Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @FSecureLabs
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @FSecureLabs
-
F-Secure Labs proslijedio/la je Tweet
Absolutely stoked to be speaking alongside
@rookuu_ at Objective by the Sea v3 in Hawaii in March!@FSecure_Consult@objective_see#OBTS
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
It's Mighty^MorphoManager^in' Time! - Activate pwnage, power of RCE! Courtesy of
@FSecureLabs@FSecure_Consult Knud - https://labs.f-secure.com/advisories/identity-one-morphomanager-rce/ …pic.twitter.com/LAislH4AiN
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
From zero to hero in 1, EC2 steps... tales of bashing around in the cloud from labs’ Christian the real IAM when it comes to pwning AWS https://labs.f-secure.com/blog/misadventures-in-aws/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Interested in Smart TV hacking but don't know where to start? We've done all the legwork for you on the Samsung Q60 TV by
@AlizTheHax0r https://labs.f-secure.com/blog/samsung-q60r-smart-tv-opening-up-the-samsung-q60-series-smart-tv/ …#pwn2ownHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Barco Click2Pwn the Easy Wireless Penetration System. Easy integration into the company network for all your APT needs. Share your screen and secrets with 1 click by
@InfoSecDJ https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
F-Secure Labs proslijedio/la je Tweet
New from
@FSecureLabs: Digital Lock-Picking – Stealing Keys to the Kingdom.
Read @__0kami and Michał Madziar's new research on a KeyWe Smart Lock flaw that allows thieves to eavesdrop on messages between the lock and phone app. https://labs.f-secure.com/blog/digital-lockpicking-stealing-keys-to-the-kingdom/ … |#infosec#securitypic.twitter.com/Vi3eB0bt3ZHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
KeyWe hack it? yes we can Our own
@__0kami tells us how to pick digital locks. https://labs.f-secure.com/blog/digital-lockpicking-stealing-keys-to-the-kingdom … https://labs.f-secure.com/advisories/keywe-smart-lock-unauthorized-access-traffic-interception …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
If you use the Net2 Access Control system you might want to check out this advisory by Knud: https://labs.f-secure.com/advisories/paxton-net2-rce/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Are you avian a hard time with AWS? Of corvus we know such auspices are very hard to read. Why not aves a go with awspx from our resident
@FSecureLabs augur Craig Koorn.#aws#cloud#apm#AttackPath https://labs.f-secure.com/blog/awspx/ https://labs.f-secure.com/tools/awspx/ https://github.com/fsecurelabs/awspx …pic.twitter.com/AtRxUyiPcm
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
You gotta be kidding Mi - We just published the Xiaomi Pwn2Own 2018 advisories, which were patched just before Pwn2Own 2019, for silent APK install in the Browser and WiFi categories by
@munmap https://labs.f-secure.com/advisories/xiaomi/ … and https://labs.f-secure.com/advisories/xiaomi-wifi/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
"Fine, I'll make my own tool!" The story of how
@Yogehi had to devise his own way of exploiting an Informix SQL Injection vulnerabilityhttps://labs.f-secure.com/blog/uncommon-sql-database-alert-informix-sql-injection …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Two security researchers went on a web app test and you won't believe what overflowed next: check out our new blog post "Prince of the Honeycomb" by
@pwnfl4k3s https://labs.f-secure.com/blog/prince-of-the-honeycomb/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
F-Secure Labs proslijedio/la je Tweet
Confirmed! The
@FSecureLabs crew used an#XSS bug in the NFC component of the#Xiaomi Mi9 to exfiltrate data just by touching their specially made NFC tag. Their efforts earned $30,000 and 3 more Master of Pwn points.#P2OTokyoHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
F-Secure Labs proslijedio/la je Tweet
Success! The
@FSecureLabs crew was able to exfiltrate a picture from the#Xiaomi Mi9 handset just by touching it to a rogue NFC tag. The photo transferred slowly, but it definitely worked. They're headed to the disclosure room for verification.#P2OTokyoHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
F-Secure Labs proslijedio/la je Tweet
Confirmed! The
@FSecureLabs team combined a command injection bug along with some insecure settings to achieve their code execution (and Snake-themed light display). The effort earns them $20,000 and one Master of Pwn point.#P2OTokyoHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
F-Secure Labs proslijedio/la je Tweet
Success! Not only did the
@FSecureLabs team get their code execution working on the TP-Link AC1750 via the WAN interface, they got the front lights of the router to play Snake!#StylePoints#P2OTokyoHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
OU having a laugh? How edit rights on an OU can allow you to compromise any of its computer or user members by
@pkb1s https://labs.f-secure.com/blog/ou-having-a-laugh/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
F-Secure Labs proslijedio/la je Tweet
Success! After installing a rouge app on their first attempt, the
@FSecureLabs team was able to exfiltrate a picture from the#Xiaomi Mi9 on their second attempt. They're headed to the disclosure room to go over all the details.#P2OTokyoHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.