Sirius Matters @MattersSirius
Logical negativist doing cybersecurity. Fan of Columbo, Husserl, OWASP & CIS controls. In security "correlation does not imply causation" doesn't go far enough sirius-matters.com -38.106459, 144.874946 Joined December 2018-
Tweets59
-
Followers20
-
Following308
-
Likes28
Hand jive
In @sydney at ACS and clients. I like you Sydney but even the hot chocolate is better in Melbourne
15M+ Services & Apps Remain Sitting Ducks for Known Exploits: bit.ly/3m2JKm6 by @roblemos
Q3 Student writing contest TSB. “Write hard and clear about what hurts.” - Ernest Hemingway #Writing thestrategybridge.org/the-bridge/202…
“This is really dangerous,” EFF’s @mguariglia told @WIRED — frequent and apparently widespread use of 1509 summonses creates “a situation where this agency can fully go rogue” by using this tool in investigations that fall outside the scope of the law. wired.com/story/ice-1509…
Opposition to the RESTRICT Act is growing. Here's why: eff.org/deeplinks/2023…
Sad to hear about Klaus passing. #redteam #gamenight cnn.com/videos/media/2…
So #ChatGPT - tell me the biggest lie in cybersecurity
Listen up! Hear about the latest rising issues in online security, privacy, and free expression with EFF's EFFector newsletter: eff.org/deeplinks/2023…
Atomic Red Team Atomic Red Team™ is a library of tests mapped to the MITRE ATT&CK® framework. Security teams can use Atomic Red Team to quickly, portably, and reproducibly test their environments. github.com/redcanaryco/at… #cybersecurity #infosec #hacking #redteam
This is the line at the Silicon Valley Bank.
Microsoft says a group of cyberattackers tied to China hit its Exchange email servers cnn.com/2021/03/03/tec…
Asked the most vital US foreign policy issue for the next decade, I answered: "Washington, DC"
Asked the most vital US foreign policy issue for the next decade, I answered: "Washington, DC"
"What's up" (for 40+ years) is basing and overflight rights, in order to enforce the Carter Doctrine. bit.ly/2PHRzbi
"What's up" (for 40+ years) is basing and overflight rights, in order to enforce the Carter Doctrine. bit.ly/2PHRzbi
Elza Pioche @PiocheEl
53 Followers 5K Following🎃 britt @brittnik
2K Followers 5K Following I like tweeting music + things that make me laugh. My views are not my employer’s. morphing into a Margot Robbie fan account and I am unashamed!John Fowler @JohnDFowler
3K Followers 5K Following Author, A FOREST IN THE CLOUDS: MY YEAR AMONG THE MOUNTAIN GORILLAS IN THE REMOTE ENCLAVE OF DIAN FOSSEY (I'm the hairy one in the picture.)Dr Ruth Delaforce @Dr_R_D
2K Followers 4K Following Australian researcher in security, intelligence, military, policing and transnational crime. Human security in all its forms. RTs are not personal opinion.Red Team Australia @redteamoz
152 Followers 1K Following Australian Co specialising in helping organisations achieve better protective security outcomes through a range of Red Teaming & Alternative Analysis techniquesStatic Variable @StaticVariable
423 Followers 806 Following An expert in cybersecurity, geopolitics and anything else that may be trending that day. Also a hypothetical liar.Ben @_benwaters_
474 Followers 1K Following Co-founder & COO at @Cydarmtech. Cybersecurity generalist. I love a good coffee and digging at a problem. All tweets my own. Retweet ≠ endorsement.Sailor on the Cyberse.. @Sec00000101
882 Followers 1K Following Security Architect, anthropologist, ocean lover. "Where there is water, there is life" - Science. "Where there is a sea, there are pirates" - Greek ProverbSeers @seersco
309 Followers 1K Following The World’s leading data privacy and consent management platform. Updates on developments in global data privacy 📰 #DataPrivacy #GDPR #DataProtectionj03d @jdalessa
296 Followers 1K Following Personal account. #cybersecurity wonk. #cyberpsychology #securityauditor. @Brandeis & @Tulane InfoSec adjunct. @sam4compliance. Opinions are mine. RT ≠ endorseBen Heyes @BenHeyes12
220 Followers 3K Followingthecybersecurityblog @thecybersecblog
862 Followers 2K Following Independent CyberSecurity Analyst, Blogger, Cyber Security Geek, passionate about children safety, cybercrimeHyperion Gray @HyperionGray
5K Followers 4K Following Software & Security Research, Penetration Testing, Ethical Hacker EducationSocialKraft @Social_Kraft
131 Followers 342 Following Best Digital Marketing Agency in Jaipur, Socialkraft offers a wide range of IT solutions services like branding, marketing, web work, web design and developmentRon Bernard-Rivera @rbernrbern
94 Followers 895 FollowingTopWardaddy @topwardaddy
680 Followers 3K Following Blue Team: Ideals are peaceful. Red Team: History is violent. #DEFCON ... #Sevendust and #Chevelle fanRichard Stiennon @stiennon
45K Followers 46K Following Cybersecurity Industry Analyst Curating all the data on 3,800+ cybersecurity vendors and 10,400+ products.Meredith Whittaker @mer__edith
92K Followers 4K Following President of @signalapp, Chief Advisor to @ainowinstitute (Also on Mastodon @[email protected], also on bsky @meredithmeredith.bsky.social)Jathan Sadowski @jathansadowski
20K Followers 401 Following senior fellow (decra) @emergingtechlab /// co-host @machinekillspod /// my new book – https://t.co/Rgzl9unqomCory Doctorow NONCONS.. @doctorow
498K Followers 3K Following Author/activist/journalist. New novel: THE BEZZLE, a thriller of hi-tech fraud and the Shitty Tech Adoption Curve https://t.co/4ZExCQHv6q @[email protected]DoD Cyber Crime Cente.. @DC3Forensics
10K Followers 423 Following Official Twitter Page of the DoD Cyber Crime Center. Digital/multimedia forensics, cyber training, analysis, vulnerability sharing, and technical solutions.SecurityWeek @SecurityWeek
220K Followers 3K Following #Cybersecurity News, Threats, Insights and Expert Analysis: #SCADA #Infosec #ICS CoverageBlondes Over Baghdad @BlondsOvrBaghd
15K Followers 4K Following Putting the pun in pundit. Satirist at @DuffelBlog and @Reductress, Soldier, storyteller, exaggerater.Task & Purpose @TaskandPurpose
84K Followers 115 Following News, culture, and analysis by and for the military community. Talk to us at [email protected] or slide into our DMs.Army Cyber Command @ARCYBER
38K Followers 674 Following Official X page of U.S. Army Cyber Command (Following, retweets and links do not equal endorsement)LetsDefend @LetsDefendIO
89K Followers 0 Following LetsDefend is a hands-on Blue Team training platform that enables people to gain practical experience by investigating real cyber attacks inside a simulated SOCHacking Articles @hackinarticles
225K Followers 402 Following House of Pentesters Follow us: https://t.co/Y6XOlSOA92ᗩᒪETᕼE @AletheDenis
20K Followers 1K Following ‘Uh-Lee-th’ | 🦊Red Team @bishopfox | ⚫️ #BlackBadge @DefCon & @tracelabs | 🦋@darknetdiaries 107 | Board @DefconGroups | ☠️ Goon | #DC209 CoFounderDave Luber @NSA_CSDirector
34K Followers 335 Following Director of Cybersecurity at @NSAgov. Follow @NSAcyber for unique, actionable, and timely cybersecurity guidance. https://t.co/Jivn9PjkOMU.S. Cyber Command @US_CYBERCOM
126K Followers 313 Following Official Twitter page of U.S. Cyber Command (Following, retweets and links do not equal endorsement)Covert Contact Podcas.. @CovertContact
6K Followers 5 Following Covert Contact is a podcast about conflict, intelligence, & tech hosted by John W. Little.CISA Cyber @CISACyber
259K Followers 71 Following Part of @CISAgov, we respond to major incidents, analyze threats, and exchange critical cybersecurity information with partners around the world.Blake Strom @stromcoffee
3K Followers 363 Following Tech, security, and other random things. @msftsecurity researcher. Creator and former lead of @mitreattack. Tweets are my own.Red Canary @redcanary
28K Followers 1K Following 24/7/365 threat detection and response across your cloud, identity, endpoints and everything in-between. We got you: https://t.co/pFNwBJMvnxMISP (@misp@misp-comm.. @MISPProject
23K Followers 97 Following MISP - Threat Sharing. An open source software and standards to share, create and validate threatintel and intelligence. Mastodon @[email protected]ATT&CK @MITREattack
104K Followers 534 Following MITRE ATT&CK® - A knowledge base for describing the behavior of adversaries. Replying/Following/Re-tweeting ≠ endorsement.Ana Navarro-Cárdenas @ananavarro
2.0M Followers 1K Following Proud Nicaraguan-AMERICAN. On @CNN & @TheView. I love America, imperfections and all. In 2024, I’m a single-issue voter: for Trump to lose. Vote! 🇺🇸🇳🇮Chrissy Morgan @5w0rdFish
12K Followers 3K Following Mother | Hacker | Pagan | DIY Hobbyist & Gardener | Operational Technology - Cyber Security R&D Views are my ownDW @expl01tat10n
1K Followers 223 Following CISO @ Unqork. Making it Asymmetrical since before you were born. Doing things in places, comments are my own.Dr. Emily Petroff @ebpetroff
11K Followers 2K Following Assoc. Dir, Strategic Partnerships, Perimeter Institute. Project Manager. Former Astronomer. Expat in Canada 🇨🇦 🏳️🌈 (she/her) Dog mom to Delta the CorgiWorld Health Organiza.. @WHO
12.3M Followers 2K Following We are the #UnitedNations’ health agency - #HealthForAll. ▶️ Always check our latest tweets on #COVID19 for updated advice/information.FBI @FBI
3.6M Followers 2K Following Official FBI Twitter. Submit tips at https://t.co/tGqFRcJykB. Public info may be used for authorized purposes: https://t.co/x6bfDUEYeJ.FEMA @fema
823K Followers 759 Following Helping people before, during and after disasters. ¿Habla español? Siga a @FEMAEspanol. Social media policies: https://t.co/88yAQIy74uU.S. Secret Service @SecretService
1.3M Followers 84 Following The Secret Service is mandated by Congress to carry out an integrated mission of protection and criminal investigations.Department of Defense.. @DeptofDefense
6.5M Followers 689 Following Official U.S. Department of Defense Twitter account. Follow @SecDef for more from Secretary Lloyd J. Austin III. https://t.co/paI4g75Ek8…Homeland Security @DHSgov
2.3M Followers 448 Following With honor and integrity, we will safeguard the American people, our homeland, and our values. #WeAreDHS, led by @SecMayorkas and @DHS_DepSec.CIA @CIA
3.4M Followers 56 Following We are the Nation's first line of defense. We accomplish what others cannot accomplish and go where others cannot go. https://t.co/yhjtYvFBiJNSA/CSS @NSAGov
1.1M Followers 166 Following National Security Agency/Central Security Service official account, home to America's codemakers and codebreakers. Likes, retweets, and follows ≠ endorsement.SocietyInfoRisk @societyinforisk
778 Followers 153 Following The Society of Information Risk Analysts is dedicated to furthering the practice of Information Risk Management.CyberWarrior @CyberDomain
22K Followers 10K Following It took only 14 days to decode 9EC4C12949A4F31474F299058CE2B22A #AmazonInfluencer #Cyberwar #CyberSecurity #Intelligence #Pentest #DDoS #Bitcoin #GDPR #LGPDSAMforcompliance @sam4compliance
6 Followers 15 Following Economical tools to assess, report and improve compliance with cybersecurity standards such as APRA CPS 234, CIS, NIST-CSF, 800-171, 800-66, ISO27000 seriesChristina Lekati @ChristinaLekati
7K Followers 1K Following #SocialEngineering, #Psychology, #HUMINT & #OSINT intertwined for the sake of security. Exec Board @OSINTCuriousRiskLens @RiskLens
3K Followers 880 Following We help cyber risk leaders build programs that manage cybersecurity risk in financial terms. A @SafeCRQ company. #riskquantificationFAIR Institute @FAIRInstitute
3K Followers 645 Following The FAIR Institute is a non-profit professional organization dedicated to advancing the cyber risk management. RTs ≠ endorsements.Global Foundation for.. @GFCYBER
405 Followers 33 Following A #Cybersecurity think tank with the motto: "Thinking in Cyber, Influencing the Perspectives"GlobalCyberAlliance @GlobalCyberAlln
6K Followers 1K Following GCA is an international nonprofit focused on delivering a secure, trustworthy Internet that enables social and economic progress for all.RedTeam Security @redteamsecure
4K Followers 583 Following Social Engineering, Penetration Testing, Red Teaming. Is Your Business Safe? Start Testing To Find Out Before Malicious Attackers Do It For You.Red Team Tools @redteamtools
1K Followers 0 FollowingNJCCIC @NJCybersecurity
8K Followers 1K Following Official Twitter account for the NJ Cybersecurity & Communications Integration Cell at @NJOHSP. Likes + Retweets + Follows ≠ EndorsementCybersecurity @ NIST @NISTcyber
74K Followers 542 Following Official handle covering all things cybersecurity at NISTCybersecurity and Inf.. @CISAgov
279K Followers 109 Following America's Cyber Defense Agency and National Coordinator for critical infrastructure security & resilience. Likes, RTs, follows ≠ endorsements.Sailor on the Cyberse.. @Sec00000101
882 Followers 1K Following Security Architect, anthropologist, ocean lover. "Where there is water, there is life" - Science. "Where there is a sea, there are pirates" - Greek ProverbRobert M. Lee @RobertMLee
79K Followers 420 Following Co-Founder & CEO @DragosInc | SANS #FOR578 & #ICS515 course author & Faculty Fellow |@_LittleBobby_ writer | NSA & USAF VeteranDuckDuckGo @DuckDuckGo
2.8M Followers 4 Following Independent internet privacy company. Download our browser on mobile and desktop. Unlike Chrome, it has privacy built in, including our private search engine.Eliza Sorensen @Zemmiph0bia
2K Followers 4K Following local smut peddler, snarky antagonist, koori, disabled, queer, tech policy and recovering sysadmin.Asked the most vital US foreign policy issue for the next decade, I answered: "Washington, DC"
And @MicahZenko makes a very strong case for the power of the U.S. President to shape the future, 'Whoever rules Washington will determine how America will connect with the outside world.' americas.chathamhouse.org/article/2020-v…
"What's up" (for 40+ years) is basing and overflight rights, in order to enforce the Carter Doctrine. bit.ly/2PHRzbi
A Saudi military officer commits a terrorist act on a U.S. military base in apparent conjunction with others and the @POTUS meekly reads a letter of apology from the Saudi king? What’s up with THAT? chicagotribune.com/nation-world/c…
New study. Adding one woman to a Marine Corps team increases its ability to solve complex problems, if team leader has positive belief about the woman's contributions. bit.ly/2XOc8rz
Brilliant idea. National security orgs do this (CIA and USSS museums feature many failures), but never seen a private sector org that does. Adjacent FB campus that retains bold "Sun Microsystems" lettering on the main building is one mini-example.
Shrines of Failure. A short thread. I was at an event recently where one participant talked passionately about a disaster they had that they have since preserved artifacts from in a physical space, among other things, to encode the lesson's learnt. 1/6
They spent nearly 20min flashing their cc# to everyone. Both sides. Repeatedly. For 20 min. When I could stand no more I told her so. Response: It’s the company’s card... Admittedly, only like 5 of us could see it, so they have that going for em. #infosec
Thank you to my good friend and awesome cybersecurity professional Keyaan Williams. His outreach efforts are helping to build the next generation of systems security engineers and executives who understand the importance of those skilled individuals. linkedin.com/posts/keyaan_e… #SSE
I counted 15+ sensitive operational details in Trump's Q+A about the Baghdadi raid--planning timeline, overhead ISR, logistical, geographic, partner support, time-on-site, PID assessment, route of travel, etc. Transcript would be classified if it wasn't public.
Check out this awesome SIEMonster with terminator laser eyes with a NYC backdrop created by @elkentaro Not once did he ask for money, shipping or a thank you. What a guy. @_SIEMonster
@jaysonstreet Its funny, because now i have a picture of you in my head, in a dinosaur costume, with a yaggi on a pole pointed at the front of the White House.
A beautiful sign in front of this church! #FightPovertyNotThePoor 💜
🔥 CVE-2019-14287 A flaw in Sudo—that comes installed on almost every #Linux OS—could let users run commands as "root" even when they're restricted. Details ➤ thehackernews.com/2019/10/linux-… How? Just by specifying user ID "-1" or "4294967295" in the command instead of the root.
Good security is a business opportunity. @cydarmtech Co-founder & COO @_benwaters_ presenting on Third Party Assurance at the @DefenceTeaming Defence Cyber Security Summit. #ozcyber #cyber #gameon
This week when my new book, Permanent Record, became available, the US government sued my publisher for failing to grant the CIA and NSA an opportunity to remove evidence of their crimes from the manuscript. Not even joking. This is my publisher's response: (via @minipetite)
My mortgage broker has given me the gift of the greatest auto-correct I have ever received. Yes Nick. Yes I have time for that.
My sincere thanks to Strategy Bridge, Mark Perry, Greg Fontenot and Steve Leonard. They made me think. I am grateful to all for the comments, thoughts, and best wishes, most of all for taking the time out of life to read what I wrote. Cheers all!
Bluetooth negotiates keylength in the clear before key exchange starts; either party can force the length to 8 bits, and so can a middleman. How on earth did this get agreed by dozens of tech companies, and get past NIST?
Bluetooth is broken: A third party can force a one byte encryption key on any Bluetooth connection in range, even between already paired devices. It's bad. knobattack.com
We have new frameworks available! #infosec #cybersecurity #securityaudit linkedin.com/posts/sam-for-…
I have heard from folks struggling to figure out how to demonstrate #cybersecurity. There are many free resources. The most important thing to do - is start. Just start. Start here: and use the guide linked. #informations…lnkd.in/fycFbHw lnkd.in/fZgenxq