Marina Krotofil

@Marmusha

Senior ICS Security Engineer . Own opinions. Red-Team cyber-physical security/IR/forensics. ICS/SCADA/IoT/IT security. & reviewer.

Germany
Vrijeme pridruživanja: svibanj 2010.

Tweetovi

Blokirali ste korisnika/cu @Marmusha

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Marmusha

  1. Prikvačeni tweet
    6. srp 2017.

    preparations 🛠💻 I'm not sure what's louder: the pump or the server. My ears hurt already 🙉 I must speak very loud on stage 🎤

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet

    whoever is responsible for this is my new personal hero.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    3. velj

    Today, visited me. What a nice diversion attack by a well known social engineer ;-)

    Poništi
  4. 3. velj

    The Call for Papers for Black Hat USA 2020 is now OPEN!!!! 🎓🎩  Important Dates: CfP opens: February 3, 2020 CfP closes: April 6, 2020 Notification of submitters: End of May 2020 HURRY UP!! 🤓🤓🤓

    Poništi
  5. proslijedio/la je Tweet
    29. sij

    Black Hat USA () is back at Mandalay Bay in Las Vegas, August 1-6. Registration is now open and Trainings will fill up fast! Save your seat and lock-in the lowest possible rates:

    Poništi
  6. proslijedio/la je Tweet
    2. velj

    "In vernetzten Fabriken kann Cyberkriminalität jeden Bereich treffen. Unternehmer Thomas Pilz berichtet, wie ein Angriff sein Unternehmen traf und welche Lehren er daraus gezogen hat" Sehr lesenswerter Artikel.

    Poništi
  7. proslijedio/la je Tweet
    1. velj
    Poništi
  8. proslijedio/la je Tweet
    2. velj

    "America warned Germany that Huawei's 5G gear was effectively bugged and leaking secrets to PRC agents, and that Huawei has been proven to work with China's security agencies."

    Poništi
  9. 2. velj

    When your peer become an epigraph to a chapter in your research manuscript

    Poništi
  10. proslijedio/la je Tweet
    2. velj

    An example of cyber and physical alerts correlation based on temporal-based and attribute-based similarity analyses for cyber-manufacturing intrusion detection, by researchers of

    Poništi
  11. 2. velj

    Can somebody explain me the meaning of this job advert of German federal police? -> "Have you ever entered a Backdoor"? 🤦🏼‍♀️ 🤦🏼‍♀️ Whose backdoor? Attribution in cyber crimes is hard, so whose door are they planning to enter? But hey! A nice lady on the poster. Kudos! 👍👍👍

    Poništi
  12. proslijedio/la je Tweet
    2. velj

    Free 20 pages paper: Ethical Web Development Guide from . Nice content for caring about your web visitors. 👍

    Poništi
  13. proslijedio/la je Tweet
    2. velj

    Jeder Vater von Teenagern, der in der IT tätig ist, wird das immer 2 x mehr wie alle anderen verstehen... 🤪

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    1. tra 2017.
    Poništi
  15. proslijedio/la je Tweet
    27. sij

    I had to get a background check for my job, and it turns out the report is a 300+ page pdf of every single tweet I’ve ever liked with the work “fuck” in it. Enjoy your dystopian bs! *waves*

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    2. velj
    Poništi
  17. proslijedio/la je Tweet
    1. velj

    If you need a name for a new malware, threat group operation or hack tool, check this Imgur gallery with 29 posters showing deities, monsters and heroes of different mythologies

    Poništi
  18. proslijedio/la je Tweet
    1. velj

    99 smartphones are transported in a handcart to generate virtual traffic jam in Google Maps. Through this activity, it is possible to turn a green street red which has an impact in the physical world by navigating cars on another route!

    Prikaži ovu nit
    Poništi
  19. 31. sij

    It took me >8hrs in total to design this picture, calculate, draw it in Visio, figure out suitable colors, font size and resolution. Academia is hard 🥺🥵🥺

    Poništi
  20. proslijedio/la je Tweet
    30. sij

    "Organisations are blindly trusting LoRaWAN because it's encrypted, but that encryption can be easily bypassed if hackers can get their hands on the keys," said Cesar Cerrudo, CTO at IOActive, in this ZDNet article examining security.

    Poništi
  21. proslijedio/la je Tweet
    31. sij

    'unternehmen ist Opfer eines Hacker-Angriffs geworden! Angreifer Gruppe mit dem Namen hat jahrelang deutsche Konzerne ausgespäht. Experten vermuten, dass die Angreifer eine Verbindung zur chinesischen Regierung haben

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·