Kuldeep Singh (@imkuldeepsingh1) 's Twitter Profile
Kuldeep Singh

@imkuldeepsingh1

Airdrop Security | NFT Security | Crypto | Blockchain Security | #Bitcoin #ETH | IPFS Web- https://kuldeep.crypto

ID: 728075873132290049

calendar_today05-05-2016 04:16:29

2,2K Tweet

351 Takipçi

3,3K Takip Edilen

Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

🚨 First Large-scale Cyberattack Using AI Tools With Minimal Human Input Read more: cybersecuritynews.com/first-large-sc… Chinese government-backed hackers used Anthropic’s Claude Code tool to carry out advanced spying on about thirty targets worldwide, successfully breaking into several

🚨 First Large-scale Cyberattack Using AI Tools With Minimal Human Input 

Read more: cybersecuritynews.com/first-large-sc…

Chinese government-backed hackers used Anthropic’s Claude Code tool to carry out advanced spying on about thirty targets worldwide, successfully breaking into several
LangChain (@langchainai) 's Twitter Profile Photo

🛠️ LangCode: Unified AI CLI Made by the LangChain Community LangCode unifies AI coding assistants into one CLI. Built on LangChain & LangGraph, it features dual agents (ReAct for speed, Deep for complexity), intelligent routing, and safety controls. Check it out on GitHub:

🛠️ LangCode: Unified AI CLI

Made by the LangChain Community

LangCode unifies AI coding assistants into one CLI. Built on LangChain & LangGraph, it features dual agents (ReAct for speed, Deep for complexity), intelligent routing, and safety controls.

Check it out on GitHub:
Kubetools (@kubetools) 's Twitter Profile Photo

Ingress2gateway helps translate Ingress and provider-specific resources (CRDs) to Gateway API resources. Ingress2gateway is managed by the Gateway API SIG-Network subproject. github.com/kubernetes-sig…

K3sDaily (@k3sdaily) 's Twitter Profile Photo

This project allows you to deploy and manage Kubernetes clusters directly on Proxmox VE to create a private Kubernetes cloud platform ➤ ku.bz/3DC5Dtmzj

This project allows you to deploy and manage Kubernetes clusters directly on Proxmox VE to create a private Kubernetes cloud platform

➤ ku.bz/3DC5Dtmzj
Clandestine (@akaclandestine) 's Twitter Profile Photo

GitHub - 0x4m4/hexstrike-ai: HexStrike AI MCP Agents is an advanced MCP server that lets AI agents (Claude, GPT, Copilot, etc.) autonomously run 150+ cybersecurity tools for automated pentesting, vulnerability discovery, bug bounty automation, github.com/0x4m4/hexstrik…

Kubernetes Architect (@k8sarchitect) 's Twitter Profile Photo

Kgateway is a Kubernetes-native ingress controller and API gateway built on Envoy and Gateway API It handles north-south traffic routing, API management with auth/rate limiting, AI/LLM gateway functions, and hybrid app migration ➤ ku.bz/ljZg7vf64

Learnk8s (@learnk8s) 's Twitter Profile Photo

Kagenti is a cloud-native middleware platform for deploying and orchestrating multi-framework AI agents on Kubernetes with standardized REST APIs, dynamic SPIRE-managed identities, and support for A2A and MCP protocols ➜ ku.bz/PtCLJSqjZ

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

📣 Everything defenders need to know about UNC1549: a deep dive analysis of suspected Iran-nexus espionage targeting the aerospace, aviation, and defense industries in the Middle East. Dive into the details: bit.ly/3LLpzFF

📣 Everything defenders need to know about UNC1549: a deep dive analysis of suspected Iran-nexus espionage targeting the aerospace, aviation, and defense industries in the Middle East.

Dive into the details: bit.ly/3LLpzFF
LuemmelSec (@theluemmel) 's Twitter Profile Photo

👻 AD-Ghost ✨ undetectable ✨ unstoppable ✨ unseeable even by DAs ✨ absolutely magical and probably powered by dark wizardry 🧙‍♂️💀 Please don't believe all this AI generated cyber bullshit. github.com/LuemmelSec/AD-…

0b1d1 (@_0b1d1) 's Twitter Profile Photo

🚨 SOC Playbook Complete Phishing Investigation Guide 🚨 🎯 From Inbox to Incident Closure: Mastering Phishing Defense Phishing continues to be the leading initial compromise method in modern cyber breaches 📧Comment PDF for full Guide

🚨 SOC Playbook Complete Phishing Investigation Guide 🚨

🎯 From Inbox to Incident Closure: Mastering Phishing Defense
Phishing continues to be the leading initial compromise method in modern cyber breaches

📧Comment PDF for full Guide