Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @Saif_Sherei
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Saif_Sherei
-
0x5A1F proslijedio/la je Tweet
w00t! So excited to announce our new course at
#BHUSA2020 - Adversary Emulation and Active Defense! 4Day - https://www.blackhat.com/us-20/training/schedule/index.html#adversary-emulation-and-active-defense-19136 … Combining the spheres of offense and defense to teach core concepts.@BlackHatEvents@TeamAresSec@CRITICALSTART@paragonsec@BlaiseBrignacHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x5A1F proslijedio/la je Tweet
Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy! https://googleprojectzero.blogspot.com/2020/01/part-ii-returning-to-adobe-reader.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x5A1F proslijedio/la je Tweet
We’re excited to announce the Xbox Bounty Program, which awards up to $20,000 for vulnerabilities in the Xbox network space. Find out more information:https://msrc-blog.microsoft.com/2020/01/30/announcing-the-xbox-bounty-program/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x5A1F proslijedio/la je Tweet
#Blackhat has 151 trainings. We have 18. 18 of the best hacker trainings you can ever find.#SimplifyYourChoices Early
prices are still available at #Ringzer0! Register now
https://ringzer0.training
RTs appreciated!
#QUALITYvsQUANTITYpic.twitter.com/uDo3MDzh36
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x5A1F proslijedio/la je Tweet
Qualys Security Advisory: LPE and RCE (CVE-2020-7247) in OpenSMTPD, OpenBSD's mail server. Erroneous logic in smtp_mailaddr() which validates user and domain. More details and PoC at: https://www.openwall.com/lists/oss-security/2020/01/28/3 … PS: "Did you ever play tic-tac-toe?"
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x5A1F proslijedio/la je Tweet
Mobius Strip Reverse Engineering is announcing public sessions for its Static Reverse Engineering and SMT-Based Binary Program Analysis training classes in May 2020 in Manassas, VA. More details can be found on our website:https://www.msreverseengineering.com/training-classes/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x5A1F proslijedio/la je Tweet
Here's your chance to hear
@JohnLaTwC tell the story of MS08-067 and finding exploits in crash reports :) And in case you missed the blog post he published a while ago: https://docs.microsoft.com/en-us/archive/blogs/johnla/the-inside-story-behind-ms08-067 …https://twitter.com/DarknetDiaries/status/1219646340277440513 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x5A1F proslijedio/la je Tweet
Co-wrote this OSINT analysis (with nice data visualization) about Facebook Coordinated Inauthentic Behavior (CIB) with
@simabasel - The data is available on GitHub! http://si.ma/fb-cib/#OSINT#Facebook#CIB Twitter will be the next one. cc@ngleicher@yoyoelPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x5A1F proslijedio/la je Tweet
RDP to RCE: When Fragmentation Goes Wrong AKA: What we know about CVE-2020-0609 and CVE-2020-0610.https://www.kryptoslogic.com/blog/2020/01/rdp-to-rce-when-fragmentation-goes-wrong/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x5A1F proslijedio/la je Tweet
My favorite articles are the ones that walks you through the author methodology and strategy to find/exploit bugs. This is the case for
@mmolgtm last post on Chrome IPC vulnerabilities:https://securitylab.github.com/research/chromium-ipc-vulnerabilities …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x5A1F proslijedio/la je Tweet
We have increased our Microsoft Edge bounty awards alongside today's general availability of the new Microsoft Edge. Find out more here: https://www.microsoft.com/en-us/msrc/bounty-new-edge …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x5A1F proslijedio/la je Tweet
This month's updates includes CVE-2020-0601 affecting Windows 10. We have not seen it used in active attacks. Learn how this is one example of our partnership with researchers and industry to release quality security updates to help protect our customers.https://aka.ms/cve-2020-0601
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x5A1F proslijedio/la je Tweet
I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell https://srcincite.io/blog/2020/01/14/busting-ciscos-beans-hardcoding-your-way-to-hell.html … PoC exploit code: https://srcincite.io/pocs/cve-2019-15975.py.txt … https://srcincite.io/pocs/cve-2019-15976.py.txt … https://srcincite.io/pocs/cve-2019-15977.py.txt …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x5A1F proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
0x5A1F proslijedio/la je Tweet
My courses are going back to GitHub and off of my website. It was really annoying running them on my website. The reverse engineering course is getting a revamp soon and a basic exploit dev course is being worked on.https://github.com/0xZ0F/Z0FCourse_ReverseEngineering …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x5A1F proslijedio/la je Tweet
I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage: https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-1.html …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x5A1F proslijedio/la je Tweet
We are excited to announce the Microsoft Identity Research Project Grant, a new opportunity in partnership with the security community to help protect Microsoft customers, with grant awards of up to $75,000 USD. For more information please visithttps://msrc-blog.microsoft.com/?p=11516
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x5A1F proslijedio/la je Tweet
My team is once more hiring vulnerability researchers for our Redmond WA office. This is for low-level OS/platform security research work on Windows and Azure. More details on what we do at https://www.linkedin.com/pulse/vulnerability-research-scale-windows-arthur-wongtschowski/ …. Apply directly at https://aka.ms/AA6z0a8 or DM me if interested!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x5A1F proslijedio/la je Tweet
Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher
@flxflndy https://labs.bluefrostsecurity.de/blog/2020/01/07/cve-2019-1215-analysis-of-a-use-after-free-in-ws2ifsl/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x5A1F proslijedio/la je Tweet
New blog post. ARM hardware bug. In the specification. https://siguza.github.io/PAN/
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.