Medijski sadržaj
- Tweetovi
- Tweetovi i odgovori
- Medijski sadržaj, trenutna stranica.
-
Exploring the iOS screen frame-buffer– a kernel reversing experiment http://dlvr.it/RPJZVy pic.twitter.com/hlKW9p12fX
-
AMSI (Antimalware Scripting Interface) bypass by patching memory seen in the wild http://dlvr.it/RPHyww pic.twitter.com/b6d0A0uuA8
-
Exploit PoC: HyperV Admin to System http://dlvr.it/RPH7ng pic.twitter.com/VVUkmIWlGR
-
emotet_protection_tools: This repository provides tools to fight against Emotet malware. You can protect your system using these tools http://dlvr.it/RPGkX0 pic.twitter.com/M1qvM13RW8
-
Kraken Identifies Critical Flaw in Trezor Hardware Wallets http://dlvr.it/RPFmB5
#featuredpic.twitter.com/sXuxLZMsuC
-
Detection Engineering using Apple’s Endpoint Security Framework http://dlvr.it/RPDJlc pic.twitter.com/1uTgsZzBxi
-
"How to set up Secure LDAP for Active Directory — Astrix" http://dlvr.it/RPD2JS pic.twitter.com/nBmRuzwItr
-
-
Scripting Macs With Malice | How Shlayer and Other Malware Installers Infect macOS | SentinelOne http://dlvr.it/RPBhLz
#bypass#Gatekeeperpic.twitter.com/1N2ET2E2sm
-
An attacker logged into the honeypot and ran a batch file that created a vbs script that attempted to download a possible coin miner. The attacker then downloaded an application named Defender Control to turn off Defender. See the timeline, details, and… http://dlvr.it/RPBCBQ pic.twitter.com/dhLEptF5v3
-
Remote Cloud Execution – Critical Vulnerabilities in Azure Cloud Infrastructure http://dlvr.it/RP9vxh
#Azure#azureStackpic.twitter.com/PjodV4tMHU
-
Fuzzing npm/nodejs WebAssembly parsing library with jsfuzz http://dlvr.it/RP9Jb0
#fuzzing#javascriptpic.twitter.com/6OtUCcazko
-
PHP 7.0-7.4 disable_functions bypass 0day PoC http://dlvr.it/RP98hf pic.twitter.com/9ps9UnCYs5
-
Here's a new way to deploy and update Sysmon on your Windows endpoints http://dlvr.it/RP7yYG pic.twitter.com/SKIlCSyXUT
-
Kubernetes security monitoring at scale with sysdig falco http://dlvr.it/RP7fQ7 pic.twitter.com/kOtOg1jGd6
-
Chain Reactor: Open source tool for adversary simulation on Linux endpoints, uses self-contained binaries & JSON config http://dlvr.it/RP7Fg0 pic.twitter.com/1hSJMGjNlh
-
xHunt Campaign: New Watering Hole Identified for Credential Harvesting http://dlvr.it/RP71kz
#CredentialHarvesting#DNSHijackingpic.twitter.com/uFUOM3me2M
-
Stopping the Press: New York Times Journalist Targeted by Saudi-linked Pegasus Spyware Operator http://dlvr.it/RP6cHC
#Journalism#NewYorkTimespic.twitter.com/G30ZOyvfFn
-
Attacking Azure, Azure AD, and Introducing PowerZure http://dlvr.it/RP6Blm pic.twitter.com/fJV34nVKaI
-
Fuzzing in complex, hard-to-read code, such as web browsers and operating systems (Magnus Klaaborg Stubman) http://dlvr.it/RP4ZCl pic.twitter.com/RQhMnPhtc6
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.