int0x33 Profile Banner
Matthew T. Carr πŸ€˜πŸ—οΈπŸš€ Profile
Matthew T. Carr πŸ€˜πŸ—οΈπŸš€

@int0x33

Followers
2K
Following
562
Media
0
Statuses
80

Cyber Security Specialist | Host @CISODigestLive | https://t.co/nGJjw1oEOC | πŸ’―Movement | GORILLA 🦍

πŸ₯·
Joined April 2015
Don't wanna be here? Send us removal request.
@int0x33
Matthew T. Carr πŸ€˜πŸ—οΈπŸš€
8 days
I kneel only to God. God is great. God bless you all.
0
0
3
@CISODigestLive
CISO Digest
18 hours
Tomorrow @int0x33 will be discussing supply chain attacks and how it features in the OWASP 2025 update.
0
2
3
@int0x33
Matthew T. Carr πŸ€˜πŸ—οΈπŸš€
3 days
If you want to master cybersecurity, and excel in your career, you need to RTFM.
0
0
0
@int0x33
Matthew T. Carr πŸ€˜πŸ—οΈπŸš€
5 days
Hi everyone - I’m launching my first live/podcast this week. No sales, just real value. Breaking down real cyber threats for leaders. Would love to connect with CISOs or anyone interested in joining as a guest.
@CISODigestLive
CISO Digest
5 days
Launching CISO Digest Live - a tri-weekly broadcast breaking down real cyber threats for CISOs and execs. Every Monday, Wednesday, and Friday at 2 PM GMT / 9 AM EST. No noise. No buzzwords. Just clear, operational intelligence.
0
0
1
@CISODigestLive
CISO Digest
5 days
Launching CISO Digest Live - a tri-weekly broadcast breaking down real cyber threats for CISOs and execs. Every Monday, Wednesday, and Friday at 2 PM GMT / 9 AM EST. No noise. No buzzwords. Just clear, operational intelligence.
0
4
4
@int0x33
Matthew T. Carr πŸ€˜πŸ—οΈπŸš€
5 days
After 15 years in offensive security, I’m done watching the gap between hackers and CISOs widen. Starting this Friday, I’ll be live - breaking down real threats and translating them for leadership.
0
0
1
@int0x33
Matthew T. Carr πŸ€˜πŸ—οΈπŸš€
7 days
Tore my meniscus while training BJJ. It’s been a long road to recovery, but I’m happy to be back in the gym and on the mat. Still focused on rehab, but it’s a big milestone.
0
0
1
@int0x33
Matthew T. Carr πŸ€˜πŸ—οΈπŸš€
7 days
Excited to submit some CFPs this year. It’s been almost five years since I last spoke at a conference. Would love to team up with @mikeghacks again.
1
0
1
@thegorillamafia
GORILLA MAFIA 🦍
8 days
AI is moving fast, but most people miss the point. The real opportunities aren’t in tech - they’re in bringing it back to the real world: entertainment, human connection, experience. That’s where the future lives.
0
1
2
@int0x33
Matthew T. Carr πŸ€˜πŸ—οΈπŸš€
10 days
The mindset that finds vulnerabilities can also find opportunity. Same skill, different target.
0
0
1
@int0x33
Matthew T. Carr πŸ€˜πŸ—οΈπŸš€
11 days
Security engineers make the best founders. You already think in attack trees, patch cycles, and system design - apply that to business, and you’ll print cash.
0
0
1
@int0x33
Matthew T. Carr πŸ€˜πŸ—οΈπŸš€
11 days
I’ve been away from Twitter and blogging for a while - amazing to see how much the community’s grown. Love seeing so many people doing great things. πŸ™Œ
0
0
2
@int0x33
Matthew T. Carr πŸ€˜πŸ—οΈπŸš€
13 days
Hot take: Beyond the buzzwords, AI won’t actually disrupt cybersecurity for a long time.
0
0
1
@int0x33
Matthew T. Carr πŸ€˜πŸ—οΈπŸš€
2 years
However when used improperly Umrienteriet can lead towards unfavorable outcomes leading towards getting caught- making its correct implementation crucial."
0
0
0
@int0x33
Matthew T. Carr πŸ€˜πŸ—οΈπŸš€
2 years
My interviews with top elite red teams revealed their expert opinions about this technique - they consider it highly useful if executed properly, allowing them greater access while avoiding detection from defenders who are constantly looking out for these tactics.
1
0
0
@int0x33
Matthew T. Carr πŸ€˜πŸ—οΈπŸš€
2 years
The goal here being not only gaining successful entry into complex network infrastructures but also remaining undetectable for longer periods by creating confusion and chaos within an adversary’s network.
1
0
0
@int0x33
Matthew T. Carr πŸ€˜πŸ—οΈπŸš€
2 years
This German word refers to disorientation which involves obscuring your actions through various techniques such as obfuscation or misdirection.
1
0
0
@int0x33
Matthew T. Carr πŸ€˜πŸ—οΈπŸš€
2 years
Red teaming is a vital component of cybersecurity where experts simulate attacks on organizational systems and networks in order to identify vulnerabilities before real attackers do. One tactic that has emerged as particularly effective in red team operations is skills is .
1
0
0