c0rdis (@c0rdis) 's Twitter Profile
c0rdis

@c0rdis

ШΔΠDΣRΣR

ID: 139432860

linkhttps://aan.sh calendar_today02-05-2010 16:00:16

575 Tweet

330 Followers

548 Following

bridgecrew (@bridgecrewio) 's Twitter Profile Photo

.Nimrod Kor's allthetalksconf recording is up! 🥳 Check it out to see the unveiling of AirIAM, our newest open-source project that migrates existing AWS IAM to least-privilege IAM Terraform. youtu.be/nFD0e9BNQRg

.<a href="/KorNimrod/">Nimrod Kor</a>'s <a href="/allthetalksconf/">allthetalksconf</a> recording is up! 🥳

Check it out to see the unveiling of AirIAM, our newest open-source project that migrates existing AWS IAM to least-privilege IAM Terraform. youtu.be/nFD0e9BNQRg
Jon Hencinski (@jhencinski) 's Twitter Profile Photo

We chased an attacker in #AWS and want to share the story. Our blog covers: 🔍 Initial lead w/ #CloudTrail 🕵️ Investigative approach 🤖 Use of orchestration "robots" to respond faster ✅ Steps to improve ☁️ #Mitre ATT&CK Cloud Tactics? 👍 Those too! expel.io/blog/finding-e…

bridgecrew (@bridgecrewio) 's Twitter Profile Photo

We're excited to release TerraGoat, a vulnerable-by-design training tool for #Terraform! 🐐 📑 Read more about why we built TerraGoat: bridge.dev/2XdwAlz ⭐ Check it out on GitHub: bridge.dev/3bLgOUt

We're excited to release TerraGoat, a vulnerable-by-design training tool for #Terraform! 🐐

📑 Read more about why we built TerraGoat: bridge.dev/2XdwAlz
⭐ Check it out on GitHub: bridge.dev/3bLgOUt
Krzysztof (Chris) (@wardleymaps) 's Twitter Profile Photo

I am just watching a great presentation about security & #WardleyMapping by Mario Platt. My notes are here, feel free to add notion.so/kdaniel/Evolut…

Open Security Summit (@opensecsummit) 's Twitter Profile Photo

From the 15th-19th of June 2020, we will be bringing the best security minds together to take our participants on a unique experience. All sessions will be recorded, LIVE streamed and shared : ) To register, head over to …en-security-summit-2020.heysummit.com/checkout/selec…

From the 15th-19th of June 2020, we will be bringing the best security minds together to take our participants on a unique experience.

All sessions will be recorded, LIVE streamed and shared : )

To register, head over to …en-security-summit-2020.heysummit.com/checkout/selec…
briankrebs (@briankrebs) 's Twitter Profile Photo

For 327 days, the impostor site privnotes.com has been stealing traffic/privacy/users from privnote.com, a legit encrypted msg service. Worse: KrebsOnSecurity found privnotes.com also will alter bitcoin addresses in messages. krebsonsecurity.com/2020/06/privno…

For 327 days, the impostor site privnotes.com has been stealing traffic/privacy/users from privnote.com, a legit encrypted msg service. Worse: KrebsOnSecurity found privnotes.com also will alter bitcoin addresses in messages. krebsonsecurity.com/2020/06/privno…
Salahaldin (@salahhasoneh1) 's Twitter Profile Photo

🛡️ Sensitive data leakage using .json 🛡️ #cybersecurity #infosec #ethicalhacking #bugbounty #bugbountytips #bugbountytip

🛡️ Sensitive data leakage using .json 🛡️
 
#cybersecurity #infosec #ethicalhacking #bugbounty #bugbountytips #bugbountytip
Karen Hao (@_karenhao) 's Twitter Profile Photo

Without formal access, a college kid got hold of OpenAI's GPT-3 and created a fake, AI-generated blog under a fake name. Within hours, his first post reached #1 on Hacker News Bot. A case study in how people could (ab)use the model in the future. technologyreview.com/2020/08/14/100…

Phil Venables (@philvenables) 's Twitter Profile Photo

Security Budgets - Supply and Demand Thinking Think of budgeting as a supply & demand problem. Work both sides to make it a risk management exercise. It will bring clarity of thought and illustrates to your business that you are thinking commercially. bit.ly/3joAqlp

Security Budgets - Supply and Demand Thinking

Think of budgeting as a supply &amp; demand problem. Work both sides to make it a risk management exercise. It will bring clarity of thought and illustrates to your business that you are thinking commercially. 

bit.ly/3joAqlp
Sarah Jamie Lewis (@sarahjamielewis) 's Twitter Profile Photo

I'm not that great a chess player, but a pretty good hacker...so after watching The Queen's Gambit I of course put my skills to great use and found a board setup I could give to a chess engine to have it segfault when it tries to search for the next best move... take that

I'm not that great a chess player, but a pretty good hacker...so after watching The Queen's Gambit I of course put my skills to great use and found a board setup I could give to a chess engine to have it segfault when it tries to search for the next best move...

take that
Jake Williams (@malwarejake) 's Twitter Profile Photo

Scenario: Your CEO is worried about supply chain security and tells you to implement a program to "stop us from being hit with another SolarWinds." What *specifically* do you do to secure your software supply chain? Please RT for reach. I'm interested in diverse opinions.

Ming Zhao (@fabiusmercurius) 's Twitter Profile Photo

🕸️Inside the Ransomware Economy🕸️ Ryuk is the biggest Saas unicorn u've never heard of. $150M ARR. 3 yrs old. Maybe it’s taboo to learn business strategy from a cybergang. But the ransomware industry-- from supply chain operations to market microstructures-- is truly genius. 👇

🕸️Inside the Ransomware Economy🕸️

Ryuk is the biggest Saas unicorn u've never heard of.
$150M ARR.
3 yrs old.

Maybe it’s taboo to learn business strategy from a cybergang. But the ransomware industry-- from supply chain operations to market microstructures-- is truly genius.
👇
CyberKnow (@cyberknow20) 's Twitter Profile Photo

#GhostSec claims to have conducted the first ever #ransomwwre attack against an RTU - remote terminal unit used in ICS environments. Allan “Ransomware Sommelier🍷” Liska Robert M. Lee #cybersecurity #infosecurity #infosec #cyber

#GhostSec claims to have conducted the first ever #ransomwwre attack against an RTU - remote terminal unit used in ICS environments.

<a href="/uuallan/">Allan “Ransomware Sommelier🍷” Liska</a> <a href="/RobertMLee/">Robert M. Lee</a>
#cybersecurity #infosecurity #infosec #cyber
Zuk (@ihackbanme) 's Twitter Profile Photo

The recent WhatsApp accounts takeover is simple and genius. This is how it works: You're sleeping. A "hacker" tries to login to your account via WhatsApp. You get a text message with a pincode that says "Do not share this". You don't share it, yet you still get hacked. How?