Christopher | 🇺🇦  (@d4rkshell) 's Twitter Profile
Christopher | 🇺🇦 

@d4rkshell

Senior Security Analyst 💻 | Public Sector | #CISSP | #CCSP | #SecurityX | #CySA+ | #CyberSecurity | #Infosec | #Hacking

ID: 988471429652992003

linkhttps://blog.razrsec.uk/ calendar_today23-04-2018 17:35:28

2,2K Tweet

509 Takipçi

455 Takip Edilen

Christopher | 🇺🇦  (@d4rkshell) 's Twitter Profile Photo

It was an absolute pleasure to meet the legend that is Jayson E. Street 💙 🤗💛 at BSidesLeeds today! Thanks for the amazing keynote and for taking the time to chat by the sticker stall 😎 Safe travels dude, and hope to see you again one day when I finally get to DEF CON #BSidesLeeds

STÖK ✌️ (@stokfredrik) 's Twitter Profile Photo

I just love hacking! The feeling when you finally figure out how to use something for purposes it wasn’t intended for, never gets old.

National Crime Agency (NCA) (@nca_uk) 's Twitter Profile Photo

Four people have been arrested in the UK as part of a National Crime Agency investigation into cyber attacks targeting M&S, Co-op and Harrods. Read the full story ➡️ nationalcrimeagency.gov.uk/news/retail-cy…

Four people have been arrested in the UK as part of a National Crime Agency investigation into cyber attacks targeting M&S, Co-op and Harrods.

Read the full story ➡️ nationalcrimeagency.gov.uk/news/retail-cy…
Nathan Jones (@njcve_) 's Twitter Profile Photo

Had a blast hosting the bug bounty gathering at SteelCon again this year. We had lots of traffic, a presentation, group hacking and someone found their first bug (which was a critical auth bypass!). Amazing, thanks to everyone who made this happen. #hackerone #steelcon

Security Response (@msftsecresponse) 's Twitter Profile Photo

Microsoft is aware of active attacks targeting on-premises SharePoint Server customers, exploiting a variant of CVE-2025-49706. This vulnerability has been assigned CVE-2025-53770. We have outlined mitigations and detections in our blog. Our team is working urgently to release

Splitzz 🇺🇦 🇬🇪 (@splitzz_fr) 's Twitter Profile Photo

Phrack #72 release reveals TTPs, backdoors and targets of a Chinese/North Korean state actor mimicking Kimsuky A copy of his workstation data was done and is now available for all researchers to analyse! Article: drive.proton.me/urls/Z5BX5M7PM… Data dump: drive.proton.me/urls/ZQ1235FY7…