3ncr1pt3d @ RSAC next

@3ncr1pt3d

InfoSec/Threat Intel/Bridge builder. Writer/Speaker/Mom (she/her) ITIL. Views are mine only 💜 💜 💜 💜NCC-1031 🦖

Toronto, Canada
Vrijeme pridruživanja: lipanj 2014.

Tweetovi

Blokirali ste korisnika/cu @3ncr1pt3d

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @3ncr1pt3d

  1. Prikvačeni tweet
    17. stu 2018.

    Dear InfoSec, this is for you. While we are not perfect there is a wonderful strength in our community. Each of us brings something of worth to the table. I wrote this to remind you of that here: 🤗

    Poništi
  2. This! We need curiosity and people who look where we have not. Ask “I wonder if” and find what was hidden there. We need to support security researchers and responsible disclosure. Great work Ben Seri and

    Poništi
  3. More key points: this can break out of segmentation, like guest wifi. Point of entry can be anything including IoT devices. Attacks can’t be done over the internet - local network access req’d. CDP is enabled by default on all Cisco products.

    Poništi
  4. proslijedio/la je Tweet
    prije 5 sati

    Here's what vulnerable [see image below]. Quite a lot. Also, the CERT/CC advisory is out: Along with the actual CDPwn technical report:

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    prije 5 sati

    CDPwn vulnerabilities impact tens of millions of enterprise devices - CDPwn impacts Cisco's Discovery Protocol (CDP) - CDPwn = 4 RCEs + 1 DOS - LAN exploitable, not via WAN - ideal for escalating access and taking over entire networks

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    4. velj

    . is scanning the internet for Jenkins servers vulnerable to CVE-2020-2100. Jenkins 2.218 (LTS 2.204.1) and earlier are vulnerable to UDP amplification/reflection denial of service attacks.

    Poništi
  7. proslijedio/la je Tweet
    prije 8 sati

    Join on February 15 during Virtual Tactical Edge. Don’t miss this talk about and

    Poništi
  8. proslijedio/la je Tweet
    4. velj

    *10 slots available! Breach The Keep is an exciting exercise. Try it for yourself at the Women in conference. Toronto March 10th. To secure your spot, email info@breachthekeep.com

    Poništi
  9. proslijedio/la je Tweet

    “Cybersecurity doesn’t have a skills shortage. We have a culture problem that manifests in the ways we source and recruit talent. By removing barriers to entry, prioritizing potential over pedigree, re-engineering the way we recruit and interview candidates, we can welcome more”

    Prikaži ovu nit
    Poništi
  10. 3. velj

    Thank you to all those who made happen. You gave it your all so that we could enjoy the wonderful experience that is uniquely Shmoo. Another year of great times with friends old and new, learning and discovering. Much ❤️ 🤗❤️

    Poništi
  11. proslijedio/la je Tweet

    Holy shit. My was selected as the number one winner. I didn’t expect that — the other firetalks were so good. Thanks, ! & was my very first infosec con experience years ago & still my favorite con.

    Poništi
  12. 2. velj

    W00t! 🎉🎉🎉 Congratulations for winning first prize on your amazing excellent Firetalk on DNS. Grats also on the outstanding talks by all firetalks participants.

    Poništi
  13. proslijedio/la je Tweet

    Congratulations to on winning FIRST PLACE at this year! It was a pleasure watching you. Well done!

    Poništi
  14. 2. velj

    Do you ever think about space debris? Satellites? Messing with space? Soaking up all the possibilities from a great talk “Hack the Stars” by Yacko, Wacko and Dot

    Poništi
  15. 1. velj

    Omg. Loving this talk on anti forensics by Ranking levels to hide from: your mom up to nation state. Great tips with hilarious snark. So good! 🤣👍👍

    Poništi
  16. 1. velj

    Time is critical in healthcare. Notification & mitigation of vulns in software & equipments is complex and time consuming because supply chain, upstream dependencies, no line of sight. Code red talk by and

    Poništi
  17. 1. velj

    W00t! If you missed this Firetalk on DNS last night come see it today at 4:15!

    Poništi
  18. 1. velj

    Appreciate this talk by on evaluating vendor risk This applies to all orgs, all sizes. From threat Intel perspective I see growing & sophisticated trends by APTs to target low hanging fruit on supply chains for bigger game.

    Poništi
  19. 1. velj

    Thoroughly enjoying the presentation on Russian disinformation campaigns “The Cyberlous Mrs Maisel” by J. Zhanna Malekos Smith, in costume and character! She is covering so much detail

    Poništi
  20. proslijedio/la je Tweet

    Recommendations: Run your own internal recursive eDNS server. And many more...

    Poništi
  21. 1. velj

    Kudos and congrats to on his fascinating firetalk on DNS and so much we don’t realize. 🎉 He is like the Gandalf of the Internets - much wisdom and many battles.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·