Interested in the technical details of this research? Check out our blog in which we detail the issues we found and how they can be mitigated 🔗⬇️
wiz.io/blog/wiz-and-h…
A Chinese military training site in China's Inner Mongolia region is an exact replica of the road network near Taiwan's Presidential Palace.
Make no mistake: China fully plans to invade Taiwan in a geopolitical play that will unbalance the region.
Note: This is sure to drive a conversation; however, Tweet ≠ endorsement
United States Cyber Force
March 25, 2024, Foundation for the Defense of Democracies
fdd.org/analysis/2024/…
A colleague shared this quote with me. I don't know the exact origin, if anyone can point to it that would be great. Resonates big time
“Ransomware Threat Actors are very good at the basics, and this shows against companies that aren’t.” -SANS DFIR Aug 2023
Dole Food Company, an Irish agricultural multinational corporation, among one of the largest producers of fruits and vegetables, with over 38,000 employees and $6,500,000,000 in annual revenue, has been hit by ransomware.
Intel and photo via @BleepinComputer
Mandiant has observed APT29, a Russian espionage group, continue to demonstrate exceptional operational security and advanced tactics targeting Microsoft 365. In this blog they highlight several newer TTPs used by APT29 in recent operations | mandiant.com/resources/blog…@Mandiant
Spread the word! The US Cyber Challenge’s annual CyberQuests competition is on!
This FREE online competition was designed to see how competitors rank against others throughout the nation.
Are you up for the challenge? CyberQuests.org
TODAY is my 18th BIRTHDAY! IM AN ADULT POGGERS
I just wanted to thanks some streamers/val players that helped me get through quarintine:
@nosyy_tv@ProdCM_@vinniehacker@zander_fps@ranked_demon@xQc
Thanks everyone for creating content for me to watch. I love yall ❤️
Anyone using ExifTool make sure to update to 12.24+ as CVE-2021-22204 can be triggered with a perfectly valid image (jpg, tiff, mp4 and many more) leading to arbitrary code execution!
224K Followers 6K FollowingFounder @Binary_Defense @TrustedSec Co-Owner https://t.co/HQC75WhdJh. @WeHackHealth Pod. God + Family/Hacker/CSO/USMC/Intel/Fitness. Make the world a better place.
26K Followers 1K FollowingSenior Security Consultant @TrustedSec | Military grade meme poster, researcher, cloud penetration tester, voider of warranties. My thoughts are my own.
14K Followers 19 FollowingZeek is an open-source network security monitor. Retweets are not endorsements. https://t.co/gJjutmzsi8. Also: https://t.co/T5ptypZeDp
195K Followers 995 FollowingHelping policymakers and the public engage the challenges facing the U.S. and international community in the 21st century.
Newsletter: https://t.co/HgDCEOVGYy
7K Followers 389 FollowingHacker of the old-school variety. Associate Teaching Professor at Tufts University. Likes the simple life. My views are mine alone. #GGMU
83K Followers 16 FollowingTrend Zero Day Initiative™ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
79K Followers 472 FollowingU.S. @Energy labs dedicated to securing a peaceful and free world through #science and #technology. Follows, RTs and mentions ≠ endorsements.
64K Followers 81 FollowingThe latest research and news from Unit 42, the Palo Alto Networks (@paloaltontwks) Threat Intelligence and Security Consulting Team covering incident response.
50K Followers 2K FollowingSecure Coding Trainer, Best-selling author of Alice and Bob Learn Secure Coding & Alice and Bob Learn Application Security. #AppSec she/her 🌻
235K Followers 1K FollowingCofounder @hackinghub_io | Advisor @CaidoIO. I hack companies and make content about it. #NahamCon organizer. ex @hacker0x01🇮🇷
682 Followers 489 FollowingELITECISOs (For CISOs by CISOs ) is a forum of senior security professionals dedicated to enhancing collaboration within CISO community and peers.
2.7M Followers 4 FollowingIndependent online protection company. Get our mobile & desktop browser with protections built-in, including our search engine that doesn't track you.
11K Followers 7 FollowingBlue Team Con is an annual cybersecurity conference built for defenders, inclusive of anyone interested in safeguarding organizations. | 4-7 September 2025
3K Followers 393 FollowingWe vet #Cybersecurity books. Our reviews are written by real life experts, heroes, and hackers who led through the biggest exploits. Sponsored by @OhioState
2K Followers 162 FollowingOfficial account of the Western Regional Collegiate Cyber Defense Competition. Maintained by @spiceywasabi, @bluescreenofwin, and @Turb0Yoda