CertifyCyber (@certifycyber1) 's Twitter Profile
CertifyCyber

@certifycyber1

Posts about cyber security, digital forensics, phishing, malware, password management, and technology topics.
#cybersecurity #phishing #malware #dfir

ID: 1566435783606616064

calendar_today04-09-2022 14:39:59

66 Tweet

135 Followers

583 Following

CertifyCyber (@certifycyber1) 's Twitter Profile Photo

Do you ever just ignore your work #email? There's all of the general work bs, vendor emails, #spam, emails about #phishing and #malware emails. Have you ever just left it all unread and kept living your life? I thought so too... :)

Do you ever just ignore your work #email? There's all of the general work bs, vendor emails, #spam, emails about #phishing and #malware emails.

Have you ever just left it all unread and kept living your life?

I thought so too... :)
CertifyCyber (@certifycyber1) 's Twitter Profile Photo

Tips for the wise, don't ever put the words "Hi, Hey," or any variation of "Hey There" in an email subject line. "Dear Sir/Madam" will yield points towards the quarantine as well. #phishing #malware #CyberSecurity #infosec #spam #emailmarketing #cyber #technology

Tips for the wise, don't ever put the words "Hi, Hey," or any variation of "Hey There" in an email subject line. "Dear Sir/Madam" will yield points towards the quarantine as well. 

#phishing #malware #CyberSecurity #infosec #spam #emailmarketing #cyber #technology
CertifyCyber (@certifycyber1) 's Twitter Profile Photo

Little #phish little phish left and right. In the primary inbox, the quarantine out of sight. The users click and then reply, credentials out the door and data integrity says goodbye. #emailsecurity #phishing #malware #CyberSecurity #dfir This poem is about where you work.

Little #phish little phish left and right. In the primary inbox, the quarantine out of sight. 

The users click and then reply, credentials out the door and data integrity says goodbye.
#emailsecurity #phishing #malware #CyberSecurity #dfir
This poem is about where you work.
CertifyCyber (@certifycyber1) 's Twitter Profile Photo

Customer: I want a tool that just works, I don't want to configure it. Me: Good luck with that #phishing #spam #CyberSecurity #malware #infosec

Customer: I want a tool that just works, I don't want to configure it.

Me: Good luck with that

#phishing #spam #CyberSecurity #malware #infosec
CertifyCyber (@certifycyber1) 's Twitter Profile Photo

"These are not the droids you're looking for." #phishing is getting pretty persuasive these days. #Malware #cybersecurity #infosecurity #email #emailsecurity

"These are not the droids you're looking for."
#phishing is getting pretty persuasive these days. 

#Malware #cybersecurity #infosecurity #email #emailsecurity
CertifyCyber (@certifycyber1) 's Twitter Profile Photo

#phishing attack subject line of the day "Your Paid the Invoice" from random Gmail account. No, no you didn't, you know you didn't so don't bother. #malware #infosec Get #email security tools that work.

#phishing attack subject line of the day "Your Paid the Invoice" from random Gmail account.

No, no you didn't, you know you didn't so don't bother. 

#malware #infosec Get #email security tools that work.
CertifyCyber (@certifycyber1) 's Twitter Profile Photo

Social engineering attacks are getting pretty sneaky. Please tell everyone in your HR to look out for employees requesting change for their Direct Deposit setup. Lots of spoofing and social engineering on that. #phishing #emailsecurity #malware

Social engineering attacks are getting pretty sneaky. Please tell everyone in your HR to look out for employees requesting change for their Direct Deposit setup. Lots of spoofing and social engineering on that. #phishing #emailsecurity #malware
Michael Shellenberger (@shellenberger) 's Twitter Profile Photo

EXPOSED: America's Secret Censorship-Industrial Complex U.S. government officials, agencies, and contractors are violating the First Amendment My testimony to Congress public.substack.com/p/exposed-amer…

Andrew Morris (afk) (@andrew___morris) 's Twitter Profile Photo

Lots of cyber security companies are going to fail this year. They will close their doors from running out of money or go to private equity asset sales. This is going to suck in the near term but be a good thing for the industry in the mid to long term. Many of these businesses

Matt Taibbi (@mtaibbi) 's Twitter Profile Photo

Dear ⁦Mehdi Hasan⁩: here’s the EIP website saying it partnered with CISA, the CIS site saying the same thing, and the award showing CIS is a DHS contractor. You’re wrong on this and you convinced a politician to threaten me with jail as a result. This has gone too far.

Dear ⁦<a href="/mehdirhasan/">Mehdi Hasan</a>⁩: here’s the EIP website saying it partnered with CISA, the CIS site saying the same thing, and the award showing CIS is a DHS contractor. You’re wrong on this and you convinced a politician to threaten me with jail as a result. This has gone too far.
Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Microsoft has detected increased credential attack activity by the threat actor Midnight Blizzard using residential proxy services to obfuscate the source of their attacks. These attacks target governments, IT service providers, NGOs, defense industry, and critical manufacturing.

CertifyCyber (@certifycyber1) 's Twitter Profile Photo

#adhd I've been too distracted today. How about I turn off my phone and do some real work. Shuts off phone. Starts to do real work on the computer. 2 minutes into real work needs phone for multi-factor authentication. #infosecurity #email #security #dfir