Erick Galinkin

@ErickGalinkin

Artificial Intelligence Researcher Applied Math Cybersecurity These are barely my opinions, much less anyone else. He/Him

The Bae Area
Vrijeme pridruživanja: lipanj 2015.

Tweetovi

Blokirali ste korisnika/cu @ErickGalinkin

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ErickGalinkin

  1. proslijedio/la je Tweet
    4. velj

    We on the Labs team use Projects Sonar and Heisenberg to provide context for risk on the Internet. Today I published a blog post on DOUBLEPULSAR over RDP in support of 's efforts in this area.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    4. velj
    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet

    If you told me in 2016 that I’d be singing Bernie’s praises, I’d have been really surprised. But the thing is, his disability plan dropped yesterday, and it’s *great*.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    3. velj

    At , voting-hack experts & agreed: Voting machines are the least vulnerable part of the U.S. election system. The bad news? Almost every other part looks like an easy target.

    Poništi
  5. proslijedio/la je Tweet
    3. velj

    The halftime show last night was amazing. Two powerful Latina women headlining and crushing it while making a statement? Yes please! If you saw anything else 👏stop👏blaming👏and👏hating👏women👏

    Poništi
  6. proslijedio/la je Tweet
    3. velj
    Poništi
  7. proslijedio/la je Tweet
    2. velj

    Happy Palindrome Day! It's 20200202, or 02022020 for you non-ISO-loving people.

    Poništi
  8. proslijedio/la je Tweet
    1. velj

    We can't get facial *recognition* to work on people of color with acceptable success rates but yet we're forging ahead into cramming videos of applicants faces through piles of linear algebra to decide if they'd be a good hire? JFC. Enjoy your lawsuits. You deserve them.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet

    i believe i just did something no one has ever done before: i wrote a constant-time galois field implementation on a 6502 chipset, which not only does not have a constant-time hardware multiply instruction, but does not have a multiply instruction at all

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    30. sij

    no holden caufield but people do be kinda phony

    Poništi
  11. proslijedio/la je Tweet

    From : Trump's 2020 budget includes $25,000,000,000 in cuts to Social Security.

    Poništi
  12. proslijedio/la je Tweet

    Want to know a fun thing about CVE-2019-0604? Thousands of publicly exposed systems still run SharePoint 2007. Doesn’t matter as the advisory says it doesn’t apply to SP 2007, right? Wrong. Exploit absolutely works, product is out of support. Vuln scanners don’t detect.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    28. sij

    1\ Surprisingly, you could build a very mediocre PE malware detector with a single PE feature: the PE compile timestamp. In fact, I built a little random forest detector that uses only the timestamp as its feature that gets 62% detection on previously unseen malware at a 1% FPR.

    Prikaži ovu nit
    Poništi
  14. 27. sij

    Verifying myself: I am egalinkin on . PMkjFXvJPhaLUaj9oNW4M5ml_y9GCFXlB3bj /

    Poništi
  15. proslijedio/la je Tweet
    27. sij

    Threat Labs Kicking off our series of posts by breaking down a attack and showing how you can defend against it.

    Poništi
  16. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet

    I was just looking for a cybersecurity stock photo when I realized the internet has ruined me.

    Poništi
  18. proslijedio/la je Tweet
    24. sij

    1/ Here's a thread on how to build the kind of security artifact "social network" graph popularized by and others, but customized, and on your own private security data. Consider the following graph, where the nodes are malware samples:

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    22. sij

    I've been using Jira for the last year and here it is added to my ranking of top project management tools: 1. Trello 2. Piece of paper 3. Word document shared via ftp 4. Shouting to each other over the table 5. Not tracking tasks at all 6. Jira

    Poništi
  20. proslijedio/la je Tweet
    23. sij

    Pro tip: Security means you’re concerned about bad things happening to your data. Compliance means you’re concerned about auditors happening to your data.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·