Matthew Risck

@Mateusz_Jozef

Information security research and development

Vrijeme pridruživanja: kolovoz 2009.

Tweetovi

Blokirali ste korisnika/cu @Mateusz_Jozef

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Mateusz_Jozef

  1. prije 23 sata

    Dr. Jekyll and Mr. “Hide” – How Covert Malware Made it into Apple’s App Store

    Poništi
  2. prije 23 sata
    Poništi
  3. 29. sij

    oss-security — LPE and RCE in OpenSMTPD (CVE-2020-7247)

    Poništi
  4. 27. sij

    [CVE-2019-14615] iGPU Leak: An Information Leakage Vulnerability on Intel Integrated GPU

    Poništi
  5. proslijedio/la je Tweet
    19. sij

    Co-wrote this OSINT analysis (with nice data visualization) about Facebook Coordinated Inauthentic Behavior (CIB) with - The data is available on GitHub! Twitter will be the next one. cc

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    20. sij

    Announcing the first guest speaker for SHACK 2020 aka WhiskeyCon 2020: "the Grugq" - The Unrestricted Cyber War.

    Poništi
  7. 19. sij

    CVE-2020-0674: Microsoft Internet Explorer 0day - Scripting Engine Memory Corruption Vulnerability being exploited in the wild

    Poništi
  8. proslijedio/la je Tweet
    18. sij

    RDP to RCE: When Fragmentation Goes Wrong AKA: What we know about CVE-2020-0609 and CVE-2020-0610.

    Poništi
  9. 16. sij

    Reliably Finding and Exploiting ICS/SCADA Bugs - A walkthrough of a command inject exploit for Advantech WebAccess

    Poništi
  10. 16. sij
    Poništi
  11. 13. sij

    What is Azure Active Directory?

    Poništi
  12. 10. sij

    Deep Dive in to Citrix ADC Remote Code Execution, CVE-2019-19781

    Poništi
  13. proslijedio/la je Tweet
    9. sij

    Have reproduced Citrix SSL VPN pre-auth RCE successfully on both local and remote. Interesting bug!

    Poništi
  14. 9. sij

    Remote iPhone Exploitation Part 1: Poking Memory via iMessage and CVE-2019-8641

    Poništi
  15. 8. sij
    Poništi
  16. proslijedio/la je Tweet
    1. sij

    [ KASLD ] Kernel Address Space Layout Derandomization - A collection of various techniques to bypass KASLR and retrieve the Linux kernel base virtual address on x86 / x86_64 architectures as an unprivileged user.

    Poništi
  17. proslijedio/la je Tweet
    29. pro 2019.

    Wrote another post on a recent finding (.NET deserialization)

    Poništi
  18. 30. pro 2019.
    Poništi
  19. 28. pro 2019.

    D-Link DIR-859 — RCE UnAutenticated (CVE-2019–17621) [EN] by

    Poništi
  20. 24. pro 2019.

    Great write up - Reversing Windows Internals: Digging Into Handles, Callbacks & ObjectTypes

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·