Human

5.5K posts

Human

Human

@BadaMasigi

AI will not replace you. A person using AI will

Katılım Ocak 2020
640 Takip Edilen46 Takipçiler
Jenny
Jenny@Jennnyyyyyy·
What is the weight of Lion? 🤔 Difficulty - Medium Pro 🤠
Jenny tweet media
English
71K
1.6K
33.5K
13.9M
Human retweetledi
Ray🫧
Ray🫧@ravikiran_dev7·
Best YouTube Channels To Crack Tech Interviews (2026) 1. DSA – NeetCode 2. LeetCode Patterns – Abdul Bari 3. System Design – Gaurav Sen 4. Mock Interviews – Pramp 5. FAANG Prep – Tech Dummies 6. Coding Rounds – Nick White 7. Behavioral – Jeff H Sipe 8. Problem Solving – Back To Back SWE 9. Deep DSA – Errichto 10. Interview Strategy – Exponent 11. Resume + Career – Self Made Millennial 12. Real Interview Qs – Clément Mihailescu 13. Advanced DSA – William Lin 14. CS Basics – MIT OpenCourseWare
Ray🫧 tweet mediaRay🫧 tweet media
English
44
215
1.7K
65.5K
Human retweetledi
Ridgeline Cyber
Ridgeline Cyber@RidgelineCyber·
OAuth consent phishing is the #M365 attack most orgs still aren’t watching. No password stolen. No MFA bypassed. Just one “Sign in with Microsoft → Approve” click. Malicious app gets a refresh token with persistent access to mail, files & calendar. Bypasses Conditional Access. Logs look normal. Default detections miss it. Fix: Monitor Entra audit logs for “Consent to application”. Alert on risky scopes (Mail.Read, Files.ReadWrite.All, offline_access) from unverified publishers. Better: Disable user consent entirely. Force admin approval only, where practical. This is the gap between “we have MFA” and real security. M365/SecOps pros: auditing your consents right now!
Ridgeline Cyber tweet media
English
4
27
114
8.5K
Human retweetledi
Het Mehta
Het Mehta@hetmehtaa·
OWASP just dropped APTS A governance standard for autonomous pentesting platforms. Not a methodology. A control layer. Focus: scope enforcement, safe autonomy, manipulation resistance, accountability. As AI-driven testing scales, this is the guardrail the industry needed. github.com/OWASP/APTS
Het Mehta tweet media
English
4
102
423
30.9K
Human retweetledi
Human retweetledi
Vivek | Cybersecurity
Vivek | Cybersecurity@VivekIntel·
🛡️ 𝗛𝗮𝗰𝗸𝗲𝗿 𝗦𝗲𝗮𝗿𝗰𝗵 𝗘𝗻𝗴𝗶𝗻𝗲𝘀 (𝗢𝗦𝗜𝗡𝗧) 🌐 Infra • Shodan — Find exposed devices shodan.io • Censys — Internet-wide asset view censys.io • FOFA — Asset discovery fofa.info • ZoomEye — Attack surface mapping zoomeye.org 📧 Identity • Hunter — Find emails hunter.io • HaveIBeenPwned — Breach check haveibeenpwned.com • Dehashed — Leaked credentials dehashed.com 💻 Web / Code • URLScan — Analyze websites urlscan.ioGrep.app — Search code grep.appcrt.sh — SSL cert lookup crt.sh 🔐 Vulns • Vulners — Vulnerability DB vulners.com • GreyNoise — Filter attack noise viz.greynoise.io • FullHunt — Attack surface fullhunt.io 📡 OSINT • WiGLE — WiFi mapping wigle.net • IntelX — Deep data search intelx.io • LeakIX — Exposed data leakix.net • SecurityTrails — DNS/IP data securitytrails.com 💡 Tip: SpiderFoot — automate recon spiderfoot.net #OSINT #CyberSecurity
English
2
311
1.3K
62.7K
Human retweetledi
Merill Fernando
Merill Fernando@merill·
Entra Hardening Tip #2: Require MFA for device join & device registration using 'User Action' If you don’t enforce a Conditional Access policy for “Register or join devices”, you’re leaving a gap. Attackers can take advantage of this and register new devices without MFA. Once they’re in, they can: 🚩 Stay persistent 🚩 Bypass controls that rely on trusted devices From there, it opens the door to: 🚩 Data exfiltration 🚩Dropping malicious apps 🚩 Moving laterally across your environment 🚩Recon of your device configuration and compliance policies The fix: Create a CA policy → Include: All users → Target: User Action = Register or join devices → Grant access: Require authentication strength - MFA
Merill Fernando tweet media
English
4
43
216
13.5K
Human retweetledi
Merill Fernando
Merill Fernando@merill·
Just dropped a new EntraChat episode with @PyroTek3 from @TrustedSec and honestly my brain is full 🤯 Sean has been doing Microsoft identity security since Azure AD was barely a thing and he still sees the same misconfigs in enterprise environments every. single. day. legacy auth left on. app permissions nobody's auditing. shadow tenants nobody knows exist. the fundamentals aren't boring, they're just not done 🎙️👇
Merill Fernando tweet media
English
2
53
203
35.7K
Human retweetledi
Nav Toor
Nav Toor@heynavtoor·
TeamViewer charges $50.90/month. AnyDesk starts at $22.90/month. And every single connection goes through their servers. Your screen. Your passwords. Your files. Your private conversations. All routed through someone else's computer. TeamViewer was breached in June 2024. An APT group got into their internal corporate IT environment. There is a free alternative. You host it yourself. Your data never touches a third party. It is called RustDesk. 102,000+ stars on GitHub. You download it. Share your ID. Connect. That is it. Works instantly. No account needed. Here is what it does: - Full remote desktop control across Windows, Mac, Linux, Android, and iOS - File transfer between devices. Drag and drop. - Clipboard sync. Copy on one machine, paste on the other. - Direct P2P connections through TCP hole punching. Faster than any relay. - End-to-end encryption on every connection. NaCl cryptography. - Works out of the box with zero configuration Here's the wildest part: You do not need to self-host to use it. Public relay servers are built in. Download and connect in seconds. But if you self-host on a $5 VPS, you get something no paid tool offers: Complete data sovereignty. Your screen. Your files. Your logs. All on YOUR server. Nobody else sees them. Ever. Unlimited users. Unlimited devices. TeamViewer Business: $50.90/month. $610/year. AnyDesk Solo: $22.90/month. $274/year. RustDesk: $0. Forever. Built in Rust. 356 contributors. 14,900+ forks. Translated into 39 languages. AGPL-3.0 licensed. Self-hosted. Community-driven. 100% Open Source. (Link in the comments)
Nav Toor tweet media
English
82
452
2.6K
194.1K
Human retweetledi
Suni
Suni@suni_code·
Interviewer: An OTP is valid for exactly 30-60 seconds. Even though no one stored it anywhere. how does the server verify it without ever saving it?
Suni tweet media
English
46
35
736
297.2K
Human retweetledi
Sakshi Sugandhi
Sakshi Sugandhi@SakshiSugandhi·
Interviewer: You type a Gmail username and UI instantly shows "Username already taken" There are millions of users globally How does it check so fast?
Sakshi Sugandhi tweet media
English
85
22
443
165.6K
Human retweetledi
F.O.L.A
F.O.L.A@folaoftech·
Have you heard about Vector Database
English
6
118
1K
50.2K
Human retweetledi
Hacking Articles
Hacking Articles@hackinarticles·
🚨 Lateral Movement: Enabling RDP Remotely 🚨 🔥 Telegram: t.me/hackinarticles ✴ Twitter: x.com/hackinarticles Attackers can remotely enable Remote Desktop (RDP) on compromised systems to gain persistent access and move laterally across the network without needing physical interaction. ⚡ Attack Highlights 💻 Enable RDP via registry modification 🔐 Change fDenyTSConnections to allow access 🔥 Open firewall port 3389 for connectivity 🌐 Authenticate remotely using valid credentials 🛠️ Techniques & Methods 📡 Remote Registry manipulation ⚙️ PowerShell / CMD execution 🧩 Group Policy (GPO) abuse 🛡️ Firewall rule modification 💡 RDP uses port 3389 and requires proper firewall rules and permissions—once enabled, attackers can fully control the system remotely. 📖 Article: hackingarticles.in/lateral-moveme… #CyberSecurity #EthicalHacking #Pentesting #RedTeam #LateralMovement #RDP #ActiveDirectory
Hacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet media
English
5
51
261
15.2K
Human retweetledi
Ben Dicken
Ben Dicken@BenjDicken·
Postgres, MySQL, and SQLite all support atomic transactions. It's what allows us to apply any combination of inserts, updates, and deletes as a single logical unit of work. A walkthrough from this weeks stream.
English
12
67
845
42K
Human retweetledi
Roan
Roan@RohOnChain·
This 2 hour Stanford lecture will teach you more about how LLMs like ChatGPT & Claude are built than most people working at top AI companies learn in their entire careers. Bookmark this & give 2 hours today, no matter what. It'll be the most productive thing you do this week.
English
141
3.3K
19.4K
2.2M
Human retweetledi
mRr3b00t
mRr3b00t@UK_Daniel_Card·
Ok, I just used Claude to pentest a very simple Active Directory in the LAB! round one it basically end to end did a pentest with very little handholding, it walked me through a wizard of test style and rules, when it got stuck at the black box stage it then asked me for a course of action, we went to assume breach. the account I gave it was in the 'administrators' group so it had ADMIN rights and then it ran bloodhound, DCSYC, found kerberoastable accounts, enumerated ADCS vulnerabilities etc. then it checked the hashes of accounts and then wrote a report (the report is pretty good) I am now making it go back and go again but this time the user is LOW priv (a bit of a fuck up on my part this was the wrong way round)
mRr3b00t tweet media
English
10
19
215
22.5K
guljar khan
guljar khan@guljarkhan02·
मिट्टी के नीचे सालों से दबी एक कहानी… 😨 जब कब्र खोली गई, तो हड्डियों के साथ मिला कीमती जेवर आखिर ये खजाना है या किसी अधूरी ज़िंदगी की आखिरी निशानी
हिन्दी
155
306
2.6K
661.2K
Exotic Astrology
Exotic Astrology@exotikastrology·
Major Predictions for UAE 🇦🇪 - Great period till 2041 2026, 2027 - Buy property 2028, 2033, 2035, 2036 - Sell property #UAE #Dubai #uaerealestate
English
11
18
162
30K
Rakesh Chauhan
Rakesh Chauhan@RakeshC000·
लड़कियां बेवक़ूफ़ नहीं होती हैं जिनके साथ कोई फ्रॉड कर सके कुछ फ्रॉड करने वालों के साथ भी फ्रॉड कर सकतीं हैं। 📹 वीडियो इंटरेस्टिंग है
हिन्दी
77
1.4K
5.8K
88.8K
Human retweetledi
Microsoft Learn
Microsoft Learn@MicrosoftLearn·
If you want to get Microsoft AI certified, start here: • Level 1: Azure AI Fundamentals (AI-900) • Level 2: Azure AI Engineer Associate (AI-102) • Level 3: Azure Solutions Architect Expert (AZ-305) (not AI‑specific, but useful for architecting AI solutions)
English
192
1.8K
18.8K
4M