Joe (@protectionjoe) 's Twitter Profile
Joe

@protectionjoe

Cybersecurity evangelist since 2011. Promoting and sharing cybersecurity information for all of humankind.

ID: 98743028

calendar_today22-12-2009 23:20:42

1,1K Tweet

1,1K Followers

2,2K Following

Hacking Articles (@hackinarticles) 's Twitter Profile Photo

Structure of Cyber Security #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #infosecurity #cyberattacks #bugbounty #bugbountytips

Structure of Cyber Security

#infosec #cybersecurity #cybersecuritytips  #pentesting #oscp #redteam  #informationsecurity  #cissp #CyberSec #networking #networksecurity #CheatSheet #infosecurity  #cyberattacks #bugbounty #bugbountytips
Dan Nanni (@xmodulo) 's Twitter Profile Photo

Network monitoring involves tracking and analyzing network traffic at OSI layers 2 to 4, providing insight into various communication activities across the network protocol stack Here are #Linux-based network monitoring tools, categorized by the OSI layer they operate on πŸ˜ŽπŸ‘‡

Network monitoring involves tracking and analyzing network traffic at OSI layers 2 to 4, providing insight into various communication activities across the network protocol stack

Here are #Linux-based network monitoring tools, categorized by the OSI layer they operate on πŸ˜ŽπŸ‘‡
Rich Tehrani (@rtehrani) 's Twitter Profile Photo

Pro-Russian hacker group targets critical infrastructure and public services buff.ly/411OXMW #Cybersecurity #cybercrime #cyberattacks #hacker #hack #breach #phishing #dos #ransomware #malware

Pro-Russian hacker group targets critical infrastructure and public services buff.ly/411OXMW

#Cybersecurity #cybercrime #cyberattacks #hacker #hack #breach #phishing #dos #ransomware #malware
LeighTrinity (@leighgi66657535) 's Twitter Profile Photo

To successfully exploit computer systems on your own you MUST understand assembly.πŸ™‚Reverse engineering, exploit development all starts at Assembly code. Over the past year I've been focused on 32 bit assembly and 32 bit exploitation. It's been a wild eye opening ride into