Tweetovi

Blokirali ste korisnika/cu @Awwal_Quan

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Awwal_Quan

  1. proslijedio/la je Tweet
    prije 20 sati
    Poništi
  2. proslijedio/la je Tweet
    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    prije 19 sati

    Are you aware that the Minister of Communications and Digital Economy, Dr Isa Ali Ibrahim Pantami, has directed the Nigerian Communications Commission (NCC) to revise the Policy on SIM Card registration and usage? **This review concerns everyone!** Here you go:

    Poništi
  4. proslijedio/la je Tweet
    4. velj

    Can I take a picture of the moon? Pisa Tower: yea sorry

    Poništi
  5. proslijedio/la je Tweet
    5. velj
    Poništi
  6. proslijedio/la je Tweet

    To the person who figured out my honeypot is a honeypot could you please stop putting the picture of Pooh bear with a jar of honey on it? Its like this person's life mission, I've blocked him on: - Client - IPs (now on Tor ffs) - The image (he just edits 1 pixel every time...)

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    2. velj

    WooT! There is always a way. New short write up! Chain the bugs till you get what you want. Some steps were not mentionned. RT, Like and Comments are appreciated. For any pentest work DM me:) 🎉🎉

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet

    Dn’t B Araid or Ashamed to liv In Your Truth - Everything is Spirit - for your way may not B the way of others

    Poništi
  9. proslijedio/la je Tweet
    2. velj

    Live a life of gratitude...in all situations.

    Poništi
  10. proslijedio/la je Tweet
    2. velj

    Cyber Criminals will like to know your location 😂😂😂😂

    Poništi
  11. proslijedio/la je Tweet
    Poništi
  12. proslijedio/la je Tweet
    1. velj
    Odgovor korisnicima

    Another angle. This thread made me carry out more research and I clarified that a 0-day vulnerability is simply an unpatched flaw in a software, hardware... nothing more. It's in the process of trying to exploit these flaws that alarms are raised in the security system

    Poništi
  13. proslijedio/la je Tweet
    1. velj
    Odgovor korisniku/ci

    Great insight 🙌🏽 I totally get your point of behavioural patterns. We always set rules on the SIEM and EDR to detect such out-of-scope behaviours (use cases). My worry is, if we can predict the malicious patterns before they happen, are they still zero days?

    Poništi
  14. proslijedio/la je Tweet
    1. velj
    Odgovor korisniku/ci

    Hmm. I think there needs to be some context. Zero Day exploits rely on undiscovered/undisclosed vulnerabilities. Let’s take RDP for example, it’s primarily used for connecting to a remote host on a network. Any RDP behavior other than this can be flagged as unusual.

    Poništi
  15. 31. sij

    If a security product provides protection against 'zero day' exploits, those exploits aren't really zero days. Get it??? 🙄🙄

    Poništi
  16. proslijedio/la je Tweet
    30. sij

    Some hunters made over €50.000 in bug bounties with this simple trick. 🤑 Thanks for the , !

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet

    whoever is responsible for this is my new personal hero.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    30. sij

    “A jack of all trades is a master of none, but oftentimes better than a master of one.”

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    26. sij

    Don’t say: It doesn’t worth it. Say instead: It isn’t worth it.

    Poništi
  20. proslijedio/la je Tweet
    26. sij

    All Praise Be To The Most High 🤲🏽

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·