Z-r0_day

@9172_zr0

DFIR | Geopolitics | Sports

%temp%
Vrijeme pridruživanja: veljača 2009.

Tweetovi

Blokirali ste korisnika/cu @9172_zr0

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @9172_zr0

  1. proslijedio/la je Tweet
    4. velj

    This year we will be providing training at on Adversary Emulation and Active Defense this 4 day course will teach you how to think like an attacker and give insights into catching these attacker methods.

    Poništi
  2. proslijedio/la je Tweet
    prije 6 sati

    Seeing an ⬆️ in activity in To detect: Alert when new Inbox rules are created to: - Auto delete messages - Fwd emails to RSS, subscription, junk folders - Send to external address - OR keywords like virus, invoice, fraud, etc. Examples 👇

    Poništi
  3. proslijedio/la je Tweet

    Lol, this company (GK8) ran a 24 hour bug bounty and declared their product “truly unhackable”.

    Poništi
  4. proslijedio/la je Tweet
    29. sij

    price list for cables with implants for keystroke injection attacks. you literally plug the USB to the computer and it runs a remote shell on Win10 box for example insane what someone with pocket money and a will to hack can do with that!

    Poništi
  5. proslijedio/la je Tweet

    Israeli researcher, , finds an open SSH access on an Israeli government’s DNS server. This is while Israel claims "Zero Cyberattack Success Against Critical Israeli Infrastructures in 2019"

    Poništi
  6. proslijedio/la je Tweet
    prije 19 sati

    Stay positive Lolbins... not! rundll32 advpack.dll, RegisterOCX calc.exe rundll32 advpack.dll, #12 calc.exe rundll32 advpack.dll, #+12 calc.exe rundll32 advpack.dll, #-4294967284 calc.exe

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    3. velj

    99 smart phones in a pull-cart = instant traffic jam

    Poništi
  8. proslijedio/la je Tweet

    A new security flaw (CVE-2020-6007) in Philips Smart Light Bulbs 💡 could let remote attackers gain access to your entire WiFi network (over-the-air without cracking password) & launch further attacks against other devices connected to the same. Details:

    Poništi
  9. proslijedio/la je Tweet
    Odgovor korisniku/ci

    Cc

    Poništi
  10. proslijedio/la je Tweet

    Twitter warns hackers exploited an API bug on its platform to inappropriately match and learn linked phone numbers of millions of users. Based on IP addresses engaged in the attack, believes some of them may have ties to state-sponsored actors.

    Poništi
  11. proslijedio/la je Tweet

    The FBI warned of a potential Pseudo-Random Subdomain DDoS attack that targeted a state-level voter registration and information site in a Private Industry Notification released today - by

    Poništi
  12. proslijedio/la je Tweet

    It's the tale of "Too Close For Comfort." With the latest data in, we're starting to feel a little more confident that most of the metroplex won't experience any significant winter weather. The line will be SHARP & likely fall just west of Denton & Tarrant Counties.

    Poništi
  13. proslijedio/la je Tweet
    Poništi
  14. proslijedio/la je Tweet
    4. velj

    Someone is selling a "zero-day" exploit impacting all major browsers at the same time, on all Windows versions, for the super-mega cheap price of $2k Yeah, skippy. If you say so. (via )

    Poništi
  15. proslijedio/la je Tweet
    4. velj

    . is scanning the internet for Jenkins servers vulnerable to CVE-2020-2100. Jenkins 2.218 (LTS 2.204.1) and earlier are vulnerable to UDP amplification/reflection denial of service attacks.

    Poništi
  16. proslijedio/la je Tweet
    4. velj

    Aon acquires Cytelligence, a Canadian-based cyber security firm that provides incident response advisory, digital forensic expertise, security consulting services and cyber security training for employees.

    Poništi
  17. proslijedio/la je Tweet
    4. velj

    Critical Security Flaw Found in WhatsApp Desktop Platform Allowing Read From The File System

    Poništi
  18. proslijedio/la je Tweet
    4. velj
    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    4. velj

    ❤️? Yeah, me too! But if you're chasing a bad guy across a > 100K-node environment you're probably pivoting to your . 🤔 shares some of the (many) ways we use as our "cheat code" when responding . 👇

    Poništi
  20. proslijedio/la je Tweet
    4. velj

    This is a new thing is doing, taking an ICS range and educational content to various cities and hosting it with infrastructure companies. Yes it’s marketing but in an educational way to show the world more about ICS. Look for it in a city near you.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·