angerman (@hybrid_angerman) 's Twitter Profile
angerman

@hybrid_angerman

Infosec enthousiast since 1999, Threat Intelligence & Hunting, Hacking, Sci-Fi, geek, petrol head, husband, dad, hybrid personality, little weird, loves life.

ID: 1448540593693597696

calendar_today14-10-2021 06:46:31

505 Tweet

71 Followers

293 Following

Wrath Of Gnon (@wrathofgnon) 's Twitter Profile Photo

The summer heat continues. Let's have a look at how the ancient Romans built themselves a cool, breezy, indoor climate and supplied themselves with almost unlimited fresh, filtered, indoor water, miles from wells or aqueducts, at the same time: the impluvium.

The summer heat continues. Let's have a look at how the ancient Romans built themselves a cool, breezy, indoor climate and supplied themselves with almost unlimited fresh, filtered, indoor water, miles from wells or aqueducts, at the same time: the impluvium.
Bits of Freedom (@bitsoffreedom) 's Twitter Profile Photo

Grote winst, niet alleen voor ons, maar voor alle internetgebruikers in Europa. Het systeem waarmee online reclame wordt verkocht moet radicaal op de schop. We zijn ontzettend blij met de uitspraak.

vx-underground (@vxunderground) 's Twitter Profile Photo

LAPSUS$ extortion group claims to have breached @Okta. They have released 8 photos as proof. The photos we are sharing has been edited so no sensitive information or user identities are displayed. Image 1 - 4 attached below.

LAPSUS$ extortion group claims to have breached @Okta. They have released 8 photos as proof.

The photos we are sharing has been edited so no sensitive information or user identities are displayed.

Image 1 - 4 attached below.
Anthropy (anthropy@mastodon.derg.nz) (@dergnz) 's Twitter Profile Photo

Holy shit, okay, so the NL datacenter I work at is getting rid of its 10+ gigantic Oracle and Spectra tape libraries, and I've asked, and I'm actually able to donate one or more to a computer museum or similar place. Does anyone know any Dutch museums that would be interested?

Holy shit, okay, so the NL datacenter I work at is getting rid of its 10+ gigantic Oracle and Spectra tape libraries, and I've asked, and I'm actually able to donate one or more to a computer museum or similar place. Does anyone know any Dutch museums that would be interested?
Follow the Money (@ftm_nl) 's Twitter Profile Photo

Via de lekke beveiliging van een Chinees bedrijf kon een Nederlandse hacker op afstand duizenden zonnepanelen bedienen, en wereldwijd het stroomnet verstoren. In principe zou het bedrijf dit ook kunnen. bit.ly/3z0L8rL?utm_soโ€ฆ

Internet.nl | @internet_nl@mastodon.nl (@internet_nl) 's Twitter Profile Photo

Interesting session by Digital Trust Center on the use of and need for the new security.txt standard, that can be tested for with Internet.nl, during the ONE Conference. Who better to answer questions than the coauthor Ed of the standard itself.

Interesting session by <a href="/DTC_NL/">Digital Trust Center</a> on the use of and need for the new security.txt standard, that can be tested for with Internet.nl, during the <a href="/OneConferenceNL/">ONE Conference</a>. Who better to answer questions than the coauthor <a href="/EdOverflow/">Ed</a> of the standard itself.
Ken Shirriff (@kenshirriff) 's Twitter Profile Photo

The 8086 processor (1978) led to the hugely-popular x86 architecture. Internally, the 8086 uses microcode, running a tiny program for each machine instruction. I'm reverse-engineering the chip from die photos and I can explain exactly how the 8086 microcode engine works.๐Ÿงต

The 8086 processor (1978) led to the hugely-popular x86 architecture. Internally, the 8086 uses microcode, running a tiny program for each machine instruction.
 I'm reverse-engineering the chip from die photos and I can explain exactly how the 8086 microcode engine works.๐Ÿงต
๐—ฅ๐—ผ๐—ป๐—ฎ๐—น๐—ฑ ๐—ฃ๐—ฟ๐—ถ๐—ป๐˜€ ๐Ÿ‡ฟ๐Ÿ‡ฆ (@cryptoron) 's Twitter Profile Photo

Zeer goede paper over de relevantie van cyber in een echte oorlog. Spoiler: die is eigenlijk heel erg beperkt. โ€ฆIf this correlation holds, cyberspace should probably not be seen as a โ€œfifth domainโ€ of warfare equivalent in stature to land, sea, air, and space

Hudson Rock (@rockhudsonrock) 's Twitter Profile Photo

BREAKING: Hudson Rock discovered a credible threat actor is selling 400,000,000 Twitter users data. The private database contains devastating amounts of information including emails and phone numbers of high profile users such as AOC, Kevin O'Leary, Vitalik Buterin & more (1/2).

BREAKING: Hudson Rock discovered a credible threat actor is selling 400,000,000 Twitter users data.

The private database contains devastating amounts of information including emails and phone numbers of high profile users such as AOC, Kevin O'Leary, Vitalik Buterin &amp; more (1/2).
Matt Johansen (@mattjay) 's Twitter Profile Photo

๐Ÿงต THREAD: A federal whistleblower just dropped one of the most disturbing cybersecurity disclosures Iโ€™ve ever read. He's saying DOGE came in, data went out, and Russians started attempting logins with new valid DOGE passwords Media's coverage wasn't detailed enough so I dug

๐Ÿงต THREAD: A federal whistleblower just dropped one of the most disturbing cybersecurity disclosures Iโ€™ve ever read.

He's saying DOGE came in, data went out, and Russians started attempting logins with new valid DOGE passwords

Media's coverage wasn't detailed enough so I dug