Moonsoulchild(@bymoonsoulchild) 's Twitter Profile Photo

I learned years ago that suppressing my soft side did nothing but ruin me. My vulnerability is a gift. My emotional intelligence is beautiful. Anyone who couldn’t see that didn’t need to be close to my heart.

account_circle
Jefferson Gonzales(@gonzxph) 's Twitter Profile Photo

[Akamai Bypass] Open Redirect to XSS

Open Redirect

/path?next=//evil,com --> redirected to evil,com

Tried XSS

/path?next=javascript:alert(7) --> blocked by Akamai WAF

[1/2]

s

[Akamai Bypass] Open Redirect to XSS

Open Redirect

/path?next=//evil,com --> redirected to evil,com

Tried XSS

/path?next=javascript:alert(7) --> blocked by Akamai WAF

[1/2]

#BugBounty #bugbountytips #bugbountytip #vulnerability #infosec #akamaibypass
account_circle
Corellium(@CorelliumHQ) 's Twitter Profile Photo

Strengthen your government agency’s cybersecurity capabilities and find mobile vulnerabilities before bad actors do. Learn more at: corellium.com/security-resea…

account_circle
𝖓𝖎𝖆♡(@brujabitchh) 's Twitter Profile Photo

Pulling out the toxicity within yourself is not a comfortable process. You gotta stand in your humility and vulnerability. You need to take ownership and responsibility. You need to be aware of the frequency you emit and the environment you create. Let the walls down. Put the ego…

account_circle
• Lissah •(@iamthecreatress) 's Twitter Profile Photo

Why is it the ppl who provide the least emotional safety who feel the most entitled to my vulnerability? Lol. Like I am absolutely capable of being vulnerable… I’m just not comfortable with you.

account_circle
Sitarah Mohammadi(@sitarah_m) 's Twitter Profile Photo

I addressed the United Nations Human Rights Council 📍 #HRC53 53rd Regular Session, shedding light on the ongoing persecution faced by the Hazara people. I empathised the extra layers of vulnerability faced by Hazara women due to the intersectional factors of gender, religion & ethnicity.

Written statement:…

I addressed the @UN_HRC 53rd Regular Session, shedding light on the ongoing persecution faced by the Hazara people. I empathised the extra layers of vulnerability faced by Hazara women due to the intersectional factors of gender, religion & ethnicity.

Written statement:…
account_circle
Bishop Fox(@bishopfox) 's Twitter Profile Photo

We’ve created a tool to quickly check if a remote firewall is affected by critical -2023-27997. noperator walks through the design of the timely assessment tool in this write-up. bfx.social/3pbdEGj

account_circle
Michell C. Clark(@MichellCClark) 's Twitter Profile Photo

We think we’re alone in what we’re going through because we’re not talking about our pain.

We need to stop isolating ourselves—vulnerability is the bridge.

account_circle
SMU(@SMU) 's Twitter Profile Photo

Autonomous systems depend on machine learning and AI which can create cyberattack vulnerabilities.

SMU's Darwin Deason Institute for Cyber Security has launched the Cyber Autonomy Range, supported by IBM's SkillsBuild Security Software, to harden these systems against attacks.

account_circle
Stephen Ajadi(@StephenAjadi) 's Twitter Profile Photo

It is an honour that my research at Land Economy on reducing the vulnerability of open spaces to extreme conflict and violence in Nigeria received the 2023 CSAR PhD award for outstanding research at @cambridge_Uni from the pro-VC Prof. Andy Neely

It is an honour that my research at @CambridgeLandEc  on reducing the vulnerability of open spaces to extreme conflict and violence in  Nigeria received the 2023 CSAR PhD award for outstanding research at @cambridge_Uni from the pro-VC  Prof. Andy Neely
#ThinkingNigeria #Nigeria
account_circle
gina • جینا(@entertheunseen) 's Twitter Profile Photo

denying someone communication isn’t giving the alpha vibe you think it’s giving. it’s giving emotionally abusive, dysfunctional child who hasn’t learned that healthy forms of connection require emotional vulnerability, reciprocal communication & mutual respect. like, hello? duh!

account_circle
Corelight(@corelight_inc) 's Twitter Profile Photo

Networks create an unavoidable vulnerability. However, this ebook demonstrates that when they’re properly monitored, networks can also provide evidence that’s instrumental for incident response and threat hunting.

account_circle
your thoughts(@ohthoughtsquote) 's Twitter Profile Photo

before, i used to annoy my friends when i'm bored, let them know the reason behind my happiness and vent out my frustrations to them. i used to show my vulnerability and became dependent and that wasn't a wise move. that was indeed selfish. i expected them to be there for me all

account_circle
𝑁𝑒𝑡𝑡𝑒(@adoseofnette) 's Twitter Profile Photo

I’m learning so much about not over sharing with the things I have going on in my life everyone is not qualified to experience my vulnerability.

account_circle
Atlanta Makeup Artist(@TierraaaMariee) 's Twitter Profile Photo

Idc about being labeled as emotional anymore. I’ve spent years of being strong, bottling up my feelings, holding my breath… not trying to show any sign of vulnerability to anyone. It’s growth actually being in tune with your emotions & capable to express

account_circle
noperator(@noperator) 's Twitter Profile Photo

My brilliant team at Bishop Fox developed a safe, no-crash vulnerability check for the recent CVE-2023-27997 heap overflow in FortiGate firewalls allowing RCE. You can try the tool out yourself at github.com/BishopFox/CVE-…. Check out the blog, too! Clever technique, worth a read.

My brilliant team at @bishopfox developed a safe, no-crash vulnerability check for the recent CVE-2023-27997 heap overflow in FortiGate firewalls allowing RCE. You can try the tool out yourself at github.com/BishopFox/CVE-…. Check out the blog, too! Clever technique, worth a read.
account_circle
ohwale(@dedohwale) 's Twitter Profile Photo

(1/6) ⚔️Solidity Attack Vector⚔️

Piece-wise functions

When calculating a piece-wise function, there is almost always a point of vulnerability.

Let's take a look at a similar example from my recent medium finding.

👇🧵

(1/6) ⚔️Solidity Attack Vector⚔️

Piece-wise functions

When calculating a piece-wise function, there is almost always a point of vulnerability.

Let's take a look at a similar example from my recent medium finding.

👇🧵
account_circle