Marlon (@marlonrh) 's Twitter Profile
Marlon

@marlonrh

Passionate about technology and cybersecurity. I'm here to learn, share insights, and build professional connections. No debates, just growth.

ID: 406609538

calendar_today06-11-2011 23:10:42

3,3K Tweet

500 Followers

5,5K Following

Andrew Ng (@andrewyng) 's Twitter Profile Photo

I'm thrilled to announce the definitive course on Claude Code, created with Anthropic and taught by Elie Schoppik Elie Schoppik. If you want to use highly agentic coding - where AI works autonomously for many minutes or longer, not just completing code snippets - this is it.

Merill Fernando (@merill) 's Twitter Profile Photo

So who else has seen this 'Enforce attestation' setting and didn't really understand what it does? Well you can count me as one of the clueless until today. So I had to create this visual so I won't forget it the next time. (Bookmark this!)👇 What is Passkey Attestation? ❓

So who else has seen this 'Enforce attestation' setting and didn't really understand what it does?

Well you can count me as one of the clueless until today. So I had to create this visual so I won't forget it the next time.  (Bookmark this!)👇

What is Passkey Attestation? ❓
Harm Veenstra | MVP (@harmveenstra) 's Twitter Profile Photo

I regularly check SPF records for syntax and entries during Exchange migrations or when troubleshooting mailflow. The SpfAnalyzer module from Jiri Formacek can help with that. In this blog post, I will show you how it works. powershellisfun.com/2025/08/29/ana… #PowerShell #SPF #DMARC #DNS

International Cyber Digest (@intcyberdigest) 's Twitter Profile Photo

🚨 Breach alert: Attackers claim live access to AT&T infrastructure. Alleged impact: enables SIM-swapping, reading SMS 2FA codes, and accessing a database with ~24M AT&T customer records.

🚨 Breach alert: Attackers claim live access to AT&T infrastructure. Alleged impact: enables SIM-swapping, reading SMS 2FA codes, and accessing a database with ~24M AT&T customer records.
Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

🚨 Cloudflare Confirms Data Breach, Hackers Stole Customer Data from Salesforce Instances Read more: cybersecuritynews.com/cloudflare-con… 1. ☁️ Cloudflare confirmed a data breach involving unauthorized access to customer data through its Salesforce, impacting hundreds of organizations

🚨 Cloudflare Confirms Data Breach, Hackers Stole Customer Data from Salesforce Instances 

Read more: cybersecuritynews.com/cloudflare-con…

1. ☁️ Cloudflare confirmed a data breach involving unauthorized access to customer data through its Salesforce, impacting hundreds of organizations
ALI TAJRAN (@alitajran) 's Twitter Profile Photo

Starting November 3, 2025, LinkedIn Will Use Your Profile to Train Its AI! This means that not only your own posts, but also those of your employees, will be used as practice material for smart algorithms. What you or your employees post on LinkedIn can indirectly end up in AI

Starting November 3, 2025, LinkedIn Will Use Your Profile to Train Its AI!

This means that not only your own posts, but also those of your employees, will be used as practice material for smart algorithms.

What you or your employees post on LinkedIn can indirectly end up in AI
Ru Campbell (@rucam365) 's Twitter Profile Photo

New video: deep dive into Entra ID Governance with MVP Matt Levy | Microsoft Security MVP. • why identity is the front door • sources of authority (HR vs AD) • joiner/mover/leaver workflows • PowerShell scripts vs governance at scale WATCH: youtu.be/VVU2UhYaGzk

New video: deep dive into Entra ID Governance with MVP <a href="/MattChatt42/">Matt Levy | Microsoft Security MVP</a>.

• why identity is the front door
• sources of authority (HR vs AD)
• joiner/mover/leaver workflows
• PowerShell scripts vs governance at scale

WATCH: youtu.be/VVU2UhYaGzk
bugcrowd (@bugcrowd) 's Twitter Profile Photo

Comment “CISO” to get your own copy 💫 If you haven’t checked out our Inside the Mind of a CISO 2025 report yet, go read it. You’ll thank us later: bugcrowd.com/resources/repo…

Comment “CISO” to get your own copy 💫

If you haven’t checked out our Inside the Mind of a CISO 2025 report yet, go read it. You’ll thank us later: bugcrowd.com/resources/repo…
Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

The Microsoft Digital Defense Report 2025 shows how threats are evolving faster than ever, fueled by AI. msft.it/6017sf36v Key insights from report include: -More than 50% of cyberattacks with known motives had financial objectives such as extortion or ransom, while only

Quincy Larson (@ossia) 's Twitter Profile Photo

This weekend learn Cryptography for beginners with this FREE 1-hour Python course 🐍. Here are this week's five freeCodeCamp resources that are worth your time: 1. Learn how cryptography works, and how developers use it to secure both data and communication. freeCodeCamp just

This weekend learn Cryptography for beginners with this FREE 1-hour Python course 🐍. Here are this week's five freeCodeCamp resources that are worth your time:

1. Learn how cryptography works, and how developers use it to secure both data and communication. freeCodeCamp just
Georgia Weidman (@georgiaweidman) 's Twitter Profile Photo

Happy New Year! 🎉 I’ve made an entire penetration testing course I previously created for a training platform (now defunct after an acquisition) freely available on YouTube. If you’re interested in hands-on, practical security training, you can watch the full course here: 👉

☁ CHARBEL NEMNOM🇨🇭| MVP | MCT | CCSP | CISM ☁ (@charbelnemnom) 's Twitter Profile Photo

Another Learning Opportunity! 8 Best Practices To Secure Domain Controller charbelnemnom.com/8-best-practic… #Microsoft #Azure #Blog > Please RP if you like it!

Flu Project (@fluproject) 's Twitter Profile Photo

Si trabajas con evidencia electrónica de Microsoft 365, este libro es para ti. Explica paso a paso cómo analizar correos, validar integridad y documentar hallazgos.  Disponible gratis #forenseDigital #ciberseguridad #Office365 #eDiscovery flu-project.com/2025/05/dispon…

CHEMA PONZE (@chema_ponze) 's Twitter Profile Photo

Me llamo Chema y soy dibujante tradicional. Desde que llegó la IA casi no tengo trabajo, pero yo seguiré dibujando mientras pueda. ¿Me ayudas a difundir mis obras? Por cada retuit ayudas a compartir el arte generado por las personas y Skynet pierde una batalla. ¡Gracias!

Me llamo Chema y soy dibujante tradicional. Desde que llegó la IA casi no tengo trabajo, pero yo seguiré dibujando mientras pueda.
¿Me ayudas a difundir mis obras? Por cada retuit ayudas a compartir el arte generado por las personas y Skynet pierde una batalla. ¡Gracias!
Macjosan (@macjosan) 's Twitter Profile Photo

💾 Ayer fue el Día Mundial del Backup y os expliqué cómo proteger vuestros datos correctamente usando la regla 3-2-1-1-0 ➡️ youtu.be/T3tbjc35vZI Aproveché para explicaros que ya no hay limitación de discos en Synology Inc.

Microsoft Security (@msftsecurity) 's Twitter Profile Photo

OWASP just dropped its top 10 risks for agentic applications for 2026. Let’s debrief. ➡️ Get the key findings from the report ➡️ Learn practical ways to mitigate these risks—grounded in Agent 365 capabilities in Microsoft Copilot Studio For teams using agents, having the right

Maximiliano Firtman (@maxifirtman) 's Twitter Profile Photo

Guillermo, CEO de Vercel, da detalles técnicos del ataque que sufrió la empresa afectando las claves de algunos proyectos aunque recomiendan a todos los clientes cambiarlas. Esas claves son las que permiten que muchas apps se conecten con apps de terceros, como bases de datos,

William Lam (@lamw) 's Twitter Profile Photo

🆕 Broadcom KB regarding the upcoming expirations of Microsoft Secure Boot 2011 Certificates 🔑 and how to handle them in a vSphere-based environment knowledge.broadcom.com/external/artic…