and1hof Profile Banner
Andrew Hoffman Profile
Andrew Hoffman

@and1hof

Followers
165
Following
3
Media
5
Statuses
39

Software Engineer & Security Researcher. Author of Web Application Security: Exploitation and Countermeasures (O'Reilly, 2020).

Seattle, WA
Joined September 2015
Don't wanna be here? Send us removal request.
@and1hof
Andrew Hoffman
3 years
I am separating my manual and automated tweets. Follow @and1hofbot for reminders whenever I upload a new YouTube video. Follow this account to hear my thoughts and ideas.
1
0
0
@and1hof
Andrew Hoffman
5 months
This morning I released a deep-dive and technical breakdown of a sophisticated XSS vulnerability that was exploited against 80+ govs last year. It uses an unusual & uncommon XSS sink. #appsec #infosec #CyberSecurity.
0
0
0
@and1hof
Andrew Hoffman
3 years
I just released an important blog post regarding a new and upcoming SCA feature that all next-gen platforms will have. #infosec #cybersecurity .
1
0
0
@and1hof
Andrew Hoffman
3 years
SCA tells you if a library is vulnerable, but does not tell you if you are making use of the library in a vulnerable way. Next-gen SCA will all support "reachability" combining SCA & SAST to close this gap. #infosec.
0
0
0
@and1hof
Andrew Hoffman
3 years
RT @echetus: If you use Wikipedia, you've seen pop-ups like this. If you're like me, you may have donated as a result. Wikipedia is an am….
0
8K
0
@and1hof
Andrew Hoffman
3 years
Decentralized apps don’t have to be built on blockchains. #programming.
0
2
3
@and1hof
Andrew Hoffman
3 years
Do note, "crypto" has referred to cryptographic algorithms for far longer than it has referred to cryptocurrency. #security.
0
1
1
@and1hof
Andrew Hoffman
3 years
Piggybacking on the previous data privacy tweet: remember not to roll your own crypto. NIST has good breakdowns of what crypto algorithms are secure in 2022 and beyond.
0
0
0
@and1hof
Andrew Hoffman
3 years
One often forgotten element of good security posture is data privacy. If companies would encrypt PII more often, then even in the case of a data breach the blast radius would be limited and the most valuable data would be un-useable by a hacker.
0
1
0
@and1hof
Andrew Hoffman
3 years
If a library has 200 separate functions and 1 of those functions is vulnerable it should not be an incident unless your code is invoking the vulnerable function. #security.
0
1
1
@and1hof
Andrew Hoffman
3 years
In any other industry suggesting “hash and salt” to a co-worker means you want to get brunch at the local diner. #CybersecurityAwarenessMonth.
0
0
0
@and1hof
Andrew Hoffman
3 years
Regression testing is essential for a good long term security posture. Fix the vulnerability once, write a test and than block merge if a developer ever reopens the bug. #CybersecurityAwarenessMonth2022.
1
0
1
@and1hof
Andrew Hoffman
3 years
The goal of a threat model should be four-fold. a) identify threats, b) identity mitigations, c) identify delta between "a" and "b", and finally e) document knowledge #CybersecurityAwarenessMonth.
0
0
2
@and1hof
Andrew Hoffman
3 years
For cryptocurrency to succeed in the long run, it needs to deliver value by replacing or creating new financial tools. Coins solely used for price speculation and trading aren't worth considering as part of your long term strategy.
0
0
1
@and1hof
Andrew Hoffman
3 years
RT @ACouedelo: Great Explainer about Zero Trust Architecture by @and1hof . He made me realize that I had missed some elements in my researc….
0
1
0
@and1hof
Andrew Hoffman
3 years
Don’t forget to vote in the upcoming midterm elections. As a US citizen, these elections are your best voice into changing outdated laws, introducing new ones and of course preserving and improving our democracy! #Midterms2022.
0
0
0
@and1hof
Andrew Hoffman
3 years
RT @DanaEpp: I’m giving away the perfect API Hacker’s library to one of my readers - @hAPI_hacker’s “Hacking APIs”, @DafyddStuttard’s “The….
0
20
0
@and1hof
Andrew Hoffman
3 years
I am releasing a comprehensive video on #ZeroTrust architecture in 1 hour on my YouTube channel (and1hof). Head on over to YT and check it out #CybersecurityAwarenessMonth
Tweet media one
0
0
1
@and1hof
Andrew Hoffman
3 years
RT @cianmaher0: "Graphics are the first thing finished in a video game" . Here's a Thunderjaw from an early build of Horizon: Zero Dawn htt….
0
4K
0
@and1hof
Andrew Hoffman
3 years
If you haven't already, check out my short documentary on hacking Pokémon games: #pokemon.
0
0
1
@and1hof
Andrew Hoffman
3 years
Yes, you too can design an app that is difficult to hack as long as your architects evaluate security cost benefit trade offs alongside functionality requests. It’s much harder to secure an app after it’s been built. #cybersecurity.
0
0
0