Privacy and sec (@secendpraiv) 's Twitter Profile
Privacy and sec

@secendpraiv

ID: 1608169134885425153

calendar_today28-12-2022 18:34:02

11 Tweet

14 Takipçi

200 Takip Edilen

ZachXBT (@zachxbt) 's Twitter Profile Photo

Here’s everything mapped out about the FTX attack on both the Ethereum and Bitcoin side. Will keep this report updated with all of the relevant addresses: chainabuse.com/report/b6fb4e1…

Here’s everything mapped out about the FTX attack on both the Ethereum and Bitcoin side. 

Will keep this report updated with all of the relevant addresses: 
chainabuse.com/report/b6fb4e1…
CertiK (@certik) 's Twitter Profile Photo

The biggest threats can come from inside a project team, from a trusted member of the group 🕵️ Many projects skip the process of vetting new team members due to the perceived complexity or daunting nature of the process How to Protect Crypto Projects from Insider Threats 🧵👇

Saviour Crypto (🧲) (@1millsaviour) 's Twitter Profile Photo

You accumulate during the bear market so you can retire in the bull market Making sure you accumulate the right projects is the hard part..

You accumulate during the bear market so you can retire in the bull market

Making sure you accumulate the right projects is the hard part..
Gajendra upadhyay (@almighty_one007) 's Twitter Profile Photo

With Slick, you can easily subscribe to your favorite cybersecurity newsletters and receive them all in one place. Download Slick today and start managing all your cybersecurity newsletters with ease! Checkout: slickinbox.com

Security Trybe (@securitytrybe) 's Twitter Profile Photo

Top 35 Cybersecurity Tools 1.Nmap 2.Metaspoilt 3.Cain and Abel 4.Wireshark 5.Kali Linux 6.John the Ripper 7.Nikto 8.Forcepoint 9.Burp Suite 10. Tor 11.Tcpdump 12. Aircrack-ng 13. Splunk 14. Netstumbler 15. Acunetix 16. OSSEC 17. VIPRE 18. Avira

BowTiedCyber | Evan Lutz (@bowtiedcyber) 's Twitter Profile Photo

Network security is HARD But it's SO POWERFUL Learning just a little about SURICATA will make your resume STAND OUT SURICATA is the IDS that's running EVERYTHING on the back end Learning how it works will make you a better threat hunter

Turtlecute 🐢⚡ (@turtlecute33) 's Twitter Profile Photo

Al momento la verifica degli account su X rimane facile da aggirare: - email usa e getta creata sotto tor - sms4sats (rented number) - carta revolut monouso di amico Ed ecco la spunta blu senza fornire dati personali 🙏🧡