Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @KhuuSec
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @KhuuSec
-
The drone assassination of Iranian general Qasem Soleimani is leading many to believe Iran is going to strike back with a significant cyber attack. Make sure your devices are fully patched with the latest security updates. It only takes a minute
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Brandon Khuu proslijedio/la je Tweet
New breach: Zynga (creator of the Words with Friends game) suffered a data breach in September. Data included 173M unique email address, usernames and passwords stored as salted SHA-1 hashes. 69% were already in
@haveibeenpwned. Read more:https://www.cnet.com/news/words-with-friends-hack-reportedly-exposes-data-of-more-than-200m-players/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
all locks, then defenders should know about the key so they can protect themselves from it. A problem with this approach is that not everyone takes advantage of the opportunity. This leaves ppl open to attack by unskilled criminals and results in real costs to tax payers
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Solid points. OST = tools used by both legit security folks and the bad guys CNO = legit IT security doing their jobs Security tools (for offense and defense) are often developed and released to the public. The thought behind the status quo is if attackers have a key to (1/2)https://twitter.com/QW5kcmV3/status/1206727979948298240 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Department of Defense is going to start requiring ALL companies working on contracts to meet a certain level of cybersecurity maturity. They'll be releasing more info about this program over the next three monthshttps://www.defense.gov/explore/story/Article/2034756/dod-will-help-small-companies-meet-cybersecurity-requirements/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Brandon Khuu proslijedio/la je Tweet
Absolutely. Got my first InfoSec job only bc I was in the right place at the right time. First security FTE at this company. I didn't even know what FTP was at that point. Network+ -> Vender Certs -> Security+ -> GCIH brought my skills up and now getting promoted to team lead
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Brandon Khuu proslijedio/la je Tweet
The security industry needs more people with breadth of knowledge.
@malwareunicorn#BHEUpic.twitter.com/WTYt0z0wsA – mjesto: ExCeL London
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Got new internet today from Comcast. Funny how the temp PSK I set on the modem allowed their TV box to locate and authenticate to my network as soon as the tech plugged it in... PW changes, devices resets and bridging the modem to my Netgear router worked.
#cybersecurityHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Brandon Khuu proslijedio/la je Tweet
Offensive Security Tools are the aggregation of vulnerability agnostic disparate functionality that may independently exist for legitimate purposes but when selectively combined and streamlined to facilitate authorized intrusions results in an OST.https://link.medium.com/cdsXFjL901
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Brandon Khuu proslijedio/la je Tweet
If you don't give your employees a secure way to do their job they will find an insecure way to do their job
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Before criminals learned to use computers, a news article about thugs holding a hospital hostage and forcing them to pay tens of thousands of dollars would have made the front page. Our society has become numb to modern crimehttps://www.cnn.com/2019/10/08/business/ransomware-attacks-trnd/index.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
"Cybersecurity breaches caused by employee error are very common, to the point that employee mistakes are an even larger threat to data security than hackers" Truth. And threats to data security often result in financial losses, decreased productivity, and hurt your reputation.https://twitter.com/RedSeal_co/status/1199752262203170817 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Part seven: If you're responsible for securing your organization, Stage one accounts may have been infected with FAREIT malware, emails coming from those accounts have links to spoofed pages which are used to capture creds, and the stage two accounts are used for the BEC attack.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Part six: Having one or more foothold in your organization can allow the attacker to make requests and then confirm the legitimacy with another account. Attacks like this can be difficult to identify. Especially if you personally know the person who owns the account.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Part five: Be aware that these compromised accounts are being used to send additional phishing emails or to make requests such as wire transfers from internal employees
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Part four: If you see a rule that you didn't setup then check to see what it's doing. Attackers are setting them up to hide emails related to their activity on YOUR account
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Part three: If you start receiving phone calls or emails from friends and colleagues about an email that they think you sent and you didn't send it, change your password immediately. One way you can confirm that your account has been owned is by checking your inbox rules
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Part two: A few of the phishing emails identified so far in the attack have had the following subject lines - "Proposal from [company name]" - "Proposal from [contractor name]" - "Review"
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Thanksgiving advisory part one: Be careful of phishing emails from clients, suppliers, and other business partners as we go into this Thanksgiving weekend. There's a fairly widespread phishing campaign that's ongoing and targeting businesses of various sizes.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.