cje (@caseyjohnellis) 's Twitter Profile
cje

@caseyjohnellis

hacker/entrepreneur/exec | troublemaker & troubleshooter | founder/cso @bugcrowd | cofounder @disclose_io | pioneered crowdsourced security as-a-service

ID: 53837402

linkhttps://linktr.ee/caseyjohnellis calendar_today05-07-2009 04:32:27

66,66K Tweet

29,29K Takipçi

4,4K Takip Edilen

corgi (@corg_e) 's Twitter Profile Photo

The Social Engineering Community Youth Challenge at DEF CON 32 is a wrap! Nearly 100 kids took on everything from prompt injection to hands-on hardware hacking. Want to know more? Check out my short blog post: corgima.com/communityinvol…

The <a href="/sec_defcon/">Social Engineering Community</a> Youth Challenge at <a href="/defcon/">DEF CON</a> 32 is a wrap! Nearly 100 kids took on everything from prompt injection to hands-on hardware hacking. Want to know more? Check out my short blog post: corgima.com/communityinvol…
bugcrowd (@bugcrowd) 's Twitter Profile Photo

💡 What would you choose: sticking to the routine checks or finding those hidden vulnerabilities that keep you up at night? Catch us at IANS on Sept 10th! We’re bringing #hacker ingenuity to the forefront. 🐞✨ Curious? That's the point! Come see how we’re making cybersecurity

cje (@caseyjohnellis) 's Twitter Profile Photo

hot take: the trend of turning vulns like this one into a pissing contest between "team nothingburger" and "team armgeddon" atm is getting a bit asinine

Tom Hegel (@tomhegel) 's Twitter Profile Photo

Can't help myself.. Taking a look into some of these 32 domains sheds light on a few unmentioned Doppelganger domains still active and personas posting on Twitter. Quick 🧵

Joseph Thacker (@rez0__) 's Twitter Profile Photo

Small announcement 😊 🎉 I've learned a crazy amount about AI tooling and AI implementation over the last 2 years, so I'm launching an AI consulting side hustle. Naturally I've got a primary strength of hacking/security, but I've been a Principal AI Engineer for the last year

Small announcement 😊 🎉 I've learned a crazy amount about AI tooling and AI implementation over the last 2 years, so I'm launching an AI consulting side hustle. 

Naturally I've got a primary strength of hacking/security, but I've been a Principal AI Engineer for the last year
Chelsea Onik (@chelseaonik) 's Twitter Profile Photo

Yes, I’m glad you asked. Americans put soy sauce in pouches that tear open and lose half the sauce. Australians have soy sauce fish, which is correct.

Yes, I’m glad you asked. Americans put soy sauce in pouches that tear open and lose half the sauce. Australians have soy sauce fish, which is correct.
Josh Kamdjou (@jkamdjou) 's Twitter Profile Photo

i’m looking for someone who can rip apart an email attack, identify what’s interesting about the techniques used by the attacker, what makes it hard to detect, and produce well written content. here’s a specific example from a talk i gave at blue team con today. would love to

i’m looking for someone who can rip apart an email attack, identify what’s interesting about the techniques used by the attacker, what makes it hard to detect, and produce well written content. 

here’s a specific example from a talk i gave at blue team con today. would love to
mdowd (@mdowd) 's Twitter Profile Photo

Few people tell you this early in your career, but one of the most essential skills for software development is the ability to come up with cool sounding project codenames on the spot

OrangeCon (@orangecon_nl) 's Twitter Profile Photo

🍊 OrangeCon 2024 was an absolute blast! 🧡🎉 The videos are now live! 🎥 (Re)watch your favourite talks, and get all the juicy details on our YouTube channel: youtube.com/@OrangeCon #OrangeCon #conference #education #cybersecurity

gabsmashh (@gabsmashh) 's Twitter Profile Photo

A security researcher found an unsecured database belonging to Confidant Health that exposed 5.3TB of personal & confidential mental health information. The leaked files contained psychiatry intake notes, medical histories, family traumas, & even audio/video recordings of therapy