Christina Lekati (@christinalekati) 's Twitter Profile
Christina Lekati

@christinalekati

#SocialEngineering, #Psychology, #HUMINT & #OSINT intertwined for the sake of security. Black Hat Trainer. Previous Exec Board @OSINTCurious

ID: 931185662262480896

linkhttp://www.cyber-risk-gmbh.com calendar_today16-11-2017 15:42:17

3,3K Tweet

7,7K Followers

1,1K Following

Blue Team Con (@blueteamcon) 's Twitter Profile Photo

Learn to build proactive and reactive measures against open-source intelligence and social engineering attacks in the BTC 2024 training: Security Intelligence: Practical Social Engineering & Open-Source Intelligence for Security Teams. Learn more: blueteamcon.com/directory/sociโ€ฆ

Learn to build proactive and reactive measures against open-source intelligence and social engineering attacks in the BTC 2024 training: Security Intelligence: Practical Social Engineering & Open-Source Intelligence for Security Teams.

Learn more: blueteamcon.com/directory/sociโ€ฆ
Christina Lekati (@christinalekati) 's Twitter Profile Photo

Very happy to announce that the "๐‘บ๐’๐’„๐’Š๐’‚๐’ ๐‘ฌ๐’๐’ˆ๐’Š๐’๐’†๐’†๐’“๐’Š๐’๐’ˆ & ๐‘ถ๐’‘๐’†๐’-๐’”๐’๐’–๐’“๐’„๐’† ๐‘ฐ๐’๐’•๐’†๐’๐’๐’Š๐’ˆ๐’†๐’๐’„๐’† ๐’‡๐’๐’“ ๐‘บ๐’†๐’„๐’–๐’“๐’Š๐’•๐’š ๐‘ป๐’†๐’‚๐’Ž๐’”" class will be taking place this September at Blue Team Con in Chicago! Here are some details about what we will cover: ๐Ÿงต

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Hackers abused API to verify millions of Authy MFA phone numbers - Lawrence Abrams bleepingcomputer.com/news/security/โ€ฆ bleepingcomputer.com/news/security/โ€ฆ

Christina Lekati (@christinalekati) 's Twitter Profile Photo

Highly recommended book for the ones interested in how advanced threat actors operate and in the dynamics around cyberwarefare and state-sponsored attacks. Some very good case studies are included! Summer is here and it's my time to tackle a long reading list:)

Highly recommended book for the ones interested in how advanced threat actors operate and in the dynamics around cyberwarefare and state-sponsored attacks. Some very good case studies are included! 

Summer is here and it's my time to tackle a long reading list:)
Digital Trails Academy (@d1g1tal_trails) 's Twitter Profile Photo

๐Ž๐ฉ๐ž๐ง ๐‚๐ฅ๐š๐ฌ๐ฌ ๐€๐ฅ๐ž๐ซ๐ญ! Our โ€œFundamentals of Cyber Investigations and Human Intelligenceโ€ training returns as an ๐ข๐ง-๐ฉ๐ž๐ซ๐ฌ๐จ๐ง, ๐จ๐ฉ๐ž๐ง ๐œ๐ฅ๐š๐ฌ๐ฌ ๐ญ๐ก๐ข๐ฌ ๐’๐ž๐ฉ๐ญ๐ž๐ฆ๐›๐ž๐ซ ๐ข๐ง ๐๐ž๐ซ๐ฅ๐ข๐ง (๐†๐ž๐ซ๐ฆ๐š๐ง๐ฒ)! Class details & Registration: digitaltrails.podia.com/fundamentals-oโ€ฆ

Christina Lekati (@christinalekati) 's Twitter Profile Photo

Time for lunch at a company training and our table has this sign ๐Ÿฅน Based on the drawings, I suspect that they might have not really understood the topic of our class ๐Ÿ˜‚ ๐ŸŽญ ๐ŸŒท๐ŸŒน (I lowkey love it though)

Time for lunch at a company training and our table has this sign ๐Ÿฅน 
Based on the drawings, I suspect that they might have not really understood the topic of our class ๐Ÿ˜‚ ๐ŸŽญ ๐ŸŒท๐ŸŒน 
(I lowkey love it though)
OSINTgeekยฎ (@osintgeek) 's Twitter Profile Photo

Willst du im Bereich OSINT wirklich durchstarten? Es gibt viele Accounts, die dir wertvolle Einblicke bieten. Folgst du ihnen? Hier sind einige meiner Favoriten: OSINT Techniques, Dutch Osint Guy Nico, Christina Lekati, Aware Online und @thegaryruddell โ€“ um nur einige zu nennen!

Willst du im Bereich OSINT wirklich durchstarten?

Es gibt viele Accounts, die dir wertvolle Einblicke bieten. Folgst du ihnen? Hier sind einige meiner Favoriten: <a href="/OSINTtechniques/">OSINT Techniques</a>, <a href="/dutch_osintguy/">Dutch Osint Guy Nico</a>, <a href="/ChristinaLekati/">Christina Lekati</a>, <a href="/aware_online/">Aware Online</a> und @thegaryruddell โ€“ um nur einige zu nennen!
Jake | JCyberSec_ (@jcybersec_) 's Twitter Profile Photo

Threat Actors using the global CrowdStrike outage to spin up new domains ๐ŸŒ ๐Ÿ‘๏ธKeep an eye out for malware posing to 'fix' the issue ๐Ÿ”’Malicious phishing pages posing as a fixing site #Phishing

Threat Actors using the global CrowdStrike outage to spin up new domains ๐ŸŒ

๐Ÿ‘๏ธKeep an eye out for malware posing to 'fix' the issue
๐Ÿ”’Malicious phishing pages posing as a fixing site

#Phishing
Blue Team Con (@blueteamcon) 's Twitter Profile Photo

Don't get beat by slimy social engineering hackers - learn to identify and disrupt cyberthreats from open-source intelligence and social engineering in our upcoming training. Learn more: blueteamcon.com/directory/sociโ€ฆ

Don't get beat by slimy social engineering hackers - learn to identify and disrupt cyberthreats from open-source intelligence and social engineering in our upcoming training.

Learn more: blueteamcon.com/directory/sociโ€ฆ
Christina Lekati (@christinalekati) 's Twitter Profile Photo

With summer taking over and as things naturally slow down these weeks, it is my favorite time for rest, research, and going down some rabbit holes! Expect interesting new things and new classes coming from September on! ๐Ÿค“๐Ÿ–๐Ÿ“š What are you doing this summer? ๐ŸŒž

Christina Lekati (@christinalekati) 's Twitter Profile Photo

Hello Chicago! It's time for the Blue Team Con week! I look forward to meeting everyone in class tomorrow, and to attending the conference afterwards. ๐Ÿ˜ƒ Are you going to be there? If you see me around come say hi! So glad to be here :)

Hello Chicago! It's time for the  <a href="/BlueTeamCon/">Blue Team Con</a> week! I look forward to meeting everyone in class tomorrow, and to attending the conference afterwards. ๐Ÿ˜ƒ Are you going to be there? If you see me around come say hi!

So glad to be here :)