CheckTheLogs Profile Banner
Wayne Bridgeman Profile
Wayne Bridgeman

@CheckTheLogs

Followers
3K
Following
24K
Media
2K
Statuses
13K

Christian | Husband & Father of 3 Daughters | Oklahoman | Mentor | ARPG Gamer | BJJ | Sober | CISSP | CISM | BSCy

Oklahoma, USA
Joined February 2016
Don't wanna be here? Send us removal request.
@kmcnam1
sudox
12 hours
15
27
277
@CheckTheLogs
Wayne Bridgeman
18 hours
These people lead our country. WMDs at their fingertips.
@Mrgunsngear
Mrgunsngear
22 hours
Well this should be fun... It seems a lot of the Epstein documents were redacted using Adobe so you can just copy the info then paste it into a Word document and un-redact them ๐Ÿ˜‚ #EpsteinFiles #Epstein #crime #education #learning #adobe #word
1
0
0
@bonchieredstate
Bonchie
24 hours
โ€œSo you redacted by putting black boxes over the text, but didnโ€™t remove the text layer?โ€ โ€œYes, Dave.โ€ โ€œAnd you can easily remove the black boxes?โ€ โ€œThatโ€™s correct, Dave.โ€
@flyosity
Mike Rundle
1 day
Users on TikTok realizing they can just copy and paste the "redacted" text from Epstein file PDFs to read what it says
202
2K
27K
@CheckTheLogs
Wayne Bridgeman
22 hours
Surprised by the 0.1%
0
0
1
@CheckTheLogs
Wayne Bridgeman
1 day
God is Good. Peace be with you.
@BenSasse
Ben Sasse
1 day
Friends- This is a tough note to write, but since a bunch of you have started to suspect something, Iโ€™ll cut to the chase: Last week I was diagnosed with metastasized, stage-four pancreatic cancer, and am gonna die. Advanced pancreatic is nasty stuff; itโ€™s a death sentence.
0
0
1
@DBillius
โšก๏ธ
4 days
gotta play the bears in chicago week 18 for a playoff spot
36
36
4K
@alanbwt
Alan โ‚ฟ
4 days
Worried about quantum computing overpowering SHA-256, but not the 4-digit PIN securing your bank account?
167
408
4K
@sircalebhammer
Caleb Hammer
5 days
@Kalshi
Kalshi
5 days
BREAKING: Approximately 90% of the released Epstein files are fully redacted
130
483
14K
@RepThomasMassie
Thomas Massie
5 days
Consider these three attachments: 1) Epstein Files Transparency Act 2) Statement from Fox Digital 3) existing criminal statute
2K
7K
38K
@CheckTheLogs
Wayne Bridgeman
5 days
Passed the ISACA Advanced in AI Security Management (AAISM) today. AMA other than serious questions. ๐Ÿ˜†
0
0
3
@CheckTheLogs
Wayne Bridgeman
6 days
๐Ÿค• ๐Ÿ˜ฑ
@IntCyberDigest
International Cyber Digest
7 days
โ€ผ๏ธ Red Hat breach released on the newly launched BreachForums: acquired from Crimson Collective by ShinyHunters. The data includes sensitive customer engagement reports affecting around 800 organizations, along with credentials, authentication tokens, CI/CD secrets,
0
0
0
@CheckTheLogs
Wayne Bridgeman
7 days
Computers and gaming are going to be crazy expensive but at least we can summarize meeting notes that should have just been emails.
@Pirat_Nation
Pirat_Nation ๐Ÿ”ด
7 days
Nvidia to cut gaming GPU production by 30-40% starting 2026 Source: https://t.co/ysVLFmfGXG
0
1
0
@Jhaddix
JS0N Haddix
8 days
CISOs now face a new class of AI risks. The OWASP Top 10 for LLM Apps outlines the threats and how to prepare. Explore this @PaloAltoNtwks interactive guide with mitigation suggestions:ย  https://t.co/JAVCaf7nXq
Tweet card summary image
paloaltonetworks.com
OWASP Top 10 LLM Security Risks: An interactive diagram maps each risk, attack path, and concrete mitigation you can explore to secure AI systems in production
5
72
282
@CheckTheLogs
Wayne Bridgeman
8 days
๐Ÿฅณ
@Kostastsale
Kostas
8 days
๐Ÿ“ข ๐—œโ€™๐—บ ๐—ฎ๐—ป๐—ป๐—ผ๐˜‚๐—ป๐—ฐ๐—ถ๐—ป๐—ด ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐—›๐˜‚๐—ป๐˜๐—ถ๐—ป๐—ด ๐—Ÿ๐—ฎ๐—ฏ๐˜€, ๐—น๐—ฎ๐˜‚๐—ป๐—ฐ๐—ต๐—ถ๐—ป๐—ด ๐—ป๐—ฒ๐˜…๐˜ ๐˜†๐—ฒ๐—ฎ๐—ฟ! After building threat hunting teams for large MSSPs, creating DFIR Labs for TheDFIRReport, and sharing years of free threat hunting material, I want to bring everything
0
0
1
@CheckTheLogs
Wayne Bridgeman
8 days
Short the stock. This is AI in action at Cox Communications.
1
0
0
@drunknbass
ssษquสžunษนp ๎จ€ ๐• แฏ…
10 days
@mcuban @mjpallett I've been in this industry a long time. Much longer than Photoshop has been doing diffusion or code completion leveraging llms. Most if not all of these models are trained on our /stolen/ data, our mannerisms, our coding styles, architectural patterns, etc by blatantly copying
10
10
253
@SANSInstitute
SANS Institute
10 days
The Cybersecurity Company of the Year Award ๐Ÿข celebrates a company delivering top-tier security services and products while leading with integrity and community spirit. The Community Winner for 2025 goes to @HuntressLabs. Congratulations! #SANSDMA
2
7
31
@CheckTheLogs
Wayne Bridgeman
12 days
0
0
0
@malmoeb
Stephan Berger
13 days
Calling out for help. We have proof that a threat actor exfiltrated data to a Microsoft Azure Blob, thanks to detailed logs in the *.log files written by azcopy, for example: C:\Users\compromised_user\.azcopy\1323eb6d-2624-834e-45e0-218454b383be.log We see the blob name where
17
23
140