Vince Warrington (@warringtonvince) 's Twitter Profile
Vince Warrington

@warringtonvince

Cyber Security and Information Assurance

ID: 817145134500474880

calendar_today05-01-2017 23:05:56

211 Tweet

722 Followers

256 Following

Oscaron (@oscaron) 's Twitter Profile Photo

┳┻| ┻┳| ┳┻| ┻┳| ┳┻| ┻┳| ┳┻| ┻┳| ┳┻| ┻┳| ┳┻| ┻┳| ┳┻| _ ┻┳| •.•) Hey kid. Wanna ┳┻|⊂ノ buy some ┻┳| blockchain?.

Masha Sedova (@modmasha) 's Twitter Profile Photo

I’m thrilled to announce the release of our new Phishing Difficulty Calculator! My team and I designed this free calculator to help you determine how hard your phishing tests are so you can better measure employee performance. buff.ly/2JYzIdm

UK Department for Business and Trade MEaP (@tradegovukmeap) 's Twitter Profile Photo

#Qatar #UK Cyber security for #FinancialServices roundtable is underway & stimulating very interesting discussion between Qatar's banks & UK #CyberSecurity companies. With our huge thanks to #QatarCentralBank for hosting. #TechnologyisGREAT #UKinQatar

#Qatar #UK Cyber security for #FinancialServices roundtable is underway & stimulating very interesting discussion between Qatar's banks & UK #CyberSecurity companies. With our huge thanks to #QatarCentralBank for hosting. #TechnologyisGREAT #UKinQatar
Vince Warrington (@warringtonvince) 's Twitter Profile Photo

Welcome to 2018, folks - where armed robbers break into your physical house to steal your virtual currency... BBC News - Robbers order gunpoint Bitcoin transfer after Moulsford break-in bbc.co.uk/news/uk-englan…

NCSC UK (@ncsc) 's Twitter Profile Photo

We think that understanding how a cyber crime gang operates is really useful! ncsc.gov.uk/blog-post/ever… #cybersecurity

We think that understanding how a cyber crime gang operates is really useful! ncsc.gov.uk/blog-post/ever… #cybersecurity
KIRO Newsradio 97.3 FM🎙 (@kironewsradio) 's Twitter Profile Photo

Last night we captured surveillance footage of a vandal trying to break in to one of our employee's vehicles in our parking lot. While the suspect is still at large, we took the liberty to have John Curley give his play-by-play of the incident. Take a listen 🔊

l0ss (@mikeloss) 's Twitter Profile Photo

Found out today that one of our guys was finding privesc on a new client's AD domain unusually challenging and it turns out that the client's sysadmin saw my WAHCKon talk about AD privesc last year and made a bunch of changes in response. A THING GOT BETTER! THE SYSTEM WORKS!

Lesley Carhart (@hacks4pancakes) 's Twitter Profile Photo

Please stop (not) preparing for critically impactful security incidents based on their relative infrequency. You put your important stuff in a fire safe, have fire drills, maintain fire insurance, and install smoke detectors even though your building doesn’t burn down every year.

Vince Warrington (@warringtonvince) 's Twitter Profile Photo

Fellow cyber people (especially those of you in the UK, given the events of the last week or so) - it’s important that you read and understand this alert from US-CERT. x.com/uscert_gov/sta…

Vince Warrington (@warringtonvince) 's Twitter Profile Photo

Sad news about Rick Dickinson, the designer of Sinclair computers. I still remember getting my first computer, a ZX81 Spectrum - it's that moment which sent me on this crazy career path we call cyber. bbc.co.uk/news/technolog…

Emad Shanab - أبو عبد الله (@alra3ees) 's Twitter Profile Photo

Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords. github.com/Viralmaniar/Pa…

ISACA Global (@isacanews) 's Twitter Profile Photo

Many women enter technical fields and cyber, but drop out before reaching executive levels. Why? What can we do to support women in cyber? Diana Kelley explores these questions in her webinar. Listen now: bit.ly/2rfN1hh

Many women enter technical fields and cyber, but drop out before reaching executive levels. Why? What can we do to support women in cyber? Diana Kelley explores these questions in her webinar. Listen now: bit.ly/2rfN1hh
🇺🇦 Joe Gray aka JOSINT 🇺🇦 (@c_3pjoe) 's Twitter Profile Photo

At 3:35 I’m presenting my #OPSEC and Anti-#OSINT talk, #DECEPTICON at SOURCE Conference #Boston. If you’re here, come to the talk. I’ll be fishing actionable advice. #SRCBos

At 3:35 I’m presenting my #OPSEC and Anti-#OSINT talk, #DECEPTICON at <a href="/SOURCEConf/">SOURCE Conference</a> #Boston. If you’re here, come to the talk. I’ll be fishing actionable advice. #SRCBos
Masha Sedova (@modmasha) 's Twitter Profile Photo

The average employee isn’t exposed to the same security experiences practitioners are. But we can get them closer to security by simulating attacks. In this week’s post, I explain why and how this works: buff.ly/2s8p7EZ