Dominik Penner(@zer0pwn) 's Twitter Profileg
Dominik Penner

@zer0pwn

principal security consultant @mandconsulting_. former ssc @nccgroupinfosec. co-founder @hackerschange. vulnerability researcher in the pursuit of knowledge

ID:437250058

linkhttps://zero.lol/about calendar_today15-12-2011 05:32:37

6,6K Tweets

5,5K Followers

1,6K Following

chompie(@chompie1337) 's Twitter Profile Photo

Some seem to believe you need to “prove” your technical ability to be shown basic respect. Not a mystery why infosec is seen as unwelcoming

account_circle
7etsuo 🏴‍☠️(@7etsuo) 's Twitter Profile Photo

Stephen Sims and Randall Jones discuss the concept of a 10x engineer, noting the debate over whether achieving such productivity requires sacrifice or can be managed within a standard work-life balance.

account_circle
Greg Linares (Laughing Mantis)(@Laughing_Mantis) 's Twitter Profile Photo

This is really impressive considering how much technology is involved in making this possible and accessible

However parts of me are thinking about the potential risk this has via cybersecurity and ensuring physical controls exist to prevent hijacking or abuse.

Very neat

account_circle
Xeno Kovah(@XenoKovah) 's Twitter Profile Photo

In my upcoming hardwear.io training, you get to pick whether you want to learn about x86-64 assembly, x86-64 OS internals, Intel firmware attack & defense, C/C++ source code vulnerability hunting, or RISC-V assembly! A true feast for the curious!

hardwear.io/usa-2024/train…

In my upcoming @hardwear_io training, you get to pick whether you want to learn about x86-64 assembly, x86-64 OS internals, Intel firmware attack & defense, C/C++ source code vulnerability hunting, or RISC-V assembly! A true feast for the curious! hardwear.io/usa-2024/train…
account_circle
Alex Plaskett(@alexjplaskett) 's Twitter Profile Photo

With the push to memory safe languages, bug classes like directory traversals are going to be one of the prevalent vulnerability classes which are going to be continually be exploited in future as part of attack chains unless initiatives like secure by design make headway.

account_circle
Dawg(@cybersecdawg) 's Twitter Profile Photo

Dominik Penner mRr3b00t true, been scanning the odd places for leaked keys from months and already upto 100k something different type of working api keys.
Non working ones are in millions, and even those are a good resource to investigate & pivot from.
Lots of big companies affected.

account_circle
Trail of Bits(@trailofbits) 's Twitter Profile Photo

Abstract Syntax Trees (ASTs) are fundamental for compilers, but their design choices significantly impact performance and memory usage. Overlooking the pragmatics can lead to suboptimal implementations.
blog.trailofbits.com/2024/05/02/the…

account_circle
Andrew Thompson(@ImposeCost) 's Twitter Profile Photo

One of my favorite interview questions as a hiring manager is:

What are your expectations for your manager?

Good managers align on their expectations for their teammates; great managers align on bilateral expectations.

account_circle
Nick Carr(@ItsReallyNick) 's Twitter Profile Photo

New cyber crime sentencing just dropped: 13 years, $16 million USD
reminder: ransomware affiliate Yaroslav Vasinskyi – aka рабо́тник (rabotnik) – orchestrated the July 2021 Kaseya Virtual System Administration (VSA) intrusion campaign piggybacking off of managed service providers…

New cyber crime sentencing just dropped: 13 years, $16 million USD reminder: ransomware affiliate Yaroslav Vasinskyi – aka рабо́тник (rabotnik) – orchestrated the July 2021 Kaseya Virtual System Administration (VSA) intrusion campaign piggybacking off of managed service providers…
account_circle