SECURITY/COMPLIANCE (@mininatechsec) 's Twitter Profile
SECURITY/COMPLIANCE

@mininatechsec

#infosec vulnerabilities, SIEM, malware, compliance. I'm rarely here. If you know me IRL, find me over there.

ID: 58723111

calendar_today21-07-2009 06:19:01

33,33K Tweet

2,2K Followers

3,3K Following

Wiz (@wiz_io) 's Twitter Profile Photo

Our second annual "State of AI in the Cloud" report, refreshed with the latest data, includes: - The latest stats on AI adoption across cloud environments - Security risks we’ve uncovered in AI models like DeepSeek - What security teams should focus on now

Andrew Thompson (@imposecost) 's Twitter Profile Photo

"Secretary Noem Terminates Inept FEMA Employees After Uncovering Massive Cyber Failures, Demands Accountability" dhs.gov/news/2025/08/2…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

πŸ›‘ WARNING: WhatsApp confirms a zero-click spyware attack targeting iPhone & Mac users. Hackers chained a new WhatsApp flaw with an Apple bugβ€”letting them hijack devices without you even tapping a link. πŸ”₯ Here’s what you need to know ↓ thehackernews.com/2025/08/whatsa…

πš•πš’πš—πšπš’πš•πšŽ (@lintile) 's Twitter Profile Photo

Your #DFIU category today is OG HACKER SHIRTS This Ron Rivest 1987 cipher, illegal to export from the US (mathematical munitions), fit on 3 lines of Perl and adorned t-shirts as a form of civil disobedience before becoming the WEP protocol's greatest weakness

ThreatDown (@threat_down) 's Twitter Profile Photo

Ransomware is getting worse πŸ‘€ It has been a record-breaking year for ransomware, and attackers are becoming increasingly stealthy. Download the 2025 State of Ransomware for the full scoop. threatdown.com/dl-state-of-ra…

John Hammond (@_johnhammond) 's Twitter Profile Photo

A threat actor installed Huntress. ... a hysterical mistake on their part, giving us first-hand insight to their tooling, workflow & routine. Phishing infra, stealer logs, Telegram+dark web sites, AI... Hilarious goldmine of cybercrime deets with a front row seat:

A threat actor installed Huntress.

... a hysterical mistake on their part, giving us first-hand insight to their tooling, workflow & routine. Phishing infra, stealer logs, Telegram+dark web sites, AI... 

Hilarious goldmine of cybercrime deets with a front row seat: