Tarique (@thatguy9869) 's Twitter Profile
Tarique

@thatguy9869

technology enthusiasts,infoSec professional, looking forward to CISSP,GIASEC,cloudSecurity speciali...
rt are not endorsement.

ID: 1047459769538109440

calendar_today03-10-2018 12:14:04

11,11K Tweet

164 Followers

943 Following

Marc Menninger (@marcmenninger) 's Twitter Profile Photo

🚨 Ransomware Isn’t What You Think - And It’s Bleeding Businesses Dry Think you’ve got ransomware figured out? Think again. It’s evolving faster than defenses, raking in billions, and crippling organizations daily. One slip - a single click or overlooked setting - and your

Faiza Chenti Adam | CyberBuddie (@cyberchenti) 's Twitter Profile Photo

What is the difference between the SOC and DevSecOps Security Operations Center (SOC): A SOC is a centralized unit that deals with security issues.This team is responsible for monitoring, detecting, preventing, analyzing, and responding to cybersecurity incidents. The main goal

Speaker 25 (@rodtrent) 's Twitter Profile Photo

Level Up Your App Governance With MDA Workshop Series techcommunity.microsoft.com/blog/microsoft… #MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

Security Trybe (@securitytrybe) 's Twitter Profile Photo

TCP Three-Way Handshake: The three-way handshake is a three-step process to establish a reliable connection: 1.SYN: Client sends a synchronization request. 2.SYN-ACK: Server acknowledges and responds with its own SYN. 3.ACK: Client acknowledges the server’s SYN. Connection

TCP Three-Way Handshake:

The three-way handshake is a three-step process to establish a reliable connection:

1.SYN: Client sends a synchronization request.

2.SYN-ACK: Server acknowledges and responds with its own SYN.

3.ACK: Client acknowledges the server’s SYN. 

Connection
Tech Enthusiast (@ctprecious) 's Twitter Profile Photo

Security Awareness - Always verify the URL before entering your credentials - Check if the domain name is correct - Look for the padlock icon and HTTPS in the address bar - Be wary of unsolicited communications, asking you for your personal information #Cybersecurity

Webenstein |SOC Analyst (@cyber_webstein) 's Twitter Profile Photo

Want to Work in a SOC? 🚩 Avoid These Red Flag Mistakes" Starting your journey into the Security Operations Center (SOC) world? That’s a solid career moveβ€”but many beginners make mistakes that could hold them back. Here are the biggest red flags 🚩

Dan Nanni (@xmodulo) 's Twitter Profile Photo

Tcpdump is a powerful command-line tool for capturing and analyzing network traffic on Linux. Here are useful tcpdump command examples πŸ˜ŽπŸ‘‡ #opensource Find pdf books with all my #Linux and #cybersecurity related infographics at study-notes.org

Tcpdump is a powerful command-line tool for capturing and analyzing network traffic on Linux.  Here are useful tcpdump command examples πŸ˜ŽπŸ‘‡ #opensource 

Find pdf books with all my #Linux and #cybersecurity related infographics at study-notes.org
LetsDefend (@letsdefendio) 's Twitter Profile Photo

⚠️ New SOC Alert: Possible ICMP Tunneling Detected Attackers use ICMP tunneling to bypass firewalls by hiding data in ping packets, enabling covert data transfer or remote access. πŸ™ Role: Incident Responder πŸ”Ή Type: C2 πŸ”’ Event ID: 221 πŸ’ͺ Difficulty: Medium

⚠️ New SOC Alert: Possible ICMP Tunneling Detected 

Attackers use ICMP tunneling to bypass firewalls by hiding data in ping packets, enabling covert data transfer or remote access. 

πŸ™ Role: Incident Responder
πŸ”Ή Type: C2
πŸ”’ Event ID: 221
πŸ’ͺ Difficulty: Medium
C-DAC India (@cdacindia) 's Twitter Profile Photo

Exciting Paid Internship Opportunity with MeitY! πŸš€ The Ministry of Electronics & IT has launched a unique Work-Based Learning (WBL) Paid #Internship Programme designed to provide invaluable experience for candidates from SC, ST, Women, and EWS categories. This incredible scheme offers a chance

Exciting Paid Internship Opportunity with MeitY! πŸš€

The <a href="/GoI_MeitY/">Ministry of Electronics & IT</a>  has launched a unique Work-Based Learning (WBL) Paid #Internship Programme designed to provide invaluable experience for candidates from SC, ST, Women, and EWS categories.

This incredible scheme offers a chance
Microsoft Edge Dev (@msedgedev) 's Twitter Profile Photo

Secure password deployment is now generally available ⭐ Now it's easier to deploy encrypted shared passwords, limit unauthorized access, and boost organizational security. πŸ” Try it today in the Edge management service: msft.it/6019SqqaF

Secure password deployment is now generally available ⭐

Now it's easier to deploy encrypted shared passwords, limit unauthorized access, and boost organizational security. 

πŸ” Try it today in the Edge management service: msft.it/6019SqqaF
Dele (@delelearnstech) 's Twitter Profile Photo

The OSI Model! 7 Layers, 3 Protocols Each: 1️⃣ Physical: Ethernet, DSL, USB 2️⃣ Data Link: MAC, ARP, PPP 3️⃣ Network: IP, ICMP, IGMP 4️⃣ Transport: TCP, UDP, SCTP 5️⃣ Session: NetBIOS, PPTP, SMB 6️⃣ Presentation: SSL/TLS, JPEG, ASCII 7️⃣ Application: HTTP, DNS, FTP Master this stack,