September 1st, 2020

My tweets

  • Mon, 13:05: RT @jrimer2008: tech blog There is a new threat, its called death stalker: Apparently there is a group out there called death stalker and i…
  • Mon, 15:23: The Independent artist show, broadcast 258: Broadcast 258 was aired on its normal day, and we got two new albums. Have fun with this program and we'll see you again soon. Welcome to broadcast 258 of the independent show. We're going to play a wide… https://t.co/kibyUPlQQH https://t.co/97OhC52DS1
  • Mon, 18:41: Cyber scoop UK man arrives to face charges in US after alleged $2 million email scam: A man charged as part of a business email compromise money laundering scheme that allegedly defrauded victims out of $2 million over the course of at… https://t.co/IiEfeJEoqZ Check it out! https://t.co/mJKk4qPUI3
  • Mon, 19:49: Cyber scoop The FBI's digital security guide for local police actually has good OPSEC advice: An FBI cybersecurity guide instructs local police officers on how to avoid surveillance and harassment online amid ongoing protests against police… https://t.co/wGTjGL95MQ Check it out! https://t.co/7848DlTppz
  • Mon, 20:15: The Independent artist show, broadcast 258 https://t.co/aBtennsJ1l
  • Mon, 20:15: The Independent artist spotlight: Mercy Machine https://t.co/8sAE6fP0DX
  • Tue, 03:30: Cyber scoop The most popular brand websites hackers use for typosquatting campaigns: The most imitated websites that credential-stealing, financially-motivated hackers have resorted to mimicking include Wells Fargo, Netflix, Facebook, and… https://t.co/GXbIcZquGg Check it out! https://t.co/unsg9CgojT
  • Tue, 07:20: Trend Micro The Life Cycle of a Compromised (Cloud) Server: Trend Micro Research has developed a go-to resource for all things related to cybercriminal underground hosting and infrastructure. Today we released the second in this three-part series of… https://t.co/jMTm3v0RqH https://t.co/mp4LpaJLhP
  • Tue, 11:41: Cyber scoop Cisco says it will issue patch ‘as soon as possible’ for bugs hackers are trying to exploit: Unidentified hackers are trying to exploit critical vulnerabilities in router software made by Cisco while the networking giant… https://t.co/5lhcVFp9SF Check it out! https://t.co/notd6iUplJ