twitter.com Open in urlscan Pro
104.244.42.1  Public Scan

Submitted URL: https://links.avatao.com/ls/click?upn=5SiCHBl1FE2e544pUsquT0hlw6NSVzAXLKgNVmAAM9ATDKLWQN-2FvJGR-2B-2BEJVEJDHbh0ZyRy0WWLQ0...
Effective URL: https://twitter.com/theavatao?lang=en&utm_source=avataonextreminders&utm_medium=email&utm_campaign=website
Submission: On April 14 via api from SE — Scanned from DE

Form analysis 1 forms found in the DOM

#

<form action="#" aria-label="Search Twitter" role="search" class="r-1oszu61 r-1phboty r-1yadl64 r-deolkf r-6koalj r-13awgt0 r-eqz5dr r-crgep1 r-ifefl9 r-bcqeeo r-t60dpp r-bnwqim r-417010">
  <div class="css-1dbjc4n r-1wbh5a2">
    <div class="css-1dbjc4n r-1sw30gj r-42olwf r-sdzlij r-1phboty r-rs99b7 r-eqz5dr r-16y2uox r-1wbh5a2 r-1777fci">
      <div class="css-1dbjc4n"><label class="css-1dbjc4n r-1dqbpge r-18u37iz" data-testid="SearchBox_Search_Input_label">
          <div class="css-1dbjc4n r-7q8q6z r-6koalj r-1777fci"><svg viewBox="0 0 24 24" aria-hidden="true" class="r-14j79pv r-4qtqp9 r-yyyyoo r-1xvli5t r-dnmrzs r-4wgw6l r-f727ji r-bnwqim r-1plcrui r-lrvibr">
              <g>
                <path
                  d="M21.53 20.47l-3.66-3.66C19.195 15.24 20 13.214 20 11c0-4.97-4.03-9-9-9s-9 4.03-9 9 4.03 9 9 9c2.215 0 4.24-.804 5.808-2.13l3.66 3.66c.147.146.34.22.53.22s.385-.073.53-.22c.295-.293.295-.767.002-1.06zM3.5 11c0-4.135 3.365-7.5 7.5-7.5s7.5 3.365 7.5 7.5-3.365 7.5-7.5 7.5-7.5-3.365-7.5-7.5z">
                </path>
              </g>
            </svg></div>
          <div class="css-1dbjc4n r-16y2uox r-1wbh5a2">
            <div dir="auto" class="css-901oao r-18jsvk2 r-6koalj r-37j5jr r-a023e6 r-16dba41 r-rjixqe r-bcqeeo r-qvutc0"><input aria-activedescendant="typeaheadFocus-0.7690793353444194" aria-autocomplete="list" aria-label="Search query"
                aria-owns="typeaheadDropdown-2" autocapitalize="sentences" autocomplete="off" autocorrect="off" placeholder="Search Twitter" role="combobox" spellcheck="false" enterkeyhint="search" type="text" dir="auto"
                class="r-30o5oe r-1niwhzg r-17gur6a r-1yadl64 r-deolkf r-homxoj r-poiln3 r-7cikom r-1ny4l3l r-xyw6el r-y0fyvk r-1dz5y72 r-fdjqy7 r-13qz1uu" data-testid="SearchBox_Search_Input" value=""></div>
          </div>
          <div class="css-1dbjc4n r-6koalj r-1777fci"></div>
        </label></div>
    </div>
  </div>
  <div class="css-1dbjc4n r-13awgt0 r-bnwqim"></div>
</form>

Text Content

JAVASCRIPT IS NOT AVAILABLE.

We’ve detected that JavaScript is disabled in this browser. Please enable
JavaScript or switch to a supported browser to continue using twitter.com. You
can see a list of supported browsers in our Help Center.

Help Center

Terms of Service Privacy Policy Cookie Policy Imprint Ads info © 2022 Twitter,
Inc.

Don’t miss what’s happening
People on Twitter are the first to know.
Log in
Sign up
Did someone say … cookies?
Twitter and its partners use cookies to provide you with a better, safer and
faster service and to support our business. Some cookies are necessary to use
our services, improve our services, and make sure they work properly. Show more
about your choices.
Accept all cookies
Refuse non-essential cookies

Explore
Settings
AVATAO

866 Tweets

See new Tweets
Follow
avatao
@theavatao
Our secure coding platform helps developers deliver high-quality products by
immersing them in real-life scenarios of security best practices. #avatao
Budapest, Hungaryavatao.comJoined January 2014
199 Following
719 Followers
Tweets

Tweets & replies

Media

Likes




AVATAO’S TWEETS

Pinned Tweet
avatao

@theavatao
·
Mar 30

Are cybersecurity vulnerabilities taking up too much of your company's time and
money? How would you like having a strong strategy to fight back against
them? Check out our ebook to learn how to turn security bugs to your advantage!
https://avatao.com/how-to-turn-security-bugs-to-your-advantage/… #CyberSecurity
avatao.com
How to turn security bugs to your advantage - Avatao
5 high-profile security issues and proven ways to turn them into insights for
your company
1
3

avatao

@theavatao
·
23h

We asked Gábor Molnár, Senior Information Security Engineer at Google about his
role, the most important security trends developers need to be aware of, and
more. Click to read our newest Expert Interview!
https://avatao.com/interview-with-gabor-molnar-google/… #informationsecurity
#cybersecuritytips
avatao.com
Interview with Gábor Molnár, Google - Avatao
Staying up-to-date with the latest cybersecurity trends is not easy. Reacting to
them is even harder. We asked an expert about best practices!
1
2

avatao

@theavatao
·
Apr 6

Check out
@CyberNews
’ interview with our CEO Mark Felegyhazi, where he discusses current
cybersecurity challenges, the importance of secure coding training, Avatao’s
vision, and more!
https://cybernews.com/security/mark-felegyhazi-avatao-fixing-security-bugs-takes-much-more-time-than-learning-how-to-avoid-them/…
#CyberSecurity #Interview #CyberSecurityTraining
cybernews.com
Mark Felegyhazi, Avatao: “fixing security bugs takes much more time than
learning how to avoid...
Cybernews invited Mark Felegyhazi, the CEO of Avatao – a company that
specializes in interactive training, to discuss cybersecurity training, threats,
and other prevention methods.
1
1

avatao

@theavatao
·
Mar 24

Is your company safe from source code breaches like the one Samsung just
experienced? Learn how to protect your source code and prevent full source code
attacks by learning from the Samsung Galaxy data breach!
https://avatao.com/blog-samsung-breach/… #databreach #CyberAttack #CyberSecurity
avatao.com
Source code under attack: the Samsung breach - Avatao
The hacker group Lapsus$ claims to have breached Samsung and stolen 190 GB of
data, including the source code. Here is everything you need to know!
3
1

avatao

@theavatao
·
Mar 9

Why do you need Zero Trust security and how can you implement this popular
framework in your organization? Check out our latest blog post to find out!
https://avatao.com/blog-zero-trust-security/… #ZeroTrust #CyberSecurity
#CyberSecurityAwareness

4
2

avatao

@theavatao
·
Feb 23

In our latest blog we discuss 4 popular testing tools and techniques for API
security. Check it out and give our exercises a try!
https://avatao.com/blog-4-methods-api-testing/… #cybersecuritytips #APIs
#cybersecuritytraining
avatao.com
4 API testing methods - Avatao
Understanding the importance of API security is just the beginning of an
extensive process to secure your APIs from attacks.
1

TOPICS TO FOLLOW


Sign up to get Tweets about the Topics you follow in your Home timeline.


CAROUSEL

Linux
Cloud platforms
Open source
Artificial intelligence
Heavy metal
Databases
Cloud computing
Formula 1
Venture capital
Animation
Movie news
Esports
Web development
Game development
Apple
Cybersecurity
Books
Science news
World news
Gaming news
Movies
Computer programming
Tech news
Music
Video games
Gaming
War in Ukraine
Popular images
Viral Tweets
Data science

NEW TO TWITTER?


Sign up now to get your own personalized timeline!
Sign up with Apple
Sign up with phone or email
By signing up, you agree to the Terms of Service and Privacy Policy, including
Cookie Use.

YOU MIGHT LIKE


Mark Felegyhazi

@markfelegyhazi
Follow
Shinjo Park

@ad_ili_rai_en
Follow
KT

@koczkatamas
Follow
Show more


TRENDING NOW

TRENDS FOR YOU


Trending worldwide
#msü2022
3,953 Tweets

Only on Twitter · Trending
#PamerAyank
6,111 Tweets

K-pop · Trending
#BamBamxโหนกระแส
536K Tweets

Trending worldwide
#TheWifeShowmax
2,617 Tweets

Trending worldwide
#scientistprotest
30.8K Tweets

Trending worldwide
#LetTheEarthBreath
41.8K Tweets

Entertainment · Trending
#KGF3
10.9K Tweets

Trending worldwide
#بینک_ٹائمنگ_نامنظور
9,085 Tweets

Fashion & beauty · Trending
GUCCIの財布
2,456 Tweets

Business & finance · Trending
#NCTzenSiapSiap
11.7K Tweets

Show more
Terms of ServicePrivacy PolicyCookie PolicyAccessibilityAds info
More
© 2022 Twitter, Inc.