Rezultati pretraživanja
  1. prije 48 minuta

    . and I had a chat about the evidence, or lack thereof, to support the and Burisma hacking allegations, and the responsibilities of media and cybersecurity companies when reporting on hacks which impact geopolitics. Have a listen!

  2. Gotta love thumbnails. Clearly I mean business in this one! 😇 (90-120 secs each. See if you can find which one?)

  3. Next 4 Q&A Vids NASDAQ 2020 Series (90-120secs) 3. Risk profile from Cyber Crime? 4. Chainkit consumption model & addressable market 5. - many Cyber Security Lessons Learned 6. Protection - Where should organizations & individuals start?

  4. 6. velj

    NASDAQ 2020 Cyber Video Series by CEO Cyber Crime, Cyber Security & Cyber Insurance - plus a bonus segment on the Jeff Bezos phone hack!

  5. 5. velj
  6. 4. velj

    Newspapers have started to publish the truth about the hacking of Bezos phone. There is a contract between an American media company, Bezos' girlfriend and her brother.

  7. 4. velj
  8. All the news turned against Jeff’s allegations, all the news agencies proved who infiltrates Bezos’s privacy. Through Bezos’ girlfriend 😑

  9. They had this teed up and ready to hit like a mosquito on a fly trap. is really going all out today.

  10. 3. velj
  11. 3. velj

    GlobalCyberAlln: RT Cyber_Readiness: .kierstentodt joins the dialogue: "Businesses of all sizes, small and large, must ensure that employees are educated in threats, like mobile phishing, and offer guidelines on secure behavior."

  12. 3. velj

    Saudi Arabia will be hosting the world’s first Global Cybersecurity Forum in order to address the threats, challenges, risks and cyber opportunities to “build a secure, resilient and prosperous cyber world for all” *slow claps*.

    Prikaži ovu nit
  13. 2. velj

    I think the most important job of is to teach the TALENTED not to use his personal cellphone number when hacking others!

  14. Random: does anyone recall seeing mention of any corroborative data for the so-called ? He’s sure to have been using WiFi for some time after the event (even possibly during?) could show phone activity to some degree. Mejor que nada?

  15. 1. velj

    forensic report: The forensic analysis assessed that the intrusion likely was undertaken through the use of a prominent spyware product identified in other Saudi surveillance cases, such as the NSO Group's Pegasus-3 malware

    Prikaži ovu nit
  16. 1. velj

    Bezos phone hack report from FTI CyberSec is thorough 👍

  17. 1. velj
    Odgovor korisnicima

    and this self-destruction theory emerged right after you were asked for evidence on your wild allegations. ⁉️⁉️

  18. 31. sij
  19. 31. sij

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.