SayHelloMrRoboto (@hellomrroboto) 's Twitter Profile
SayHelloMrRoboto

@hellomrroboto

ID: 3610528692

calendar_today19-09-2015 00:51:39

146 Tweet

44 Takipçi

489 Takip Edilen

Santiago (@svpino) 's Twitter Profile Photo

Data Engineering is incredibly underrated, yet people are making fortunes building data pipelines. I can't think of anything more important than data for the next 20 years. Here is a great book: packt.link/SfOW1 These skills will make you irreplaceable.

Data Engineering is incredibly underrated, yet people are making fortunes building data pipelines.

I can't think of anything more important than data for the next 20 years.

Here is a great book: packt.link/SfOW1

These skills will make you irreplaceable.
mRr3b00t (@uk_daniel_card) 's Twitter Profile Photo

The most common kill chain used during a ransomware incident typically involves several stages, which may include: 1. **Reconnaissance**: Attackers gather information about the target network, such as identifying vulnerabilities, employee email addresses, or system

Santiago (@svpino) 's Twitter Profile Photo

I took this Deep Learning course. It's from UC Berkeley. Amazing how you can get free education from top universities in the world! The course is great. I love it's organized in small chunks. I watch it all during my morning walks. Here is the link: youtube.com/playlist?list=…

I took this Deep Learning course.

It's from UC Berkeley. Amazing how you can get free education from top universities in the world!

The course is great. I love it's organized in small chunks. I watch it all during my morning walks.

Here is the link: youtube.com/playlist?list=…
Santiago (@svpino) 's Twitter Profile Photo

Building a model is easy. Keeping the model working is the hard part. Unfortunately, we don't talk enough about what happens after deploying a model. The work doesn't end when you deploy. It begins. Your model must deal with edge cases, feedback loops, and drift. Your model

HalcyonAI (@halcyonai) 's Twitter Profile Photo

#BlackCat / #ALPHV Claims #Attack on Trans-Northern Pipelines The consequences of failing to defend #Linux systems could prove catastrophic, but we can reduce risk of a major disruption by preparing now... bit.ly/3SXEMV4 #cybersecurity #infosec #security #ransomware

#BlackCat / #ALPHV Claims #Attack on Trans-Northern Pipelines

The consequences of failing to defend #Linux systems could prove catastrophic, but we can reduce risk of a major disruption by preparing now...

bit.ly/3SXEMV4

#cybersecurity #infosec #security #ransomware
HalcyonAI (@halcyonai) 's Twitter Profile Photo

Ransomware Payments Broke $1 Billion Record in 2023 While the huge losses from #ransomware #attacks reported are staggering, it’s the increasing #threat to human life that should be of greatest concern... bit.ly/49nmhPp #cybersecurity #infosec #security

Ransomware Payments Broke $1 Billion Record in 2023

While the huge losses from #ransomware #attacks reported are staggering, it’s the increasing #threat to human life that should be of greatest concern...

bit.ly/49nmhPp

#cybersecurity #infosec #security
Santiago (@svpino) 's Twitter Profile Photo

25 algorithms every programmer should know: Let's start with my top favorite 10. If nothing else, you should read about these algorithms and have a good idea of how they work: 1. Linear search to find an element in a list 2. Binary search to find an element on a sorted list 3.

Santiago (@svpino) 's Twitter Profile Photo

Traditional education is in trouble. The best education in the world is no longer from academic institutions but from practitioners with decades of experience at a fraction of the cost. If you are a data scientist or software developer, this is the best program for learning how

Traditional education is in trouble.

The best education in the world is no longer from academic institutions but from practitioners with decades of experience at a fraction of the cost.

If you are a data scientist or software developer, this is the best program for learning how
HalcyonAI (@halcyonai) 's Twitter Profile Photo

Ransomware on the Move: #BlackBasta, #UndergroundTeam, #SpaceBears, #LockBit HalcyonAI publishes a #RaaS and #extortion guide, Power Rankings: Ransomware Malicious Quartile. Here's #ransomware on the move last week... ransomwareattacks.halcyon.ai/news/ransomwar… #cybersecurity #infosec #security

Ransomware on the Move: #BlackBasta, #UndergroundTeam, #SpaceBears, #LockBit

<a href="/HalcyonAi/">HalcyonAI</a> publishes a #RaaS and #extortion guide, Power Rankings: Ransomware Malicious Quartile. Here's #ransomware on the move last week...

ransomwareattacks.halcyon.ai/news/ransomwar…

#cybersecurity #infosec #security
Manish Kumar Shah (@manishkumar_dev) 's Twitter Profile Photo

𝟭𝟱 𝗕𝗲𝘀𝘁 𝗙𝗥𝗘𝗘 𝗦𝗤𝗟 𝗖𝗼𝘂𝗿𝘀𝗲𝘀 𝘄𝗶𝘁𝗵 𝗖𝗲𝗿𝘁𝗶𝗳𝗶𝗰𝗮𝘁𝗶𝗼𝗻 𝗢𝗻𝗹𝗶𝗻𝗲 (𝟮𝟬𝟮𝟰) 1. SQL for Data Science imp.i384100.net/oqJLJE 2. Introduction to Structured Query Language (SQL) imp.i384100.net/zNObOW 3. Databases and SQL for Data Science with Python

𝟭𝟱 𝗕𝗲𝘀𝘁 𝗙𝗥𝗘𝗘 𝗦𝗤𝗟 𝗖𝗼𝘂𝗿𝘀𝗲𝘀 𝘄𝗶𝘁𝗵 𝗖𝗲𝗿𝘁𝗶𝗳𝗶𝗰𝗮𝘁𝗶𝗼𝗻 𝗢𝗻𝗹𝗶𝗻𝗲 (𝟮𝟬𝟮𝟰)

1. SQL for Data Science
imp.i384100.net/oqJLJE

2. Introduction to Structured Query Language (SQL)
imp.i384100.net/zNObOW

3. Databases and SQL for Data Science with Python
Santiago (@svpino) 's Twitter Profile Photo

Really good book: • Python + Langchain + Streamlit • Architecture and components of LLMs • Fine-tuning • Multi-modal applications • Conversational and recommendation applications • Agents packt.link/04xiy

Really good book:

• Python + Langchain + Streamlit
• Architecture and components of LLMs
• Fine-tuning
• Multi-modal applications
• Conversational and recommendation applications
• Agents

packt.link/04xiy
HalcyonAI (@halcyonai) 's Twitter Profile Photo

Webinar: Defend, Detect, & Defeat - every week we offer a LIVE DEMO of the Halcyon Anti-Ransomware Platform - join us in-person and ask questions or watch one on-demand: bit.ly/3E95K7j We'll show you how HalcyonAI minimizes downtime and increases operational

Webinar: Defend, Detect, &amp; Defeat - every week we offer a LIVE DEMO of the Halcyon Anti-Ransomware Platform - join us in-person and ask questions or watch one on-demand:

bit.ly/3E95K7j

We'll show you how <a href="/HalcyonAi/">HalcyonAI</a> minimizes downtime and increases operational
HalcyonAI (@halcyonai) 's Twitter Profile Photo

Halcyon U.K. Partner Program Expands - Distology Named Key Channel Partner in Region HalcyonAI has launched the expanded Halcyon Revolution Partner Program in the United Kingdom (U.K.) as a key part of its strategy to accelerate global growth... halcyon.ai/blog/halcyon-u…

Halcyon U.K. Partner Program Expands - Distology Named Key Channel Partner in Region

<a href="/HalcyonAi/">HalcyonAI</a>  has launched the expanded Halcyon Revolution Partner Program in the United Kingdom (U.K.) as a key part of its strategy to accelerate global growth...

halcyon.ai/blog/halcyon-u…
HalcyonAI (@halcyonai) 's Twitter Profile Photo

Webinar: Every month get the latest #ransomware news and analysis from the HalcyonAI RISE Team (Research, Intelligence, Services, Engineering). Join us for the next Threat Insights webinar Jun 10, 2025 10:00 AM PT / 1:00 PM ET (or watch on-demand here): bit.ly/4knbVEQ

Webinar: Every month get the latest #ransomware news and analysis from the <a href="/HalcyonAi/">HalcyonAI</a> RISE Team (Research, Intelligence, Services, Engineering).

Join us for the next Threat Insights webinar Jun 10, 2025 10:00 AM PT / 1:00 PM ET (or watch on-demand here): bit.ly/4knbVEQ
Paul Lopez (@lopezunwired) 's Twitter Profile Photo

Landmark Admin and Young Consulting have reported data breaches affecting 2.6 million individuals. Landmark's breach involved a ransomware attack through stolen VPN credentials, compromising 1.6 million people's sensitive personal data. Young… securityweek.com/2-6-million-im…

NullSecX (@nullsecurityx) 's Twitter Profile Photo

🧠 CORS Misconfig → Credential Theft 1️⃣ Server: Access-Control-Allow-Origin: * + Allow-Credentials: true 2️⃣ Attacker uses fetch(..., {credentials: "include"}) 3️⃣ Browser sends victim’s cookies cross-origin 4️⃣ Sensitive data exfiltrated 🎯 Full session hijack #bugbounty #xss

🧠 CORS Misconfig → Credential Theft
1️⃣ Server: Access-Control-Allow-Origin: * + Allow-Credentials: true
2️⃣ Attacker uses fetch(..., {credentials: "include"})
3️⃣ Browser sends victim’s cookies cross-origin
4️⃣ Sensitive data exfiltrated
🎯 Full session hijack
#bugbounty #xss
HalcyonAI (@halcyonai) 's Twitter Profile Photo

Webinar: Defend, Detect & Defeat Ransomware - Live Demo of the Halcyon Anti-Ransomware Platform - June 18, 2025 9:00am PT / 12:00pm ET Join live or watch on-demand here: bit.ly/3E95K7j Our experts will guide you through: - Advanced Ransomware #Detection, #Prevention

Webinar: Defend, Detect &amp; Defeat Ransomware - Live Demo of the Halcyon Anti-Ransomware Platform - June 18, 2025 9:00am PT / 12:00pm ET

Join live or watch on-demand here: bit.ly/3E95K7j

Our experts will guide you through: 

- Advanced Ransomware #Detection, #Prevention