Thund3r-struck@bsky's Avatar

Thund3r-struck@bsky

@thund3r-struck.bsky.social

Former I.T. Consultant with over 20 years experience now focused on cybersecurity๐ŸŒŸPentester, Offensive Security Engineer. Currently working on my OSCP (Offensive Security Certified Professional)Certification.

215 Followers  |  479 Following  |  4 Posts  |  Joined: 08.09.2023  |  1.7201

Latest posts by thund3r-struck.bsky.social on Bluesky

Those fucking Republican fools staying silent right now think this fascist shit wonโ€™t come for them too.

You dumbfucks.
Open a history book.
Itโ€™s not if.
Itโ€™s when.

12.06.2025 22:24 โ€” ๐Ÿ‘ 3640    ๐Ÿ” 578    ๐Ÿ’ฌ 144    ๐Ÿ“Œ 20

Hi. Iโ€™m an expert in modernizing legacy government software systems. This is profoundly stupid and will definitely fail, and itโ€™s just a question of whether our social security system fails along with it.

28.03.2025 14:54 โ€” ๐Ÿ‘ 4171    ๐Ÿ” 1603    ๐Ÿ’ฌ 217    ๐Ÿ“Œ 89

DEI never once helped me in my career but I can recall so many times an unqualified white guy got an opportunity he didnโ€™t earn that Iโ€™ve lost count.
We have to over prove merit while they get rewarded based on potential & vibes.
This is one reason diverse teams do better overall

26.01.2025 14:56 โ€” ๐Ÿ‘ 226    ๐Ÿ” 38    ๐Ÿ’ฌ 8    ๐Ÿ“Œ 4
Preview
WhatsApp spear phishing campaign uses QR codes to add device A Russian espionage group has tried to trick targets into adding their systems as an extra device to your WhatsApp account.

Linked to Russiaโ€ฆ

www.malwarebytes.com/blog/news/20...

21.01.2025 11:53 โ€” ๐Ÿ‘ 2    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Let the purges begin.

20.01.2025 21:15 โ€” ๐Ÿ‘ 107    ๐Ÿ” 29    ๐Ÿ’ฌ 5    ๐Ÿ“Œ 0

Beyond disgraceful.

I cannot imagine a more cowardly affront to the rule of law than siding with traitors who favored political violence over free elections and the Constitution.

Iโ€™m speechless.

21.01.2025 02:00 โ€” ๐Ÿ‘ 21    ๐Ÿ” 7    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Letโ€™s talk about AI and end-to-end encryption Recently, I came across a fantastic new paper by a group of NYU and Cornell researchers entitled โ€œHow to think about end-to-end encryption and AI.โ€ Iโ€™m extremely grateful to see tโ€ฆ

I wrote a post about how AI will interface with end-to-end encryption. TL;DR maybe not so well! blog.cryptographyengineering.com/2025/01/17/l...

17.01.2025 15:43 โ€” ๐Ÿ‘ 207    ๐Ÿ” 85    ๐Ÿ’ฌ 12    ๐Ÿ“Œ 13
Preview
Executive Order on Strengthening and Promoting Innovation in the Nationโ€™s Cybersecurity | The White House By the authority vested in me as President by the Constitution and the laws of the United States of America, including the International Emergency

The cybersecurity executive order @cyberscoop.bsky.social has been informing you for months about was released this morning www.whitehouse.gov/briefing-roo...

16.01.2025 14:18 โ€” ๐Ÿ‘ 4    ๐Ÿ” 4    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 1
Preview
Billion-dollar video game: is this the most expensive piece of entertainment ever made? How player-funded development launched a multiplayer game of galactic proportions โ€“ and costs โ€“ in Star Citizen How much does it cost to make a video game? The development expenses of blockbuster games are closely guarded business secrets, but they haveโ€ฆ

Billion-dollar video game: is this the most expensive piece of entertainment ever made?

16.01.2025 11:39 โ€” ๐Ÿ‘ 56    ๐Ÿ” 8    ๐Ÿ’ฌ 15    ๐Ÿ“Œ 4
Preview
Is RedNote Safe? Hereโ€™s What Millions Of TikTok Users Need To Know As TikTok users flock to RedNote, there are several considerations, including the privacy of your data. Hereโ€™s what you need to know.

โ€œExperts warn of the risks of sharing your data without careful xonsideration.โ€œRedNote might seem like a quick fix for TikTok fans ahead of its potential ban in the U.S., but it comes with serious cybersecurity and privacy risksโ€โ€ฆ www.forbes.com/sites/kateof...

15.01.2025 19:25 โ€” ๐Ÿ‘ 0    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Bluesky is getting its own photo-sharing app, Flashes More good news for those looking to exit Metaโ€™s social app ecosystem in favor of a more open alternative: An independent developer is building a photo-sharing app for Bluesky called Flashes. The soon-to-launch app is powered by the same technology thatโ€ฆ

Bluesky is getting its own photo-sharing app, Flashes

15.01.2025 17:16 โ€” ๐Ÿ‘ 33409    ๐Ÿ” 6801    ๐Ÿ’ฌ 908    ๐Ÿ“Œ 2632
Preview
Understanding Cybersecurity Challenges in Industrial Settings with Lesley Carhart In this episode, host Aaron Crow converses with Lesley Carhart, Technical Director at Dragos, who brings over 15 years of experience in incident response and forensics within critical infrastructure s...

Check out my latest appearance with the 'PrOTect IT All' podcast. You can tune in here where we discuss how to practically build an OT cybersecurity program, and how to build a career in the field as a cybersecurity practitioner! protectitall.co/episodes/und... #ICScybersecurity

13.01.2025 19:37 โ€” ๐Ÿ‘ 76    ๐Ÿ” 19    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 2
Preview
Microsoft: macOS bug lets hackers install malicious kernel drivers Apple recently addressed a macOS vulnerability that allows attackers to bypass System Integrity Protection (SIP) and install malicious kernel drivers by loading third-party kernel extensions.

Apple recently addressed a macOS vulnerability that allows attackers to bypass System Integrity Protection (SIP) and install malicious kernel drivers by loading third-party kernel extensions.

13.01.2025 13:24 โ€” ๐Ÿ‘ 3    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Ransomware abuses Amazon AWS feature to encrypt S3 buckets A new ransomware campaign encrypts Amazon S3 buckets using AWS's Server-Side Encryption with Customer Provided Keys (SSE-C) known only to the threat actor, demanding ransoms to receive the decryption key.

A new ransomware campaign encrypts Amazon S3 buckets using AWS's Server-Side Encryption with Customer Provided Keys (SSE-C) known only to the threat actor, demanding ransoms to receive the decryption key.

13.01.2025 10:27 โ€” ๐Ÿ‘ 8    ๐Ÿ” 7    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 2
Preview
Critical Warning For 100 Million Apple Usersโ€”New Hack Attack Confirmed Security researchers have warned that a new variant of the Banshee credential-stealer is targeting Appleโ€™s 100 million macOS users. Hereโ€™s what you need to know.

A significant rise in credential stealer campaigns has proven highly successful, primarily driven by social engineering, where attackers convince users to execute the malware themselves.

12.01.2025 12:54 โ€” ๐Ÿ‘ 1    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Luxembourg government websites knocked offline in latest cyberattack Several websites were inaccessible for a two-hour period on Friday afternoon

Luxembourg government websites knocked offline in latest cyberattack | Luxembourg Times www.luxtimes.lu/luxembourg/l...

11.01.2025 14:02 โ€” ๐Ÿ‘ 6    ๐Ÿ” 7    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Banshee stealer evades detection using Apple XProtect encryption algo A new version of the Banshee info-stealingย malware for macOS has been evading detection over the past two months by adopting string encryption from Apple's XProtect.

Banshee stealer evades detection using Apple XProtect encryption algo https://buff.ly/4hbfWKX

11.01.2025 15:12 โ€” ๐Ÿ‘ 3    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

A network protocol stack is a hierarchy of layered protocols that collaboratively manage communication between devices, handling tasks from application-level interactions to physical data transmission over a network ๐Ÿ˜Ž๐Ÿ‘‡

#sysadmin #devops #infosec #cybersecurity

04.12.2024 13:15 โ€” ๐Ÿ‘ 10    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Post-apocalypse show pausing for the apocalypse

09.01.2025 10:15 โ€” ๐Ÿ‘ 11785    ๐Ÿ” 2789    ๐Ÿ’ฌ 114    ๐Ÿ“Œ 41
Preview
a totally not malware window with a picture of a girl on it ALT: a totally not malware window with a picture of a girl on it
19.12.2024 01:12 โ€” ๐Ÿ‘ 0    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
TikTok SCOTUS Live Blog: The Court Hears Arguments Over Potential Ban We're tuning in live as the justices consider what could be one of the most consequential First Amendment cases of the past several decades.

LIVE: WIRED journalists are tuning in and will be bringing you the most important updates from the courtroom and our analysis as the justices consider what could be one of the most consequential First Amendment rulings of the past several decades.

10.01.2025 15:07 โ€” ๐Ÿ‘ 309    ๐Ÿ” 92    ๐Ÿ’ฌ 12    ๐Ÿ“Œ 8
Preview
Security Bite: macOS malware โ€˜Bansheeโ€™ found using Appleโ€™s own code to evade detection 9to5Mac Security Bite is exclusively brought to you by Mosyle,ย the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-artโ€ฆ

Security Bite: macOS malware โ€˜Bansheeโ€™ found using Appleโ€™s own code to evade detection

10.01.2025 15:56 โ€” ๐Ÿ‘ 10    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 1

Finally closed the X account , glad to see it go

15.11.2024 01:52 โ€” ๐Ÿ‘ 4    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Thanks for the follow , agreed, I think twitter is becoming toxic as well.

26.09.2023 11:27 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

High there

14.09.2023 00:28 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Finally here, whatโ€™s up

08.09.2023 22:23 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 4    ๐Ÿ“Œ 0

@thund3r-struck is following 20 prominent accounts