Alexander Sverdlov (@sverdlov) 's Twitter Profile
Alexander Sverdlov

@sverdlov

I helped build cyber defenses at nuclear power plants, banks and telecoms in Microsoft's security team and on my own - now I do it in my security company.

ID: 18158520

linkhttps://linkedin.com/in/asverdlov calendar_today16-12-2008 07:47:15

1,1K Tweet

510 Followers

501 Following

/r/netsec (@_r_netsec) 's Twitter Profile Photo

GitHub - fullhunt/log4j-scan: A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 github.com/fullhunt/log4j…

Nikhil Mittal (@nikhil_mitt) 's Twitter Profile Photo

Wrapped up the Introduction to Azure Pentesting class! This was super fun and I had a great time teaching. Access the course video and the lab here - azure.enterprisesecurity.io

MrSockPuppet (@mrsockpuppet) 's Twitter Profile Photo

Andy Robbins So, if you're looking at it from a compliance angle, CISA has a draft of a Zero Trust Maturity Model that isn't useless, is pretty prescriptive. cisa.gov/sites/default/…

Alexander Sverdlov (@sverdlov) 's Twitter Profile Photo

linkedin.com/video/event/ur… 120 registrations to my FREE webinar on battling Ransomware without buying ANY commercial security tools or products.

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

For #auditd on #Linux you can use my best practice auditd configuration, which is still actively maintained and gets frequent updates via PR If you've found ways to improve it, please provide them as pull request to help everyone else github.com/Neo23x0/auditd

For #auditd on #Linux you can use my best practice auditd configuration, which is still actively maintained and gets frequent updates via PR 

If you've found ways to improve it, please provide them as pull request to help everyone else 

github.com/Neo23x0/auditd
Carlos Holguera (@grepharder) 's Twitter Profile Photo

@HackrowdSec Bug Bounty Tips Katie Paxton-Fear The XSS Rat - Proud XSS N00b :-) The @OWASP_MSTG Mobile Security Testing Guide has everything you need to escalate on mobile security. You can use the included Mobile Security Checklist to guide you through all the steps and the MSTG to learn everything you need to know. github.com/OWASP/owasp-ms…

Alexey Lukatsky (@alukatsky) 's Twitter Profile Photo

Помните (t.me/alukatsky/5439) принцип «трех слов» при создании паролей от английского центра ИБ (NCSC)? У новозеландского CERT схожая идея, но они отказываются от случайности в выборе слов, входящих в пароль, увеличивая их число с трех до четырех. Такие запоминать попроще

Помните (t.me/alukatsky/5439) принцип «трех слов» при создании паролей от английского центра ИБ (NCSC)? У новозеландского CERT схожая идея, но они отказываются от случайности в выборе слов, входящих в пароль, увеличивая их число с трех до четырех. Такие запоминать попроще
Andy Robbins (@_wald0) 's Twitter Profile Photo

And... we're done! That heavily censored token will let us perform any action in AzureAD as a Global Admin now! Defenders: The "Prevention" section of this blog post offers guidance to find/fix/prevent these attack paths in your own environments: medium.com/p/82667d17187a

Greg Linares (Laughing Mantis) (@laughing_mantis) 's Twitter Profile Photo

This will be a thread discussing a real world breach involving a drone delivered exploit system that occurred this summer Some details I am not able to discuss, however for the blue teams & red teams out there I hope this provides a good measure of capability. 🧵🚁 🎮🖥️🦠