Echo Chamber

“Disinformation” is a spook term. Anyone who unironically says “disinformation” is doing an intelligence service’s bidding.

Nithin 🦹‍♂️

@InfoSecComm Newsletter - 10 condensed : #bugbounty #infosec #cybersecurity #hacking #newsletter

Het Mehta

FROM INTERNET ~ Series of #infosec Blogs. 1)[case study#1] IDOR vulnerability allows access to user’s personal data https://t.co/hKSODbgx0F #thesecureedge #BugBounty #IoT #cybe...

Rishiraj Singh

Day 3 of Web Application Penetration Testing From Absolute Beginning - Topic - Session Management in Web Applications Check Threats #cybersecurity #bugbounty #bugbountytips #i...

Lohitaksh Nandan

Recon Tools for Web Application Pentesting... :) Credits ~ Khalid Maina A Thread 🧵 ↓ #cybersecurity #infosec #pentesting #bugbounty

root@alex:~/ #

Good morning my fellow #infosec and other curious individuals! Today is day TWO of my live tweeted Internal Penetration Test with Acme. Updates to follow. Here's the thread from y...

Lohitaksh Nandan

FREE LABS TO TEST YOUR PENTEST/CTF SKILLS :-) Retweet this to let others know :) #cybersecurity #infosec #pentesting

Nithin 🦹‍♂️

Here's a list of some high quality Bug Bounty Methodologies / checklists. All for FREE. 🧵👇 #bugbounty #bugbountytips #infosec #cybersecurity

Officer's Notes

Cold wallet attacks & defense methods: reading list from CIA: - https://t.co/tghJJniqCe - https://t.co/RmtPKIOo3C - https://t.co/cR9rwLu33t - https://t.co/fmi8cN4Rc2 - https:...

Akash Hamal 🇮🇳🇳🇵🇵🇭

🧵A Thread: 2+ years in bugbounty here are my stats: ->Total reports: 403 ⟢Resolved: 59 ⟢N/A: 81 ⟢Duplicate: 82 ⟢Informative: 165 ⟢Triaged: 13 ⟢New: 3 Approach: Manual testing,...

Het Mehta

FROM INTERNET: [ Thread Of Bug Bounty Blogs ] 👇 #infosec #cybersecurity #thesecureedge #bugbounty #OSINT #tech #hacking #Blogs

Het Mehta

Cybersecurity trends:: ( Mini Thread ) 1. Zero-trust architecture 2. Behavior analytics 3. Elastic log-monitoring for large data sets (1/4) #infosec #tgesecureedge #cybersecurity...

Jason Haddix

(a LONG thread) 🧵 Inspired by @infosec_au & @hacker_ here's one of my fun hacker stories: = The complete compromise of a password manager company = Here's how I did it (so you...

SophosLabs

NEW: Reconstructing PowerShell scripts from multiple Windows event logs On the trail of malicious #PowerShell artifacts too large to be contained in a single log? Help is on the w...

AppSecEngineer

Application Security is one of the top skills that every tech firm is aggressively looking for 🚀 If you are a person who wants to make a great career in AppSec, this thread is fo...

Het Mehta

FROM INTERNET: Daily Series Of Bug Bounty, CTF Write-ups. / Day - 3 A Thread | #infosec #hacking #bugbounty #tech #AI #cloud #dfir #linux #cybersecurity #thesecureedge

Aseem Shrey

Top 7 #Shodan Dorks : A thread 🧵👇

TRÄW🤟

22 Best search🔍engines for Pentesters and Infosec Professionals. 🧶 thread ↓

Het Mehta

Networking Refresher: #infosecurity #tech #Thread #tech #linux Seven Second Subnetting: https://t.co/gTFMwQases Subnet Guide: https://t.co/Lmt7xUQmUD

Today Cyber News

Bypass Rate Limits in Web Applications and API's. — What is Rate Limit Rate limiting is a process to limiting the number of request an user can make to a web server in an span o...

Snap Sec

8 different techniques to Bypass Rate Limits in Web Applications and API's. [A Thread 🧵] #bugbounty #bugbountytips #cybersecurity #AppSec

Rahul Bhichher

Shodan detects devices that are connected to the internet at any given time, the location of those devices and their current users. It's a thread 🧵👇 You can search, hack and even...

Jonathan Scott

Some of the most elite phone hackers in the world are in an industry many ppl have never heard called, reverse logistics. Similarly, top phone repair techs, can exploit hardware &...

Cyber Detective💙💛

Today I started compiling a list of twitter accounts of online media who write articles on #hacking, #cybersecurity, #pentest, #forensics, #osint etc https://t.co/JGnjnakzbF In t...