Google sounds alarm after massive data breach leaves 2.5B users exposed β what to do ASAP to protect yourself
Google breach underscores the importance of being in control of your digital safety.
Change Your Password: Google sounds alarm after ShinyHunters hack Salesforce database, exposing 2.5 billion Google users. Company's threat intelligence group discovered the breach in June. Users: update security, enable two-factor authentication and be wary of suspicious comms. More tips offered.
30.08.2025 06:11 β π 10 π 11 π¬ 1 π 1
Great talk by Dominik!
#cybersecurity #vulnerability #securityresearch #0day #bugbounty #fuzzing
15.01.2025 08:51 β π 3 π 2 π¬ 0 π 0
* Fuzzing: Brute Force Vulnerability Discovery
* Fuzzing for Software Security Testing and Quality Assurance
* A Bug Hunterβs Diary
* The Fuzzing Book
Addons
_ Practical Malware reverse engineering
_ objective C
_ x86, x64 assembly
14.01.2025 11:24 β π 0 π 0 π¬ 0 π 0
Vulnerabilities
Public mind map by Alexey Odintsov. Create your own collaborative mind maps for free at www.mindmeister.com
Keen to learn Vulnerability Research π?
Thread of books and reference materials
* The Art of Software Security Assessment
* REVERSING: Secrets of Reverse Engineering
www.mindmeister.com/849149540/vu...
#cybersecurity #vulnerability #securityresearch #0day #bugbounty #fuzzing
14.01.2025 11:24 β π 1 π 0 π¬ 1 π 0
Had a blast in Sydney, AUS recording a live "Wide World of Cyber" podcast w/ @patrick.risky.biz. Awesome crowd, timely content, & even better weather (early summer in Sydney ain't bad!). Sadly, no Kangaroo π¦ sightings, but the biggest batsπ¦I've ever seen! 10/10, would do again!
19.12.2024 23:49 β π 44 π 3 π¬ 3 π 1
Apple 0-day
Malware can unload network extensions and cause chaos
Great work by @patrickwardle on reversing crash dumps. Excellent preso on walking through the reversing process
Link - objective-see.org/blog/blog_0x...
#defcon32 #blackhat #apple #CyberSecurity #zeroday #malware
29.11.2024 03:18 β π 3 π 1 π¬ 1 π 0
Happy to release Proxy_Bypass π
Post exploitation tool to identify UserAgents that bypasses proxy restrictions.
github.com/Add3r/Proxy_Byβ¦
#Pentesting #Security #Hacking #CyberSecurity #infosec #redteam #pentest #hackers #coding #opensource #purpleteam #bugbounty #hack #proxy
29.11.2024 03:15 β π 3 π 0 π¬ 0 π 0
Retro tech, early web & vintage computing. 80s, 90s, 2000s nostalgia. Follow for daily posts.
I am eminently qualified to speak from experience about a variety of dumpster fires.
ICS DFIR at Dragos, martial artist, marksman, humanist, level 14 Neutral Good rogue, USAF retired. I post *very serious* things about infosec. Thoughts my own. Enby. π³οΈβπ
May tinker with cameras, motorbikes, and infosec automation when not being antisocial. See also: @notalenthack.org
cyber, adv sim, VECTR dev, Java/Rust/Vue, MACAT (https://macat.io), catpoasting, screaming at the moon
think bad, do good. | https://sa.my
Cat content || Joern || GTFO
https://quedev-security.com/
@joernio core
@allesctf
@0x4d5a@infosec.exchange
computers are an insecure mess
Computer Science student mff.cuni.cz, CTFs with wrecktheline.com & czechcyberteam.github.io
Someone who likes debuggers a bit too much
π¨π¦ β’ π°π· β’ π«π·
Former USAF intel officer. Early info war practitioner. Created GE-CIRT. Mandiant's first CISO. #NetworkSecurityMonitoring for @corelight-inc. Author. Latest books #ad amzn.to/3B2AcMc
Detect, Defend, Defeat β Building robust #CyberResilience for organizations through advanced, future-proof #CyberSecurity solutions.
Lemmy: https://lemmy.ml/c/rocketmeup
Matrix: https://matrix.to/#/#rocketmeup:matrix.org
Telegram: https://t.me/rocketmeup
Cloud Vulnerability Research @ Google
reverse engineering & vulnerability research, ex MWR Labs, generally bad at computers, memory safe(probably), OS internals/hypervisor/browser research and bug hunting r&d (β€οΈprogram/code analysis)ππ @adhsec on hellsite, they/them, enby, #AuDHD
Dad, Vulnerability Research, Packet connoisseur. He/Him. Cyber Security Architect @greynoise.bsky.social
, DM's open. Top percentage Rattata. #cve #infosec #cybersecurity
https://remyhax.xyz/
Security Engineering and Architecture at Apple. Vulnerability research. Embedded systems in Swift. Alumnus RPISEC. Previously ReSwitched. π³οΈβπ
Fuzzing; Vulnerability Research;
Deep Learning; Reverse Engineering
Training & Publications @ http://fuzzing.io
Hacking the planet since 1995
Undercurrents.io BOFH
I'll stop the world and melt with you
OffensiveCon is a highly technical international security conference focused on offensive security only. Organized by Binary Gecko GmbH.
offensive security - windows internals - reverse engineering | X: https://x.com/splinter_code | Mastodon: https://infosec.exchange/@splinter_code | GitHub: https://github.com/antonioCoco | Blog: https://splintercod3.blogspot.com/
I do AI + Offensive Security research @ Duke
Prev breaking things professionally @ OtterSec, PaloAltoNetworks, Glimpse, Spirals
I do offensive security things on the internet
- pentester/recovering sysadmin
- Ethical Threat
- Active Directory Security Connoisseur
- offensive stuff > securit360.com
- Host Cyber Threat POV > offsec.blog
- SWAG > swag.ethicalthreat.com
- free newsletter > https://click.spenceralessi.com/mylinks