Adwersarz.pl
Piszemy o (cyber)bezpieczeństwie. Z pasji i dla pasjonatów.
🧑💻 http://adwersarz.pl
✉️ redakcja@adwersarz.pl
@neutra.com.pl
Neutralizujemy dezinformację. Prawda nie obroni się sama. Najnowsze informacje o bezpieczeństwie narodowym, walce z dezinformacją i budowaniu świadomości na temat działań hybrydowych.
@vxundergroundre.bsky.social
The largest collection of malware source code, samples, and papers on the internet. Password: infected (unofficial, this is a bot! Maintained by @yjb.bsky.social, the bot can't handle retweets, video, and maybe a few other things)
@lasq.pl
Advanced Practices 🦅 @Google Threat Intelligence Group Threat Attribution, Frontline Intelligence, Malware Analysis, Threat Hunting, Incident Response #attributionmatters
@bellingcat.com
Bellingcat is an independent investigative collective of researchers, investigators and citizen journalists brought together by a passion for open source research. Want to support our charity? bellingcat.com/donate
@eliothiggins.bsky.social
Founder and creative director of Bellingcat and director of Bellingcat Productions BV. Author of We Are Bellingcat. Democracy isn't dead, it just smells funny.
@pagedout.bsky.social
Paged Out! is a free magazine about programming, hacking, security hacking, retro computers, modern computers, electronics, demoscene, and other similar topics. Always accepting submissions of one-page articles.
@rootkovska.bsky.social
Embracing technology to enhance cognition. Trying to understand how minds work. Maps & exploration of various spaces. Golem Foundation. Previously: Qubes OS, hardware/virtualization/OS security research.
@hdm.io
CEO and founder of runZero.com, previously the founder and lead developer of Metasploit, a CSO, a consultant, and the head of various security research teams. Contact info, presentations, and more at https://hdm.io/
@mkow.bsky.social
reverse-engineering / low-level security Dragon Sector CTF vice-captain, Invisible Things Lab Mastodon: @redford@infosec.exchange Also known as Redford
@gynvael.bsky.social
Security researcher/programmer ⁂ Managing director @ HexArcana ⁂ @DragonSectorCTF founder ⁂ he/him
@lcamtuf.coredump.cx
Substack: http://lcamtuf.substack.com/archive Homepage: http://lcamtuf.coredump.cx
@carste1n.bsky.social
Security Engineer @ Cloudflare, ex-Google ISE, I use bad software and bad machines for the wrong things. My writing: https://carstein.github.io
@troyhunt.com
Creator of Have I Been Pwned. Microsoft Regional Director. Pluralsight author. Online security, technology and “The Cloud”. Australian.
@lukasz.bromirski.net
networking & security geek / CCIE #15929 R&S/SP, CCDE #2012::17 / opinions are my own, not of my employer / 42 / Director@Cisco Security, building NGFW hardware platforms
@oshogbo.bsky.social
🔨 Building things 😈 #FreeBSD developer 🌶 #security programmer 💾 #storage programmer https://oshogbo.com
@linustorvalds.bsky.social
@lawsecnet.counterintelligence.pl
#threatintel #dfir #osint #natsec and other secs. Downloading things from the Internet and looking at them. Views are my own Email: kamil@counterintelligence.pl
@corpen.secman.pl
Hunting ghosts in wires and boxes, Head of CTI, former NCSC-PL, PL Navy #fightingthreats | @PIVOTcon.bsky.social co-founder & Chief Meme Officer
@daniel.haxx.se
I write curl. I don't know anything. I am @bagder@mastodon.social Weekly email at https://lists.haxx.se/listinfo/daniel
@dell.bsky.social
Sr. writer @wired.com. w/ the @newsguild.org. privacy & national security + DOGE > Send tips via @signal.org ➜ dell.3030
@godek.bsky.social
🏺 od geolokalizacji 👹 SP6XOR 🤖 Creator of http://otwartezrodla.pl = http://osintframework.pl 👁️ All opinions are my own.
@znanyproblem.bsky.social
@zaufana3strona.bsky.social
Wszystko co chcesz wiedzieć o hasłach: https://z3s.pl/hasla