pavan (@619_pavan) 's Twitter Profile
pavan

@619_pavan

Cyber Security Professional

ID: 1150232911

calendar_today05-02-2013 07:21:44

38 Tweet

29 Followers

515 Following

DynamiteLab (@dynamitelab) 's Twitter Profile Photo

There is so much to learn from malware traffic! #pcap #netsec #Malware #cerber packettotal.com/app/search?q=c… #emotet packettotal.com/app/search?q=e… #gh0st packettotal.com/app/search?q=g… #kovter packettotal.com/app/search?q=k… #mirai packettotal.com/app/search?q=m… #nanocore packettotal.com/app/search?q=n…

KTR (@ktrbrs) 's Twitter Profile Photo

Govt of India’s Ministry of Jal Shakti reports; Telangana is the leader with 98.31% tap connections providing potable drinking water under the pioneering #MissionBhagiratha 🚰 Kudos to Hon’ble CM Sri KCR’s vision & diligent efforts of team RWS on this fabulous achievement 👍👏

Govt of India’s Ministry of Jal Shakti reports; Telangana is the leader with 98.31% tap connections providing potable drinking water under the pioneering #MissionBhagiratha 🚰 

Kudos to Hon’ble CM Sri KCR’s vision & diligent efforts of team RWS on this fabulous achievement 👍👏
Jagan Patimeedi (@jaganbrs) 's Twitter Profile Photo

An idea evolved in a Statesman's mind is accepted & implemented across the nation benefiting millions of farmers #KCR #RYTHUBANDHU has become a slogan of development for farmers. When such slogans become a Nations pride you become praiseworthy to it @KTRTRS Singireddy Niranjan Reddy

Christophe Tafani-Dereeper (@christophetd) 's Twitter Profile Photo

The AWS Instance Metadata service strikes again! Privilege Escalation in AWS Elastic Kubernetes Service by compromising the instance role of worker nodes blog.christophetd.fr/privilege-esca… ... or how a single compromised pod in an EKS cluster can have serious account-wide consequences.

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

UPDATE: Cisco updated their advisory with a second actively exploited zero-day vulnerability (CVE-2020-3569) impacting the company's IOS XR carrier-grade routers. bleepingcomputer.com/news/security/…

James (@james_inthe_box) 's Twitter Profile Photo

A csv formatted list of #malspam campaigns that crossed my path in August to include subject names, hashes, c2's and email exfils. gist.github.com/silence-is-bes… #retrohunt

A csv formatted list of #malspam campaigns that crossed my path in August to include subject names, hashes, c2's and email exfils.

gist.github.com/silence-is-bes…

#retrohunt
Telangana CMO (@telanganacmo) 's Twitter Profile Photo

CM Sri KCR gave out salient features of the proposed revenue reforms while introducing the relevant Bills in the Legislative Assembly today. The reforms aim at digitisation of land records and land transactions for ease of revenue administration.

CM Sri KCR gave out salient features of the proposed revenue reforms while introducing the relevant Bills in the Legislative Assembly today. The reforms aim at digitisation of land records and land transactions for ease of revenue administration.
NULLCON (@nullcon) 's Twitter Profile Photo

Protocol Reverse Engineering (PRE) is not only useful for offensive purposes but also used by modern Intrusion Detection Systems(IDS) ➡️Join Munawwar for the 4 Day Training to explore PRE & Try to Fuzz the game server ✅bit.ly/3bidenU

Protocol Reverse Engineering (PRE) is not only useful for offensive purposes but also used by modern Intrusion Detection Systems(IDS) 

➡️Join Munawwar for the 4 Day Training to explore PRE & Try to Fuzz the game server

✅bit.ly/3bidenU
John Breth (JB) | CyberInsight® on YouTube (@jbizzle703) 's Twitter Profile Photo

This is a pretty solid list of free cybersecurity tools/feeds/services from Cybersecurity and Infrastructure Security Agency cisa.gov/free-cybersecu… It's also VERY useful for folks looking to get hands on experience with different aspects of cyber without paying for tools.

This is a pretty solid list of free cybersecurity tools/feeds/services from <a href="/CISAgov/">Cybersecurity and Infrastructure Security Agency</a> 

cisa.gov/free-cybersecu…

It's also VERY useful for folks looking to get hands on experience with different aspects of cyber without paying for tools.