InfosecWarden (@infosecwarden) 's Twitter Profile
InfosecWarden

@infosecwarden

All things Cybersecurity/Info Assurance. Interested in Emerging and Disruptive Tech - [email protected]

ID: 853348149951418369

calendar_today15-04-2017 20:43:48

60 Tweet

466 Takipçi

811 Takip Edilen

Max Rogers (@maxrogers5) 's Twitter Profile Photo

Interesting data from Huntress EDR here 🧵 Let's explore how frequently RMM/remote tools are "rare" in an organization, where "rare" is less than 10% of hosts use the tool.

Interesting data from <a href="/HuntressLabs/">Huntress</a> EDR here 🧵

Let's explore how frequently RMM/remote tools are "rare" in an organization, where "rare" is less than 10% of hosts use the tool.
Sick.Codes (@sickcodes) 's Twitter Profile Photo

35 year old Chinese man arrested in Bangkok, driving around populated areas with a SMS blaster with a 3km radio sending 1,000,000 phishing SMS per hour. "Phone users within range received a message stating: “Your 9,268 points are about to expire! Hurry up and redeem your gift

35 year old Chinese man arrested in Bangkok, driving around populated areas with a SMS blaster with a 3km radio sending 1,000,000 phishing SMS per hour. "Phone users within range received a message stating: “Your 9,268 points are about to expire! Hurry up and redeem your gift
OODA (@ooda) 's Twitter Profile Photo

Afraid of losing the US-Canada trade pact, Mexico alters its laws and removes Chinese parts ift.tt/kSuNgqK #OODA

GP (@graham_depenros) 's Twitter Profile Photo

DeepSeek R1 CCP dipping all your data and being applauded is so typical of the utter lack of awareness of the difference between tech competition and enemy state espionage using the shiny new toy Honeypot. The West is in a coma of self-denial

Wiz (@wiz_io) 's Twitter Profile Photo

BREAKING: Internal #DeepSeek database publicly exposed 🚨 Wiz Research has discovered "DeepLeak" - a publicly accessible ClickHouse database belonging to DeepSeek, exposing highly sensitive information, including secret keys, plain-text chat messages, backend details, and logs.

BREAKING: Internal #DeepSeek database publicly exposed 🚨

Wiz Research has discovered "DeepLeak" - a publicly accessible ClickHouse database belonging to DeepSeek, exposing highly sensitive information, including secret keys, plain-text chat messages, backend details, and logs.
unusual_whales (@unusual_whales) 's Twitter Profile Photo

US Defense Department employees connected their work computers to Chinese servers to access DeepSeek’s new AI chatbot for at least two days before the Pentagon moved to shut off access, per Bloomberg

InfosecWarden (@infosecwarden) 's Twitter Profile Photo

Fun with chatbots: Below is a completely fictional, creative exploration of what “cutting‐edge” intelligence capabilities might look like if quantum, neuro-intelligence, and interplanetary surveillance technologies were active today. Remember—this is pure speculative fun,

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

For anyone influenced by the mass hysteria into thinking this somehow constitutes a 'data breach' - let me ask you this: If your boss decides your colleague didn’t do a great job reviewing your work and sends someone else to check it, would you call that a data breach? Probably

Matt Johansen (@mattjay) 's Twitter Profile Photo

Hackers are using Google Tag Manager (GTM) to inject credit card skimmers into E-commerce sites. At least 6 compromised sites identified so far. Here's what we're seeing. 👇

DOGE IRS (@doge_irs) 's Twitter Profile Photo

DOGE is seeking help from the public! Please DM this account with insights on finding and fixing waste, fraud and abuse relating to the Internal Revenue Service.

Georgi Gerganov (@ggerganov) 's Twitter Profile Photo

Today I was sent the following cool demo: Two AI agents on a phone call realize they’re both AI and switch to a superior audio signal ggwave