Introduction
Introduction Statistics Contact Development Disclaimer Help
Posts by [email protected]
Post #AxCi5agBCL3DVKNsqe by [email protected]
0 likes, 0 repeats
@AnachronistJohn @GossiTheDog thanks, this works!
Post #AxEd3qU80bGfXVywOO by [email protected]
0 likes, 1 repeats
@jannem @skribe the movie is very different from the book but they kept the maj…
Post #AxFBloYxue9elINkY4 by [email protected]
0 likes, 1 repeats
@0ddj0bb @BlueTeamCon Me!
Post #AxFC8lLi1m4ZSG7kwq by [email protected]
0 likes, 1 repeats
@tayfonay remind me not to ever meet you in a dark alley
Post #AxGY0l8bK21edFXdr6 by [email protected]
0 likes, 1 repeats
@malwarejake I don’t understand why Cisco has been so consistently poor with …
Post #AxGZBQqfCJ40qTnwUC by [email protected]
0 likes, 1 repeats
@bengerman @rossmadness @cR0w we review all source ip’s and user agents assoc…
Post #AxGcEWiu6x3JnULI5g by [email protected]
0 likes, 1 repeats
@skryking brilliant. That’s clearly where browser developers should be focusi…
Post #AxGd3MuEN4ya7NsqLw by [email protected]
0 likes, 1 repeats
@badsamurai @malwarejake Cisco’s not the only vendor that pushed people towar…
Post #AxIqGfpD1tImHN84rA by [email protected]
0 likes, 1 repeats
@SecureOwl for me it was my hip pain era. But to each their own 😉
Post #AxKPRnqTF1wBtQinfk by [email protected]
0 likes, 1 repeats
@guyjantic @malwarejake unpopular opinion: phishing simulations can be effectiv…
Post #AxLOAv6R6DtAgOXEEi by [email protected]
0 likes, 0 repeats
@briankrebs love it!
Post #AxMTXv63yvPSFm6hG4 by [email protected]
0 likes, 0 repeats
@GossiTheDog I’m worried that they got documentation on their customer networ…
Post #AxNKQ1HOPDJOgOWYym by [email protected]
0 likes, 1 repeats
@badsamurai your list is great! Thanks for maintaining it.
Post #AxNQ9qdqmwXImXhVJo by [email protected]
0 likes, 0 repeats
@GossiTheDog perfect!
Post #AxNVg7veYAvJR0ErmS by [email protected]
0 likes, 0 repeats
@reverseics @cR0w OMG 😱 “now we have Microsoft apparently determining that…
Post #AxOZ41Tkg1chOuEaJ6 by [email protected]
0 likes, 1 repeats
@nopatience yeah, just block *.lovable.app and be done with it. #cybersecurity
Post #AxPakpTXTWmHjl4PLM by [email protected]
0 likes, 0 repeats
@fcbsd @guyjantic @malwarejake that does sound bad. However, I don’t think mo…
Post #AxV60iIS0CycTVjmWO by [email protected]
0 likes, 1 repeats
@lauren I do t really know why, but I never watched B5 despite being a sci-fi f…
Post #AxVjxkXPD36wivsFWa by [email protected]
0 likes, 1 repeats
@badsamurai awesome. How do I see the diff between this version and the last ve…
Post #AxVsasFrFcrTaIpiQy by [email protected]
0 likes, 1 repeats
@badsamurai this was exactly what I was looking for. Thanks!
You are viewing proxied material from pleroma.anduin.net. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.