Tom Porter (@porterhau5) 's Twitter Profile
Tom Porter

@porterhau5

infosec | baseball | red team | trainer | fan of the pipe delimiter

ID: 1219289658

linkhttps://www.blackhat.com/us-25/training/schedule/index.html#attacking-devops-pipelines-44488 calendar_today25-02-2013 16:49:47

412 Tweet

1,1K Followers

359 Following

Tom Porter (@porterhau5) 's Twitter Profile Photo

Two weeks from today! Resister here: blackhat.com/eu-24/training… If you happen to be at Black Hat #BHEU, or even in London around that time, give me a shout and we’ll grab a pint

Jason Haddix (@jhaddix) 's Twitter Profile Photo

The next cohort of "Red Blue Purple AI" is MONDAY! Last chance register is this weekend! RBPAI is a cutting edge course on how to USE AI to scale your cyber security skills! It is the ONLY course of its kind! Full Syllabus and purchase link: arcanuminfosec.gumroad.com/l/ygmlpe Join

The next cohort of "Red Blue Purple AI" is MONDAY! Last chance register is this weekend!

RBPAI is a cutting edge course on how to USE AI to scale your cyber security skills! It is the ONLY course of its kind!   

Full Syllabus and purchase link:  

arcanuminfosec.gumroad.com/l/ygmlpe

Join
Jason Haddix (@jhaddix) 's Twitter Profile Photo

🛑 GIVEAWAY ALERT 🛑⬇️ Today is day SEVEN of EIGHT days of Arcanum Information Security and friends Black Friday and Cyber Monday giveaways! Today ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ 🛡️ and I are giving away one seat to his next "AUGMENTED" Course! Dan runs a FANTASTIC course on integrating AI into the very

🛑 GIVEAWAY ALERT 🛑⬇️

Today is day SEVEN of EIGHT days of <a href="/arcanuminfosec/">Arcanum Information Security</a> and friends Black Friday and Cyber Monday giveaways!

Today <a href="/DanielMiessler/">ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ 🛡️</a> and I are giving away one seat to his next "AUGMENTED" Course! 

Dan runs a FANTASTIC course on integrating AI into the very
Tom Porter (@porterhau5) 's Twitter Profile Photo

2024 was one of the most productive years of my life, and the catalyst for it was starting the DEF Reset last January. No overthinking, no lofty goal setting — just do the habits prescribed until they become automatic. Success will be a lagging indicator.

Jason Haddix (@jhaddix) 's Twitter Profile Photo

⚠️ Giveaway time! ⚠️ 👇 📢 Our new course "Attacking AI" will be Feb 27-28! This two-day course equips security professionals with the tools and methodologies to identify vulnerabilities in AI systems. It's gonna be a BANGER. Syllabus: payhip.com/b/2qPZ1 We are giving

Chris Thompson (@retbandit) 's Twitter Profile Photo

I am excited to announce the first conference dedicated to the offensive use of AI in security! Request an invite at offensiveaicon.com. Co-organized by RemoteThreat, Dreadnode, & DEVSEC. The Call for Papers opens Tuesday, March 25, 2025, and will remain open until Friday,

I am excited to announce the first conference dedicated to the offensive use of AI in security! Request an invite at offensiveaicon.com.

Co-organized by RemoteThreat, Dreadnode, &amp; DEVSEC.

The Call for Papers opens Tuesday, March 25, 2025, and will remain open until Friday,
Praetorian (@praetorianlabs) 's Twitter Profile Photo

A Praetorian Security Engineer recently found a vuln in GitHub CodeQL where a token was exposed for 1.022 seconds. In that brief window, he was able to demonstrate how an attacker could push code to the CodeQL Actions GitHub repository and modify CodeQL's trusted tags to gain

Tom Porter (@porterhau5) 's Twitter Profile Photo

We're bringing Attacking DevOps Pipelines to #BHUSA Black Hat. Register soon to get the early bird discount! This 2-day course is our hands-on, red team take on everything DevOps – recon, privesc, code exec, lat movement, exfil, OPSEC. Aug 2-3: blackhat.com/us-25/training… Aug

Black Hat (@blackhatevents) 's Twitter Profile Photo

⌛ The #BHUSA Early Registration Rate ends in THREE DAYS! Register now to secure your spot at the lowest rate available and save $700 off the on-site rate. Register Here: bit.ly/4jnXIa5

⌛ The #BHUSA Early Registration Rate ends in THREE DAYS! Register now to secure your spot at the lowest rate available and save $700 off the on-site rate. Register Here: bit.ly/4jnXIa5
Level Effect, LLC. (@level_effect) 's Twitter Profile Photo

🚀 ContinuumCon Workshops Revealed! 🚀 👉 continuumcon.com/schedule Today we reveal 15 hands-on workshops at #ContinuumCon! Practical training from leading experts in defense, threat detection, automation, AppSec, AI, and more. 🎟️ Reminder on lifetime tickets access: you own these

Level Effect, LLC. (@level_effect) 's Twitter Profile Photo

🚀 Day 3 of Workshop Showcases at ContinuumCon June 20! Today’s spotlight goes to Tom Porter (Tom Porter) and Colbert Zhu from Accenture’s elite FusionX Adversary Simulation team. Do you have your ticket? 🎫 📷 continuumcon.com/tickets 🛠 Workshop Name: Detecting Script Abuse

Black Hat (@blackhatevents) 's Twitter Profile Photo

Join #BHUSA Trainings course "Attacking DevOps Pipelines (Online)" to learn the modern adversary's approach to attacking DevOps pipelines. Secure your spot before the price increase>> bit.ly/446lKAb

Tom Porter (@porterhau5) 's Twitter Profile Photo

Come catch us on the livestream at 4:15pm ET -- we'll talk about how adversaries abuse script execution in Jenkins (which a lot of people talk about) and a few different strategies for enabling detection of it (which no one talks about). We even wrote a custom Jenkins plugin for

Tom Porter (@porterhau5) 's Twitter Profile Photo

Banger thread. I’d add: proactively reach out to other teams/people and ask what they need to be successful, then deliver that. You & your team build the reputation of being enablers (which, in infosec, is great) and they’ll often reciprocate down the road. Trust gets built.