(╯°□°)╯︵ S︵ T︵U (@cybersecstu) 's Twitter Profile
(╯°□°)╯︵ S︵ T︵U

@cybersecstu

Consulting Director @ Unit42 | ❤️OSINT |✍️ CTI & Analytics book ~2025, Tracelabs Black badge x3 | Ex- @themanyhatsclub | #cyber Views my own not employers

ID: 29990309

calendar_today09-04-2009 14:10:02

35,35K Tweet

29,29K Followers

3,3K Following

CyberKnow (@cyberknow20) 's Twitter Profile Photo

🚨🚨 Iran-Israel War Cybertracker #3 🚨🚨 22 June 2025 update for hacktivist activity related to the ongoing Iran-Israel War. - There are now 120 hacktivist groups who are active from this geopolitical flashpoint. - There are 9 pro-Russian hacktivist groups supporting

🚨🚨 Iran-Israel War Cybertracker #3 🚨🚨 
22 June 2025 update for hacktivist activity related to the ongoing  Iran-Israel War.

  - There are now 120 hacktivist groups who are active from this geopolitical flashpoint. 
 - There are 9 pro-Russian hacktivist groups supporting
Dave Kennedy (@hackingdave) 's Twitter Profile Photo

I'll be on CNBC at 1:15PM ET talking about Iran's cyber capabilities and threats potentially at home. Landed at 5AM this morning, this should be fun. As always, and as if it needs to be said however... not wearing pants.

I'll be on CNBC at 1:15PM ET talking about Iran's cyber capabilities and threats potentially at home. 

Landed at 5AM this morning, this should be fun.

As always, and as if it needs to be said however... not wearing pants.
vx-underground (@vxunderground) 's Twitter Profile Photo

French Media outlets are reporting IntelBroker was apprehended by law enforcement February 22nd. Today they're reporting French law enforcement have apprehended 4 more individuals believed to act as administrators for breached valeursactuelles.com/societe/info-v…

Digital Trends (@digitaltrends) 's Twitter Profile Photo

Japanese researchers transferred data at 1.02 petabits per second over 1,123 miles of fiber, the first transmission of its kind. Enough bandwidth to download all of Netflix in a second. #TechNews

Japanese researchers transferred data at 1.02 petabits per second over 1,123 miles of fiber, the first transmission of its kind. Enough bandwidth to download all of Netflix in a second.

#TechNews
Florian Hansemann (@cyberwarship) 's Twitter Profile Photo

''Doppelganger: An Advanced LSASS Dumper with Process Cloning'' #infosec #pentest #redteam #blueteam labs.yarix.com/2025/06/doppel…

vx-underground (@vxunderground) 's Twitter Profile Photo

Chat, my post has escaped its target audience and internet dorks are big mad People are saying mean things to me and I am NOT happy about it. It's all ogre

Chat, my post has escaped its target audience and internet dorks are big mad

People are saying mean things to me and I am NOT happy about it.

It's all ogre
Thomas Roccia 🤘 (@fr0gger_) 's Twitter Profile Photo

🤓 Big Thread AI and Security Experiment! I previously created a series with GenAI content focused on security. Here is a recap thread to keep it all in one place 👇

vx-underground (@vxunderground) 's Twitter Profile Photo

I've seen a lot of confusion about this post and the meme-ing from it. Initially I didn't really care to discuss it (I still don't), but because I've seen a lot of noobs discussing it I've decided I'll partially address it. There are a few different types of polymorphism (and

Thomas Roccia 🤘 (@fr0gger_) 's Twitter Profile Photo

🔥 If you are at BlackHat in August, I will present NOVA for adversarial prompt hunting. My talk is scheduled at Station 4 on August 7 at 12 PM! See you there! I have another release planned for that day if you are interested into MCP security 😉

🔥 If you are at BlackHat in August, I will present NOVA for adversarial prompt hunting. My talk is scheduled at Station 4 on August 7 at 12 PM!

See you there! I have another release planned for that day if you are interested into MCP security 😉
vx-underground (@vxunderground) 's Twitter Profile Photo

Last year individuals from DEFCONs data duplication village requested I send them malware stuff so they can distribute it. I said, "For sure, no problem" I then subsequently specified the wrong path on Rclone and sent DEFCON staff my tax information from the past 5 years

Last year individuals from DEFCONs data duplication village requested I send them malware stuff so they can distribute it.

I said, "For sure, no problem"

I then subsequently specified the wrong path on Rclone and sent DEFCON staff my tax information from the past 5 years
vx-underground (@vxunderground) 's Twitter Profile Photo

Gamers are going ballistic Call of Duty WWII, available on Xbox PC Game Pass, contains an unpatched RCE exploit Someone is trolling gamers with Notepad pop ups, PC shutdowns, and gay pornography

Gamers are going ballistic

Call of Duty WWII, available on Xbox PC Game Pass, contains an unpatched RCE exploit

Someone is trolling gamers with Notepad pop ups, PC shutdowns, and gay pornography
Thomas Roccia 🤘 (@fr0gger_) 's Twitter Profile Photo

🤓 Over the past few months I was asked many times how I stay updated and experiment so quickly with AI in cybersecurity. So I tried to break down my process into the RAW method: Research, Apply, Weaponize. Nothing crazy but if it can help others then it is worth sharing. 🙂

🤓 Over the past few months I was asked many times how I stay updated and experiment so quickly with AI in cybersecurity.

So I tried to break down my process into the RAW method: Research, Apply, Weaponize.

Nothing crazy but if it can help others then it is worth sharing. 🙂