Alex Hutton / @huttonalexander.bsky.social (@alexhutton) 's Twitter Profile
Alex Hutton / @huttonalexander.bsky.social

@alexhutton

I once did breach data & risk things. Tweets do not reflect the opinions of my employer, or even necessarily myself. 2017 Hacker Pyramid Champ. I won a Primey.

ID: 1933141

linkhttp://alexhutton.com calendar_today22-03-2007 20:15:04

17,17K Tweet

13,13K Followers

3,3K Following

Ryan K (@meansec) 's Twitter Profile Photo

Ok. Let's start off my Verizon DBIR live tweet thread in prep of my conversation with Alex Pinto tomorrow on Splunk's #CoffeetalkWithSURGe interview series. Coffee and grainy loaf thing from #LDUcoffee here in Dallas

Ok. Let's start off my <a href="/VZDBIR/">Verizon DBIR</a> live tweet thread in prep of my conversation with <a href="/alexcpsec/">Alex Pinto</a> tomorrow on <a href="/splunk/">Splunk</a>'s #CoffeetalkWithSURGe interview series. Coffee and grainy loaf thing from #LDUcoffee here in Dallas
Arvind Narayanan (@random_walker) 's Twitter Profile Photo

In a new essay, Sayash Kapoor and I analyze 15 types of generative AI on social media. Envisioning how the information landscape is likely to be profoundly altered by gen AI was fun and a bit disturbing. We hope you read it! Some additional thoughts in this 🧵. knightcolumbia.org/content/how-to…

Microsoft Security (@msftsecurity) 's Twitter Profile Photo

Now on Security Insider, Microsoft distinguished engineer John Lambert explains how AI is enhancing threat intelligence. Check it out: msft.it/6955 #SecurityInsider When organizations enabled attack surface reduction (ASR) rules, incidents decreased by how much?

Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Microsoft has detected increased credential attack activity by the threat actor Midnight Blizzard using residential proxy services to obfuscate the source of their attacks. These attacks target governments, IT service providers, NGOs, defense industry, and critical manufacturing.

Virus Bulletin (@virusbtn) 's Twitter Profile Photo

Check Point researchers investigated an incident attributed to Camaro Dragon (aka Mustang Panda/LuminousMoth) involving self-propagating malware capable of spreading via USB drives. They provide a technical analysis of the infection chains & components. research.checkpoint.com/2023/beyond-th…

Check Point researchers investigated an incident attributed to Camaro Dragon (aka Mustang Panda/LuminousMoth) involving self-propagating malware capable of spreading via USB drives. They provide a technical analysis of the infection chains &amp; components. research.checkpoint.com/2023/beyond-th…
Roman History (@romanhistory1) 's Twitter Profile Photo

Died today 79AD Vespasian aged 69. He was the fourth & last in the Year of the 4 Emperors. He was the commander of a legion in Germany & Britain & subjugated Judaea Vespasian. Kindle amzn.to/38NNcI5 Book amzn.to/2H6tPOY The life and times of the emperor Vespasian

Sam Humphries 🐀🌻 on holidaaaaay (@safesecs) 's Twitter Profile Photo

Today has been immense, and surpassed my already high expectations. BSidesLeeds crewdem, you are wonderful kind people, and I love each and every one of you 💙❤️💜

Today has been immense, and surpassed my already high expectations. <a href="/BSidesLeeds/">BSidesLeeds</a> crewdem, you are wonderful kind people, and I love each and every one of you 💙❤️💜
Ben Rothke (@benrothke) 's Twitter Profile Photo

Hardly a day goes by without an article about ‘millions’ of open information security jobs. But the notion of millions of #infosec jobs is preposterous. How can you know how many #cybersecurity jobs there are if there’s no real statistical data available? brothke.medium.com/the-big-lie-of…

Nikita Tarakanov (@nikitatarakanov) 's Twitter Profile Photo

The latest Windows kernel RCE CVE-2024-38063 is integer underflow in processing IPv6 options. Vulnerable function is Ipv6pProcessOptions in tcpip.sys. Patch now!