Whisper.Security

27 posts

Whisper.Security banner
Whisper.Security

Whisper.Security

@WhisperSecTech

Katılım Ocak 2026
1 Takip Edilen16 Takipçiler
Whisper.Security
Whisper.Security@WhisperSecTech·
5/6 Built by a team that's spent 25+ years on the internet's core stack: ex-RIPE NCC, ICANN, IETF, K-root operator. Advised by Internet Hall of Fame inductees Geoff Huston (APNIC) and Jeff Osborn (ISC), and Cisco/security veteran Merike Kaeo. Already in production at TRM Labs.
English
1
0
2
34
Whisper.Security
Whisper.Security@WhisperSecTech·
1/6 📢We just shipped Whisper AI Context. A free-tier MCP server that gives your security AI agent live infrastructure intelligence, BGP, DNS, WHOIS, threat-graph, in 2 minutes of setup. [60-second install screencast] 👉whisper.security 🧵
English
3
4
8
86
Whisper.Security
Whisper.Security@WhisperSecTech·
AI can explain a lot of things. But not how infrastructure actually connects. 🔺DNS, BGP, certs, WHOIS, the data is public. The missing piece is context. Give AI fragments, it summarizes. Give it relationships, it investigates. More in comments 👇 #AI #ThreatIntel #InfoSec
English
1
0
5
66
Whisper.Security
Whisper.Security@WhisperSecTech·
⚠️ Three companies. One failure. You don’t have an infrastructure problem, you have a dependency problem. 🔺Same clouds.🔺 Same DNS. 🔺Same routes. Different vendors, same failure point! Infrastructure is visible. Dependencies aren’t. That’s where risk lives. More in comments 👇
Whisper.Security tweet media
English
1
0
2
27
Whisper.Security
Whisper.Security@WhisperSecTech·
The data is public. The relationships are not. Domains, IPs, DNS, certs, routing, all visible. ⚠️Attackers see systems. 🔺Defenders see fragments. The signal isn’t in the data, it’s in the connections. 👉Swipe → see the connections. Full breakdown in comments. #InfoSec
Whisper.Security tweet mediaWhisper.Security tweet mediaWhisper.Security tweet mediaWhisper.Security tweet media
English
1
0
2
34
Whisper.Security
Whisper.Security@WhisperSecTech·
What if the phishing domain you blocked was just one of twenty? Blocklists are reactive. Attackers rotate fast. Phishing runs in batches, sharing registrars, DNS, hosting, and infrastructure patterns. See why blocklists fall behind Read more in comments 👇 #ThreatIntel #InfoSec
Whisper.Security tweet mediaWhisper.Security tweet mediaWhisper.Security tweet mediaWhisper.Security tweet media
English
1
0
3
49
Anton
Anton@Antonlovesdnb·
Going to be spinning up a little series of posts with some Blue Team specific Claude tips - follow along with #ClaudeForBlueTeam First tip - ATT&CK can be downloaded as a JSON file, which Claude loves to work with. Remember, ATT&CK has a Data Source component - use Claude to ask some questions like "What logs do I need to detect X" or "What data source do I need to enable to cover the most techniques"
Anton tweet mediaAnton tweet media
English
6
80
391
25.5K
Whisper.Security
Whisper.Security@WhisperSecTech·
Technology doesn’t exist in a vacuum. Understanding the human and economic systems behind it is key to better security. Thrilled to welcome Dr. Jonathan Cave to the Whisper Advisory Board. His expertise in economics, policy, and trust will help shape cybersecurity #TechPolicy
Whisper.Security tweet media
English
0
0
2
55
Whisper.Security
Whisper.Security@WhisperSecTech·
Some build products. Others build companies. Few do both. From UUNET to MakerBot to leading the Internet Systems Consortium, Jeff Osborn has shaped critical internet infrastructure. Thrilled to welcome him to the Whisper Advisory Board. Let’s build what’s next. #TechLeadership
Whisper.Security tweet media
English
0
0
3
64
Whisper.Security
Whisper.Security@WhisperSecTech·
Your firewall isn’t your perimeter. Every SaaS tool and third-party script extends your attack surface. When their infrastructure fails, you feel it. 🔎Map what you can’t see. Try Whisper’s free API. #AttackSurfaceManagement #SupplyChainSecurity 👇Read more in comments
Whisper.Security tweet media
English
1
0
3
46