NCC Group InfosecOvjeren akaunt

@NCCGroupInfosec

This is the technical account for global cyber security & risk mitigation provider, NCC Group. This account is run alongside the corporate account.

Vrijeme pridruživanja: travanj 2011.

Tweetovi

Blokirali ste korisnika/cu @NCCGroupInfosec

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @NCCGroupInfosec

  1. proslijedio/la je Tweet
    2. velj

    Latest : Operation Wocao (我操, “Wǒ cāo”, is a Chinese curse word) is the name uses to describe the hacking activities of a Chinese based hacking group. shares their new report on this group. Listen here:

    Poništi
  2. proslijedio/la je Tweet
    1. velj

    Interesting in sight into incident response , honeypots and attribution

    Poništi
  3. proslijedio/la je Tweet
    31. sij

    Logging made easy: a logging system that just about any organisation can manage

    Poništi
  4. proslijedio/la je Tweet
    29. sij

    NCC Group () are now recruiting for their 2020 graduate scheme starting in July. I have just finished the scheme in Manchester so if you have any questions regarding that, or the company in general, don't hesitate to DM me 😄

    Poništi
  5. proslijedio/la je Tweet
    28. sij

    So glad to finally be able to release Collaborator++! It adds the ability to view interactions from all contexts, manually poll for interactions on old contexts, and secure your private servers with a pre-shared key!

    Poništi
  6. proslijedio/la je Tweet
    30. sij

    We’re onto IoT secure by design with Rob Joyce, David Mudd, Peter Stephens and – mjesto: British Museum

    Poništi
  7. Poništi
  8. proslijedio/la je Tweet
    25. sij

    Happy to see our /Docker pentesting tool made public. If you find registry creds, quickly see if there are secrets stored in the metadata of other images in a registry. Or scan unauth'd registries. Did you know that ENV in a Dockerfile, is stored in the registry metadata? ;)

    Poništi
  9. Poništi
  10. proslijedio/la je Tweet
    24. sij

    Which coast is the best coast? Sourya Biswas of the discusses how the different coasts approach information security differently at .

    Poništi
  11. proslijedio/la je Tweet
    22. sij

    We’ve launched ’s new report on the Computer Misuse Act 1990 in the House of Commons today. Great to hear from and legal and cyber security industry professionals:

    Reforming the computer misuse act 1990
    Reforming the Computer Misuse Act 1990
    Reforming the Computer Misuse Act 1990
    Reforming the Computer Misuse Act 1990
    Poništi
  12. proslijedio/la je Tweet

    talking at the CMA reform report launch for and the campaign.

    Poništi
  13. proslijedio/la je Tweet

    We have expanded to Japan! We’re pleased to announce that Tony Richardson has been appointed as country manager to drive the company’s presence across the Japanese market. Read more here:

    Poništi
  14. proslijedio/la je Tweet

    Great overview of our engagement with global commodities trading firm, around replication of NotPetya worm. Exactly the type of project that our Exploit Development Group lives for. Replicate, strengthen, unleash & assess. Issue 12, page 22.

    Poništi
  15. proslijedio/la je Tweet
    15. sij

    Hunting for C&C beacons by analyzing connection patterns

    Poništi
  16. proslijedio/la je Tweet
    14. sij

    I recommend a good Secure Coding in C course for this reason, and also so my boss doesn't send me out on more web pen tests.

    Poništi
  17. proslijedio/la je Tweet
    13. sij

    CVE-2019-19781 post-exploitation notes: If you are seeing attackers reading your /flash/nsconfig/ns.conf file then you need to change all passwords. The SHA512 passwords are easily crackable with hashcat.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    12. sij

    Odd thing about some of the Citrix ADC/NetScaler exploits/scanners.. the ones written in python use the requests module, which normalizes the path so /vpn/../vpns/ => /vpns/ Does that mean people are getting false negatives on the vuln check, or that /../ is really not needed?

    Poništi
  19. proslijedio/la je Tweet
    13. sij

    Good Luck to all of the teams from Chester taking part in the starting today.

    Poništi
  20. proslijedio/la je Tweet
    11. sij

    RE: CVE-2019-19781 detections (Citrix NetScaler/ADC RCE) Although the vulnerable code mandates the the first request *must* be a POST request - the second request can be a HEAD or even a PUT and will still get processed by the template engine.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·