Asaf Aprozper

@3pun0x

Head of Research at - All your assets are exposed to us. Tweets are my own.

Israel
Vrijeme pridruživanja: prosinac 2016.

Tweetovi

Blokirali ste korisnika/cu @3pun0x

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @3pun0x

  1. proslijedio/la je Tweet
    2. velj

    This is how we start the week! What about you? BsidesTLV 2020 CFP is open Submit and share.

    Poništi
  2. proslijedio/la je Tweet
    20. sij

    Hackers found exposed Telnet ports and leaked passwords of 500k+ servers, routers & IoT devices. The only way to reduce exposures at scale is to get a continuous outside-in view of your exposed assets.

    Poništi
  3. proslijedio/la je Tweet
    16. sij

    Jenkins Gitlab Hook Plugin 1.4.2 contains a reflected XSS vulnerability (CVE-2020-2096). To find out if you are affected by this CVE, contact Reposify and uncover your complete External Attack Surface.

    Poništi
  4. proslijedio/la je Tweet
    16. sij

    Had a blast hosting leading CISOs at our exclusive Lunch & Learn session! Insightful talks, lively discussion and a delicious lunch! A big thanks to our guest speaker Shahar Geiger Maor and for all of you who attended! To attend future events, PM us.

    Poništi
  5. proslijedio/la je Tweet
    16. sij

    My very first CVE has just been published. XSS, CVE-2020-2096 POC: http://JENKINS_IP/gitlab/build_now%3Csvg/onload=alert(document.domain)%3E

    Poništi
  6. proslijedio/la je Tweet
    15. sij

    CVE-2019-15010 Bitbucket Server and Bitbucket Data Center versions starting from version 3.0.0 before version 5.16.11, from version 6.0.0 before 6.0.11, from version 6.1.0 before 6.1.9, from version 6.2.0 before 6.2.7, from version 6.3.0 before 6.3.6, f...

    Poništi
  7. 12. sij
    Poništi
  8. 8. sij
    Poništi
  9. 8. sij

    For some reason, removed the video from the old account. The new link for the video from my talk can be found on the following link:

    Poništi
  10. proslijedio/la je Tweet
    9. pro 2019.
    Poništi
  11. 15. pro 2019.

    The video from my talk at Japan has just been published. On the following link, you can find the PoC tool () and the rules that I created for my research:

    Poništi
  12. proslijedio/la je Tweet
    12. pro 2019.

    [CB19] Leveraging Yara Rules to Hunt for Abused Telegram Accounts by Asaf Aprozper

    Poništi
  13. 13. pro 2019.

    The video from my talk at Japan has just been published. On the following link, you can find the PoC tool () and the rules that I created for my research:

    Poništi
  14. 11. pro 2019.
    Poništi
  15. proslijedio/la je Tweet
    9. pro 2019.

    2 New CVEs were released for GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. Code Execution (-2019-5096) & DoS Flaw (-2019-5097). Upgrade yours to safeguard your External Surface.

    Poništi
  16. proslijedio/la je Tweet
    2. pro 2019.

    Hi, any chance you can increase our public API limit? Who should we communicate this to?

    Poništi
  17. proslijedio/la je Tweet
    21. stu 2019.

    Our amazing malware research group had the perfect way to celebrate its two-year anniversary. We had an online party of malware research with members and presenters from all around the world. Now we are happy to share the presentations with the community!

    Prikaži ovu nit
    Poništi
  18. 9. stu 2019.

    Look what I found in my mailbox 📪 - Thanks 👾

    Poništi
  19. 29. lis 2019.
    Prikaži ovu nit
    Poništi
  20. 29. lis 2019.

    I would like to thank everyone who attended my talk “Leveraging Yara Rules to Hunt for Abused Telegram Accounts” at Code Blue 2019. I hope you enjoyed it 🙏 ありがとうございました | Arigatou gozaimashita | Thank you

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·