π—›πŸ―π—žπ—§l𝗖 (@h3ktlc) 's Twitter Profile
π—›πŸ―π—žπ—§l𝗖

@h3ktlc

#infosec engineer | all things gaming | void hunter | will shitpost | i like to lift weights & play piano | los angeleno currently in twin cities | fight on✌️

ID: 1135316861317451776

linkhttp://Twitch.tv/H3KTLC calendar_today02-06-2019 22:46:47

3,3K Tweet

42,42K Followers

2,2K Following

✞ inversecos (@inversecos) 's Twitter Profile Photo

Understanding EVERY Token in Entra ID πŸ”Ž Not all tokens are equal. There are many different types with different uses and benefits. In this blog, I break down each token and what they are used for and which tokens are the most "valuable" for an attacker to obtain. Full blog

Understanding EVERY Token in Entra ID πŸ”Ž

Not all tokens are equal. There are many different types with different uses and benefits.

In this blog, I break down each token and what they are used for and which tokens are the most "valuable" for an attacker to obtain.

Full blog
vx-underground (@vxunderground) 's Twitter Profile Photo

LiNuX iS tHe sUpErIoR Os Delete all zip files in a directory on Windows: del *.zip Delete all zip files in a directory on Linux: find "$(pwd | awk '{ print $1 }')" -type f -name "*.zip" -exec sh -c 'for file; do if [ -w "$file" ]; then rm -f "$file"; fi; done' sh {} +

LiNuX iS tHe sUpErIoR Os

Delete all zip files in a directory on Windows:
del *.zip

Delete all zip files in a directory on Linux:
find "$(pwd | awk '{ print $1 }')" -type f -name "*.zip" -exec sh -c 'for file; do if [ -w "$file" ]; then rm -f "$file"; fi; done' sh {} +
meg west (@cybersecmeg) 's Twitter Profile Photo

things that bother me about working in cybersecurity (in no specific order): - glorified burn out culture - the toxic mindset of β€œif you’re not spending your free time studying up on cyber, you aren’t working hard enough” - the toxic mindset of β€œi had to spend 5 years working on

Rachel Tobac (@racheltobac) 's Twitter Profile Photo

We’re seeing a string of retail (and some luxury retail) hit with cyber attacks. Definitely a focus area for attackers right now. Dior, Adidas, Victoria's Secret, and now Cartier. If you work in retail and your team doesn’t use a password manager, strong MFA, and verify

Alvaro Cintas (@dr_cintas) 's Twitter Profile Photo

What a crazy week in AI 🀯 - ElevenLabs v3 - Runner H Agent - Leo AI gets Veo 3 - Mirage Studio AI Actors - Google’s Gemini 2.5 Pro - HeyGen IV new AI Studio - OpenAI Data Connectors - Google Phone App Local AI - Mistral Vibe Coding Assistant Here’s EVERYTHING you need to know:

James Woolley (@xtrato) 's Twitter Profile Photo

I left a server online with VNC wide open to see how it would be interacted with. This is one of the more interesting interactions: