OSSTMM

358 posts

OSSTMM banner
OSSTMM

OSSTMM

@osstmm

The official account for the Open Source Security Testing Methodology Manual. Pronounced "aw-stem". A tool designed to research how security works.

Katılım Şubat 2014
10 Takip Edilen409 Takipçiler
OSSTMM retweetledi
pete
pete@peteherzog·
Every profession has its own snobs who laugh at how their colleagues get even basic things wrong. So do we hate them for being so snobby or should we be scared that we might get one of the idiots helping us instead?
English
2
2
3
0
OSSTMM retweetledi
pete
pete@peteherzog·
#coronavirus This is not rocket biology my #cybersecurity friends. You've got this. Create a physical separation between the threat and the asset. Reduce interactions. Apply both ingress and egress filtering. Stay strict with your hygiene. Beware misinformation. #Covid_19 #OSSTMM
English
0
6
4
0
OSSTMM retweetledi
pete
pete@peteherzog·
#coronavirus Keep calm and react. This is about security not Risk. Reduce your Attack Surface and protect your interactions. Remove unneeded services. Use controls for necessary operations. Remember a compromised host is a danger to other hosts. #Covid_19 #CyberSecurity #OSSTMM
English
0
6
8
0
OSSTMM retweetledi
BlackBerry Cybersecurity
BlackBerry Cybersecurity@BlackBerrySpark·
#Cybersecurity Island, the Unfortunate Reality Show. The show starts as contestants are forced to grab all the cybersecurity products they can off a boat and get to shore. With just their wits and a default Windows install, they must survive... @peteherzog bit.ly/33rhwlF
BlackBerry Cybersecurity tweet media
English
0
8
8
0
OSSTMM retweetledi
pete
pete@peteherzog·
So I've been busy with a bunch of projects for ISECOM and Hacker Highschool but one of the ones that's most interesting lately is using Social Engineering tricks to teach AI to learn how to understand what it reads. I'm going to see if I can present on it somewhere.
English
0
6
8
0
OSSTMM retweetledi
pete
pete@peteherzog·
Cybersecurity: keeping everything working the same while keeping unknown bad things from happening by using technologies that have unknown supply-chain effects all under time pressure.
English
0
5
12
0
OSSTMM retweetledi
pete
pete@peteherzog·
Training AI through Social Engineering Techniques on Feb. 25th in Cardiff! Just got my invite! Come see the presentation and the demo! Details here: eventbrite.co.uk/e/ai-for-finte…
English
0
4
5
0
OSSTMM retweetledi
pete
pete@peteherzog·
There is something pathetically optimistic about cybersafety. There is something quietly unsettling about cybersecurity. There’s something nauseously helpless about being breached. What to do guidelines for what to do when you're breached: threatvector.cylance.com/en_us/home/so-…
English
0
4
5
0
OSSTMM retweetledi
BlackBerry Cybersecurity
BlackBerry Cybersecurity@BlackBerrySpark·
#Cybersecurity Island, the Unfortunate Reality Show. The show starts as contestants are forced to grab all the cybersecurity products they can off a boat and get to shore. With just their wits and a default Windows install, they must survive... @peteherzog bit.ly/33rhwlF
BlackBerry Cybersecurity tweet media
English
0
9
6
0
OSSTMM retweetledi
BlackBerry Cybersecurity
BlackBerry Cybersecurity@BlackBerrySpark·
#Cybersecurity Island, the Unfortunate Reality Show. The show starts as contestants are forced to grab all the cybersecurity products they can off a boat and get to shore. With just their wits and a default Windows install, they must survive... @peteherzog bit.ly/33rhwlF
BlackBerry Cybersecurity tweet media
English
0
4
3
0
OSSTMM retweetledi
Thinkst Canary
Thinkst Canary@ThinkstCanary·
A repeat of our annual Black Friday Offer: Create as many Canarytokens as you want, completely free¹ at canarytokens.org. At this price, you’d be crazy not to sprinkle some around your network. __ ¹ Tokens only free till heat death of Universe;
Thinkst Canary tweet media
English
0
23
44
0
OSSTMM retweetledi
BlackBerry Cybersecurity
BlackBerry Cybersecurity@BlackBerrySpark·
#Cybersecurity Island, the Unfortunate Reality Show. The show starts as contestants are forced to grab all the cybersecurity products they can off a boat and get to shore. With just their wits and a default Windows install, they must survive... @peteherzog bit.ly/33rhwlF
BlackBerry Cybersecurity tweet media
English
1
6
6
0
OSSTMM retweetledi
raptor
raptor@0xdea·
I can attest to the fact that defenders prefer to have PoCs to better understand, prioritize, and fix security issues. As a researcher, it’s your own bug — you can do whatever you want with it. And please stop saying “responsible” disclosure. No need for moral judgements here.
Maddie Stone@maddiestone

@Fox0x01 We clearly disagree on this 😏 Providing POCs helps defenders more than attackers. Defenders often use POCs to build detections and develop new solutions to mitigate not just the big but also exploit techniques.

English
0
2
11
0