Toggle navigation
TWText.com
TWText.com
faq
Contact US
Follow US
#Infosec
Rox 🐧
theroxyd
abuser playbook - 12 steps(personal experience - refer to experts to learn more)Identify this behavior and get out of the situation as early as possibleBelieve survivors when you see this:
Read more
Huthaifa
J0rd4nian
#ثريد :مصادر لتعلم اختراق الاختبار ، من قنوات يوتيوب و كتب ومقالات ..الخ سأقوم بتجزئتها كل على حدى كيف تبدأ في مجال اختبار الاختراق :[ Guides/Roadmaps/How to Start ] :1.
Read more
Tze Ming Mok
tzemingdynasty
In mid-97 I gave notice as Craccum News Editor without even making a harassment complaint. I was 19. Martyn, my boss, locked me out of my computer & went through
Read more
Jon Nichols
WvuAlphaSoldier
I guess I should make it obvious now.I am looking a permanent gig somewhere either in senior analysis or management.Due to world events I am willing to relocate or chill
Read more
reclaimthefacts
reclaimthefacts
Verschwörungstheorien als Instrument der russischen Public Diplomacy und hybriden KriegsführungA thread http://reclaimthefacts.com/2020/10/30/verschwoerungstheorien-als-instrument-der-russischen-public-diplomacy-und-hybriden-kriegsfuehru
Read more
Brian Anderson
btanderson72
We need to have a serious talk about the difference between being ‘offended’ and being ‘harmed’. a conversation about forests and trees: 1/x The reason I use the analogy of
Read more
Thibeault 👨🏻💻
thibeault_chenu
#ViolencesPolicièresAnalyse nocturne de l'application mobile "Urgence Violences Policieres" suite au hashtag en TT et plusieurs messages citant cette application.#infosec 1/ L'application a pour but de permettre à une personne possé
Read more
A Noun and a Verb
hroethgar
So after slightly more thought about the medical privacy breach committed by Boag and Walker, and while their actions are vile, this news about the breach is probably the best
Read more
Beta Cuck 4 Lyfe
BetasGamma
1You may have heard recently of phone surveillance tech being used against protestors (and anyone who happens to be ANYWHERE NEAR what the Feds *declare* to be a protest.)This thread's
Read more
Taz Wake
tazwake
so about 7 months ago I rant-tweeted about orgs not really valuing security. I think its time to repeat rant.In a discussion with one of the people I really respect
Read more
Pwn All The Things
pwnallthethings
Guys in infosec: we need to have a little chat about this really nasty undercurrent of misogyny in this industry. Because there's a lot to dismantle, and as guys it
Read more
Dodge This Security
shotgunner101
Funny story: Someone was trying to forex scam people in a game I play. They wanted people to download whatsup, telegram, etc to "discuss the details in training them to
Read more
kay⁷⁺⁵ - FILOS CHECK PINNED
coffeemlkyoongi
okay filo moots here's what we got to do1. start using telegram its end to end encrypted and they dont sell our data to anyone2. Filter messages or posts about
Read more
🗣 Rob Rosenberger
vmyths
1/7Dave calls it "terrible reporting" but I'll DEFEND writer @kari_paul for summarizing the cybersecurity community's own #hyperbole.Dave notes the story includes NO comments from "security researchers." Okay then, let'
Read more
Lock Down Your Life
lockdownurlife
1/25 How to Establish Secure Communications- This is for you if:- You’ve been stalked or harassed- You think your spouse/partner is spying on you- You are a journalist or activist
Read more
𝙰𝚕𝚎𝚝𝚑𝚎
AletheDenis
DM Etiquette Tip: Please consider your request before sending it to someone who works for themselves or consults. Or anyone really. I’ve had some crazy requests lately and while I
Read more
‹
1
2
3
4
5
6
7
8
9
10
11
›