Eduardo Chavarro

@EChavarro

MSc Infosec, IR Specialist, Telecommunications, CSIRT First Responder, Malware analysis ... GCFA/CHFI/CISM/CPTE/ITIL |

Closer
Vrijeme pridruživanja: siječanj 2010.

Tweetovi

Blokirali ste korisnika/cu @EChavarro

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @EChavarro

  1. Prikvačeni tweet
    14. velj 2019.

    "Imagination is more important than knowledge." - Albert Einstein From

    Poništi
  2. proslijedio/la je Tweet
    5. velj

    CDPwn vulnerabilities impact tens of millions of enterprise devices - CDPwn impacts Cisco's Discovery Protocol (CDP) - CDPwn = 4 RCEs + 1 DOS - LAN exploitable, not via WAN - ideal for escalating access and taking over entire networks

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    5. velj

    Malaysia CERT, , released an advisory on espionage campaign targeting Malaysia government officials. .Periscope

    Poništi
  4. proslijedio/la je Tweet
    4. velj

    Shoot first, ask later: strategies for protecting the most phished country in the world

    Poništi
  5. proslijedio/la je Tweet

    And what about WhatsApp by ? Does it manage any different user's privacy?🙄

    Poništi
  6. proslijedio/la je Tweet
    2. velj

    SettingSyncHost.exe as a LolBin cd %TEMP% & c:\windows\system32\SettingSyncHost.exe -LoadAndRunDiagScript foo

    Poništi
  7. proslijedio/la je Tweet
    31. sij

    SCOOP: Ransomware hits TV & radio news monitoring service TVEyes Newsrooms, political campaigns, and PR agencies panic as they lose access to one of their crucial media monitoring tools.

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    30. sij

    Hackers are using as a malspam lure to distribute Emotet and other variants, according to and telemetry

    Poništi
  9. proslijedio/la je Tweet
    30. sij

    CVE-2020-0674: Internet Explorer Remote Code Execution Vulnerability Exploited in the Wild Zero-day remote code execution vulnerability Triggers 0. JScript 1. used in 2. ... Proof of Concept Demo Video

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  10. proslijedio/la je Tweet
    29. sij

    Introducing my newest project: I got phished The goal is to notify IT-security representatives about phishing victims within their constituency 📨 👉 A big thanks to who initiated the project! 👏 For bug reports and feature requests -> DM me

    Poništi
  11. proslijedio/la je Tweet
    29. sij

    Hey, ICSsec! If you know ICS security related podcasts/episodes in any language: Chinese, Spanish, French, German, Arabic, Portuguese, Turkish, and any others, let me know, We'll be adding them to the public : CPS/ICS Security Podcast Playlist

    Poništi
  12. proslijedio/la je Tweet
    Poništi
  13. 29. sij

    En 2020 - Primera reunión hablamos de , les comparto los slides presentados en la sesión via

    Poništi
  14. 29. sij

    HEVD Exploits – Windows 7 x86 Arbitrary Write

    Poništi
  15. proslijedio/la je Tweet
    29. sij

    A new whitepaper by experts: "Advancing Cyber Resilience in Aviation: An Industry Analysis"

    Poništi
  16. 28. sij

    Nada como aprender, compartir y pasarla bien ... pasando del 111 0000 1000 al 1800 ;)

    Poništi
  17. proslijedio/la je Tweet
    28. sij

    Hola a todos. En Shieldnow buscamos apasionados por la seguridad informática para hacer parte del equipo como Pentester o Analista de Vulnerabilidades Se valorará: conocimientos, experiencia y/o estudios realizados. +info por dm

    Poništi
  18. proslijedio/la je Tweet
    27. sij

    Detrás de las cámaras, Tom y Jerry Q bueno!! 😂😂😂

    Poništi
  19. proslijedio/la je Tweet
    24. sij

    I examined the files posted from after they refused to pay the . the interesting thing I discovered is that they obviously hacked Gedia via the exploit my bet is that all recent targets were accessed via this exploit. (1/2)

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    27. sij

    Noticed a couple new stagers in Empire3 osx/shellcode and windows/wmic (created an XSL stylesheet file that runs wmic.exe).

    Poništi
  21. proslijedio/la je Tweet
    25. sij

    I'm working on a new project for Android reversers called Smali Debugger. It's like gdb but for Smali. It uses smalivm () for execution. Here's a quick video of me stepping through two similar methods.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·