Toggle navigation
TWText.com
TWText.com
faq
Contact US
Follow US
#Malware
Victor Baissait
VictorBaissait
Very Important ! don't hesitate to share itA translation of my thread about #RoundYearFun & his game "My Twitter Family". If you use the Twitter app remove it now. This
Read more
Walt Mossberg
waltmossberg
1/ I’m not weighing in on the growing controversy about the complex rules applied to developers in @Apple’s App Store. Just based on what I’ve read, I wouldn’t be surprised
Read more
پیپر
pepper_smoker
Looks like Amit Malware is using some random Arabic name generator to create such fake accounts. Don't fall for it: Older IT cell accounts are now being renamed https://twitter.com/pepper_smoker/status/1252618283485761536?s=19
Read more
FBI
FBI
#FBI Deputy Director David Bowdich will join our partners from the @TheJusticeDept for a press conference today regarding a national security matter. You can watch live at 1 p.m. EST
Read more
Evil Mike Myers
SirDavidBent
Tutorial: How to not spend money on any girl and still make her your fuckmate successfully. %100 Working. Follow this thread. 1. If you see any girl you like and
Read more
Anonymous
YourAnonCentral
Delete TikTok now; if you know someone that is using it explain to them it is essentially malware operated by the Chinese government running a massive spying operation.https://twitter.com/d1rtydan/status/1277081198624337920 This is
Read more
Aware Online
aware_online
★ #OSINT Tips ★ 17 short tips for website investigations[1/17: tactical information]Purpose: collect and analyze tactical information. 1. Visit website2. Collect visible info (contact details, VAT numbers, etc.)3. Analyze information4.
Read more
Molly McKew
MollyMcKew
Today, more detail was revealed by CISA about extensive Russian cyber intrusions in US election/critical systemsThe indictment of GRU hackers released Monday is a roadmap to understanding what Russian can
Read more
symmetric (Brandon Enright)
bmenrigh
So about this SIGRed Microsoft DNS Server vulnerability (CVE-2020-1350). Microsoft calls it "wormable".https://msrc-blog.microsoft.com/2020/07/14/july-2020-security-update-cve-2020-1350-vulnerability-in-windows-domain-name-system-
Read more
Venture Capital
kelly2277
Russian hackers cloaked attacks using Iranian group - so it looks like @DNI_Ratcliffe, @GOP and Trump LIED about Iran election hacking to cover for Putin’s election interference on the U.S.
Read more
Eric Garland
ericgarland
That's right up there with the "press freedom of Wikileaks," the front for Russian intelligence. Because TikTok is being used as an espionage tool of the Chinese state.https://twitter.com/ACLU/status/1289412933991174144 Russia
Read more
Horkos
WylieNewmark
When I first came to CTI, I cared about 2 things: the "why" and the most precise version of the "who". But the longer I stay at the fair, I
Read more
Cory Doctorow
doctorow
You may recall the Wannacry ransomware epidemic in 2017, when hospitals, businesses and governments were shutting down because their computers were being encrypted by malware that relied on a leaked
Read more
Cálmese
wakeywakey16
https://buzzfeed.egnyte.com/dl/QOyOORUMxw/ There were multiple contacts between FBI and GP. The NSCLB one is interesting. They are part of the FISA app process for one thing. There were NSCLB attorneys
Read more
Robᵉʳᵗ Graham😷, provocateur
ErrataRob
1/ Use Tor, use Signal -- unless your life depends upon them.https://twitter.com/TinkerSec/status/1267158243866001409 2/ If your life depends upon the security of your communications, then there is no substitute for learning
Read more
Calli Schroeder
Iwillleavenow
Terrible news, all. My time has come. The hackers pwned me. It’s all over. The horror. FYI, this is a pretty common scam. This is not a thing, there is
Read more
‹
1
2
3
4
5
6
7
8
...
12
13
›