AMol NAik(@amolnaik4) 's Twitter Profileg
AMol NAik

@amolnaik4

CISO | Ex-Gojek | Startup Security | Vulnerability Researcher | Bodhi (https://t.co/IOJjeRGHNc) | Likes are bookmarks | Opinions are my own

ID:99859721

linkhttp://amolnaik4.blogspot.com calendar_today28-12-2009 04:25:50

5,8K Tweets

3,4K Followers

386 Following

丂卄ㄖᗪ卂几 - 👋 crack fingers(@therealshodan) 's Twitter Profile Photo

If you send 1000s of PUT requests to even a private s3 bucket which you don’t have authorisation for you can create mega bills.

Is this a new form of attack? Sounds like it could be pretty dangerous.

medium.com/@maciej.pocwie…

account_circle
Cyber Detective💙💛(@cyb_detective) 's Twitter Profile Photo

Cyber Security Career Path

Detailed information on dozens of different professions related to cyber security:

- hard skills
- soft skills
- education
- certifications
- average salary

github.com/rezaduty/cyber…

Contributor rezaduty

Cyber Security Career Path Detailed information on dozens of different professions related to cyber security: - hard skills - soft skills - education - certifications - average salary github.com/rezaduty/cyber… Contributor @rezaduty
account_circle
Andreas Zeller(@AndreasZeller) 's Twitter Profile Photo

Today 12:22 ICSE, we’re showing off FormatFuzzer for effective generation of binary file formats: conf.researchr.org/details/icse-2…
github.com/uds-se/FormatF…

account_circle
Royal Hansen(@royalhansen) 's Twitter Profile Photo

Kudos to Google Project Zero's j00ru//vx who published new research today detailing his audit of the Windows Registry which includes 50 CVEs: googleprojectzero.blogspot.com/2024/04/the-wi…

account_circle
Mark Simos(@MarkSimos) 's Twitter Profile Photo

Are you experiencing these SecOps/SOC antipatterns (common mistakes) now? have you seen them in the past?

We see these antipatterns pretty frequently across organizations and industries of all sizes as they struggle with a bottom-up technology-first approach to SecOps.

Are you experiencing these SecOps/SOC antipatterns (common mistakes) now? have you seen them in the past? We see these antipatterns pretty frequently across organizations and industries of all sizes as they struggle with a bottom-up technology-first approach to SecOps.
account_circle
Clint Gibler(@clintgibler) 's Twitter Profile Photo

🎓 Google Cloud Skills Boost
🛣️ Security Engineer Learning Path

Use the 30 day free trial to take this 14 part course on Google Cloud security

Covers
• GCP basics
• Networking
• Security best practices
• GCP Security services

+ more

cloudskillsboost.google/paths/15

🎓 Google Cloud Skills Boost 🛣️ Security Engineer Learning Path Use the 30 day free trial to take this 14 part course on Google Cloud security Covers • GCP basics • Networking • Security best practices • GCP Security services + more cloudskillsboost.google/paths/15
account_circle
farbood — e/acc(@farbood) 's Twitter Profile Photo

Today we are open-sourcing and sharing a longevity assistant called Sequel

- locally stored: we don’t get or see your data
- chat with your complete health picture: blood labs, Whoop, DEXA, MRI, therapies, drugs or supplements you’re on
- run a local LLM or OpenAI

Links ⬇️

account_circle
Clint Gibler(@clintgibler) 's Twitter Profile Photo

🛠️ gram

A 🪞 polished 🪞 threat model diagramming tool

Create a dataflow diagram using the web app, and get:
• Collaborative editing
• Threat and control suggestions
• Integrations with Okta and Jira

by Klarna

github.com/klarna-incubat…

account_circle
Clint Gibler(@clintgibler) 's Twitter Profile Photo

⏰ goalert

A fully featured, open-source on-call and alerting platform

Features:
• Scheduling
• Automated escalations
• Alert triggers (API, email, Prometheus, etc.)
• Notifications (SMS, Voice, Email, Slack)

github.com/target/goalert

⏰ goalert A fully featured, open-source on-call and alerting platform Features: • Scheduling • Automated escalations • Alert triggers (API, email, Prometheus, etc.) • Notifications (SMS, Voice, Email, Slack) github.com/target/goalert
account_circle
David das Neves(@david_das_neves) 's Twitter Profile Photo

𝗗𝗮𝗺𝗻 𝗩𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗹𝗲 𝗥𝗲𝘀𝘁𝗮𝘂𝗿𝗮𝗻𝘁 - is an intentionally vulnerable Web API game for learning and training purposes dedicated to devs, ethical hackers, and security engineers.

Blog: buff.ly/3vAM9Jh
Repo: buff.ly/3J2xjhT

𝗗𝗮𝗺𝗻 𝗩𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗹𝗲 𝗥𝗲𝘀𝘁𝗮𝘂𝗿𝗮𝗻𝘁 - is an intentionally vulnerable Web API game for learning and training purposes dedicated to devs, ethical hackers, and security engineers. Blog: buff.ly/3vAM9Jh Repo: buff.ly/3J2xjhT #CyberSecurity
account_circle
Clint Gibler(@clintgibler) 's Twitter Profile Photo

👥 SO-CON 2024 slides are now available

SpecterOps 🇺🇦's conference, with a big focus on graph based defense

I found a few particularly interesting:
Elad Shamir on NTLM security
Luke Jennings on the SaaS kill chain
Daniel Heinsen on AWS identity attack paths

github.com/SpecterOps/pre…

👥 SO-CON 2024 slides are now available @SpecterOps's conference, with a big focus on graph based defense I found a few particularly interesting: @elad_shamir on NTLM security @jukelennings on the SaaS kill chain @hotnops on AWS identity attack paths github.com/SpecterOps/pre…
account_circle
Matt Johansen(@mattjay) 's Twitter Profile Photo

Woah found a new resource for free security training - pwn.college

Looks like they get pretty advanced in their topics too. Love seeing free trainings for folks trying to up their skills.

Woah found a new resource for free security training - pwn.college Looks like they get pretty advanced in their topics too. Love seeing free trainings for folks trying to up their skills.
account_circle