emil(@emil_no) 's Twitter Profileg
emil

@emil_no

code & infosec

ID:91578530

calendar_today21-11-2009 14:11:10

8,4K Tweets

1,4K Followers

4,9K Following

Colin Percival(@cperciva) 's Twitter Profile Photo

For the record, I pointed out this issue to the Amazon S3 team in 2006. They recommended keeping my S3 bucket names secret.

account_circle
Scott Piper(@0xdabbad00) 's Twitter Profile Photo

Last night a blog post showed that AWS charges for access denieds on S3 buckets, resulting in one person being charged over $1300 for 100M requests against a private S3 bucket in one day. I believe the only solution is for AWS to change their pricing.🧵1/6 medium.com/@maciej.pocwie…

account_circle
Daniel Grzelak(@dagrz) 's Twitter Profile Photo

ChatGPT and its ilk are making people worse at writing, in a more insidious way than social media or text messaging ever did.

Woah Daniel, how can that be true? What you've heard and seen is that LLMs lift the base capability of a below-average knowledge worker. However, I'm…

account_circle
Daniel Cuthbert(@dcuthbert) 's Twitter Profile Photo

Strap in, we's going on a ride, a static analysis ride. I recently came across this paper, which looked at a wide variety of SAST tools against a number of Java apps.

Java being the choice of enterprise, and often not the best Java approaches out there, so it's a good choice

Strap in, we's going on a ride, a static analysis ride. I recently came across this paper, which looked at a wide variety of SAST tools against a number of Java apps. Java being the choice of enterprise, and often not the best Java approaches out there, so it's a good choice
account_circle
Heather Adkins - Ꜻ - Spes consilium non est(@argvee) 's Twitter Profile Photo

I’m looking forward to Device Bound Session Cookies which would have a meaningful impact on the online security of billions of people. blog.chromium.org/2024/04/fighti…

account_circle
Doyensec(@Doyensec) 's Twitter Profile Photo

Our latest research looked at what really matters to teams in Software Composition Analysis ( ) - comparing 3 popular tools. Which is best for you? Read the post! blog.doyensec.com/2024/03/14/sup…

Our latest research looked at what really matters to #productsecurity teams in Software Composition Analysis (#supplychainsecurity) - comparing 3 popular tools. Which is best for you? Read the post! blog.doyensec.com/2024/03/14/sup… #doyensec #security #dependabot #snyk #semgrep #infosec
account_circle
cr0 @ PurpleLabs(@cr0nym) 's Twitter Profile Photo

Awesome paper about Linux offensive/defensive eBPF internals. Make no mistake, the future of advanced Linux attacks, container escapes and rootkits is eBPF. Importantly, all Linux EDRs are also based on eBPF ^^ double-edged sword as I mentioned in the past usenix.org/system/files/u…

account_circle
Halvar Flake(@halvarflake) 's Twitter Profile Photo

I am *extremely* happy to report that Elastic has filed a ticket to donate the universal profiling agent (the multi-runtime frictionless eBPF profiler formerly known as prodfiler) as project to OpenTelemetry. This is of course still pending TC review and many other step, but...

account_circle
emil(@emil_no) 's Twitter Profile Photo

One time a SaaS app implemented SSO while still requiring us to manually create all users via the UI. Infuriating !

account_circle