Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @UltraKyle
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @UltraKyle
-
A1 proslijedio/la je Tweet
Coming soon to Sysmon: clipboard logging for malicious RDP session DFIR, and shredded file recovery for capturing hacking tools
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A1 proslijedio/la je Tweet
City of Racine, Wisconsin got hit with ransomware It's a small US city, but still another municipality that got hit this year. No word on the ransomware type, but they're restoring from backups. https://www.cbs58.com/news/city-of-racine-attacked-with-ransomware …pic.twitter.com/LrU1se02CT
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A1 proslijedio/la je Tweet
My Sysmon config sees the shell/open reg key being written, if you want to alert on this. /cc
@cyb3ropshttps://twitter.com/teamcymru/status/1224085088851447808 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A1 proslijedio/la je Tweet
#TrickBot Uses a New Windows 10 UAC Bypass to Launch Quietly#malware http://bit.ly/3aU8FxD pic.twitter.com/yxuUxeBsml
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A1 proslijedio/la je Tweet
Literally the first and last time anyone has ever wanted to talk to Mitnick at a hacking con.

https://twitter.com/DAkacki/status/1223706051280887816 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A1 proslijedio/la je Tweet
Windows 10 UAC bypass for all executable files which are autoelevate true.https://github.com/sailay1996/UAC_Bypass_In_The_Wild …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A1 proslijedio/la je Tweet
Some essential process execution/cmd lines to monitor for initial access/persist. powershell cmd rundll32 control wscript javaw csc regsvr32 reg certutil bitsadmin schtasks wmic eqnedt32 msiexec cmstp mshta hh curl installutil regsvcs/regasm at msbuild sc cscript msxsl runonce
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A1 proslijedio/la je Tweet
Documents reveal that Avast has sold its users internet browsing data, through a subsidiary called Jumpshot, to clients like Pepsi, Google, and Microsoft (
@josephfcox / VICE) https://www.vice.com/en_us/article/qjdkq7/avast-antivirus-sells-user-browsing-data-investigation …http://www.techmeme.com/200127/p6#a200127p6 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A1 proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
A1 proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
A1 proslijedio/la je Tweet
So.... I've struggled with this next bit for quite awhile now.... but after talking with some close friends I figured I'd go for it. Short story time.... As most of you know, I went through a pretty bad divorce about 5 years ago. I was left with no money to my name.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A1 proslijedio/la je Tweet
In enterprise attack wave,
#NetWire#Trojan now buries itself in disk image files#infosec https://zd.net/2NOxfGi pic.twitter.com/loOggOd9hZ
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A1 proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
A1 proslijedio/la je Tweet
New Variant
#Dharma (.cezar Family)#Ransomware Ext:.XXXXX.[notgoodnews@tutanota.com].NEWS ! Vt:https://www.virustotal.com/gui/file/489176967b6b7cfb372d6d70267f29d596c47b0fab876642a7b56d4eb5d76dfa/detection …@BleepinComputer@Malwaredev@JAMESWT_MHT@demonslay335@gridinsoft@Malwarebytespic.twitter.com/46TIvUoStXOvo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A1 proslijedio/la je Tweet
2020-01-22:


#TrickBot "Active Directory" (AD) Dumper Module Released | Build:
"ADll build Oct 17 2019 17:48:25 started"
ntds.dit & ntds.jfm | ntdsutil & reg save
Module In Development Since 2019
Reinforces Focus on AD Harvesting for Net Exploitation
cc /@DebugPrivilege https://twitter.com/sandornemes/status/1219501420774379520 …pic.twitter.com/seXkbnEPO3
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A1 proslijedio/la je Tweet
Scoop: FBI says nation-state actors have breached two US municipalities * Hackers used the CVE-2019-0604 SharePoint vulnerability * Cities were not named * Chinese APTs have historically abused this bug last year https://www.zdnet.com/article/fbi-nation-state-actors-have-breached-two-us-municipalities/ …pic.twitter.com/V4S1s6QHK4
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A1 proslijedio/la je Tweet
Anyway long story short is that when Windows Update tells you there are updates available you should install them
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A1 proslijedio/la je Tweet
<looks askance at security training programs>pic.twitter.com/7RvGFRMgij
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A1 proslijedio/la je Tweet
Guess what SynAck ransomware actors recommends to do if victims not get a reply from the contact email addresses? Of course, go to
@BleepinComputer forums and post there, they will read & contact... cc@demonslay335pic.twitter.com/m3l8FWUvoe
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.