Tushar R (@_tushar_r) 's Twitter Profile
Tushar R

@_tushar_r

Sr. Product Marketing Manager at Barracuda Networks | Tweets are own opinions only and all that.| A man of various talents, but needs watching.

ID: 47080305

calendar_today14-06-2009 12:01:53

3,3K Tweet

205 Takipçi

763 Takip Edilen

thomas🌦 (@zemnmez) 's Twitter Profile Photo

just thinking about that post where people got mad that graphql isn’t SQL. like they just thought (1) SQL is good and (2) SQL servers should be publicly accessible

jeff bryner 💙💛 (@0x7eff) 's Twitter Profile Photo

Here's a starter list of things not in CIS top 20, SOC type II, NIST CSF, sp800-53 that absolutely affect your security posture - Slack - Github integrations - a lack of data classification - a lack of risk levels - security events in devops logs - every SaaS not on SSO yours?

Tushar R (@_tushar_r) 's Twitter Profile Photo

[Special Report] Bot Attacks: Top Threats and Trends cuda.co/botvol1 See al the new findings and insights right now #ApplicationSecurity #Bots

Brian in Pittsburgh (@arekfurt) 's Twitter Profile Photo

Hackers 2: Set in Eastern Europe/Russia, with a group of 20-somethings wearing track suits, driving sports cars, and exchanging Cobalt Strike configs while they pound energy drinks and deal with their annoying FSB contact. Somehow probably not the same cult classic.

eevee 💨 (@eevee) 's Twitter Profile Photo

also i cannot stress this enough: if your ISP can spy on your traffic, and you use a VPN to avoid that, then whoever is hosting the VPN can spy on exactly the same traffic how much do you trust a random company you've only heard of at all because they gave a youtuber money

Rogue (@infosecrogue) 's Twitter Profile Photo

Dear Breweries, Not everything has to be a goddamn IPA. IPAs are gross, regardless of what the hipster tells you. It’s not “complex”, it’s hot garbage. Sincerely, 🦝

Frank McGovern - INACTIVE (@frankmcg) 's Twitter Profile Photo

I’m seeing people publicly share the name and social media links of the compromised #Okta user. Don’t do this. Don’t even look at their LinkedIn. Don’t say their name. Don’t even approach the topic. This could happen to any one of us; the actual user is irrelevant. Be better.

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

Has anyone identified a relevant web application that is vulnerable to #Spring4Shell attacks? I haven’t. Anyone? If yes, please comment.

Vivek Ramachandran (@vivekramac) 's Twitter Profile Photo

This will probably take a lot longer to become mandatory by regulation in India and SE Asia. But why wait? This should be part of Good Governance at least for late stage startups. Investors should mandate this. www-forbes-com.cdn.ampproject.org/c/s/www.forbes…

IPinfo – IP Data Provider (@ipinfo) 's Twitter Profile Photo

IPinfo has a range of different plans to suit your unique needs 😄 🧑‍💻Basic plan for teams and devs 📈Standard plan for growing businesses 👔Business plans for extensive data 🤸Custom enterprise plans for flexibility Here's a sample of our different API responses 👇

IPinfo has a range of different plans to suit your unique needs 😄

🧑‍💻Basic plan for teams and devs
📈Standard plan for growing businesses
👔Business plans for extensive data
🤸Custom enterprise plans for flexibility

Here's a sample of our different API responses 👇
Jeff Foley (@jeff_foley) 's Twitter Profile Photo

A Special Giveaway! As security testers, we all appreciate @ipinfoio, yet, have you ever needed access to additional features? ❤️ & RT to be entered into the drawing for 10 Security Tester Plan subscriptions! #osint #dns #recon #infosec #security #bugbounty #redteam #giveaways

The Product Folks 🚀 (@theproductfolks) 's Twitter Profile Photo

Here's a list of 1000+ job opportunities to look out for! 🙌 A huge thank you to Shreyas Doshi for curating this together🤝 Do share this amongst your network and help folks who have been affected by the recent job crunch in the market❤ Link: docs.google.com/spreadsheets/d…