Luke Stephens (hakluke) (@hakluke) 's Twitter Profile
Luke Stephens (hakluke)

@hakluke

Hacker, marketer. I manage socials and produce amazing technical blogs for cybersecurity orgs. Founder of @hacker_content and @haksecio

ID: 881590374136926208

linkhttp://hakluke.com calendar_today02-07-2017 19:08:19

13,13K Tweet

90,90K Takipçi

1,1K Takip Edilen

Luke Stephens (hakluke) (@hakluke) 's Twitter Profile Photo

When writing for the internet, write as if the person who is reading it won’t be able to focus long enough to read more than a paragraph (because they won’t). Split up text with: - Subheadings - Lists - Diagrams - Tables - Code blocks Remember, you’re competing with TikTok.

Luke Stephens (hakluke) (@hakluke) 's Twitter Profile Photo

Curious to hear your opinions: If a bug bounty program uses a framework/software/library that has a vuln in it, but then they use that same framework/software/library on multiple hosts, should they accept the bug for each host? Or is it just a single bug?

Travis Hubbard (@wtravishubbard) 's Twitter Profile Photo

The more I've used tools like Cursor, Claude, and ChatGPT, the more I think there is some merit to junior/mid devs being replaced by AI tools But that's not the actual risk The real risk is that the pipeline of senior/principal devs is going to die off We're either already

HackerContent (@hacker_content) 's Twitter Profile Photo

What you need to know about SSRF vulnerabilities by Luke Stephens (hakluke)👇 Including: 🪲 What is SSRF? 🐞 Where can I find them? 🐛 What can I use to bypass protections? Read now 👇 labs.detectify.com/security-guida…

Luke Stephens (hakluke) (@hakluke) 's Twitter Profile Photo

EASM or ASM (external attack surface management) always has been the continuous discovery and assessment of external threats. Now we've just invented "CTEM" which is what EASM already was anyway, and then we've changed the definition of EASM to be less comprehensive. 🫠

Security Trybe (@securitytrybe) 's Twitter Profile Photo

Top 10 Most Dangerous Hackers in the World 10. George Hotz: Also known as a ‘Jailbreak Artists’, he is one of the first people to jailbreak Play Station 3, he is also behind the April 2011 PlayStation breach, he also associated with the group ‘Anonymous’ Hotz first gained

Top 10 Most Dangerous Hackers in the World 

10.  George Hotz:

Also known as a ‘Jailbreak Artists’, he is one of the first people to jailbreak Play Station 3, he is also behind the April 2011 PlayStation breach, he also associated with the group ‘Anonymous’ 

Hotz first gained
Luke Stephens (hakluke) (@hakluke) 's Twitter Profile Photo

Just used a .gov site that has a max 8 char password policy 🤦 Without naming names, what's the worst password policy you've seen recently?