Chris Dale (@chrisadale) 's Twitter Profile
Chris Dale

@chrisadale

Hack for good, not evil or greed. Seek to understand, not just to solve. Co-founder of River Security (@rivsec), Principal SANS Instructor. Doing my own thing..

ID: 228721015

linkhttps://into.bio/chrisdale calendar_today20-12-2010 13:58:28

4,4K Tweet

2,2K Takipçi

187 Takip Edilen

Chris Dale (@chrisadale) 's Twitter Profile Photo

If GMail is being used as a Command and Control channel, are you supposed to block GMail next? When faced with adversaries willing to implement stealth, different tactics are necessary, such as basing our selves on user and entity behavioral monitoring. youtube.com/shorts/UQ_YRvb…

Chris Dale (@chrisadale) 's Twitter Profile Photo

The Web Application Hacker's Handbook is considered a foundational resource for web hackers. There wont however be a third edition, instead they have built portswigger.net/web-security/ . Thanks PortSwigger

SANS Institute, EMEA (@sansemea) 's Twitter Profile Photo

🔔 Reminder! Join SANS Principal Instructor Chris Dale today at 11 a.m. BST for an in-depth look at #NIS2, #DORA, and #TiberEU frameworks, and learn how to strengthen your IT security strategy. 📝 Don’t miss out—register here → whitepapers.theregister.com/paper/view/303… #SANSTraining

Chris Dale (@chrisadale) 's Twitter Profile Photo

The single best quality of life improvement to PowerShell; turns tab completition into linux style tab completion `Set-PSReadlineKeyHandler -Key Tab -Function Complete` #powershell

SANS Institute, EMEA (@sansemea) 's Twitter Profile Photo

🚀 The future of finance is resilient. #DORA & #TIBER-EU are driving change in how financial institutions prepare for evolving #Cybersecurity threats. Prepare for 2025, get actionable insights now. @sansinstitute Read the blog → sans.org/u/1zib

🚀 The future of finance is resilient. #DORA & #TIBER-EU are driving change in how financial institutions prepare for evolving #Cybersecurity threats. Prepare for 2025, get actionable insights now. @sansinstitute

Read the blog → sans.org/u/1zib
Chris Dale (@chrisadale) 's Twitter Profile Photo

Credential stuffing — no advanced hacking skills needed. A short 6 minute video to explain the concept youtube.com/watch?v=1BTFoJ…

SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

🔎 What’s hiding in your #AttackSurface? #PenTesting alone isn’t enough to uncover hidden vulnerabilities. Join Chris Dale as he explores how Continuous Pen Testing & #AttackSurfaceManagement can bridge the gap in security operations. → Register now: sans.org/u/1zQn

🔎 What’s hiding in your #AttackSurface?

#PenTesting alone isn’t enough to uncover hidden vulnerabilities. Join <a href="/ChrisADale/">Chris Dale</a> as he explores how Continuous Pen Testing &amp; #AttackSurfaceManagement can bridge the gap in security operations.

→ Register now: sans.org/u/1zQn
SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

🚀 A new era of #PenTesting is here! Move beyond static #Assessments and step into real-time, continuous security validation. Chris Dale shares how #OffensiveSOCs are changing the game. Read the blog → sans.org/u/1A29

🚀 A new era of #PenTesting is here! Move beyond static #Assessments and step into real-time, continuous security validation. <a href="/ChrisADale/">Chris Dale</a> shares how #OffensiveSOCs are changing the game.

Read the blog → sans.org/u/1A29
Chris Dale (@chrisadale) 's Twitter Profile Photo

In this podcast I am discussing things like how peneration testing is changing, modern penetration testing methodlogy, and more. youtube.com/watch?v=kRwGKQ…

Chris Dale (@chrisadale) 's Twitter Profile Photo

We're looking for passionate cybersecurity professionals, both junior and senior roles, to join our remote pentesting team. There is a hacking challenge below... Does this sound enticing?Message me. http://209.38.109.251/ (Reach out if you need hints) 💪

SANS Institute, EMEA (@sansemea) 's Twitter Profile Photo

Collaboration Spotlight: @DCIPark 🤝 SANS Institute Join us for an exclusive #CyberSafeRamadan webinar with Chris Dale, diving into social engineering threats & defenses 👇

LaurieWired (@lauriewired) 's Twitter Profile Photo

Just built an MCP for Ghidra. Now basically any LLM (Claude, Gemini, local...) can Reverse Engineer malware for you. With the right prompting, it automates a *ton* of tedious tasks. One-shot markups of entire binaries with just a click. Open source, on Github now.