Ben

@CyberPraesidium

Sr. Security Engineer, threat hunter, and pen tester . Tweets are my own.

DC Metro
Vrijeme pridruživanja: travanj 2017.

Tweetovi

Blokirali ste korisnika/cu @CyberPraesidium

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @CyberPraesidium

  1. 3. velj
    Poništi
  2. proslijedio/la je Tweet
    30. sij

    Thanks to , and countless others in in the community who stood by our colleagues. It was cool to see the community come together in this event!

    Poništi
  3. proslijedio/la je Tweet
    28. sij

    Kali 2020.1 is up for download! Big changes yet again, with non-root user by default, a single installer image for multiple desktop enviroments, updates to themes, and more! Not to mention Rootless NetHunter!

    Poništi
  4. proslijedio/la je Tweet
    27. sij

    New: leaked documents, data, contracts show how hugely popular antivirus Avast now harvests internet browsing data and sells it for millions of dollars. Clients included Home Depot, Google, Microsoft. Documents show a product called "All Clicks Feed"

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    24. sij

    This weekend is your last chance to vote for the Top 10 (new) Web Hacking Techniques of 2019! Voting closes Monday.

    Poništi
  6. proslijedio/la je Tweet
    24. sij

    Citrix has released a new set of patches for the recently disclosed CVE-2019-19781 vulnerability and partnered with FireEye for a tool that tells users if their systems have been compromised via the security flaw.

    Poništi
  7. proslijedio/la je Tweet
    22. sij

    We are committed to the security of our products & we are making every effort to ensure all customers are supported in response to . To that end, we have teamed up with on a scanner that aids customers in the detection of compromise.

    Poništi
  8. proslijedio/la je Tweet
    7. pro 2019.

    Integrating Pi-hole Logs in ELK with Logstash

    Poništi
  9. proslijedio/la je Tweet
    17. sij

    CALL FOR REQUESTS: Much of Sysmon-config was written years ago and it’s time for serious updates and reorganization. Some teach it as a template of Windows monitoring, but it has gaps in explaining what things do. If there’s a change you want, let me know.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    17. sij

    Sysmon-config V71 release +Enable IMPHASH Processes: -Remove Microsoft Monitoring agent -Remove Defender Files: +.job Folder: +SysWOW64 tasks folder Registry: +Classes\PROTOCOLS\ +083863F1-70DE-11d0-BD40-00A0C911CE86}\ +Sysinternals \EulaAccepted

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet

    Citrix Gateway and ADC vulnerability aka - a thread of some things which are catching out defenders:

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet

    🚨 In my Citrix ADC honeypot, CVE-2019-19781 is being probed with attackers reading sensitive credential config files remotely using ../ directory traversal (a variant of this issue). So this is in the wild, active exploitation starting up. 🚨

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    31. pro 2019.

    We sent an email to all Wyze users this morning regarding a data leak that occurred. You can read in more detail about it and the actions we took here: . Please reach out with any questions or concerns to .

    Poništi
  14. 20. pro 2019.
    Poništi
  15. proslijedio/la je Tweet
    19. pro 2019.

    Convenience store chain Wawa says all of its payment processing servers were hacked by

    Poništi
  16. proslijedio/la je Tweet

    Ransomware gangs now outing victim businesses that refuse to pay up. E.g., the crooks behind Maze Ransomware have now created a public Web site listing names, websites and sample files stolen from victims, as well as total amount of files exfiltrated.

    Poništi
  17. proslijedio/la je Tweet
    18. pro 2019.
    Poništi
  18. proslijedio/la je Tweet

    You have two weeks left to join our Capture the Flag contest and win a Nintendo Switch, or cool GitHub swag! Write a CodeQL query to find a specific class of DOM-based XSS vulnerabilities.

    Poništi
  19. proslijedio/la je Tweet
    12. pro 2019.

    F5 in the forecast for tomorrow! ShmooCon 2020 final ticket sale at noon EST, December 13. Details:

    Poništi
  20. proslijedio/la je Tweet
    9. pro 2019.
    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·