile Photo

🚨 Scattered Spider’s Latest Tactics: Insider Recruitment for Network Access Scattered Spider has shifted from chaotic data leaks to a more organized cybercrime model, now actively recruiting insiders for initial network access. They are targeting employees in telecom, SaaS,

🚨 Scattered Spider’s Latest Tactics: Insider Recruitment for Network Access

Scattered Spider has shifted from chaotic data leaks to a more organized cybercrime model, now actively recruiting insiders for initial network access. They are targeting employees in telecom, SaaS,
b1ack0wl (@b1ack0wl) 's Twitter Profile Photo

"so you spent a year finding a high impact vulnerability?" "Yes, Dave" "and you disclosed it responsibly for $5 and a t-shirt?" "That's correct, Dave"

"so you spent a year finding a high impact vulnerability?"

"Yes, Dave"

"and you disclosed it responsibly for $5 and a t-shirt?"

"That's correct, Dave"
I am Jakoby (@i_am_jakoby) 's Twitter Profile Photo

Today is my birthday! 🥳 and the full walkthrough of PowerShellForHackers.com is live. And I am going to be giving someone $2000 to go towards their DEFCON 2026 trip! This site started as a small side project. A browser based desktop for learning PowerShell and hacking

Today is my birthday! 🥳
and the full walkthrough of PowerShellForHackers.com is live.

And I am going to be giving someone $2000 to go towards their DEFCON 2026 trip!

This site started as a small side project. A browser based desktop for learning PowerShell and hacking
Florian Hansemann (@cyberwarship) 's Twitter Profile Photo

''Under the Pure Curtain: From RAT to Builder to Coder - Check Point Research'' #infosec #pentest #redteam #blueteam research.checkpoint.com/2025/under-the…

The Haag™ (@m_haggis) 's Twitter Profile Photo

🚨 New ClickGrab Updates! I just dropped a video walking through the latest enhancements to ClickGrab: 🧩 Brand-new ClickFix techniques 🌐 Community feed integration from Carson ➡️ clickfix.carsonww.com 🔀 Updates to the redirect follower 📄 Raw HTML of the compromised sites

🚨 New ClickGrab Updates! 

I just dropped a video walking through the latest enhancements to ClickGrab:

🧩 Brand-new ClickFix techniques
🌐 Community feed integration from Carson ➡️ clickfix.carsonww.com
🔀 Updates to the redirect follower
📄 Raw HTML of the compromised sites
rcegan (@rcegann) 's Twitter Profile Photo

New post out on Detect.fyi!! All about writing actually useful incident response playbooks, through the lens of applied detection engineering. Based on cool stuff we're doing in our SOC detect.fyi/re-writing-the…

Nasreddine Bencherchali (@nas_bench) 's Twitter Profile Photo

Fun sigma stats for the end of the week. We have now reached 22 million package downloads since we started doing package releases 2 years ago. We also crossed 5700 PRs/Issues :)

Stephan Berger (@malmoeb) 's Twitter Profile Photo

In various business email compromise (BEC) cases, we later discovered that although the customer had set up a conditional access (CA) policy to enforce multi-factor authentication, mistakes had been made during the implementation of said policies. For example, certain resources

In various business email compromise (BEC) cases, we later discovered that although the customer had set up a conditional access (CA) policy to enforce multi-factor authentication, mistakes had been made during the implementation of said policies.

For example, certain resources