Mike Wylie

@TheMikeWylie

Cybersecurity consultant. Creds: MBA, CISSP, GPEN, CEH, CEI, VPC, CHPA, CCNA CyberOps, CCNA R&S, Splunk User, Pentest+, Project+, Security+. Tweets are my own.

Vrijeme pridruživanja: rujan 2011.

Tweetovi

Blokirali ste korisnika/cu @TheMikeWylie

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @TheMikeWylie

  1. prije 3 sata

    You've been infected with malware, now what? Wouldn't it be nice to learn how the malware got in? How you could keep it out of your environment? Maybe you're curious if your data was stolen. This month I'll be teaching a Malware Analysis course

    Poništi
  2. 4. velj

    Just got a copy of the proposed Yahoo breach settlement. They will pay for a Settlement Fund of $117,500,000. The Settlement Fund will provide: a minimum of two years of Credit Monitoring Services to protect Settlement Class Members from future harm.

    Poništi
  3. 3. velj

    Uh oh... Sudo Bug Lets Non-Privileged Linux and macOS Users Run Commands as Root

    Poništi
  4. 2. velj

    After seeing an Amazon Prime delivery photo showing my door lock make/model, security camera position, etc., I have a new idea for passive physical reconnaissance.

    Poništi
  5. 31. sij

    If you're considering a TPN assessment or have a studio audit around the corner, check out my latest article: "Important Updates to MPA Best Practices You Don’t Want To Miss"

    Poništi
  6. 30. sij

    My MAC users, Apple released security updates for multiple products in Jan. A total of 46 vulnerabilities were addressed. Exploitation of some of these security flaws could allow an attacker to take control of an affected system.

    Poništi
  7. proslijedio/la je Tweet

    Nice use of medieval imaginery in presentation about continious cloud security monitoring by .

    Poništi
  8. 29. sij

    Kali is moving to non-root default account. First release of the year. Kali Linux 2020.1 Release

    Poništi
  9. 27. sij

    Free isn't always free. Spend a little money on AV/EDR. Avast antivirus harvested user data, then sold to Google, Microsoft according to appleinsider.

    Poništi
  10. 24. sij

    Don't live in the past. Upgrade. RIP Windows 7: Here’s How You Can Upgrade From Windows 7 to Windows 10 From Discover on Google

    Poništi
  11. 23. sij
    Poništi
  12. 21. sij

    Excited to be speaking at AppSec California on Thursday. If you're attending, come by to say hello.

    Poništi
  13. 21. sij

    I'll be giving a Fundamentals of Malware Analysis workshop at ISSA-VC in February. Sign up link:

    Poništi
  14. 20. sij

    Awesome write up on how to use KAPE to collect forensic data remotely

    Poništi
  15. 18. sij

    Two challenge coins in 24 hours. Awesome event and great teaching by

    Poništi
  16. 18. sij

    Shout out to and for the great classes prepping me for

    Poništi
  17. 15. sij

    Sometimes, I feel like this is how companies treat their Incident Response plans.

    Poništi
  18. proslijedio/la je Tweet
    14. sij

    For personal reasons I'm staying close to home for a while. As a result, I'm taking on a few extra projects. If you've got a small-medium sized app that employs newer tech and would like a seasoned pro to look at it (static and/or dynamic) for a reasonable rate, let me know.

    Poništi
  19. 14. sij

    It's that time of year again!!! "Sacred Cash Cow Tipping 2020" is now on YouTube

    Poništi
  20. proslijedio/la je Tweet
    13. sij

    Looking over honeypot logs...attacker used their backdoor to inadvertently delete /netscaler/portal/{templates,scripts}. Yes, the blue box are the backdoor IP addresses.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·