Medijski sadržaj
- Tweetovi
- Tweetovi i odgovori
- Medijski sadržaj, trenutna stranica.
-
Twitter warns hackers exploited an API bug on its platform to inappropriately match and learn linked phone numbers of millions of users. Based on IP addresses engaged in the attack,
#Twitter believes some of them may have ties to state-sponsored actors.pic.twitter.com/4TfZzR5xTf
-
Bypass Windows Authentication With Kon-Boothttps://www.youtube.com/watch?v=iBBPErhyqzw …
-
Memory Forensic Python Cheat Sheet by SANSpic.twitter.com/rPFLnrqvu9
-
CVE-2019-6146:--
#XSS via#Host#Header#Injection |#Forcepoint#Web#Security 8.x. Tools: ---------- 1.#BurpSuite 2.#Mozilla#Firefox [As Browser]#Video#Link:-https://www.youtube.com/watch?v=NfXGaNVK6eE&feature=youtu.be … -
DNS Rebinding attack in one Screenshot Cc
@SpiderSec ·pic.twitter.com/906nzq351Y
-
The
#CEO of#opensource#cybersecurity#startup#Snyk, which is now valued at over $1#billion in less than five years, explains how it doubled its revenue in the past four months!!#Link:- https://www.businessinsider.in/tech/news/the-ceo-of-open-source-cybersecurity-startup-snyk-which-is-now-valued-at-over-1-billion-in-less-than-five-years-explains-how-it-doubled-its-revenue-in-the-past-four-months/articleshow/73531744.cms …#informationtechnology#infosec#infosecuritypic.twitter.com/9UnXSI0SPm
-
#Citrix#ADC#vulnerability explanation and#exploitation. This video shows how to find hosts#vulnerable to CVE-2019-19781. Vulnerable hosts can be found easily using#Shodan. https://www.youtube.com/watch?v=cALcgyq42kI … To learn more: 1. https://support.citrix.com/article/CT ... 2. https://www.exploit-db.com/exploits/4 ... -
XML External Entity(XXE) Injection is one of the OWASP Top 10 attack vectors. In this next part learn how it works in a practical environment using Portswigger's Web Security Academy.https://www.youtube.com/watch?v=jUSkMQb8Df4 …
-
XML External Entity (XXE) Injection Payload List An XML External Entity (XXE) attack (sometimes called an XXE injection attack) is a type of attack that abuses a widely available but rarely used feature of XML parsers.pic.twitter.com/4rtZZKld6p
-
Time to Patch
Adobe has released fixes for five critical flaws in Adobe Illustrator CC, which if exploited could enable arbitrary code execution.pic.twitter.com/RRIZCtZLni
-
DEF CON 20 Hacking Conference - Hacker Pyramid 1https://vimeo.com/51297501
-
[CVE-2019-12750] Symantec Endpoint Protection Local Privilege Escalation Part 1: https://labs.nettitude.com/blog/cve-2019-12750-symantec-endpoint-protection-local-privilege-escalation-part-1/ … PoC: https://youtu.be/YtuVcOph_lc Part 2: https://labs.nettitude.com/blog/cve-2019-12750-symantec-endpoint-protection-local-privilege-escalation-part-2/ … PoC: https://youtu.be/TFPbeSYicxc
-
AirDoS: Remotely render any nearby iPhone or iPad unusablehttps://www.youtube.com/watch?v=B6boxYcAC1k&feature=youtu.be …
-
-
Ransomware: how hackers take your data hostagepic.twitter.com/PBzKZcA2Vq
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
Basic Linux Commands