Boris Murillo (@borismurillo) 's Twitter Profile
Boris Murillo

@borismurillo

Consultor en Seguridad de la Información

ID: 91386150

linkhttp://imfested.blogspot.com/ calendar_today20-11-2009 17:33:12

738 Tweet

478 Takipçi

317 Takip Edilen

Jose (Snifer) (@sniferl4bs) 's Twitter Profile Photo

Eres de #Bolivia y quieres aprender sobre seguridad Informática encaminar y crecer en comunidad, empezando desde 0 ? Además todo de manera gratuita.. Sale oficialmente #BackToRoot desde Snifer@L4b's.

Leo Arriaga (@radiohen) 's Twitter Profile Photo

“Les juro que no soy un gato” dice este abogado que no sabe cómo quitar un filtro de Zoom. (Gracias, Dios, por estos momentos)

Dreamlab Technologies (@dreamlabglobal) 's Twitter Profile Photo

Check out our latest blog post to learn what can happen when phone–based #authentication and recycled phone numbers collide 💡🔓👉 ow.ly/2AmG50DBcqU #facebook #datasecurity #cybersecurity

Check out our latest blog post to learn  what can happen when phone–based #authentication and recycled phone numbers collide 💡🔓👉 ow.ly/2AmG50DBcqU

#facebook #datasecurity #cybersecurity
Dreamlab Technologies (@dreamlabglobal) 's Twitter Profile Photo

Our latest #whitepaper reveals security #vulnerabilities existing in #Swiss #healthcare provider’s systems and highlights examples of how these attack surface scans work, where dangers lurk and what to look out for: dreamlab.net/risiken-gesund… #Switzerland #cybersecurity

Our latest #whitepaper reveals security #vulnerabilities existing in #Swiss #healthcare provider’s systems and highlights examples of how these attack surface scans work, where dangers lurk and what to look out for: dreamlab.net/risiken-gesund… 

#Switzerland #cybersecurity
Infosec Mentor (@infosec_mentor) 's Twitter Profile Photo

If you are a #infosec #security #researcher / #pentester /#bugbounty hunter and are new to #cloud security, this thread will help you. I think every modern-age pentester should know how to extract information from an #AWS account / do post-exploitation. Please share/RT.

Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Microsoft has released a new, one-click mitigation tool, the Microsoft Exchange On-Premises Mitigation Tool, to help customers who do not have dedicated security or IT teams to apply security updates for Microsoft Exchange Server. Learn more: msft.it/6015VKNpL

Microsoft has released a new, one-click mitigation tool, the Microsoft Exchange On-Premises Mitigation Tool, to help customers who do not have dedicated security or IT teams to apply security updates for Microsoft Exchange Server. Learn more: msft.it/6015VKNpL
Dreamlab Technologies (@dreamlabglobal) 's Twitter Profile Photo

Join Sharka's #webinar this coming Thursday, where she will help you discover how things have changed since #COVID started as well as some tips to protect yourself, your loved ones and your organisation. 🔗 Link to register : lnkd.in/dVKgu4T #socialengineering #isc2

Join <a href="/___Sh4rk___/">Sharka</a>'s #webinar this coming Thursday, where she will help you discover how things have changed since #COVID started as well as some tips to protect yourself, your loved ones and your organisation. 🔗 Link to register : lnkd.in/dVKgu4T
#socialengineering #isc2
S3cur3Th1sSh1t (@shitsecure) 's Twitter Profile Photo

Not long ago I found a list of which AD-groups lead to an easy Domain Administrator Privilege Escalation path like for example DNS-Admin to DA and so on. A similar structured list to this one: github.com/gtworek/Priv2A… Someone knows which one that is and has the link to it?

Tyler Hudak (@secshoggoth) 's Twitter Profile Photo

I've worked a lot of #ransomware incidents and I've found that most companies don't realize what the true cost of a ransomware incident is. But isn't it just paying the ransom or restoring and you're done? Nope. Here are the (potential) costs (based on my experience): (1/X)

Sharka (@___sh4rk___) 's Twitter Profile Photo

Almost time for our SOLD OUT training “Attacking and Securing ICS” at Black Hat ! By Juan and myself . Wanted to join us but couldn’t? Our next training at HITBSecConf is available: sectrain.hitb.org/courses/attack…

Almost time for our SOLD OUT training  “Attacking and Securing ICS” at <a href="/BlackHatEvents/">Black Hat</a> ! By <a href="/itsecurityco/">Juan</a> and myself .

Wanted to join us but couldn’t? Our next training at <a href="/HITBSecConf/">HITBSecConf</a> is available: sectrain.hitb.org/courses/attack…
Fr1endlyRATs (@fr1endlyrats) 's Twitter Profile Photo

If you like it, share it. If you dislike me, recommend it to whoever you dislike. If you enjoy it, please like it See you on Sunday!! Follow that #Fr1endlyRATs #Dreamlab #Adversaryvillage #defcon29

Ekoparty | Hacking everything (@ekoparty) 's Twitter Profile Photo

⚡ 𝗘𝗦𝗧𝗥𝗘𝗡𝗢 #𝗘𝗞𝗢𝗧𝗩 📺 ROOT AND HASH ✨ Un nuevo programa creado por Dreamlab Technologies 𝗖𝗵𝗶𝗹𝗲 🇨🇱 ▶ ESTRENO: 𝗟𝗨𝗡𝗘𝗦 𝟯𝟬 𝗗𝗘 𝗔𝗚𝗢𝗦𝗧𝗢 🕣 20.30 HS 🇦🇷 / 19.30 HS 🇨🇱 🔴 Transmisión EN VIVO: bit.ly/3stXoxo

⚡ 𝗘𝗦𝗧𝗥𝗘𝗡𝗢 #𝗘𝗞𝗢𝗧𝗩 📺

ROOT AND HASH

✨ Un nuevo programa creado por <a href="/DreamlabGlobal/">Dreamlab Technologies</a> 𝗖𝗵𝗶𝗹𝗲 🇨🇱

▶ ESTRENO: 𝗟𝗨𝗡𝗘𝗦 𝟯𝟬 𝗗𝗘 𝗔𝗚𝗢𝗦𝗧𝗢
🕣 20.30 HS 🇦🇷 / 19.30 HS 🇨🇱

🔴 Transmisión EN VIVO: bit.ly/3stXoxo
Antonio Sanz (@antoniosanzalc) 's Twitter Profile Photo

Si solo puedes hacer una cosa hoy, haz esto: pon 2FA en todos tus accesos externos. Por favor, please, porfi porfi o sea, ostias ya. Te vas a ahorrar el 90% de tus problemas de #seguridad

Eko Red Team Space (@ekozonaredteam) 's Twitter Profile Photo

En el lineup de mañana tenemos al gran Mobin en el arranque quién nos va a hablar y mostrar una herramienta para ser sigilosos en nuestras reverse shells y C2. A no faltar!!

En el lineup de mañana tenemos al gran <a href="/mobinja/">Mobin</a> en el arranque quién nos va a hablar y mostrar una herramienta para ser sigilosos en nuestras reverse shells y C2. A no faltar!!
Marta Lagos (@mmlagoscc) 's Twitter Profile Photo

A quien le interesa una inciativa ciudadana para presentar la eliminación definitiva de los notarios? Hay que certificar por métodos modernos hoy.