nyxgeek (@nyxgeek) 's Twitter Profile
nyxgeek

@nyxgeek

rebel scum, nerfherder, dogged and relentless.

ID: 608888497

linkhttps://github.com/nyxgeek calendar_today15-06-2012 07:59:44

10,10K Tweet

6,6K Followers

3,3K Following

Acyn (@acyn) 's Twitter Profile Photo

DOOCY: So what happened to the Epstein client list that the attorney general said she had on her desk?  LEAVITT: I think if you go back and look at what the attorney general said  DOOCY: I've got the quote. She said, it's sitting on my desk right now to review.

TrustedSec (@trustedsec) 's Twitter Profile Photo

Check out this Cybernews video featuring Dave Kennedy! They break down the story behind the mysterious hacker group the Shadow Brokers and how they leaked the NSA’s biggest secrets. Watch now!

TrustedSec (@trustedsec) 's Twitter Profile Photo

What started as casual poking around quickly revealed a serious privilege escalation. In our latest blog, Oddvar Moe shares his unexpected discovery and how #Lenovo's PSIRT responded to resolve the issue. Read it now! trustedsec.com/blog/cve-2025-…

Today In Infosec (@todayininfosec) 's Twitter Profile Photo

1982: The movie Tron was released. The story of a software engineer who tried to hack his old employer's mainframe to prove an exec stole games he developed. As you'd expect, AI software digitized and downloaded him. Eventually he escaped. And unsurprisingly became company CEO.

1982: The movie Tron was released. The story of a software engineer who tried to hack his old employer's mainframe to prove an exec stole games he developed. As you'd expect, AI software digitized and downloaded him. Eventually he escaped. And unsurprisingly became company CEO.
TrustedSec (@trustedsec) 's Twitter Profile Photo

Does your WAF use IP restrictions, or are they more like IP recommendations? nyxgeek reveals the difference between RemoteAddr and SocketAddr, a distinction that could create a 'sleeper' rule that looks secure but is easily bypassed. trustedsec.com/blog/azures-fr…

HaxRob (@haxrob) 's Twitter Profile Photo

A relatively unknown but particularly stealthy technique to hide files on Linux hosts. On unhardened boxes, unprivileged users can conceal files from even the root user. Disk content remains in memory, hindering disk acquisition during forensic investigation. (1/7) 👇