n0zk (@n0zk__) 's Twitter Profile
n0zk

@n0zk__

Cyber security | Privacy fighter | A lazy CTF player | I build, make and break weird stuff

ID: 334804720

calendar_today13-07-2011 18:02:43

401 Tweet

139 Followers

1,1K Following

n0zk (@n0zk__) 's Twitter Profile Photo

The latest FrostyGoop ICS Malware, written in GoLang.. Quite interesting, it's now the ninth ICS specific malware.

The Hacker News (@thehackersnews) 's Twitter Profile Photo

⚠️ Alert: DigiCert will revoke 83,267 SSL/TLS certificates within 24 hours due to a Domain Control Validation oversight. This affects 6,807 customers & may cause temporary disruptions in secure communications. thehackernews.com/2024/07/digice… Ensure your certificates are up-to-date.

n0zk (@n0zk__) 's Twitter Profile Photo

When the job titles pay individuals more than the salary? Like how is it possible for a recent university graduate to be CTO?

vx-underground (@vxunderground) 's Twitter Profile Photo

Let's discuss university degrees and whether or not they're required for cybersecurity. This may come as a shocker to some people, but universities are higher education institutions. Universities are not job fairs. If you attend a university your primary objective is to get an

n0zk (@n0zk__) 's Twitter Profile Photo

Hello guys, Don’t debug Docker containers, when ur tried, sometimes it just a missing file. That’s all, bye.

n0zk (@n0zk__) 's Twitter Profile Photo

This is what the Swedish people has received today, either it due to the sabotage in the Baltic Sea or another reason. The brochure is informing about “The crisis or an upcoming war” in other way informing what to due in part of the Contingency plan in Sweden.

This is what the Swedish people has received today, either it due to the sabotage in the Baltic Sea or another reason. 

The brochure is informing about “The crisis or an upcoming war” in other way informing what to due in part of the Contingency plan in Sweden.
n0zk (@n0zk__) 's Twitter Profile Photo

Azure subscription policy is quite underrated, especially the default settings that many forgets about. Red team engagement go brrr with extra tenant beside the main tenant

Steven Lim (@0x534c) 's Twitter Profile Photo

🔍 Cloud forensics tip: Azure Storage logs are gold during breach investigations. Threat actors love blob storage. Without logging, you’re flying blind. ✅ Enable StorageBlob logs   🕵️‍♂️ Trace SAS token misuse, key rotations, RBAC abuse   📊 Analyze UserAgentHeader for tool