Pinora (@pinorax) 's Twitter Profile
Pinora

@pinorax

Cybersecurity Shenanigans' na Kadhalika๐Ÿคญ

ID: 1372780012475015170

calendar_today19-03-2021 05:20:58

54 Tweet

9 Followers

149 Following

TryHackMe (@realtryhackme) 's Twitter Profile Photo

Preparing for a #SOCAnalyst interview? Read our latest guide as we dive into our expert tips for a Level 1 SOC Analyst interview. Donโ€™t forget, you can also brush up on your skills with our SOC Level 1 learning path! ๐Ÿ˜‰ Read more: hubs.la/Q01PtVQr0

Preparing for a #SOCAnalyst interview?

Read our latest guide as we dive into our expert tips for a Level 1 SOC Analyst interview. Donโ€™t forget, you can also brush up on your skills with our SOC Level 1 learning path! ๐Ÿ˜‰

Read more: hubs.la/Q01PtVQr0
Cyberwarzone.com - News, Tips, Guides And More (@cyberwarzonecom) 's Twitter Profile Photo

30 Search Engines for Cybersecurity Researchers: 1. AlienVault โ€” An extensive threat intelligence feed for cybersecurity researchers. 2. Binary Edge โ€” Scans the internet to gather threat intelligence data. 3. Censys โ€” Assesses the attack surface of internet-connected devices. 4.

30 Search Engines for Cybersecurity Researchers:

1. AlienVault โ€” An extensive threat intelligence feed for cybersecurity researchers.
2. Binary Edge โ€” Scans the internet to gather threat intelligence data.
3. Censys โ€” Assesses the attack surface of internet-connected devices.
4.
Matt Johansen (@mattjay) 's Twitter Profile Photo

๐Ÿšจ Wow. Imagine waking up, and your entire company's online presence is erased. Email. Domain. Documents. Databases. Gone Poof. Well, that's what happened to customers of two hosting providers this week. ๐Ÿ‘‡

Devansh (โšก, ๐Ÿฅท) (@0xasm0d3us) 's Twitter Profile Photo

DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making GitHub: github.com/devanshbatham/โ€ฆ #cybersecurity

DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making

GitHub: github.com/devanshbatham/โ€ฆ

#cybersecurity
Haifei Li (@haifeili) 's Twitter Profile Photo

So just this week I learned: 1. Chrome is โ€œdata miningโ€ userโ€™s browsing history. 2. Microsoft internal systems got hacked for like two years long. 3. iPhone users got hacked by zero-click zero-day exploit, again. 4. Someone is hacking security researchers with GitHub tools. ๐Ÿ˜ฌ

DFIR Diva (@dfirdiva) 's Twitter Profile Photo

Hack the Box has a new SOC Analyst Job Role path on HTB Academy! Includes: -Digital Forensics -Incident Handling & Reporting -Malware Analysis -Threat Hunting -Investigating with Splunk -Network Traffic Analysis and more! affiliate.hackthebox.com/dfirdiva-3 (affiliate link)

Hack the Box has a new SOC Analyst Job Role path on HTB Academy!

Includes:

-Digital Forensics

-Incident Handling & Reporting

-Malware Analysis

-Threat Hunting

-Investigating with Splunk

-Network Traffic Analysis and more!

affiliate.hackthebox.com/dfirdiva-3 (affiliate link)
Ankita Dhakar (@expankita) 's Twitter Profile Photo

Hello hackers ๐Ÿฅท๐Ÿพ Are you good at finding bugs but struggling to create a stellar pentest report? ๐Ÿ› Today, I'm sharing with you all a comprehensive collection of public pentest reports. A goldmine!!๐Ÿ“ Read thread๐Ÿ‘‡๐Ÿงต #Cybersecurity #Pentest

Control (@leo_documentary) 's Twitter Profile Photo

Dear CyberSecurity professionals please drop your favorite CyberSecurity YouTube channel or course for beginners. All the beginners gather here and come an collect free resources

The Cyber Twins ๐Ÿ‘ฅ๏ธ (@thecybertwins) 's Twitter Profile Photo

You can't secure yourself if you don't know what you have. You can't secure yourself if you don't understand all your external factors. Combine those 2 and you shall build a great cybersecurity defense. So, what are you waiting for? ๐Ÿ“ฉ

You can't secure yourself if you don't know what you have.

You can't secure yourself if you don't understand all your external factors.

Combine those 2 and you shall build a great cybersecurity defense.

So, what are you waiting for? ๐Ÿ“ฉ
wealthyprimate (@wealthyprimate) 's Twitter Profile Photo

๐Ÿš€Everything you need to know to become a SOC Analyst๐Ÿ‘‡ FOR FREE! I studied every expensive SOC Analyst training program I could find to make this๐Ÿ‘‡ ๐Ÿ•ต๏ธThe Ultimate FREE Career Path: SOC Analyst Edition This is easily a $1,000+ SOC Analyst training program for FREE! This

๐Ÿš€Everything you need to know to become a SOC Analyst๐Ÿ‘‡

FOR FREE!

I studied every expensive SOC Analyst training program I could find to make this๐Ÿ‘‡

๐Ÿ•ต๏ธThe Ultimate FREE Career Path: SOC Analyst Edition

This is easily a $1,000+ SOC Analyst training program for FREE!

This
The SecOps Group (@thesecopsgroup) 's Twitter Profile Photo

๐ŸŽ–๏ธ FREE Certified Network Security Practitioner (CNSP) Exam!๐ŸŽ–๏ธ **No discount code needed** Here's how to claim your offer: 1๏ธโƒฃ Like and share this post. 2๏ธโƒฃ Fill out this Google form:ย ๐Ÿ“docs.google.com/forms/d/e/1FAIโ€ฆ 3๏ธโƒฃ After submitting the form, we will email you the exam details. ๐Ÿ’ฏ

๐ŸŽ–๏ธ FREE Certified Network Security Practitioner (CNSP) Exam!๐ŸŽ–๏ธ

**No discount code needed**

Here's how to claim your offer:
1๏ธโƒฃ Like and share this post.
2๏ธโƒฃ Fill out this Google form:ย ๐Ÿ“docs.google.com/forms/d/e/1FAIโ€ฆ
3๏ธโƒฃ After submitting the form, we will email you the exam details. ๐Ÿ’ฏ
The SecOps Group (@thesecopsgroup) 's Twitter Profile Photo

๐Ÿ’œ๐ŸŽ‰ ๐—ช๐—ผ๐—บ๐—ฒ๐—ป'๐˜€ ๐——๐—ฎ๐˜† ๐—ฆ๐—ฝ๐—ฒ๐—ฐ๐—ถ๐—ฎ๐—น ๐—š๐—ถ๐˜ƒ๐—ฒ๐—ฎ๐˜„๐—ฎ๐˜† | ๐—™๐—ฅ๐—˜๐—˜ ๐—–๐—ฒ๐—ฟ๐˜๐—ถ๐—ณ๐—ถ๐—ฒ๐—ฑ ๐—•๐—น๐˜‚๐—ฒ ๐—ง๐—ฒ๐—ฎ๐—บ ๐—ฃ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐˜๐—ถ๐—ผ๐—ป๐—ฒ๐—ฟ (๐—–๐—•๐—ง๐—ฃ) ๐—˜๐˜…๐—ฎ๐—บ!ย ๐ŸŽ‰๐Ÿ’œ For a limited time, The SecOps Group is offering ๐—™๐—ฅ๐—˜๐—˜ ๐—ฎ๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€ ๐˜๐—ผ ๐—–๐—ฒ๐—ฟ๐˜๐—ถ๐—ณ๐—ถ๐—ฒ๐—ฑ ๐—•๐—น๐˜‚๐—ฒ ๐—ง๐—ฒ๐—ฎ๐—บ

๐Ÿ’œ๐ŸŽ‰ ๐—ช๐—ผ๐—บ๐—ฒ๐—ป'๐˜€ ๐——๐—ฎ๐˜† ๐—ฆ๐—ฝ๐—ฒ๐—ฐ๐—ถ๐—ฎ๐—น ๐—š๐—ถ๐˜ƒ๐—ฒ๐—ฎ๐˜„๐—ฎ๐˜† | ๐—™๐—ฅ๐—˜๐—˜ ๐—–๐—ฒ๐—ฟ๐˜๐—ถ๐—ณ๐—ถ๐—ฒ๐—ฑ ๐—•๐—น๐˜‚๐—ฒ ๐—ง๐—ฒ๐—ฎ๐—บ ๐—ฃ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐˜๐—ถ๐—ผ๐—ป๐—ฒ๐—ฟ (๐—–๐—•๐—ง๐—ฃ) ๐—˜๐˜…๐—ฎ๐—บ!ย ๐ŸŽ‰๐Ÿ’œ

For a limited time, The SecOps Group is offering ๐—™๐—ฅ๐—˜๐—˜ ๐—ฎ๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€ ๐˜๐—ผ ๐—–๐—ฒ๐—ฟ๐˜๐—ถ๐—ณ๐—ถ๐—ฒ๐—ฑ ๐—•๐—น๐˜‚๐—ฒ ๐—ง๐—ฒ๐—ฎ๐—บ