Search results
  1. 1 hour ago

    One main difference between camo and polo is the mission. In camo, it always came first and there was never any time it wasn't operating. In a polo, it is designed with man-hours, time off, and vacations in mind.

    Show this thread
  2. 1 hour ago
    Replying to

    True that. Ironically, I felt like my life revolved around coding more so before than it does now that I'm actually "employed" as a coder. Now that coding is my job, after I punch my 8 hours I find that I'm doing a lot of network and work that doesn't involve a ton of it

  3. 1 hour ago

    6 Best Practices For Increasing Security In AWS In A Zero Trust World

  4. 49 minutes ago

    Just by using this tool you can permanently download a list of in-scope domains and scan them without copy pasting domains! Just a few clicks! 😎

  5. 2 hours ago

    One of the active samples detected on 2019-01-05. MD5: c01fd7983bd26559e1b2277c24b11145 SHA-1: b4aba6a848cc8e4fa1b5e99c90ca26ab3016dce8 Domain: 206[.]189[.]82[.]107 Classification: Backdoor.Linux.Mirai.b

  6. 2 hours ago

    Meet our fifth panelist for the Data Privacy and Cyber security workshop Syed Asim Raza Currently working with Radio Pakistan Current affairs channel and Roze News as an anchor for current affairs show at 10 pm to 11 pm.

  7. 4 hours ago
  8. 47 minutes ago

    Account Passwords Stored Using Insecure MD5 Hashing Algorithm Town of Salem Data Breach Exposes 7.6 Million Gamers' Accounts via

  9. Replying to

    Another day another data breach.

  10. 51 minutes ago

    🛡 What is the best path to kickstart or enhance your career in cybersecurity? I have you covered, send me a DM and subscribe to the channel for more information.

  11. 2 hours ago

    attack infected servers of main cloud computing service provider

  12. 46 minutes ago

    The state of imagery is poor overall. That’s one reason why we’re working with to develop an openly licensed repository of better, more accurate, and inclusive cybersecurity visuals. We’ll be sharing more details soon....

  13. 7 minutes ago

    Security Assessment of SCADA Protocols: A taxonomy based methodology for the identification of security vulnerabilities in SCADA protocols -

  14. 36 minutes ago

    We actually expected a closer grouping between these three. Instead and were very low and relatively normal level of ~2-3% / cyborg participation. Whereas the hashtag had 10x the level of bot / cyborg participation at 21%

    Show this thread
  15. 26 minutes ago
  16. Protecting the VAPs (very attacked people) and the VIPs, with Proofpoint.

  17. 3 hours ago

    Quite the opening paragraph, yikes! Don’t be a lamb!

  18. 35 minutes ago

    TetherTies Black 10 Pack – The Pre-Assembled, Fast to Install Computer and Adapter Security and Theft Prevention Device (10-Pack-Black, Black) -

  19. 56 minutes ago

    Town of Salem Data Breach Exposes 7.6 Million Gamers' Accounts via The Hacker News

  20. 1 hour ago

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.