Kenneth Hunt (@kennethbhunt) 's Twitter Profile
Kenneth Hunt

@kennethbhunt

Specializing in Cyber Defense 'Certified Fraud Examiner' 'Qualys Certified Specialist, Vulnerability Management'

ID: 195816506

linkhttps://huntITsolutions.com/ calendar_today27-09-2010 17:02:07

780 Tweet

1,1K Takipçi

3,3K Takip Edilen

Dr. Eric Cole (@drericcole) 's Twitter Profile Photo

Creating data backups and encrypting sensitive information. Updating all security systems and software. Conducting regular employee cybersecurity training. Using strong and complex passwords. Installing firewalls. Reducing your attack surfaces. Assessing your vendors.

Creating data backups and encrypting sensitive information.
Updating all security systems and software.
Conducting regular employee cybersecurity training.
Using strong and complex passwords.
Installing firewalls.
Reducing your attack surfaces.
Assessing your vendors.
Dr. Eric Cole (@drericcole) 's Twitter Profile Photo

This year's Cybersecurity Awareness Month's campaign theme is “See Yourself in Cyber” and represents that cybersecurity is ultimately about people, which means seeing yourself in cyber no matter your role. #cybersecurity #CybersecurityAwarenessMonth2022

This year's Cybersecurity Awareness Month's campaign theme is “See Yourself in Cyber” and represents that cybersecurity is ultimately about people, which means seeing yourself in cyber no matter your role. 
#cybersecurity #CybersecurityAwarenessMonth2022
Huntress (@huntresslabs) 's Twitter Profile Photo

Huntress has your back—even if you're on a Mac! 😉 Stoked to officially announce the general availability of our macOS agent. And don't worry—Persistent Footholds are just the beginning. hubs.ly/Q01r499f0

Huntress has your back—even if you're on a Mac! 😉

Stoked to officially announce the general availability of our macOS agent. And don't worry—Persistent Footholds are just the beginning. hubs.ly/Q01r499f0
Cryptolaemus (@cryptolaemus1) 's Twitter Profile Photo

🚨Emotet back in Distro Mode🚨 - As of 0800 UTC E4 began spamming and as of 0930 UTC E5 began spamming again. Looks like Ivan is in need of some cash again so he went back to work. Be on the lookout for direct attached XLS files and zipped and password protected XLS. 1/x

Filigran (@filigranhq) 's Twitter Profile Photo

🏛️ Multiple organizations have started to use #OpenCTI as a global #sharing platform ⚓. One single instance to aggregate all pieces of information 🎨 and distribute a subset of this knowledge 🚀. Focus on the organizations sharing feature! #CTI #Cyber blog.filigran.io/opencti-organi…

Filigran (@filigranhq) 's Twitter Profile Photo

💡#OpenCTI new dashboards for #KPI, trends modelization 📊 and graphical representation of the #CTI knowledge 🫧Explaining the underlying logic of the first graph dashboarding engine for the #STIX model 🦋 and illustrate the power of this implementation 🚀 blog.filigran.io/new-octi-dashb…

CyberDefenseMagazine (@cyberdefensemag) 's Twitter Profile Photo

Thrilled to share this Cybersecurity -- Attack and Defense Strategies - Third Edition ($39.99 Value) FREE for a Limited Time - Expires 1/18/2023 cyberdefensemediagroup.tradepub.com/free/w_pacb167…

Thrilled to share this Cybersecurity -- Attack and Defense Strategies - Third Edition ($39.99 Value) FREE for a Limited Time - Expires 1/18/2023
cyberdefensemediagroup.tradepub.com/free/w_pacb167…
Active Countermeasures (@activecmeasures) 's Twitter Profile Photo

Have you heard about ACE? ACE aka "AC-Hunter Community Edition" is the free version of our easy-to-use commercial Threat Hunting tool! Watch this to learn more about ACE: youtu.be/Nl3pjrh1dEM

LetsDefend (@letsdefendio) 's Twitter Profile Photo

New course: Network Packet Analysis 🔗 buff.ly/3XDsF08 🔵 Introduction to Network Packet Analysis 🔵 TcpDump 🔵 Wireshark 🔵 Tshark 🔵 NetworkMiner #cybersecurity #infosec #wireshark

New course: Network Packet Analysis

🔗 buff.ly/3XDsF08 

🔵 Introduction to Network Packet Analysis
🔵 TcpDump
🔵 Wireshark
🔵 Tshark
🔵 NetworkMiner 

#cybersecurity #infosec #wireshark
Fletch (@fletch_ai) 's Twitter Profile Photo

Fletch Top Threat Alert: Return of the ICMAD: Critical Vulnerabilities Affecting ICM over HTTP-2 - #CVE-2023-36925 #FletchScore = High/Trending #CyberSecurity #ThreatIntel #InfoSec CVE-2023-33987 CVE-2023-35871 CVE-2023-36922 CVE-2023-36925 hubs.li/Q01XxK3M0

TryHackMe (@realtryhackme) 's Twitter Profile Photo

NEW FREE ROOM: Start your AD hardening journey by exploring various methods to safeguard an AD environment from cyber threats. Gain an overview of hardening through: 🤝 Group Policy Objects 🔐 Secure Authentication Methods 🔧 Microsoft Compliance Toolkit hubs.la/Q01YMN940

NEW FREE ROOM: Start your AD hardening journey by exploring various methods to safeguard an AD environment from cyber threats.

Gain an overview of hardening through:
🤝 Group Policy Objects
🔐 Secure Authentication Methods
🔧 Microsoft Compliance Toolkit

hubs.la/Q01YMN940
John Savill (@ntfaqguy) 's Twitter Profile Photo

A quick virtual mentoring video on how to frame opportunities with your client. youtu.be/eRBO31AR6ug 00:00 - Introduction 00:32 - Build on value to client 03:25 - Blockers 03:52 - Cost 04:54 - Effort 05:51 - Risk 07:26 - Understanding 07:58 - Summary

John Savill (@ntfaqguy) 's Twitter Profile Photo

This week's Friday the 13th update is up! youtu.be/4Hb_2YoaRoA 00:00 - Introduction 00:15 - New videos 00:59 - AKS regional Azure Backup 02:05 - VMSS default orchestration mode change 03:44 - Azure Dedicated Host resize 04:48 - ExpressRoute Traffic Collector 05:30 - Azure

John Savill (@ntfaqguy) 's Twitter Profile Photo

A look at the brand new version of Azure Update Manager for patching in and out of Azure! youtu.be/LVmNh5YgBOQ 00:00 - Introduction 00:17 - Patching 101 03:31 - Azure Update Manager (original) 06:40 - New solution 10:20 - Changing Azure VM patch orchestration mode 12:32 -

marc ochsenmeier (@ochsenmeier) 's Twitter Profile Photo

#pestudio is one of the few tools that detects an Executable embedded outside of the Resources #Malware #dfir #Ransomware #infosec

#pestudio is one of the few tools that detects an Executable embedded outside of the Resources #Malware #dfir #Ransomware #infosec