
Christopher Six
@ChristopherSix
Followers
5K
Following
8
Media
13
Statuses
93
Expert in cybersecurity and I possess a profound enthusiasm for high-speed cars! Guarding the digital world while living in the fast lane.
United States
Joined December 2019
The art of Intelligence! ? #AIjourney #AIworld #artificialintelligenceart #artisticexpression #divinerevelations #AIandfaith #artisticalgorithm #AIinspirations #fyp #viral.
0
0
0
Inaudible attack. First thought is subliminal. A new set of security ultrasound audio detection. Can we strengthen to only respond to voice? Thoughts? #cybersecurity #hackers #defend.
Inaudible ultrasound attack can stealthily control your phone, smart speaker - @billtoulas.
0
0
2
RT @BleepinComputer: FBI warns of residential proxies used in credential stuffing attacks - @billtoulas.
bleepingcomputer.com
The Federal Bureau of Investigation (FBI) warns of a rising trend of cybercriminals using residential proxies to conduct large-scale credential stuffing attacks without being tracked, flagged, or...
0
32
0
RT @BleepinComputer: Chinese hackers use new Cobalt Strike-like attack framework - @billtoulas.
bleepingcomputer.com
Researchers have observed a new post-exploitation attack framework used in the wild, named Manjusaka, which can be deployed as an alternative to the widely abused Cobalt Strike toolset or parallel to...
0
49
0
RT @BleepinComputer: Critical bug in Android could allow access to users' media files - @billtoulas.
bleepingcomputer.com
Security analysts have found that Android devices running on Qualcomm and MediaTek chipsets were vulnerable to remote code execution due to a flaw in the implementation of the Apple Lossless Audio...
0
24
0
RT @BleepinComputer: U.S. Treasury sanctions Russian cryptocurrency mining companies - @billtoulas.
bleepingcomputer.com
The U.S. Department of the Treasury has announced a new package of sanctions targeting parties that facilitate evasion of previous measures imposed on Russia.
0
14
0
RT @ECCOUNCIL: #NetworkSecurity tools are designed to prevent security incidents resulting from network intrusions. Learn about five top to….
0
76
0
RT @FSISAC: "Global banks have collaborated on cybersecurity efforts across borders for years using tools like FS-ISAC," which has helped t….
ft.com
Agencies take unusual step of disseminating assessments with overseas lenders to bolster cyber defences
0
11
0
RT @BlackHatEvents: kdigger (short for Kubernetes digger), is a context discovery tool for Kubernetes penetration testing. It’s a compilati….
0
3
0
RT @BleepinComputer: T-Mobile customers warned of unblockable SMS phishing attacks - @serghei.
bleepingcomputer.com
An ongoing phishing campaign targets T-Mobile customers with malicious links using unblockable texts sent via SMS (Short Message Service) group messages.
0
42
0
RT @CNBC: When the hackers get hacked: Leaked documents show notorious cybercriminal group has an HR department, performance reviews and an….
0
10
0
RT @BleepinComputer: To better understand how to protect passwords in your environment from attacks, let's look at the top 10 password atta….
bleepingcomputer.com
To better understand how to protect passwords in your environment from attacks, let's look at the top 10 password attacks and see what your organization can do to prevent them.
0
19
0