PK (@pkinsec) 's Twitter Profile
PK

@pkinsec

Pentester | Infosec | Red team

ID: 108071019

calendar_today24-01-2010 18:59:12

293 Tweet

50 Followers

1,1K Following

Hacking Articles (@hackinarticles) 's Twitter Profile Photo

Nmap Cheat Sheet github.com/Ignitetechnolo… #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #infosecurity #cyberattacks #security #linux #databreach #bugbounty #bugbountytips

Nmap Cheat Sheet

github.com/Ignitetechnolo…

#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #infosecurity #cyberattacks #security #linux #databreach  #bugbounty #bugbountytips
Matt Johansen (@mattjay) 's Twitter Profile Photo

🚨 A new vulnerability found in Telegram that can grant access to your camera and microphone. Found by an engineer at Google, reported to Telegram and they haven't addressed it. So now we get a detailed public disclosure! How this works and what it means for your privacy 👇

@marcusfitzsimons.bsky.social Woke Green Socialist (@marcusfitzsimon) 's Twitter Profile Photo

I cannot POSSIBLY be any clearer (as someone who worked in IT managing some of this country's biggest databases) UNDER NO CIRCUMSTANCES SHOULD ANYONE PROVIDE PICTURES OF THEIR PASSPORTS OR DRIVING LICENCES ESPECIALLY NOT to databases outside the GDPR THREAD:

Proton (@protonprivacy) 's Twitter Profile Photo

As it reaches its final stages, the #OnlineSafetyBill fundamentally threatens privacy and freedom of speech in the UK, and lawmakers may have missed their final chance to make meaningful change. Proton will not undermine our encryption or our users' rights, so we plan on

As it reaches its final stages, the #OnlineSafetyBill fundamentally threatens privacy and freedom of speech in the UK, and lawmakers may have missed their final chance to make meaningful change.

Proton will not undermine our encryption or our users' rights, so we plan on
The Hacker News (@thehackersnews) 's Twitter Profile Photo

🔥 Data Leak Alert! #Microsoft accidentally exposed 38TB of private data, including secrets, keys, passwords, and 30K+ internal Teams messages, on AI #GitHub repository due to a security glitch. Read more in this article: thehackernews.com/2023/09/micros… #ArtificialIntelligence #Tech

✞ inversecos (@inversecos) 's Twitter Profile Photo

1\ How to prove an iphone was wiped 🔎👇 #dfir #mobileforensics When a user wipes their phone, it generally results in the creation of a file ".obliterated". This file is located: /private/var/root This isn't enough to identify the timestamp of when the wipe occurred (...cont)

1\ How to prove an iphone was wiped 🔎👇
#dfir #mobileforensics

When a user wipes their phone, it generally results in the creation of a file ".obliterated". This file is located:

/private/var/root

This isn't enough to identify the timestamp of when the wipe occurred (...cont)
John Hammond (@_johnhammond) 's Twitter Profile Photo

Hey folks, big project for me at `var dayjob` — Huntress is hosting a free online CTF, releasing new challenges EVERY SINGLE DAY of October for Cybersecurity Awareness Month😱Malware analysis, DFIR, hacker tradecraft... game starts next Monday 10/2! huntress.ctf.games

Hey folks, big project for me at `var dayjob` —

<a href="/HuntressLabs/">Huntress</a> is hosting a free online CTF, releasing new challenges EVERY SINGLE DAY of October for Cybersecurity Awareness Month😱Malware analysis, DFIR, hacker tradecraft... game starts next Monday 10/2!
huntress.ctf.games
Jean-Michel Besnard (@jmbesnard_maz) 's Twitter Profile Photo

Happy to share a new Active Directory audit tool to the cybersecurity community : AD Miner (aka #Bloodhound on steroids) can help you: ⏩Check more than 40 attack vectors or weaknesses ⏩Uncover most risky control paths ⏩Prioritize and track mitigations efforts

spencer (@techspence) 's Twitter Profile Photo

Active Directory hardening blog post series, like a boss, by Jerry Devore. Posting this so I can reference it later! Disabling NTLMv1 techcommunity.microsoft.com/t5/core-infras…​ ​ Removing SMBv1 techcommunity.microsoft.com/t5/core-infras…​ ​ Enforcing LDAP Signing -techcommunity.microsoft.com/t5/core-infras…​ Enforcing AES for Kerberos

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Microsoft announces deprecation of Windows NTLM authentication - Bill Toulas bleepingcomputer.com/news/microsoft… bleepingcomputer.com/news/microsoft…

Matthew Green is on BlueSky (@matthew_d_green) 's Twitter Profile Photo

So Apple has introduced a new system called “Private Cloud Compute” that allows your phone to offload complex (typically AI) tasks to specialized secure devices in the cloud. I’m still trying to work out what I think about this. So here’s a thread. 1/

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

ASUS warns of critical remote authentication bypass on 7 routers - Bill Toulas bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Fake Google Chrome errors trick you into running malicious PowerShell scripts - Bill Toulas bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

PK (@pkinsec) 's Twitter Profile Photo

Top 5 Car Collaborations #cars #mercedes #porsche #mclaren #bmw #lamborghini #vauxhall #lotus #automotive medium.com/@redsensory/to…

Satya Nadella (@satyanadella) 's Twitter Profile Photo

A couple reflections on the quantum computing breakthrough we just announced... Most of us grew up learning there are three main types of matter that matter: solid, liquid, and gas. Today, that changed. After a nearly 20 year pursuit, we’ve created an entirely new state of

A couple reflections on the quantum computing breakthrough we just announced...

Most of us grew up learning there are three main types of matter that matter: solid, liquid, and gas. Today, that changed.

After a nearly 20 year pursuit, we’ve created an entirely new state of