Christopher Elisan (@tophs) 's Twitter Profile
Christopher Elisan

@tophs

Cyber Intel | Thought Leader | Author | Speaker | Coach | Family Man

ID: 20201341

calendar_today05-02-2009 23:27:11

2,2K Tweet

1,1K Takipçi

637 Takip Edilen

Christopher Elisan (@tophs) 's Twitter Profile Photo

Brave the Storm: Surfing the Wake of Salt Typhoon and What We Can and Should Learn From It - by @wgragido CPO of @netwitness #malware #threatintel netwitness.com/blog/brave-the…

Jason Haddix (@jhaddix) 's Twitter Profile Photo

🧠 Did you know you can pipe into Claude Code? Like: cat logs.txt | claude -p "analyze for..." strings bin.bin | claude -p "explain X" etc...

Brave (@brave) 's Twitter Profile Photo

Perplexity Comet’s AI assistant can take screenshots of websites and analyze them for users. However, Comet will also follow instructions hidden on a webpage that it screenshots.

Jason Haddix (@jhaddix) 's Twitter Profile Photo

We at Arcanum Information Security are ecstatic to announce our next course author, who is building an XPAC for our series of "The Bug Hunter's Methodology" training sessions. Welcome the_IDORminator aka Zwink to the fam 🤘 More info on the course soon! Stay tuned!

We at <a href="/arcanuminfosec/">Arcanum Information Security</a> are ecstatic to announce our next course author, who is building an XPAC for our series of "The Bug Hunter's Methodology" training sessions. 

Welcome <a href="/the_IDORminator/">the_IDORminator</a> aka Zwink to the fam 🤘 

More info on the course soon! Stay tuned!
The Hacker News (@thehackersnews) 's Twitter Profile Photo

🛑 WARNING: CVE-2025-20393 is rated 10.0, with no patch available. Cisco confirmed active exploitation of an AsyncOS zero-day by a China-linked APT. The flaw allows root-level command execution on affected email security appliances and enables attackers to establish

🛑 WARNING: CVE-2025-20393 is rated 10.0, with no patch available.

Cisco confirmed active exploitation of an AsyncOS zero-day by a China-linked APT.

The flaw allows root-level command execution on affected email security appliances and enables attackers to establish