Daniel Cuthbert (@dcuthbert) 's Twitter Profile
Daniel Cuthbert

@dcuthbert

Documentary photographer, old creaky hacker. Co-author of @OWASP ASVS standard. Blackhat/Brucon Review Board & Co_chair UK Gov Cyber Security Advisory Board

ID: 14461330

linkhttps://dcuthbert.exposure.co/ calendar_today21-04-2008 12:51:06

14,14K Tweet

31,31K Followers

1,1K Following

RAF_Luton (@raf_luton) 's Twitter Profile Photo

Fact of the Day: The B2 Stealth Fighter (pictured flying over Mount Penny Fan, Scotland) is fitted with 2 bedrooms, a kitchen & rest area to enable the crew to complete missions of up to 80,085km or 71.75hrs while long carrying 4 semi-nuclear bombs Photographed from a Canberra

Fact of the Day: The B2 Stealth Fighter (pictured flying over Mount Penny Fan, Scotland) is fitted with 2 bedrooms, a kitchen & rest area to enable the crew to complete missions of up to 80,085km or 71.75hrs while long carrying 4 semi-nuclear bombs

Photographed from a Canberra
Daniel Cuthbert (@dcuthbert) 's Twitter Profile Photo

For those of us who've been doing OSINT for ages, you know the desk and whilst it's missing our pretty boi (AndrewMohawk⁽ⁿᵘˡˡ⁾), the brains that is RT has come up with an epic OSINT tool ubikron.com Very cool to see what RT's building these days

For those of us who've been doing OSINT for ages, you know the desk and whilst it's missing our pretty boi (<a href="/AndrewMohawk/">AndrewMohawk⁽ⁿᵘˡˡ⁾</a>), the brains that is RT has come up with an epic OSINT tool

ubikron.com

Very cool to see what RT's building these days
Daniel Cuthbert (@dcuthbert) 's Twitter Profile Photo

This is a fascinating attack chain. From a user-experience standpoint, multiple failures are evident, for instance, the App name field serves only to aid the adversary. I rarely apply the descriptor “advanced,” but in this case the attack clearly warrants it.

Daniel Cuthbert (@dcuthbert) 's Twitter Profile Photo

This is a very refreshing debate between two people i'm lucky to call friends, ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ 🛡️ and Marcus on AI. Both put forward some great insights and it's worthy of a watch youtube.com/watch?v=I9-iD_…

Daniel Cuthbert (@dcuthbert) 's Twitter Profile Photo

I mean, they couldn’t have used their model to look for bugs old enough to drink and drive? github.com/modelcontextpr…

Daniel Cuthbert (@dcuthbert) 's Twitter Profile Photo

/me waves hand. This is not the malware you are looking for Ps. You can’t make this shit up research.checkpoint.com/2025/ai-evasio…

Daniel Cuthbert (@dcuthbert) 's Twitter Profile Photo

I watch videos like this and just think we need Justin Elze to do more like this with his monster youtu.be/kYEDSkMiF5w?si… The sound of that engine… lord hold me

JP Aumasson (@veorq) 's Twitter Profile Photo

"finding crypto vulnerabilities takes a PhD and years of practice, it's not for the weak-hearted" me: google's "site:github wallet mersenne" github.com/AlphaWallet/We…

"finding crypto vulnerabilities takes a PhD and years of practice, it's not for the weak-hearted"

me: google's "site:github  wallet mersenne" 

github.com/AlphaWallet/We…