Josh Grossman 👻(@JoshCGrossman@Infosec.exchange) (@joshcgrossman) 's Twitter Profile
Josh Grossman 👻(@[email protected])

@joshcgrossman

Friendly AppSec Ghost 👻
@OWASP_IL | @OWASP_ASVS
Mastodon: appsecg.host/toot
Training courses: appsecg.host/tools and appsecg.host/fast

ID: 2863808158

linkhttps://appsecg.host calendar_today06-11-2014 12:58:45

4,4K Tweet

1,1K Takipçi

2,2K Takip Edilen

Sharone Revah Zitzman 🎗️💙🇮🇱 (@shar1z) 's Twitter Profile Photo

And we're 🔴 LIVE - join our webinar and panel with Josh Grossman 👻(@[email protected]) from OWASP® Foundation + Bounce Security & Mic McCully of Oligo Security in an EPIC AppSec Smackdown of Reachability vs. Exploitability There's still time to join us: oligo-security.zoom.us/webinar/regist… #AppSec #CloudNativeSec

And we're 🔴  LIVE - join our webinar and panel with <a href="/JoshCGrossman/">Josh Grossman 👻(@JoshCGrossman@Infosec.exchange)</a> from <a href="/owasp/">OWASP® Foundation</a> + Bounce Security &amp; Mic McCully of <a href="/OligoSecurity/">Oligo Security</a> in an EPIC AppSec Smackdown of Reachability vs. Exploitability

There's still time to join us:
oligo-security.zoom.us/webinar/regist…

#AppSec #CloudNativeSec
Patrick Wardle (@patrickwardle) 's Twitter Profile Photo

I don't do Windows but here are some (initial) details about why the CrowdStrike's CSAgent.sys crashed Faulting inst: mov r9d, [r8] R8: unmapped address ...taken from an array of pointers (held in RAX), index RDX (0x14 * 0x8) holds the invalid memory address John Hammond

I don't do Windows but here are some (initial) details about why the CrowdStrike's CSAgent.sys crashed 

Faulting inst:  mov  r9d, [r8]
R8: unmapped address

...taken from an array of pointers (held in RAX), index RDX (0x14 * 0x8) holds the invalid memory address

<a href="/_JohnHammond/">John Hammond</a>
Sam Stepanyan (@securestep9) 's Twitter Profile Photo

Anyone in my network works for Twitter/X Support? OWASP London (@owasplondon) account is in trouble: X asking to agree with the new Terms & Conditions: every time I click "Agree and continue" I get error "Oops, something went wrong. Please try again later" (stuck on this error!)

Anyone in my network works for Twitter/X <a href="/Support/">Support</a>?
OWASP London (@owasplondon) account is in trouble: X asking to agree with the new Terms &amp; Conditions: every time I click "Agree and continue" I get error "Oops, something went wrong. Please try again later" (stuck on this error!)
Josh Grossman 👻(@JoshCGrossman@Infosec.exchange) (@joshcgrossman) 's Twitter Profile Photo

Got my copy but you only have a few days left to get yours! There is still time to sign up for "Accelerated AppSec – Hacking your Product Security Programme for Velocity and Value" at Black Hat #BHUSA! Learn how to design and operate an #AppSec program that really works!

Got my copy but you only have a few days left to get yours!

There is still time to sign up for "Accelerated AppSec – Hacking your Product Security Programme for Velocity and Value" at <a href="/BlackHatEvents/">Black Hat</a> #BHUSA!

Learn how to design and operate an #AppSec program that really works!
OWASP ASVS Project (@owasp_asvs) 's Twitter Profile Photo

Excited to welcome Ryan Armstrong onto the OWASP ASVS Project working group! As a long-time user and recent contributor, Ryan brings his insights in using ASVS for pen testing engagements to help us improve for version 5.0!

Excited to welcome <a href="/ryarmst/">Ryan Armstrong</a> onto the <a href="/OWASP_ASVS/">OWASP ASVS Project</a> working group!

As a long-time user and recent contributor, Ryan brings his insights in using  ASVS for pen testing engagements to help us improve for version 5.0!
OWASP ASVS Project (@owasp_asvs) 's Twitter Profile Photo

We have started going through the responses to our "Call for Volunteers" but you still have time to get in touch if you are interested in helping the @OWASP ASVS project. Let us know here: docs.google.com/forms/d/e/1FAI…

Kim Wuyts (@wuytski) 's Twitter Profile Photo

The 3rd 🔶Privacy Threat Modeling Workshop (WPTM) 🔶 will be fully remote and free to attend! 🙌 The program will be a mix of research presentations 🎓, a panel session 💬, updates on the latest developments 💡 in the privacy threat modeling world. And I get to do the keynote 🤩

The 3rd 🔶Privacy Threat Modeling Workshop (WPTM) 🔶 will be fully remote and free to attend! 🙌

The program will be a mix of research presentations 🎓, a panel session 💬, updates on the latest developments 💡 in the privacy threat modeling world. And I get to do the keynote 🤩
Kim Wuyts (@wuytski) 's Twitter Profile Photo

Why is Privacy Threat Modeling so difficult?🤔 💡Privacy is a complex concept! You need to cover all of its layers of complexity 🎯 to fully understand the privacy implications. On arXiv (doi.org/10.48550/arXiv…) or LinkedIn (linkedin.com/pulse/unraveli…) cc Avi Douglen

Why is Privacy Threat Modeling so difficult?🤔

💡Privacy is a complex concept! You need to cover all of its layers of complexity 🎯 to fully understand the privacy implications.

On arXiv (doi.org/10.48550/arXiv…) or LinkedIn (linkedin.com/pulse/unraveli…)

cc <a href="/sec_tigger/">Avi Douglen</a>
OWASP ASVS Project (@owasp_asvs) 's Twitter Profile Photo

Do you have questions about the ASVS? 🤔 Wondering how to implement specific requirements? 📊 Curious about prioritizing security controls? 🔍 Need clarification on any aspect of ASVS? Drop your ASVS-related questions in the comments below!

OWASP ASVS Project (@owasp_asvs) 's Twitter Profile Photo

🚀 Exciting News for Web Security Enthusiasts! 🛡️ The upcoming OWASP Application Security Verification Standard (ASVS) version 5.0 is leveling up with a brand new WebRTC chapter! 🎉 Want to dive deeper? Check out the full WebRTC chapter here: github.com/OWASP/ASVS/blo…

Josh Grossman 👻(@JoshCGrossman@Infosec.exchange) (@joshcgrossman) 's Twitter Profile Photo

Aside from everything else, making your development teams do irrelevant or generic training is a surefire way to make them less engaged with security, therefore making your job harder.

Jim Manico from Manicode Security (@manicode) 's Twitter Profile Photo

Excited to share the latest OWASP Top 10 Proactive Controls! Check it out here: top10proactive.owasp.org Developers, want to contribute? The GitHub repo is linked at the top right of each page. Or join the effort and help us improve: top10proactive.owasp.org/introduction/c… #AppSec #OWASP