CONFidence

@CONFidenceConf

Latest news about the legendary conference happening on 1-2 June 2020 in the Polish Aviation Museum in Krakow, Poland.

Poland
Vrijeme pridruživanja: travanj 2009.

Tweetovi

Blokirali ste korisnika/cu @CONFidenceConf

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @CONFidenceConf

  1. proslijedio/la je Tweet
    2. velj

    I added a script to generate the PDF & archive for my Exam Report Template in Markdown, as I saw a lot of people where creating their own scripts.

    Poništi
  2. proslijedio/la je Tweet
    1. velj

    Komedia na temat kontroli - osoby z bronią wchodzą obok bramki i nie są przeszukiwane. USA!

    Poništi
  3. proslijedio/la je Tweet
    prije 23 sata

    Unpopular prediction (for people at security vendors... like me): Bespoke security solutions will disappear or be subsumed into operational platforms as providers decide to actually get serious about security. Independent security companies, aside from IR, have no future.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet

    Pan sobie wozi 99 telefonów na wózeczku, z włączonymi mapami Google, żeby “zaczerwienić” trasę w nawigacji i sprawić aby samochody nawigacja kierowała w inne rejony.

    Poništi
  5. proslijedio/la je Tweet
    30. sij

    For the past few months, I've been diving into Apple's Endpoint Security Framework. This post shares how I use the framework for detection engineering purposes.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    30. sij

    It should be -2019-1367 rather than -2020-0674, and seems targeting from group.

    Poništi
  7. proslijedio/la je Tweet
    30. sij

    Google loves security keys, and today announced an open source implementation to help spur further innovation from the security research community 1/ .

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    30. sij

    My write-up on how I tracked down an alleged member of REvil group utilizing methods. If you enjoyed reading this please share it and I will work hard to create more write-ups like this!

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    30. sij

    2020-01-29: [OSINT] Deep " Activity Report" by FINSEC 🇰🇷 🤔Weird phrasing on "Zeus" group and division into "Carbanak" (Anunak) and . 🙏Also please remember != != !=

    Poništi
  10. proslijedio/la je Tweet
    28. sij

    [Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    28. sij

    Dane 30 milionów kart kredytowych rzucone na rynek. Sieć sklepów i stacji benzynowych w USA potrzebowała 10 miesięcy by znaleźć malware na terminalach płatniczych.

    Poništi
  12. proslijedio/la je Tweet
    29. sij

    Ustawienie monitorów zespołu SOC też ma znaczenie :)

    Poništi
  13. proslijedio/la je Tweet
    28. sij

    2020-01-28: 🔒 | Researcher Taunting | Inside Malware Message 😆If I am Polish, then is Ukranian. As discovered by ⏩OutputDebugStringW(lpOutputString) Definitely researcher obsession by Maze

    Poništi
  14. proslijedio/la je Tweet
    28. sij

    Fortinet wpadł na świetny pomysł - tylne furtki w SIEMie. W XXI wieku. Głowa mała.

    Poništi
  15. 28. sij

    Yes, it's not a mistake. Call for papers is only open until 11:59 PM on February 3rd, 2020🙀😱🤖 This is literally (and not only figuratively) your last chance to submit your talk for CONFidence 2020❗️ 👇Check out all the requirements and apply here👇

    Poništi
  16. proslijedio/la je Tweet

    Kids: “Dad, what’s the wifi password?” Me:

    Poništi
  17. proslijedio/la je Tweet
    26. sij

    Wonder why AV has false positives? ✅Instructions to enable macros 🧩Obfuscated code 💉Modifies security settings 🕵️Hides VBA project 🔒Password protected sheets 4⃣Detections on VirusTotal Benign 🤷‍♂️

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    26. sij

    Military grade security

    Poništi
  19. proslijedio/la je Tweet
    26. sij

    When Host Header attack looks sweet for in context of security tool dashboard: - X-Forwarded-Host injected in web-page; - the page is cached by proxy (poisoning); - Security Analyst, working from home, received the page from cache... and is running to office to purge it

    Poništi
  20. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·