SecureYeti
@SecureYeti
Followers
223
Following
10
Media
91
Statuses
127
Joined October 2018
Cisco has disclosed a critical flaw (CVSS 10.0) in its Secure Firewall Management Center. If RADIUS is enabled, attackers could take full control without logging in. Apply updates immediately or disable RADIUS until you do. https://t.co/kWZ5wDdyeU
#Cisco #Infosec
0
0
0
Traditional security programs often fall short by not engaging employees, but @jaysonstreet's class @BlueTeamCon Sept 4 takes a new approach—leveraging social engineering techniques used by adversaries to help attendees think like an attacker. Sign up: https://t.co/pihpu1dWd3
1
3
9
Stolen credentials are still one of cybercriminals’ most potent tools due to their simplicity, low cost, and efficacy. Despite advances like MFA and passkeys, weak password hygiene and widespread credential reuse keep this attack vector successful. https://t.co/zUWw5SwhVN
0
0
0
Traditional security programs often fall short by not engaging employees, but @jaysonstreet's class @BlueTeamCon Sept 4 takes a new approach—leveraging social engineering techniques used by adversaries to help attendees think like an attacker. Sign up: https://t.co/pihpu1dWd3
1
3
13
Cybercriminals are using new Matanbuchus 3.0 malware via Microsoft Teams for targeted attacks. Recently, attackers impersonated IT support during a call, tricking an employee into launching Quick Assist and running a script that deployed the loader. https://t.co/ybkICqfMW0
0
0
0
Traditional security programs often fall short by not engaging employees, but @jaysonstreet's class @BlueTeamCon Sept. 4 takes a radical approach—leveraging social engineering techniques used by adversaries to help attendees think like an attacker. https://t.co/HKF41e4zTw
0
1
7
Mitel has released patches for a critical vulnerability in its MiVoice MX ONE communications platform: unpatched versions 7.3 up to 7.8 SP1 allow unauthenticated, remote attackers to gain full access to user or admin accounts. Read more here: https://t.co/6cOhBcPz0v
0
0
0
Traditional security programs often fall short by not engaging employees, but @jaysonstreet's class @BlueTeamCon Sept. 4 takes a radical approach—leveraging social engineering techniques used by adversaries to help attendees think like an attacker. https://t.co/3cBkpir1zP
0
2
5
Cybersecurity researchers found a critical security flaw (CVE 2025 6514) in the open-source MCP remote tool used by AI-based tools like Claude Desktop, so attackers can execute commands on a user’s system and take full control. Read more: https://t.co/oL0Jb3jkvj
1
1
2
Time is running out to register for #defcontraining! Learn to unleash your inner “bad guy" with Adversary for Hire @jaysonstreet, one of the most twisted minds in the industry, to think and attack like an adversary! Register now at https://t.co/aT2DnmAFEN
#defcon
0
1
2
Traditional security programs often fall short by not engaging employees, but @jaysonstreet's class @BlueTeamCon Sept. 4 takes a radical approach—leveraging social engineering techniques used by adversaries to help attendees think like an attacker. https://t.co/3cBkpir1zP
0
3
7
Does your team know the simple mistakes that can lead to a data breach or a malicious attack on your systems? Our cybersecurity training can empower your employees to protect themselves and your company from real world threats. Set up a time to talk: https://t.co/76dDs80lt3
0
2
2
Ever wanted to unleash your inner “bad guy” in a legal and controlled setting? Learn tactics from Adversary for Hire @jaysonstreet, one of the most twisted minds in the industry, to think and attack like an adversary! Register today at https://t.co/aBoCbIHfXQ
#defcon
0
2
3
A new SharePoint vulnerability dubbed ToolShell lets adversaries gain full remote code execution on SharePoint servers. Microsoft recommends updating SharePoint servers, configuring AV/EDR and rotating the system's https://t.co/iH7Ht17S8l machine keys. https://t.co/uf01OuUxMJ
0
0
0
Teach your employees to be your biggest defender! Training from Secure Yeti's @jaysonstreet will help you make security “personal” so your employees think like a hacker and fiercely protect your company’s assets 24/7. August 2-3 at @BlackHatEvents. #BHUSA
https://t.co/08UWWTNhHr
0
0
1
Ever wanted to unleash your inner “bad guy” in a legal and controlled setting? Learn tactics from Adversary for Hire @jaysonstreet, one of the most twisted minds in the industry, to think and attack like an adversary! Register today at https://t.co/pnUTDj0L6Z
#defcon
0
0
4
We hadn’t heard from @jaysonstreet in a while, then he sent us this. We have no idea where he is right now, but we know where he’ll be soon! See him at Black Hat and DEF CON: https://t.co/oRt2Cr8VpU
#BHUSA
https://t.co/6eTsGpgHKJ
#defcon #defcontraining
1
3
9
Ever wanted to unleash your inner “bad guy” in a legal and controlled setting? Learn tactics from Adversary for Hire @jaysonstreet, one of the most twisted minds in the industry, to think and attack like an adversary! Register today at https://t.co/9rUbqdxGln
#defcon
0
2
4
Prices increase this Friday! raining from Secure Yeti's @jaysonstreet will help you make security “personal” so your employees think like a hacker and fiercely protect your company’s assets 24/7. August 2-3 at @BlackHatEvents. #BHUSA
https://t.co/tKLYplNAtu
0
1
1
Teach your employees to be your biggest defenders! Training from Secure Yeti's @jaysonstreet will help you make security “personal” so your employees think like a hacker and fiercely protect your company’s assets 24/7. August 2-3 at @BlackHatEvents. #BHUSA
https://t.co/uSjTjLAyTo
0
2
3