Those fucking Republican fools staying silent right now think this fascist shit wonโt come for them too.
You dumbfucks.
Open a history book.
Itโs not if.
Itโs when.
@thund3r-struck
Former I.T. Consultant with over 20 years experience now focused on cybersecurity๐Pentester, Offensive Security Engineer. Currently working on my OSCP (Offensive Security Certified Professional)Certification.
Those fucking Republican fools staying silent right now think this fascist shit wonโt come for them too.
You dumbfucks.
Open a history book.
Itโs not if.
Itโs when.
Hi. Iโm an expert in modernizing legacy government software systems. This is profoundly stupid and will definitely fail, and itโs just a question of whether our social security system fails along with it.
DEI never once helped me in my career but I can recall so many times an unqualified white guy got an opportunity he didnโt earn that Iโve lost count.
We have to over prove merit while they get rewarded based on potential & vibes.
This is one reason diverse teams do better overall
Linked to Russiaโฆ
www.malwarebytes.com/blog/news/20...
Let the purges begin.
Beyond disgraceful.
I cannot imagine a more cowardly affront to the rule of law than siding with traitors who favored political violence over free elections and the Constitution.
Iโm speechless.
I wrote a post about how AI will interface with end-to-end encryption. TL;DR maybe not so well! blog.cryptographyengineering.com/2025/01/17/l...
The cybersecurity executive order @cyberscoop.bsky.social has been informing you for months about was released this morning www.whitehouse.gov/briefing-roo...
Billion-dollar video game: is this the most expensive piece of entertainment ever made?
โExperts warn of the risks of sharing your data without careful xonsideration.โRedNote might seem like a quick fix for TikTok fans ahead of its potential ban in the U.S., but it comes with serious cybersecurity and privacy risksโโฆ www.forbes.com/sites/kateof...
Bluesky is getting its own photo-sharing app, Flashes
Check out my latest appearance with the 'PrOTect IT All' podcast. You can tune in here where we discuss how to practically build an OT cybersecurity program, and how to build a career in the field as a cybersecurity practitioner! protectitall.co/episodes/und... #ICScybersecurity
Apple recently addressed a macOS vulnerability that allows attackers to bypass System Integrity Protection (SIP) and install malicious kernel drivers by loading third-party kernel extensions.
A new ransomware campaign encrypts Amazon S3 buckets using AWS's Server-Side Encryption with Customer Provided Keys (SSE-C) known only to the threat actor, demanding ransoms to receive the decryption key.
A significant rise in credential stealer campaigns has proven highly successful, primarily driven by social engineering, where attackers convince users to execute the malware themselves.
Luxembourg government websites knocked offline in latest cyberattack | Luxembourg Times www.luxtimes.lu/luxembourg/l...
Banshee stealer evades detection using Apple XProtect encryption algo https://buff.ly/4hbfWKX
A network protocol stack is a hierarchy of layered protocols that collaboratively manage communication between devices, handling tasks from application-level interactions to physical data transmission over a network ๐๐
#sysadmin #devops #infosec #cybersecurity
Post-apocalypse show pausing for the apocalypse
LIVE: WIRED journalists are tuning in and will be bringing you the most important updates from the courtroom and our analysis as the justices consider what could be one of the most consequential First Amendment rulings of the past several decades.
Security Bite: macOS malware โBansheeโ found using Appleโs own code to evade detection
Finally closed the X account , glad to see it go
Thanks for the follow , agreed, I think twitter is becoming toxic as well.
High there
Finally here, whatโs up