Tweetovi

Blokirali ste korisnika/cu @TekDefense

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @TekDefense

  1. proslijedio/la je Tweet
    29. sij

    1\ I've written a little compiler to ship ML models as standalone Yara rules, and done proof of concept detectors for Macho-O, RTF files, and powershell scripts. So far I have decision trees, random forests, and logistic regression (LR) working.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    29. sij
    Odgovor korisnicima

    that would make you pause a minuet.

    Poništi
  3. 27. sij

    Stumbled across "ENTER-BSOD" while reviewing some powershell hitting pastebin hits. Far superior to the old screenshot the desktop and hide all the icons stuff we used to do!

    Poništi
  4. proslijedio/la je Tweet
    22. sij

    Learn more about the tool we worked on with to help orgs identify compromised systems associated with the CVE-2019-19781 vulnerability:

    Poništi
  5. proslijedio/la je Tweet
    22. sij

    Great work by and many others to get this out quickly!

    Poništi
  6. proslijedio/la je Tweet
    22. sij

    Lots of late nights and work on the weekend/holiday to get this out. Many thanks to for help making it happen.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    22. sij
    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    22. sij

    We are committed to the security of our products & we are making every effort to ensure all customers are supported in response to . To that end, we have teamed up with on a scanner that aids customers in the detection of compromise.

    Poništi
  9. 22. sij
    Poništi
  10. proslijedio/la je Tweet
    19. sij
    Poništi
  11. proslijedio/la je Tweet
    17. sij
    Odgovor korisniku/ci

    “FireEye believes that actors deploy to block exploitation of the CVE-2019-19781 vulnerability while maintaining backdoor access to compromised NetScaler devices.”

    Poništi
  12. proslijedio/la je Tweet
    17. sij

    Dashboard view of recent RDP activity. Looking to add these screenshots to the daily summaries soon™

    Poništi
  13. proslijedio/la je Tweet
    17. sij

    We found an unexpected development with the Citrix Netscaler vulnerability. A seemingly “white knight” who left a backdoor to deploy additional malware while keeping out other criminals.

    Poništi
  14. proslijedio/la je Tweet
    17. sij

    In which we discuss an actor deploying a mitigation for the Citrix vuln, but also appearing to have a backdoor.

    Poništi
  15. proslijedio/la je Tweet
    16. sij

    ROFL at the internet white knight that's dropping payloads to inoculate Netscaler devices.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    14. sij

    🚨 New blog with on CVE-2019-19781 - "I Promise It'll Be 200 OK", covering: • ASCII encoding trick evading most (all?) public rules /.%2e/%76pns/ 👀 🐷 tricks (negative distance, exploitation flowbits) 👉🔗 tips ⤵️

    , , i još njih 5
    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    14. sij

    NEW: Google to phase out user-agent strings in Chrome * UA strings to be replaced with Client Hints * Move is part of the larger Privacy Sandbox project * UA string freezing and deprecation to take place between Chrome 81 and 85

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    13. sij

    PDBlaster: a tool for "scalable PDB extraction and analysis" - this is cool because as points out in the blog, PDB paths may only be present in ~5% of malware, so collection, parsing, pivoting in BULK is key to squeezing meaningful juice out of the artifact.

    Poništi
  19. proslijedio/la je Tweet
    11. sij

    1. Never stop learning. 2. See failure as a beginning. 3. Teach others what you know. 4. Assume nothing, question everything. 5. Analyze objectively. 6. Practice humility. 7. Respect constructive criticism. 8. Love what you do. 9. Give credit where it's due. 10. Take initiative.

    Poništi
  20. proslijedio/la je Tweet
    11. sij

    BREAKING: I have decided to follow on Twitter, since he’s been following me on Jeopardy all week.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·