tresronours cybersecurity (@tresronours) 's Twitter Profile
tresronours cybersecurity

@tresronours

GNU/Linux, and love, nature, travels and culture.
Alexandre Blanc cyber security, was LinkedIn banned
blog.inforeseau.com
connected=hacked
cloud=leak

ID: 184776316

linkhttps://blog.inforeseau.com/a-propos calendar_today30-08-2010 13:20:32

23,23K Tweet

1,1K Takipçi

677 Takip Edilen

I am Jakoby (@i_am_jakoby) 's Twitter Profile Photo

If you publish your own powershell gallery modules you might have noticed your custom icon doesnt work anymore, the "IconUri" just doesnt render. They disabled it cause of me lol my bad I found an exploit that allowed me to grab every users email, user-agent, geo-location, ip

If you publish your own powershell gallery modules you might have noticed your custom icon doesnt work anymore, the "IconUri" just doesnt render. They disabled it cause of me lol my bad 

I found an exploit that allowed me to grab every users email, user-agent, geo-location, ip
tresronours cybersecurity (@tresronours) 's Twitter Profile Photo

Bill C-2 is anti-privacy, anti-rights, and anti-Canadian! We need your voice to stop it. ✊ Tell our leaders to scrap this dangerous bill NOW! #StopBillC2 OpenMedia openmedia.org/Stop-BillC2-tw

LibreOffice (@libreoffice) 's Twitter Profile Photo

More and more governments and organisations are freeing themselves from vendor lock-in! The Austrian military has moved 16,000 PCs to #LibreOffice – getting vital digital sovereignty in the process: blog.documentfoundation.org/blog/2025/09/3…

More and more governments and organisations are freeing themselves from vendor lock-in! The Austrian military has moved 16,000 PCs to #LibreOffice – getting vital digital sovereignty in the process: blog.documentfoundation.org/blog/2025/09/3…
DHH (@dhh) 's Twitter Profile Photo

We've undermined, if not vandalized, the beauty of the internet by centralizing so much with the cloud. But it's never too late to fix that mistake.

Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

⚠️ EY Data Leak - Massive 4TB SQL Server Backup Exposed Publicly on Microsoft Azure Read more: cybersecuritynews.com/ey-data-leak/ A massive 4TB SQL Server backup file belonging to global accounting giant Ernst & Young (EY) was discovered publicly accessible on Microsoft Azure. The

⚠️ EY Data Leak - Massive 4TB SQL Server Backup Exposed Publicly on Microsoft Azure 

Read more: cybersecuritynews.com/ey-data-leak/

A massive 4TB SQL Server backup file belonging to global accounting giant Ernst & Young (EY) was discovered publicly accessible on Microsoft Azure.

The
𝘾𝙝𝙧𝙞𝙨𝙩𝙤𝙥𝙝𝙚 𝘽𝙤𝙪𝙩𝙧𝙮 (@ced_haurus) 's Twitter Profile Photo

🚨 Un outil gratuit permet de “pister” l’activité de plus de 3 milliards d’utilisateurs WhatsApp , et Signal est concerné aussi. Le plus gênant, c’est que ça peut se faire sans message visible, sans notif, et sans accès à vos messages. Voilà comment ça marche, et surtout

🚨 Un outil gratuit permet de “pister” l’activité de plus de 3 milliards d’utilisateurs <a href="/WhatsApp/">WhatsApp</a> , et <a href="/signalapp/">Signal</a>  est concerné aussi. Le plus gênant, c’est que ça peut se faire sans message visible, sans notif, et sans accès à vos messages. 

Voilà comment ça marche, et surtout
tresronours cybersecurity (@tresronours) 's Twitter Profile Photo

Check out the latest article in my newsletter: Taking Cyber News on YouTube as well in 2026 (and latest cyber news) linkedin.com/pulse/taking-c… via LinkedIn

unusual_whales (@unusual_whales) 's Twitter Profile Photo

Microsoft's, $MSFT, Windows 11's online Microsoft Account requirement means your PC is automatically backing up its data encryption key to the cloud, and Microsoft says it will hand those over to the FBI if asked, per WindowsCentral

Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

🚨 Hackers Using AI to Get AWS Admin Access Within 10 Minutes Source: cybersecuritynews.com/aws-admin-acce… Threat actors leveraging artificial intelligence tools have compressed the cloud attack lifecycle from hours to mere minutes. The adversaries escalated from initial credential theft

🚨 Hackers Using AI to Get AWS Admin Access Within 10 Minutes 

Source: cybersecuritynews.com/aws-admin-acce…

Threat actors leveraging artificial intelligence tools have compressed the cloud attack lifecycle from hours to mere minutes.

The adversaries escalated from initial credential theft