Banbreach (@banbreach) 's Twitter Profile
Banbreach

@banbreach

Digital investigations.

ID: 791755107801010177

linkhttps://banbreach.com calendar_today27-10-2016 21:35:02

14,14K Tweet

1,1K Takipçi

1,1K Takip Edilen

Advait Palepu (@advait_px) 's Twitter Profile Photo

bloomberg.com/news/features/… 🚨 Bloomberg Investigation A relatively unknown Indian pharmaceutical firm has selling top-end Dell servers optimized for artificial intelligence to Russia. The servers moved across countries despite western government attempts to shut off Moscow’s

CreativeWolf (@creativewolf) 's Twitter Profile Photo

Saw a post asking about what could be done for startup security and missed it. With the shift towards Remote Working / Work From Home it becomes extremely imperative to have a model to address this need and gap.

Maakul (@maakul1) 's Twitter Profile Photo

gorklon rust X India reported atleast 20 such ids showing this fake ad. Shreya Ghoshal has 7m followers. If this is the level of safety for a bluetick celeb, can we really expect datasafety on X

Hunt.io (@huntio) 's Twitter Profile Photo

🚨 Hunt Findings: Spoofed Indian Ministry of Defence site delivers ClickFix-style malware to Windows and Linux systems. hunt.io/blog/apt36-cli… Fabricated press releases. HTA payloads. Decoy PDFs. Repeated techniques suggest ties to a broader infrastructure set. Here’s how to

Nathan Ruser (@nrg8000) 's Twitter Profile Photo

This appears to be pretty misleading reporting, and from my examination of the Maxar catalogue, there is nothing suspicious, least of all to support the implication in the article that Pakistani security forces provided specific imagery-intelligence to the terrorists. See more⬇️

This appears to be pretty misleading reporting, and from my examination of the Maxar catalogue, there is nothing suspicious, least of all to support the implication in the article that Pakistani security forces provided specific imagery-intelligence to the terrorists.
See more⬇️
Nathan Ruser (@nrg8000) 's Twitter Profile Photo

This is also probably the single craziest thing I've ever read in an article about commercial satellite imagery. This is just an insane thing to say and include in an article like this.

This is also probably the single craziest thing I've ever read in an article about commercial satellite imagery. 
This is just an insane thing to say and include in an article like this.
Banbreach (@banbreach) 's Twitter Profile Photo

You: Yo! Take me to this hash function Google: Hash function? Here's some malinformation. Pubmed is an aggregator. Listing on pubmed does not accord a piece of research to be backed by the UK NIH.

You: Yo! Take me to this hash function

Google: Hash function? Here's some malinformation.

Pubmed is an aggregator. Listing on pubmed does not accord a piece of research to be backed by the UK NIH.
Banbreach (@banbreach) 's Twitter Profile Photo

Insider threat is far more common than is made out to be. The question is, what, if any, checks and balances are put in place, and how these are tested for resilience.

Robert Hansen (@rsnake) 's Twitter Profile Photo

I have noticed two things about the rise of LLMs in social media/marketing that may not be immediately obvious that I felt were worth mentioning. The first is that everything is overhyped. Because the LLMs are trained to be "excited" or "impressed" they are always overly 1/11

I have noticed two things about the rise of LLMs in social media/marketing that may not be immediately obvious that I felt were worth mentioning. The first is that everything is overhyped. Because the LLMs are trained to be "excited" or "impressed" they are always overly 1/11