Dr Gerhard Knecht, PhD (@gerhardknecht) 's Twitter Profile
Dr Gerhard Knecht, PhD

@gerhardknecht

Cybersec. & Audit VP, Global CISO, Global Head MSS, Prof. Speaker, TV appearance, Top 10 UK security personality 2010, Compliance guru, AI, Followback Security.

ID: 1036715474262941698

calendar_today03-09-2018 20:40:05

1,1K Tweet

13,13K Followers

11,11K Following

vx-underground (@vxunderground) 's Twitter Profile Photo

Today Recorded Future released a research paper on using malware infostealer logs to identify CSAM consumers. RecordedFuture identified over 3,000 individuals purchasing CSAM. All users were reported to their respective law enforcement agency. recordedfuture.com/caught-in-the-…

Zach Vorhies / Google Whistleblower (@perpetualmaniac) 's Twitter Profile Photo

Crowdstrike Analysis: It was a NULL pointer from the memory unsafe C++ language. Since I am a professional C++ programmer, let me decode this stack trace dump for you.

Crowdstrike Analysis:

It was a NULL pointer from the memory unsafe C++ language.

Since I am a professional C++ programmer, let me decode this stack trace dump for you.
Zach Vorhies / Google Whistleblower (@perpetualmaniac) 's Twitter Profile Photo

Update: Crowdstrike came out and released a technical report confirming my analysis. They were reading in a bad data file and attempting to access invalid memory. This global crash was a two-part bomb. The detonator apparently, was NOT new.. it was PRE-INSTALLED. /1

Dr Gerhard Knecht, PhD (@gerhardknecht) 's Twitter Profile Photo

Why does it take Netanyahu to tell us how dangerous hackers can be? Why does it take Israel to take the lead? Why can’t we control the internet, instead of delegating this to Israel?

Dr Gerhard Knecht, PhD (@gerhardknecht) 's Twitter Profile Photo

During a conference call the CEO was deep-faked. One employee had an idea. He asked “what book did I recommend to you”? This question stopped the fraud. Be vigilant! Prepare such questions. Agree on code words.

During a conference call the CEO was deep-faked. One employee had an idea. He asked “what book did I recommend to you”?

This question stopped the fraud. 

Be vigilant! Prepare such questions. Agree on code words.
Dr Gerhard Knecht, PhD (@gerhardknecht) 's Twitter Profile Photo

The job market evolves. I recommend you use AI to tailor your CV/Resume. I often get job applications that would have benefitted from “restructuring”.

Dr Gerhard Knecht, PhD (@gerhardknecht) 's Twitter Profile Photo

Secure Software? Starting from the early development stages, your team should consider what measures to apply against different threats, including malicious reverse engineering. Include fake code to throw off spies. apriorit.com/dev-blog/367-a…

Dr Gerhard Knecht, PhD (@gerhardknecht) 's Twitter Profile Photo

Your executives don’t want to increase the information security budget? Show them this trick to fool a smart phone finger print reader.

Hacking Articles (@hackinarticles) 's Twitter Profile Photo

HTTP Status #infosec #cybersecurity #cybersecuritytips #pentesting #redteam #informationsecurity #CyberSec #networking #networksecurity #infosecurity #cyberattacks #security #linux #cybersecurityawareness #bugbounty #bugbountytips

HTTP Status

#infosec #cybersecurity #cybersecuritytips #pentesting #redteam #informationsecurity #CyberSec #networking #networksecurity #infosecurity #cyberattacks #security #linux #cybersecurityawareness #bugbounty #bugbountytips
Dr Gerhard Knecht, PhD (@gerhardknecht) 's Twitter Profile Photo

We are going down the route of banning each other’s cars, phones and even alarm systems. Why? Because we, us security professionals, we have failed. Where is a security architecture that guarantees security? “We cannot find anything wrong” is just not enough. We failed.

We are going down the route of banning each other’s cars, phones and even alarm systems. 

Why?

Because we, us security professionals, we have failed.

Where is a security architecture that guarantees security?

“We cannot find anything wrong” is just not enough. 

We failed.