Raitlin

@TheRaitlin

Microsoft PFE (tweets are my own). Foodie, mixologist and wine connoisseur. Collector of books and whisk(e)y. 😸

Philadelphia, PA
Vrijeme pridruživanja: rujan 2008.

Tweetovi

Blokirali ste korisnika/cu @TheRaitlin

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @TheRaitlin

  1. proslijedio/la je Tweet

    The next software revolution won't be about 1s and 0s, but instead the building blocks of . Learn how cells and computers are alike:

    Poništi
  2. proslijedio/la je Tweet
    3. velj

    Holy shit. Researcher discovers that TeamViewer stores user passwords encrypted and finds the encryption key and initialization vector in the windows registry

    Poništi
  3. 3. velj

    Amazing research and finding on TeamViewer storing recoverable keys in registry.

    Poništi
  4. proslijedio/la je Tweet
    Poništi
  5. proslijedio/la je Tweet
    1. velj

    Have you been wanting to open Windows Terminal with specific tabs and panes? Check out what's coming soon to the Terminal in our latest status update! 😉

    Poništi
  6. proslijedio/la je Tweet
    31. sij

    Join me and on Tuesday, February 11th as we unveil 3.0! We will demo new attack primitives, performance improvements, and changes in the GUI. Register for the webinar here (recording available afterwards):

    Poništi
  7. proslijedio/la je Tweet

    Microsoft Defender ATP's partner ecosystem expands with integrations for network access control, network threat protection, continuous security validation, security orchestration automation and response, web content filtering, threat intelligence

    Poništi
  8. proslijedio/la je Tweet

    New assessments available in the public preview of Microsoft Compliance Score help assess your compliance posture for ISO/IEC 27701:2019, California Consumer Privacy Act (CCPA), Brazil Lei Geral de Proteção de Dados (LGPD), SOC 1 Type 2 and SOC 2 Type 2:

    Poništi
  9. proslijedio/la je Tweet

    New dates and location for ! Save September 21-25, 2020 and join us in New Orleans. 🎉 Pre-register today for an amazing week of technical training and more:

    Poništi
  10. proslijedio/la je Tweet
    15. sij

    Just published a blog explaining the root cause of the recent crypto vulnerability (CVE-2020-0601 / ?) using some "Load Bearing Analogies" to make it more accessible. CC:

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    14. sij

    Nice of Microsoft to add telemetry for -2020-0601, they are expecting exploitation New Function in crypt32.dll - ChainLogMSRC54294Error CveEventWrite(L"[CVE-2020-0601] cert validation", v8);

    Poništi
  12. proslijedio/la je Tweet
    14. sij

    No fancy EDR required to capture CVE-2020-0601 attempts (after patching). Just ensure you're forwarding Application log events. Currently, CVE-2020-0601 is the only Microsoft code (AFAIK) that calls the CveEventWrite API so event noise is not a concern.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet

    > Certificates with named elliptic curves, […], can be ruled benign. […] Certificates with explicitly-defined parameters […] which fully-match those of a standard curve can similarly be ruled benign. So it's a vulnerability in ECDSA verification of custom curves.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    14. sij

    COMMENTARY ON CVE-2020-0601: I have been speaking to several players on this on background and there are a few things they want to highlight / clarify based on the public discourse so far.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    14. sij

    This you are strongly encouraged to implement the recently released CVE-2020-0601 patch immediately.

    Poništi
  16. proslijedio/la je Tweet
    14. sij

    Windows Defender Antivirus detects files w/crafted certificates exploiting the certificate validation vulnerability: ​Exploit:Win32/CVE-2020-0601.A (PE files) Exploit:Win32/CVE-2020-0601.B (Scripts) Also, Defender ATP has a threat report on your posture. -2020-0601

    Poništi
  17. proslijedio/la je Tweet
    14. sij

    To all Windows users everywhere - patch your systems now! ( and have coverage for attempted exploitation of CVE-2020-0601).

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    10. sij
    Odgovor korisniku/ci

    It’s a setting that can be found on the master branch of Terminal! You can build from source or wait until our release next week and install from the Microsoft Store :)

    Poništi
  19. proslijedio/la je Tweet

    omg it's EXACTLY norton commander now

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    10. sij

    Mass scanning activity detected from 82.102.16.220 (🇩🇪) checking for Citrix NetScaler Gateway endpoints vulnerable to CVE-2019-19781. Affected organizations are advised to apply the mitigation steps provided by Citrix as no patch exists yet.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·