Jinson Varghese (@jinsoncybersec) 's Twitter Profile
Jinson Varghese

@jinsoncybersec

Author & Editor @OWASP_WSTG. Reviewer @OWASPTop10. Information Security Lead @GetAstra. Follow me for the latest tips and updates in #Cybersecurity

ID: 169914122

linkhttps://www.jinsonvarghese.com calendar_today23-07-2010 13:45:11

20,20K Tweet

4,4K Followers

94 Following

Aman (@aman6490) 's Twitter Profile Photo

Just a warning to my followers. Don't use this site to order, thinking it's Jio owned. It's a scam: jioeat.in PS: I wasn't scammed. Just came across people who saw this as an ad on insta and their news feed, and we're scammed. They even have a razorpay payment

Shikhil Sharma (@shikhilsharma) 's Twitter Profile Photo

the world could use some non-AI updates - so we've released a new feature which allows our DAST vulnerability scanner customers to switch targets seamlessly in a self-serve way 🔃 huge time saver for teams scanning 100s of targets scan > refresh > scan again

The Athletic | Football (@theathleticfc) 's Twitter Profile Photo

Real Madrid have been comfortably the biggest draw at the Club World Cup this summer. In a tournament where plenty of focus has been on sparse crowds, their average attendance has been 67,247. From the Goal movie trilogy and Galacticos project to their huge appeal to a

Real Madrid have been comfortably the biggest draw at the Club World Cup this summer.

In a tournament where plenty of focus has been on sparse crowds, their average attendance has been 67,247.

From the Goal movie trilogy and Galacticos project to their huge appeal to a
Shikhil Sharma (@shikhilsharma) 's Twitter Profile Photo

Own a task, you'll do okay. Own a problem, you'll thrive. Own the outcome, you'll grow leaps & bounds. Working at a startup 101.

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Hackers hijack npm packages with 2 billion weekly downloads in supply chain attack - Sergiu Gatlan bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

Branko (@brankopetric00) 's Twitter Profile Photo

A penetration tester got root access to our Kubernetes cluster in 15 minutes. Here's what they exploited. The attack chain: - Found exposed Kubernetes dashboard (our bad) - Dashboard had view-only service account (we thought this was safe) - Service account could list secrets

Immanuel Cunt (@timiretimzzy2) 's Twitter Profile Photo

I run every day for 30 minutes, if I miss a day I add 30 minutes to the next day. This has truly been a game changer, tomorrow I’m supposed to run for 3 weeks.