Matthew J Boyle (@m0x40) 's Twitter Profile
Matthew J Boyle

@m0x40

Information Security Professional

ID: 15501244

linkhttp://m0x40.blogspot.com calendar_today20-07-2008 13:29:22

240 Tweet

173 Takipçi

1,1K Takip Edilen

Steve Wood (@stevewoodus) 's Twitter Profile Photo

Paras Chopra Your password should be something like ="AZ"&RANDBETWEEN(0,100000) Now it has a comma to break CSVs, and has a command to generate a random password if the hacker loads the DB as an XLS

Johannes Ullrich (@johullrich) 's Twitter Profile Photo

16 years ago, I started the daily SANS Internet Storm Center "Stormcast." Hoping that it still helps to make the tens of thousands of listeners "Sound Smarter" as they get to work in the morning. It can be challenging to stay updated in information security and to cut through the

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

🚨 An actor using the CL0P brand is exploiting an Oracle E-Business Suite zero-day (CVE-2025-61882) in an extortion campaign. Our latest blog post examines: 🔹 Campaign details 🔹 In-memory Java implant framework 🔹 Guidance and IOCs for defenders 👉 bit.ly/46KMWay

🚨 An actor using the CL0P brand is exploiting an Oracle E-Business Suite zero-day (CVE-2025-61882) in an extortion campaign.

Our latest blog post examines:
🔹 Campaign details 
🔹 In-memory Java implant framework 
🔹 Guidance and IOCs for defenders

👉 bit.ly/46KMWay
Marcello (@byt3bl33d3r) 's Twitter Profile Photo

Practical guide to NTLM Relaying in 2017 (A.K.A getting a foothold in under 5 minutes) byt3bl33d3r.github.io/practical-guid…

Lesley Carhart (@hacks4pancakes) 's Twitter Profile Photo

Repeat after me: I’m good at my job. I’m smart &help others. It’s OK I’m not an expert at every niche of infosec as long as I keep learning.

Christopher Glyer (@cglyer) 's Twitter Profile Photo

Need to manage password cracking tasks across your red team? Enter GoCrack by Christopher from @FireEye ICE team. fireeye.com/blog/threat-re…

phorkus (@phorkus) 's Twitter Profile Photo

I stand with: ifconfig netstat And a dozen other “deprecated” tools. Don’t break things just because they were invented in the 1970s Linux. RT if you agree.

Matthew J Boyle (@m0x40) 's Twitter Profile Photo

Read our newly released M-Trends 2018 report to arm your security team with the knowledge they need to defend against today’s most often-used cyber attacks. bit.ly/2EwIMlW

Read our newly released M-Trends 2018 report to arm your security team with the knowledge they need to defend against today’s most often-used cyber attacks. bit.ly/2EwIMlW
Try Catch HCF (@TryCatchHCF@infosec.exchange) (@trycatchhcf) 's Twitter Profile Photo

A scan is not a pentest. A scan is not a pentest. A scan is not a pentest. A scan is not a pentest. A scan is not a pentest. A scan is not a pentest. A scan is not a pentest. A scan is not a pentest. A scan is not a pentest. A scan is not a pentest. A scan is not a pentest.