Tweetovi

Blokirali ste korisnika/cu @4n6ir

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @4n6ir

  1. Prikvačeni tweet
    10. tra 2018.

    Threat hunting defined: The application of novel and clever methods intended to create space and time for organizations to defend themselves through: increased rates of contact; degraded will of the threat; control, influencing or severing the threat to target relationship.

    Poništi
  2. proslijedio/la je Tweet
    3. velj

    Just 6 Personal Early Bird Tickets have left

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    2. velj

    Performance artist generates virtual traffic jams in Google Maps by pulling a wagon full of smartphones

    Poništi
  4. proslijedio/la je Tweet
    2. velj

    Raytheon engineer arrested for taking US missile defense data to China | ZDNet

    Poništi
  5. 1. velj

    Anyone know a Sr. level IDM architect focused on AAD looking for a gig? Send them my way.

    Poništi
  6. proslijedio/la je Tweet
    28. sij

    From the folks that brought you Atomic Red Team, Chain Reactor is a new open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.

    Poništi
  7. proslijedio/la je Tweet
    29. sij
    Poništi
  8. proslijedio/la je Tweet
    29. sij
    Odgovor korisniku/ci

    CIO: “What do you mean it’s less secure?” Engineer: “Active Directory was never meant to be public facing and has always had physical forms of MFA to protect it prior to the cloud.” CIO: “Then why did we move to the cloud?” Engineer: “Because you went golfing with Avanade...🤷🏻‍♂️

    Poništi
  9. proslijedio/la je Tweet

    NEW: Our piece on the 3 big China cases today alleging 1) Harvard chemistry chair lied re millions in Chinese funding 2) PLA official used Boston University as base to study U.S. military 3) Researcher tried to sneak vials to China in a sock w

    Poništi
  10. proslijedio/la je Tweet

    This is similar to what said many years ago. He wanted to ship with no rules so people would write their own, suitable for their environment and risk model. I suggest those who are capable do the same with SIEM.

    Poništi
  11. proslijedio/la je Tweet
    22. sij

    Here is the link to the SpecterOps Adversary Tactics: PowerShell course material: Enjoy! For information about our current training offerings, information can be found here: (4/4)

    Prikaži ovu nit
    Poništi
  12. 20. sij

    How many CISO’s ask their red teams if investing X millions in shiny tech Or capability Y would actually negatively impact their ability to operate?

    Poništi
  13. 20. sij

    If you changed the word ‘smart’ to reflect their role in surveillance/intelligence collection would you view smart homes, tv’s, cities, phones etc differently?

    Poništi
  14. proslijedio/la je Tweet
    12. sij

    Citrix Netscaler AMIs on default vulnerable out of the box. The root password is set to the instance ID; that can be read from the metadata URL. CVE-2019-19781 from nobody to ssh as root in seconds.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    3. sij

    stop it with the myopic and ill considered cyber warfare takes, folks.

    Poništi
  16. proslijedio/la je Tweet
    3. sij

    One week everyone is an expert on offensive tooling the next week everyone is an expert on the middle east.

    Poništi
  17. proslijedio/la je Tweet

    I’ve talked to a number of reporters & friends who have loved ones in since last night. All naturally worried about quick & massive retaliation by . Iran will respond, but the reaction will be measured & delivered in due time. No need to fear immediate escalation.

    Poništi
  18. proslijedio/la je Tweet
    3. sij

    Now is not the time to ZOMG CYBER IRAN! Look at your threat model. How do Iranian actors fit into it? How do Iranian interests intersect your business? How has historic Iranian targeting related to your business? When did u last update your threat model? Do u have a threat model?

    Prikaži ovu nit
    Poništi
  19. 2. sij

    For some reason the topic of surveillance capitalism-esp w/ 5g-is much more important to me today (and I’m guessing more than just me) than topics like OST. Bad guys are always going to be bad, but choices we make will come back to haunt us for decades.

    Poništi
  20. proslijedio/la je Tweet
    2. sij

    Most interesting read of 2019. Dan Geer foresaw this way back in 2014, "Crafting good intelligence cover is getting harder & harder…misrepresentation is getting harder & harder." too had flagged the OPM link to profiling. Spying is dying.

    Poništi
  21. proslijedio/la je Tweet
    2. sij

    "The NSA shipped all the electronics in the embassy back to the US and struck gold: parts inside an IBM Selectric typewriter had been cleverly duplicated and rigged to transmit the typist’s keystrokes using Soviet over-the-air TV signals."

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·