SecureYeti (@secureyeti) 's Twitter Profile
SecureYeti

@secureyeti

ID: 1057341892738854914

calendar_today30-10-2018 18:42:06

70 Tweet

209 Followers

5 Following

SecureYeti (@secureyeti) 's Twitter Profile Photo

Security experts have identified a critical zero-day vulnerability affecting multiple Fortinet products. The vulnerability is a stack-based buffer overflow in the admin API that allows remote attackers to execute arbitrary code through HTTP requests. loom.ly/MjD-5kw

SecureYeti (@secureyeti) 's Twitter Profile Photo

Teach your employees to be your biggest defender! Training from Secure Yeti's Jayson E. Street 💙 🤗💛 will help you make security “personal” so your employees think like a hacker and fiercely protect your company’s assets 24/7. August 2-3 at Black Hat. #BHUSA loom.ly/g6HKDIE

Teach your employees to be your biggest defender! Training from Secure Yeti's <a href="/jaysonstreet/">Jayson E. Street 💙 🤗💛</a> will help you make security “personal” so your employees think like a hacker and fiercely protect your company’s assets 24/7. August 2-3 at <a href="/BlackHatEvents/">Black Hat</a>. #BHUSA loom.ly/g6HKDIE
SecureYeti (@secureyeti) 's Twitter Profile Photo

Listen to this #Infosec2025 interview with Jayson E. Street 💙 🤗💛, Chief Adversarial Officer at Secure Yeti, and hear his insights on the evolving landscape of social engineering attacks -- including the integration of artificial intelligence (AI) by threat actors. loom.ly/MpqtAhQ

SecureYeti (@secureyeti) 's Twitter Profile Photo

Teach your employees to be your biggest defenders! Training from Secure Yeti's Jayson E. Street 💙 🤗💛 will help you make security “personal” so your employees think like a hacker and fiercely protect your company’s assets 24/7. August 2-3 at Black Hat. #BHUSA loom.ly/g6HKDIE

Teach your employees to be your biggest defenders! Training from Secure Yeti's <a href="/jaysonstreet/">Jayson E. Street 💙 🤗💛</a> will help you make security “personal” so your employees think like a hacker and fiercely protect your company’s assets 24/7. August 2-3 at <a href="/BlackHatEvents/">Black Hat</a>. #BHUSA loom.ly/g6HKDIE
SecureYeti (@secureyeti) 's Twitter Profile Photo

A new malware campaign is targeting macOS users by employing the ClickFix social engineering tactic to distribute the Atomic macOS Stealer (AMOS). Attackers set up fake domains and prompt users to complete a fake Spectrum CAPTCHA verification. loom.ly/EEfX5eI

SecureYeti (@secureyeti) 's Twitter Profile Photo

Ever wanted to unleash your inner “bad guy” in a legal and controlled setting? Learn tactics from Adversary for Hire Jayson E. Street 💙 🤗💛, one of the most twisted minds in the industry, to think and attack like an adversary! Register today at loom.ly/JvnLc-Q #defcon

Ever wanted to unleash your inner “bad guy” in a legal and controlled setting? Learn tactics from Adversary for Hire <a href="/jaysonstreet/">Jayson E. Street 💙 🤗💛</a>, one of the most twisted minds in the industry, to think and attack like an adversary! Register today at loom.ly/JvnLc-Q #defcon
SecureYeti (@secureyeti) 's Twitter Profile Photo

A group known as VexTrio is hijacking vulnerable WordPress websites to inject malicious redirect scripts. These compromised sites funnel users through shady traffic distribution systems (TDS), eventually leading them to phishing sites, scams, or malware. loom.ly/KCJuaxM

SecureYeti (@secureyeti) 's Twitter Profile Photo

It's been more than 15 years since NTLM reflection was first reported, and experts still see client systems that have SMB signing disabled. A new vulnerability allows attackers to obtain remote code execution and access systems with SMB signing disabled. loom.ly/tiTfrZI

SecureYeti (@secureyeti) 's Twitter Profile Photo

Ever wanted to unleash your inner “bad guy” in a legal and controlled setting? Learn tactics from Adversary for Hire Jayson E. Street 💙 🤗💛, one of the most twisted minds in the industry, to think and attack like an adversary! Register today at training.defcon.org/lasvegas2025 #defcon

Ever wanted to unleash your inner “bad guy” in a legal and controlled setting? Learn tactics from Adversary for Hire <a href="/jaysonstreet/">Jayson E. Street 💙 🤗💛</a>, one of the most twisted minds in the industry, to think and attack like an adversary! Register today at training.defcon.org/lasvegas2025 #defcon
SecureYeti (@secureyeti) 's Twitter Profile Photo

Teach your employees to be your biggest defenders! Training from Secure Yeti's Jayson E. Street 💙 🤗💛 will help you make security “personal” so your employees think like a hacker and fiercely protect your company’s assets 24/7. August 2-3 at Black Hat. #BHUSA zurl.co/L44r3

Teach your employees to be your biggest defenders! Training from Secure Yeti's <a href="/jaysonstreet/">Jayson E. Street 💙 🤗💛</a> will help you make security “personal” so your employees think like a hacker and fiercely protect your company’s assets 24/7. August 2-3 at <a href="/BlackHatEvents/">Black Hat</a>. #BHUSA zurl.co/L44r3
SecureYeti (@secureyeti) 's Twitter Profile Photo

Ever wanted to unleash your inner “bad guy” in a legal and controlled setting? Learn tactics from Adversary for Hire Jayson E. Street 💙 🤗💛, one of the most twisted minds in the industry, to think and attack like an adversary! Register today at loom.ly/JvnLc-Q #defcon

Ever wanted to unleash your inner “bad guy” in a legal and controlled setting? Learn tactics from Adversary for Hire <a href="/jaysonstreet/">Jayson E. Street 💙 🤗💛</a>, one of the most twisted minds in the industry, to think and attack like an adversary! Register today at loom.ly/JvnLc-Q #defcon
SecureYeti (@secureyeti) 's Twitter Profile Photo

Cisco has released updates for two serious security issues in its Identity Services Engine (ISE) and Passive Identity Connector (ISE-PIC). Unpatched, these flaws could have allowed hackers to take full control of your system. Read more about it here: zurl.co/Hw8kf

Cisco has released updates for two serious security issues in its Identity Services Engine (ISE) and Passive Identity Connector (ISE-PIC). Unpatched, these flaws could have allowed hackers  to take full control of your system. Read more about it here:   zurl.co/Hw8kf
SecureYeti (@secureyeti) 's Twitter Profile Photo

Teach your employees to be your biggest defenders! Training from Secure Yeti's Jayson E. Street 💙 🤗💛 will help you make security “personal” so your employees think like a hacker and fiercely protect your company’s assets 24/7. August 2-3 at Black Hat. #BHUSA zurl.co/L44r3

Teach your employees to be your biggest defenders! Training from Secure Yeti's <a href="/jaysonstreet/">Jayson E. Street 💙 🤗💛</a>
will help you make security “personal” so your employees think like a hacker and fiercely protect your company’s assets 24/7. August 2-3 at <a href="/BlackHatEvents/">Black Hat</a>. #BHUSA zurl.co/L44r3
SecureYeti (@secureyeti) 's Twitter Profile Photo

Prices increase this Friday! raining from Secure Yeti's Jayson E. Street 💙 🤗💛 will help you make security “personal” so your employees think like a hacker and fiercely protect your company’s assets 24/7. August 2-3 at Black Hat. #BHUSA zurl.co/MyCBS

Prices increase this Friday! raining from Secure Yeti's <a href="/jaysonstreet/">Jayson E. Street 💙 🤗💛</a> will help you make security “personal” so your employees think like a hacker and fiercely protect your company’s assets 24/7. August 2-3 at <a href="/BlackHatEvents/">Black Hat</a>. #BHUSA zurl.co/MyCBS
SecureYeti (@secureyeti) 's Twitter Profile Photo

Ever wanted to unleash your inner “bad guy” in a legal and controlled setting? Learn tactics from Adversary for Hire Jayson E. Street 💙 🤗💛, one of the most twisted minds in the industry, to think and attack like an adversary! Register today at zurl.co/Vcdsv #defcon

Ever wanted to unleash your inner “bad guy” in a legal and controlled setting? Learn tactics from Adversary for Hire <a href="/jaysonstreet/">Jayson E. Street 💙 🤗💛</a>, one of the most twisted minds in the industry, to think and attack like an adversary! Register today at zurl.co/Vcdsv #defcon
SecureYeti (@secureyeti) 's Twitter Profile Photo

We hadn’t heard from Jayson E. Street 💙 🤗💛 in a while, then he sent us this. We have no idea where he is right now, but we know where he’ll be soon! See him at Black Hat and DEF CON: tinyurl.com/3tk8b3rh #BHUSA tinyurl.com/y6zfn6w6 #defcon #defcontraining

SecureYeti (@secureyeti) 's Twitter Profile Photo

Ever wanted to unleash your inner “bad guy” in a legal and controlled setting? Learn tactics from Adversary for Hire Jayson E. Street 💙 🤗💛, one of the most twisted minds in the industry, to think and attack like an adversary! Register today at zurl.co/at3PK #defcon

Ever wanted to unleash your inner “bad guy” in a legal and controlled setting? Learn tactics from Adversary for Hire <a href="/jaysonstreet/">Jayson E. Street 💙 🤗💛</a>, one of the most twisted minds in the industry, to think and attack like an adversary! Register today at zurl.co/at3PK #defcon
SecureYeti (@secureyeti) 's Twitter Profile Photo

Teach your employees to be your biggest defender! Training from Secure Yeti's Jayson E. Street 💙 🤗💛 will help you make security “personal” so your employees think like a hacker and fiercely protect your company’s assets 24/7. August 2-3 at Black Hat. #BHUSA zurl.co/L44r3

Teach your employees to be your biggest defender! Training from Secure Yeti's <a href="/jaysonstreet/">Jayson E. Street 💙 🤗💛</a>  will help you make security “personal” so your employees think like a hacker and fiercely protect your company’s assets 24/7. August 2-3 at <a href="/BlackHatEvents/">Black Hat</a>. #BHUSA zurl.co/L44r3
SecureYeti (@secureyeti) 's Twitter Profile Photo

A new SharePoint vulnerability dubbed ToolShell lets adversaries gain full remote code execution on SharePoint servers. Microsoft recommends updating SharePoint servers, configuring AV/EDR and rotating the system's zurl.co/yZ4Tv machine keys. zurl.co/eacHx

A new SharePoint vulnerability dubbed ToolShell lets adversaries gain full remote code execution on SharePoint servers. Microsoft recommends updating SharePoint servers, configuring AV/EDR and rotating the system's zurl.co/yZ4Tv machine keys. zurl.co/eacHx
SecureYeti (@secureyeti) 's Twitter Profile Photo

Ever wanted to unleash your inner “bad guy” in a legal and controlled setting? Learn tactics from Adversary for Hire Jayson E. Street 💙 🤗💛, one of the most twisted minds in the industry, to think and attack like an adversary! Register today at zurl.co/rpBWj #defcon

Ever wanted to unleash your inner “bad guy” in a legal and controlled setting? Learn tactics from Adversary for Hire <a href="/jaysonstreet/">Jayson E. Street 💙 🤗💛</a>, one of the most twisted minds in the industry, to think and attack like an adversary! Register today at zurl.co/rpBWj #defcon