Information Security
86 Threads
“Disinformation” is a spook term. Anyone who unironically says “disinformation” is doing an intelligence service’s bidding.
@InfoSecComm Newsletter - 10 condensed : #bugbounty #infosec #cybersecurity #hacking #newsletter
FROM INTERNET ~ Series of #infosec Blogs. 1)[case study#1] IDOR vulnerability allows access to user’s personal data https://t.co/hKSODbgx0F #thesecureedge #BugBounty #IoT #cybe...
Day 3 of Web Application Penetration Testing From Absolute Beginning - Topic - Session Management in Web Applications Check Threats #cybersecurity #bugbounty #bugbountytips #i...
Recon Tools for Web Application Pentesting... :) Credits ~ Khalid Maina A Thread 🧵 ↓ #cybersecurity #infosec #pentesting #bugbounty
Good morning my fellow #infosec and other curious individuals! Today is day TWO of my live tweeted Internal Penetration Test with Acme. Updates to follow. Here's the thread from y...
FREE LABS TO TEST YOUR PENTEST/CTF SKILLS :-) Retweet this to let others know :) #cybersecurity #infosec #pentesting
Here's a list of some high quality Bug Bounty Methodologies / checklists. All for FREE. 🧵👇 #bugbounty #bugbountytips #infosec #cybersecurity
Cold wallet attacks & defense methods: reading list from CIA: - https://t.co/tghJJniqCe - https://t.co/RmtPKIOo3C - https://t.co/cR9rwLu33t - https://t.co/fmi8cN4Rc2 - https:...
🧵A Thread: 2+ years in bugbounty here are my stats: ->Total reports: 403 ⟢Resolved: 59 ⟢N/A: 81 ⟢Duplicate: 82 ⟢Informative: 165 ⟢Triaged: 13 ⟢New: 3 Approach: Manual testing,...
FROM INTERNET: [ Thread Of Bug Bounty Blogs ] 👇 #infosec #cybersecurity #thesecureedge #bugbounty #OSINT #tech #hacking #Blogs
Cybersecurity trends:: ( Mini Thread ) 1. Zero-trust architecture 2. Behavior analytics 3. Elastic log-monitoring for large data sets (1/4) #infosec #tgesecureedge #cybersecurity...
(a LONG thread) 🧵 Inspired by @infosec_au & @hacker_ here's one of my fun hacker stories: = The complete compromise of a password manager company = Here's how I did it (so you...
NEW: Reconstructing PowerShell scripts from multiple Windows event logs On the trail of malicious #PowerShell artifacts too large to be contained in a single log? Help is on the w...
Application Security is one of the top skills that every tech firm is aggressively looking for 🚀 If you are a person who wants to make a great career in AppSec, this thread is fo...
FROM INTERNET: Daily Series Of Bug Bounty, CTF Write-ups. / Day - 3 A Thread | #infosec #hacking #bugbounty #tech #AI #cloud #dfir #linux #cybersecurity #thesecureedge
Top 7 #Shodan Dorks : A thread 🧵👇
22 Best search🔍engines for Pentesters and Infosec Professionals. 🧶 thread ↓
Networking Refresher: #infosecurity #tech #Thread #tech #linux Seven Second Subnetting: https://t.co/gTFMwQases Subnet Guide: https://t.co/Lmt7xUQmUD
Bypass Rate Limits in Web Applications and API's. — What is Rate Limit Rate limiting is a process to limiting the number of request an user can make to a web server in an span o...
8 different techniques to Bypass Rate Limits in Web Applications and API's. [A Thread 🧵] #bugbounty #bugbountytips #cybersecurity #AppSec
Shodan detects devices that are connected to the internet at any given time, the location of those devices and their current users. It's a thread 🧵👇 You can search, hack and even...
Some of the most elite phone hackers in the world are in an industry many ppl have never heard called, reverse logistics. Similarly, top phone repair techs, can exploit hardware &...
Today I started compiling a list of twitter accounts of online media who write articles on #hacking, #cybersecurity, #pentest, #forensics, #osint etc https://t.co/JGnjnakzbF In t...