Lincoln Kaffenberger (@lincolnkberger) 's Twitter Profile
Lincoln Kaffenberger

@lincolnkberger

ID: 358911048

calendar_today20-08-2011 18:19:28

1,1K Tweet

479 Followers

866 Following

Corben Leo (@hacker_) 's Twitter Profile Photo

In 2010, WikiLeaks released a classified document. A list of infrastructure critical to U.S national security. The government listed a Trans-Atlantic cable. 3 years ago, 19-year-old me gained ADMIN access to that cable (and another; shared codebase). ๐ŸงตHere's how I found it

In 2010, WikiLeaks released a classified document. 

A list of infrastructure critical to U.S national security.

The government listed a Trans-Atlantic cable.

3 years ago,

19-year-old me gained ADMIN access to that cable (and another; shared codebase).

๐ŸงตHere's how I found it
NetBlocks (@netblocks) 's Twitter Profile Photo

โš ๏ธ Confirmed: Metrics indicate that internet connectivity on provider Skynet (Khersontelecom) in Russian-occupied Kherson, south Ukraine, has been partially restored and rerouted via Russia's Rostelecom instead of Ukrainian infrastructure. ๐Ÿ“ฐ Background: netblocks.org/reports/internโ€ฆ

โš ๏ธ Confirmed: Metrics indicate that internet connectivity on provider Skynet (Khersontelecom) in Russian-occupied Kherson, south Ukraine, has been partially restored and rerouted via Russia's Rostelecom instead of Ukrainian infrastructure.

๐Ÿ“ฐ Background: netblocks.org/reports/internโ€ฆ
Lincoln Kaffenberger (@lincolnkberger) 's Twitter Profile Photo

" drone swarms like this could be used for disaster relief and ecological surveys." - yeah, and also LOTS of bad things. The military applications alone are terrifying. Watch a swarm of drones autonomously track a human through a dense forest theverge.com/2022/5/5/23058โ€ฆ via @Verge

Lincoln Kaffenberger (@lincolnkberger) 's Twitter Profile Photo

Question: how do you think the war in Ukraine would be different if the Solarwinds supply chain compromise had not been discovered?

EvilMogยฎ @mog.evil.af (@evil_mog) 's Twitter Profile Photo

Infosec Career Phases: Intern: I don't need an adult Junior: I need an adult Mid career: I need an adult and a project manager Senior: who was the adult on this project? Principal: *grumbles* I guess I am the adult Fellow: Here's a drawing in crayon, give this to an adult

Alexander Gabuev ้™ณๅฏ’ๅฃซ (@alexgabuev) 's Twitter Profile Photo

๐Ÿงต๐Ÿ‡จ๐Ÿ‡ณ๐Ÿ‡ท๐Ÿ‡บ Does China distance itself from Russia because of war against Ukraine? A terrific Financial Times piece helps to understand how Beijing wants its policy towards Moscow to be seen in Western capitals. Spoiler alert: the real policy might be very different. Let me help to unpack it. 1/

๐Ÿงต๐Ÿ‡จ๐Ÿ‡ณ๐Ÿ‡ท๐Ÿ‡บ
Does China distance itself from Russia because of war against Ukraine? A terrific <a href="/FT/">Financial Times</a> piece helps to understand how Beijing wants its policy towards Moscow to be seen in Western capitals. Spoiler alert: the real policy might be very different. Let me help to unpack it. 1/
Lincoln Kaffenberger (@lincolnkberger) 's Twitter Profile Photo

"Armies that lack robust recruitment, training and industrial bases tend to become steadily less effective as losses deepen." Prescient words that ring true beyond Ukraine forbes.com/sites/davidaxeโ€ฆ

Allen Jones (@ajmsft) 's Twitter Profile Photo

Following the news on MGM/Aria has brought back some old memories. Whenever I was running high-profile investigations, there was one prediction that was easy to make. Defenders, investigators, and analysts alike that are running for 14-16 hour-plus days is just not sustainable

Rev. Benjamin Cremer (@brcremer) 's Twitter Profile Photo

If you take the Bible extremely literally about human sexuality, but not about feeding the hungry, bringing good news to the poor, liberating the oppressed, forgiving debts, bringing health to the sick, or loving your neighbor, please donโ€™t act like you take the Bible seriously.

Hedgie (@hedgiemarkets) 's Twitter Profile Photo

๐Ÿฆ” Found this video and had to share. In China, AI-generated livestreams are selling products using synthetic video and voice. No humans on screen. Just AI avatars running 24/7, reportedly earning up to $100 per hour per stream. The video shows rows of PCs, each running a

Aurimas Griciลซnas (@aurimas_gr) 's Twitter Profile Photo

You must know these ๐—”๐—ด๐—ฒ๐—ป๐˜๐—ถ๐—ฐ ๐—ฆ๐˜†๐˜€๐˜๐—ฒ๐—บ ๐—ช๐—ผ๐—ฟ๐—ธ๐—ณ๐—น๐—ผ๐˜„ ๐—ฃ๐—ฎ๐˜๐˜๐—ฒ๐—ฟ๐—ป๐˜€ as an ๐—”๐—œ ๐—˜๐—ป๐—ด๐—ถ๐—ป๐—ฒ๐—ฒ๐—ฟ. If you are building Agentic Systems in an Enterprise setting you will soon discover that the simplest workflow patterns work the best and bring the most business value.

You must know these ๐—”๐—ด๐—ฒ๐—ป๐˜๐—ถ๐—ฐ ๐—ฆ๐˜†๐˜€๐˜๐—ฒ๐—บ ๐—ช๐—ผ๐—ฟ๐—ธ๐—ณ๐—น๐—ผ๐˜„ ๐—ฃ๐—ฎ๐˜๐˜๐—ฒ๐—ฟ๐—ป๐˜€ as an ๐—”๐—œ ๐—˜๐—ป๐—ด๐—ถ๐—ป๐—ฒ๐—ฒ๐—ฟ.

If you are building Agentic Systems in an Enterprise setting you will soon discover that the simplest workflow patterns work the best and bring the most business value.