Wayne Bridgeman
@CheckTheLogs
Followers
3K
Following
24K
Media
2K
Statuses
13K
Christian | Husband & Father of 3 Daughters | Oklahoman | Mentor | ARPG Gamer | BJJ | Sober | CISSP | CISM | BSCy
Oklahoma, USA
Joined February 2016
These people lead our country. WMDs at their fingertips.
Well this should be fun... It seems a lot of the Epstein documents were redacted using Adobe so you can just copy the info then paste it into a Word document and un-redact them ๐ #EpsteinFiles #Epstein #crime #education #learning #adobe #word
1
0
0
โSo you redacted by putting black boxes over the text, but didnโt remove the text layer?โ โYes, Dave.โ โAnd you can easily remove the black boxes?โ โThatโs correct, Dave.โ
Users on TikTok realizing they can just copy and paste the "redacted" text from Epstein file PDFs to read what it says
202
2K
27K
God is Good. Peace be with you.
Friends- This is a tough note to write, but since a bunch of you have started to suspect something, Iโll cut to the chase: Last week I was diagnosed with metastasized, stage-four pancreatic cancer, and am gonna die. Advanced pancreatic is nasty stuff; itโs a death sentence.
0
0
1
Worried about quantum computing overpowering SHA-256, but not the 4-digit PIN securing your bank account?
167
408
4K
130
483
14K
Consider these three attachments: 1) Epstein Files Transparency Act 2) Statement from Fox Digital 3) existing criminal statute
2K
7K
38K
Passed the ISACA Advanced in AI Security Management (AAISM) today. AMA other than serious questions. ๐
0
0
3
docusign is hiring. be one of the 400k employees https://t.co/OQiZTEzYpu
careers.docusign.com
Docusign is hiring a Sr. Cyber Threat Intelligence Analyst in United States. Review all of the job details and apply today!
9
19
163
Computers and gaming are going to be crazy expensive but at least we can summarize meeting notes that should have just been emails.
0
1
0
CISOs now face a new class of AI risks. The OWASP Top 10 for LLM Apps outlines the threats and how to prepare. Explore this @PaloAltoNtwks interactive guide with mitigation suggestions:ย https://t.co/JAVCaf7nXq
paloaltonetworks.com
OWASP Top 10 LLM Security Risks: An interactive diagram maps each risk, attack path, and concrete mitigation you can explore to secure AI systems in production
5
72
282
๐ฅณ
๐ข ๐โ๐บ ๐ฎ๐ป๐ป๐ผ๐๐ป๐ฐ๐ถ๐ป๐ด ๐ง๐ต๐ฟ๐ฒ๐ฎ๐ ๐๐๐ป๐๐ถ๐ป๐ด ๐๐ฎ๐ฏ๐, ๐น๐ฎ๐๐ป๐ฐ๐ต๐ถ๐ป๐ด ๐ป๐ฒ๐
๐ ๐๐ฒ๐ฎ๐ฟ! After building threat hunting teams for large MSSPs, creating DFIR Labs for TheDFIRReport, and sharing years of free threat hunting material, I want to bring everything
0
0
1
Short the stock. This is AI in action at Cox Communications.
1
0
0
@mcuban @mjpallett I've been in this industry a long time. Much longer than Photoshop has been doing diffusion or code completion leveraging llms. Most if not all of these models are trained on our /stolen/ data, our mannerisms, our coding styles, architectural patterns, etc by blatantly copying
10
10
253
The Cybersecurity Company of the Year Award ๐ข celebrates a company delivering top-tier security services and products while leading with integrity and community spirit. The Community Winner for 2025 goes to @HuntressLabs. Congratulations! #SANSDMA
2
7
31
Calling out for help. We have proof that a threat actor exfiltrated data to a Microsoft Azure Blob, thanks to detailed logs in the *.log files written by azcopy, for example: C:\Users\compromised_user\.azcopy\1323eb6d-2624-834e-45e0-218454b383be.log We see the blob name where
17
23
140