Razor (@razoreqx) 's Twitter Profile
Razor

@razoreqx

Speaker @DerbyCon || OSINT ||
#DFIR || Pentester || US Army Combat Medic || Malware Reverse Engineer || Malware Hunter @malwarebytes

ID: 39262054

linkhttp://404hack.blogspot.com calendar_today11-05-2009 14:35:12

13,13K Tweet

2,2K Followers

775 Following

TrustedSec (@trustedsec) 's Twitter Profile Photo

Reflecting on 12 incredible years of TrustedSec and our recent ranking in the Forrester Wave Report, Founder and CEO Dave Kennedy wanted to recognize our amazing leadership team! Learn more about the beginnings of TrustedSec here: hubs.la/Q02JvTld0

Razor (@razoreqx) 's Twitter Profile Photo

Psalm 110 1 The LORD says to my lord “Sit at my right hand until I make your enemies a footstool for your feet.”

RSA (@rsasecurity) 's Twitter Profile Photo

Between #ransomware, #credential theft, and more than 60 federal-level elections this year, "Every organization must overhaul its entire security architecture and move toward #ZeroTrust," explains RSA's Jim Taylor ⚠️ Learn how on our #blog ⬇️ rsa.com/resources/blog…

TrustedSec (@trustedsec) 's Twitter Profile Photo

In our latest #blog, Compliance Practice Lead Chris Camejo writes the ultimate CUI guide for government contractors. He starts with quick tips and continues with a deep dive into the #CUI program’s origins, structure, and nuances. Read it now! hubs.la/Q02JM4V80

The Hacker News (@thehackersnews) 's Twitter Profile Photo

U.S. DoJ charges a Nashville man for running a "laptop farm" to help North Koreans get remote IT jobs in the U.S. and U.K., fraudulently obtaining over $250,000 and causing companies significant losses. Read: thehackernews.com/2024/08/doj-ch… #infosec #cybersecurity

DEF CON (@defcon) 's Twitter Profile Photo

#defcon32 Badge update: Thanks to everyone who has reached out to us about the DEF CON 32 badge. We are aware of the save issue and a fix is incoming. Later today we'll have a patch and some instructions for you at defcon.org/badge/32. We'll keep you posted in these spaces.

#defcon32 Badge update: Thanks to everyone who has reached out to us about the DEF CON 32 badge. We are aware of the save issue and a fix is incoming.  Later today we'll have a patch and some instructions for you at defcon.org/badge/32. We'll keep you posted in these spaces.
The Hacker News (@thehackersnews) 's Twitter Profile Photo

A new social engineering campaign by the Black Basta #ransomware group targets users with credential theft and #malware attacks, using fake IT support calls via #Microsoft Teams to trick them into downloading software like AnyDesk. Read: thehackernews.com/2024/08/black-… #cybersecurity

volatility (@volatility) 's Twitter Profile Photo

3/ For more information on From The Source #FTSCon, hosted by the @Volatility Foundation in Arlington VA on Monday, October 21, 2024: events.humanitix.com/from-the-sourc…

DefSecSentinel (@defsecsentinel) 's Twitter Profile Photo

Elastic behavior rule breakdown of #cthulhu stealer for macOS. Good write-up by Cado 👍. Like they say in the article, this stealer is very similar in many ways to #amos stealer but with some modifications. Cthulhu is relatively simple, relies on a user supplied password

Elastic behavior rule breakdown of #cthulhu stealer for macOS. Good write-up by <a href="/CadoSecurity/">Cado</a> 👍. Like they say in the article, this stealer is very similar in many ways to #amos stealer but with some modifications. Cthulhu is relatively simple, relies on a user supplied password
Cyber Detective💙💛 (@cyb_detective) 's Twitter Profile Photo

Secret Files Exposed: How to Find Hidden Documents on the Web A short Guide by Nina Maelainine on how to search for sensitive files using Google and analyse their metadata. medium.com/@ninamaelainin… #osint

Secret Files Exposed: How to Find Hidden Documents on the Web

A short Guide by Nina Maelainine on how to search for sensitive files using Google and analyse their metadata.

medium.com/@ninamaelainin…

#osint
volatility (@volatility) 's Twitter Profile Photo

Our next speaker in the #FTSCon lineup: Andrew Case (Andrew Case) will present “Detecting & Defeating EDR-Evading Malware with Volatility 3” in the MAKER track! Register for From The Source here: events.humanitix.com/from-the-sourc… Stay tuned for more speaker announcements! #dfir

Our next speaker in the #FTSCon lineup: Andrew Case (<a href="/attrc/">Andrew Case</a>) will present “Detecting &amp; Defeating EDR-Evading Malware with Volatility 3” in the MAKER track!

Register for From The Source here: events.humanitix.com/from-the-sourc…

Stay tuned for more speaker announcements!

#dfir
gabsmashh (@gabsmashh) 's Twitter Profile Photo

A security researcher found an unsecured database belonging to Confidant Health that exposed 5.3TB of personal & confidential mental health information. The leaked files contained psychiatry intake notes, medical histories, family traumas, & even audio/video recordings of therapy