Cybergibbons 🚲🚲🚲 (@cybergibbons) 's Twitter Profile
Cybergibbons 🚲🚲🚲

@cybergibbons

Andrew Tierney. Head of hardware. IoT hacker. Proud resident of Hounslow. Full on Alpha Male.

ID: 18408919

linkhttps://cybergibbons.com calendar_today27-12-2008 15:06:08

28,28K Tweet

47,47K Followers

3,3K Following

Cybergibbons 🚲🚲🚲 (@cybergibbons) 's Twitter Profile Photo

"British food" Fucke me. Is this guy trying to start a war? A FUCKING BREAKFAST WITH NO BACON? WHAT THE FUCK IS THAT BURGER youtube.com/watch?v=kLaUef…

Cybergibbons 🚲🚲🚲 (@cybergibbons) 's Twitter Profile Photo

It turns out that either me or The Bean forgot to thank mr skeltal at some point. He does not have good bones and calcium and is undergoing some pretty serious surgery tomorrow after an accident. Please comment 'thank mr skeltal' to bring us good titanium rods.

It turns out that either me or The Bean forgot to thank mr skeltal at some point.

He does not have good bones and calcium and is undergoing some pretty serious surgery tomorrow after an accident. 

Please comment 'thank mr skeltal' to bring us good titanium rods.
Cybergibbons 🚲🚲🚲 (@cybergibbons) 's Twitter Profile Photo

I know y'all follow me to find out the answers to the really big questions. Like "can a man walk a marathon with just two Pepperamis and three cans of Monster?" Yes. Yes, they can.

I know y'all follow me to find out the answers to the really big questions.

Like "can a man walk a marathon with just two Pepperamis and three cans of Monster?"

Yes. Yes, they can.
Bloor (Mastodon: @bloor@bloor.tw) (@alexbloor) 's Twitter Profile Photo

Checking out the new what3words accounts filed at companies house makes me realise perhaps we've all been judging them rather harshly. After all in a quite literal sense they are a "not for profit".

Pen Test Partners (@pentestpartners) 's Twitter Profile Photo

We found unauthenticated remote code execution on an industrial PLC without ever touching the hardware. Β  By unpacking publicly available firmware for the KUNBUS Revolution Pi, our Adam Bromiley discovered four vulnerabilities. Two of them allowed RCE with no authentication

We found unauthenticated remote code execution on an industrial PLC without ever touching the hardware.
Β 
By unpacking publicly available firmware for the KUNBUS Revolution Pi, our <a href="/OPSEC_failed/">Adam Bromiley</a>  discovered four vulnerabilities. Two of them allowed RCE with no authentication