Julian Cohen

@HockeyInJune

Risk philosopher. CISO. Advisor. Mentor. Retired vulnerability researcher. Retired CTF organizer and competitor. he/him

Vrijeme pridruživanja: veljača 2008.

Medijski sadržaj

  1. 30. sij
    Odgovor korisniku/ci
  2. 10. pro 2019.
    Odgovor korisniku/ci
  3. 2. pro 2019.

    On a scale of 6 to 10 with an average of 10, how useless is this graph?

  4. 9. stu 2019.
    Odgovor korisnicima
  5. 27. ruj 2019.

    I hate when security folks say "attackers only have to win once, defenders have to win every time" because it's flawed thinking. Thanks for this: "Actually, an attacker can win everywhere and as a defender you only have to find them once"

  6. 25. ruj 2019.

    Panel time with Jeff Miller, , John Linzy, Eddie Doyle, and Roman Garber.

  7. 13. ruj 2019.

    Bug bounty memes, send your favorites.

  8. 29. kol 2019.

    I was watching Ancient Aliens on the History Channel last night and I saw this preview for a really cool sci-fi show.

  9. 23. kol 2019.
    Odgovor korisniku/ci
  10. 15. kol 2019.
    Odgovor korisniku/ci
  11. 29. srp 2019.
    Odgovor korisniku/ci
  12. 10. srp 2019.

    Brought a laptop home from my parents's house thinking I was going to repurpose it for something fun. GUESS NOT!

  13. 27. lip 2019.
  14. 15. lip 2019.

    Throwback to when and Littlefield were down the block.

  15. 20. svi 2019.
    Odgovor korisniku/ci
  16. 17. svi 2019.

    This security product needs to do two things, parse logs and raise alerts. I guess they think the second thing isn't that important.

  17. 17. svi 2019.

    This is not meaningful in any way, but the way the Southern District of Indiana spelled spearphishing does not sit well with me.

  18. 11. svi 2019.

    So, I'm writing a script that's designed to give you a simple view into the current state of the exploit mitigation settings on your machine. Simple output that you can use for auditing or hardening or asking that pesky vendor, what do you do for me that Windows doesn't already?

    Prikaži ovu nit
  19. 11. svi 2019.

    Then Microsoft deprecated EMET in Windows 10 in favor of a built in GUI tool and some Powershell Cmdlets called Get-ProcessMitigation and Set-ProcessMitigation that read information out of the registry. And these interfaces suck. Documentation is light and output is confusing.

    Prikaži ovu nit
  20. 11. svi 2019.

    Since this tweet, I've been playing around with this idea in my free time and I'm almost done with a first draft. Microsoft used to have EMET, a GUI tool that would allow administrators and users to configure the exploit mitigations built into Windows.

    Prikaži ovu nit

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·