Kristen!

365 posts

Kristen! banner
Kristen!

Kristen!

@SecPanda_

Bears. Beets. Battlestar Galactica. Cyber Threat Intel. Eater of snacks. 🐼 @[email protected]

Katılım Mart 2020
1.9K Takip Edilen387 Takipçiler
Kristen!
Kristen!@SecPanda_·
@0xTib3rius @IceSolst I went to ShmooCon and stopped by their table one year and their marketing person asked me if I was attending the conference. Then he asked if I was there with a boyfriend. Nope…I just happen to be a woman who is interested in and working in security who paid to attend. WTF.
English
0
0
3
529
Tib3rius
Tib3rius@0xTib3rius·
@IceSolst BHIS is a miserably shitty company. I haven't spoken out against them before because I had friends who worked there. Don't support them, Antisyphon Training, or Wild West Hackin Fest. There are so many better orgs that deserve your money.
English
8
2
72
22.7K
Kristen! retweetledi
Abdel
Abdel@rockkdev·
New Robinhood phishing chain that's kinda beautiful: 1. Attacker creates an RH account using the Gmail dot trick of your email (same inbox, different address) 2. Sets device name to HTML 3. RH's "unrecognized activity" email renders the device name unsanitized (html injection) The result is a real email from noreply@robinhood.com, DKIM pass, SPF pass, DMARC pass, with a phishing CTA Just because it's real, doesn't mean it's safe... $HOOD
Abdel tweet mediaAbdel tweet mediaAbdel tweet media
English
181
367
3.8K
3M
Kristen! retweetledi
ginny
ginny@0xginnny·
@paoloanzn very disappointed that no one decided to name their free claude model “philanthropic”
English
3
26
121
42.9K
vx-underground
vx-underground@vxunderground·
Good morning, afternoon, or night. We're continuing giveaways. We're on number ??????? Our friends at @AlteredSecurity hooked us up with 5 vouchers for their Certified Red Team Professional course. See subsequent for course details. If you want to do cool red teaming hacker stuff, leave a comment below. - Winners will be selected randomly in the next 24 hours. - We will DM winners. - If you do not confirm your win in 24 hours a new winner will be selected - If your DMs are closed, you automatically forfeit your prize
English
1.1K
56
776
58.3K
Kristen! retweetledi
Yarden Shafir
Yarden Shafir@yarden_shafir·
I know this isn't new but can we talk about the MS threat actor naming scheme again? It's not just that the scheme itself is ridiculous. Someone consciously chose the most stripper-coded fruit and gems for each one. On purpose.
Yarden Shafir tweet media
English
22
17
155
60.6K
Panda🐼
Panda🐼@realcyberpanda·
The perfect LEGO doesn’t exist..? Just generated my AI-designed LEGO set. I’m obsessed 😍
Panda🐼 tweet media
English
6
7
90
4.8K
Kristen! retweetledi
JD Work
JD Work@HostileSpectrum·
@alex_lanstein Technical intelligence never displaces the need for good human intelligence collection. A tale as old as metis.
English
0
5
39
5.4K
Kristen! retweetledi
John Hammond
John Hammond@_JohnHammond·
CrowdStrike Falcon agents are imploding right now and causing a Blue Screen of Death boot loop on every endpoint. Reports of massive outages globally. reddit.com/r/crowdstrike/…
English
68
978
3.5K
1.1M
Kristen!
Kristen!@SecPanda_·
A colleagues shared this with me: roadmap.sh/roadmaps What a cool resource for guided learning - both role based and specific skill based ⭐️
English
0
0
1
109
Kristen!
Kristen!@SecPanda_·
“Wanted to let you know that she’s just a little dirty today…” - dog daycare desk lady 😬❤️🐺
Kristen! tweet media
English
0
0
0
145
Kristen!
Kristen!@SecPanda_·
Oh hi North Carolina 🌲🌲
Kristen! tweet media
English
0
0
3
167
Kristen! retweetledi
Charlie
Charlie@ghost_motley·
I am one again reminding people that if you are creating a Windows 11 installer, use Rufus - You can bypass the RAM, Secure Boot and TPM requirements - You can remove the requirement for a Microsoft account - Disable automatic encryption - Auto-create account and more
Charlie tweet media
English
217
1.6K
12.1K
858.2K
Kristen! retweetledi
Amitai Cohen
Amitai Cohen@AmitaiCo·
Happy to introduce "Pivot Atlas", a digital pivoting handbook for cyber threat intel analysts. I've been working on this as a personal project with the goal of graphing the "pivotability" of threat intel artifacts and providing real-world examples and reference material. (1/2)🧵
Amitai Cohen tweet mediaAmitai Cohen tweet mediaAmitai Cohen tweet mediaAmitai Cohen tweet media
English
11
85
321
40.1K
Kristen! retweetledi
Bryson 🦄
Bryson 🦄@brysonbort·
Being Busy isn't the same thing as Being Productive
English
4
8
62
4.6K
Kristen! retweetledi
thebes
thebes@voooooogel·
next time your friend goes to the bathroom, grab their phone and use the new memory feature to add some stochastic whimsy and delight to their chatgpt experience
thebes tweet mediathebes tweet media
English
20
302
4.4K
203.7K
Kristen!
Kristen!@SecPanda_·
Sleep is but a Time Machine to more food…you know what they say - New Day, New Macros 🤤
English
0
0
0
75
Kristen! retweetledi
💻 Sherrod DeGrippo
💻 Sherrod DeGrippo@sherrod_im·
If you know a woman in infosec who is looking to learn more, please tell them to subscribe to THE Microsoft threat intelligence podcast. We have a fantastic slate of women talking on subjects like mobile malware RE, Incident Response, data science, and more!
English
6
66
232
23.8K