trickRex (@ericstr13) 's Twitter Profile
trickRex

@ericstr13

📊 Machine Learning 🌐 | Cybersecurity 💻 | Python🐍
#MachineLearning #CyberSecurity #Python #Data

ID: 1467405711713914886

calendar_today05-12-2021 08:09:40

1,1K Tweet

132 Followers

1,1K Following

David Bombal (@davidbombal) 's Twitter Profile Photo

Why space servers FAIL Execs want to put data centers in space, but there's a massive physics problem: vacuums have no convection cooling. Discover why cooling servers in space relies purely on infrared radiation! Big thanks to ThreatLocker for sponsoring my trip to ZTW26 and

Aakash Gupta (@aakashg0) 's Twitter Profile Photo

North Korean intelligence agents built an entire fake company to compromise one JavaScript developer. And it worked. UNC1069 didn't hack Axios. They befriended its maintainer. They cloned a real company founder's identity, built a branded Slack workspace with fake employee

The Best (@thebestfigen) 's Twitter Profile Photo

Paradox: If you see a baby located 90 light-years from Earth, right now it would be a 90-year-old, but you see it in your present, as a baby. While the light takes time to reach you, the baby grows and ages. When you look at the universe, you are always looking at the past.

@mikko (@mikko) 's Twitter Profile Photo

Three years ago, I said in my talks that generative AI would eventually start discovering zero-day vulnerabilities. At the time, many people dismissed the idea as unrealistic. It is no longer unrealistic.

Yoko (@kibet_bull) 's Twitter Profile Photo

Fuel has been increased and it will only affect Gen Z, Mount Kenya and Linda Mwananchi. Rift valley and Broadbased area set to be constant

Dark Web Intelligence (@dailydarkweb) 's Twitter Profile Photo

🧰 Top 10 Tools Most Used by Cybercriminals Based on our ongoing interviews with threat actors and underground monitoring, we asked one simple question: “What do you actually use?” Here’s the reality 👇 1. Lumma Stealer Still one of the most dominant infostealers. Massive

🧰 Top 10 Tools Most Used by Cybercriminals

Based on our ongoing interviews with threat actors and underground monitoring, we asked one simple question: “What do you actually use?”

Here’s the reality 👇

1. Lumma Stealer
Still one of the most dominant infostealers. Massive
n3ptune_ (@n3ptune_cpu) 's Twitter Profile Photo

Here's the exploit in action, using the RedSun PoC (note this is demostrated in virtual machines and this is purely for educational purposes, please don't repilcate the exploit on any systems you are not permited to do so)

Hacking Articles (@hackinarticles) 's Twitter Profile Photo

Burp Suite for Pentester: HackBar 🔥 Telegram: t.me/hackinarticles ✴ Twitter: x.com/hackinarticles HackBar is a Burp Suite extension that speeds up manual penetration testing by providing ready-to-use payload dictionaries for common web vulnerabilities, allowing testers

Burp Suite for Pentester: HackBar

🔥 Telegram: t.me/hackinarticles
✴ Twitter: x.com/hackinarticles

HackBar is a Burp Suite extension that speeds up manual penetration testing by providing ready-to-use payload dictionaries for common web vulnerabilities, allowing testers
Chaofan Shou (svm/acc) (@shoucccc) 's Twitter Profile Photo

Chinese LLMs can hack better than state-sponsored hackers with properly evolved harness - Kimi K2.5 managed to find and exploit 6 vulnerabilities in browsers: a single page view or an extension install by victims equal full system hijack. Check arxiv.org/abs/2604.20801

Chinese LLMs can hack better than state-sponsored hackers with properly evolved harness - 

Kimi K2.5 managed to find and exploit 6 vulnerabilities in browsers: a single page view or an extension install by victims equal full system hijack. 

Check arxiv.org/abs/2604.20801
Ebrahem Hegazy 🇵🇸 (@zigoo0) 's Twitter Profile Photo

#Udemy data breach confirmed. After refusing to pay the ransom, hackers released data of 1.4M users, including personal and financial details. We Dark Entry launched a lookup tool so you can check if you’re affected: darkentry.net/latest-breache… #DataBreach #Ransomware

#Udemy data breach confirmed.

After refusing to pay the ransom, hackers released data of 1.4M users, including personal and financial details.

We <a href="/DarkEntryAms/">Dark Entry</a> launched a lookup tool so you can check if you’re affected:

darkentry.net/latest-breache…

#DataBreach #Ransomware
ProjectDiscovery (@pdiscoveryio) 's Twitter Profile Photo

Here's a cool trick for y'all looking to create new Nuclei templates for exploitable CVEs! Using CVEmap you can get a list of CVEs with public proofs of concept, that have been marked as exploitable by CISA, are remotely exploitable AND don't have a Nuclei template (yet)!

Here's a cool trick for y'all looking to create new Nuclei templates for exploitable CVEs!

Using CVEmap you can get a list of CVEs with public proofs of concept, that have been marked as exploitable by CISA, are remotely exploitable AND don't have a Nuclei template (yet)!