Tweetovi

Blokirali ste korisnika/cu @a_de_pasquale

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @a_de_pasquale

  1. proslijedio/la je Tweet
    2. velj

    Do you have an open-source cybersecurity project you would like to see being worked on as part of Google Summer of Code? We are collecting ideas & projects for this summer! Submit yours here (even if you wouldn't be able to be a mentor): !

    Poništi
  2. proslijedio/la je Tweet

    Ho ricostruito tutta la storia, dettagli, contesto di quell'intrigo internazionale che è diventato il telefono di . I dissidenti spiati, i legami con , la debolezza del report tecnico, sentendo anche e . Su

    Poništi
  3. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet

    Is malware going out of buissness? Our feeds show that the malware started removing itself from infected clients leaving this message

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    21. sij

    Today published research that me and my colleges have been hard at work on. For 6 months we ran a factory.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    18. sij

    RDP to RCE: When Fragmentation Goes Wrong AKA: What we know about CVE-2020-0609 and CVE-2020-0610.

    Poništi
  7. proslijedio/la je Tweet
    17. sij
    Poništi
  8. proslijedio/la je Tweet
    15. sij

    I wrote a small prototype detector for CVE-2020-0601. See for the package, for the script itself and for more information and current limitations.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    7. sij

    Low-interaction honeyclient Thug 1.0 released! Now supporting Python 3 and STPyV8 V8 wrapper

    Poništi
  10. proslijedio/la je Tweet
    3. sij

    🚀 Launch Day 🚀 It’s official this project that and I have been a part of for 5 years is now available as a free public Beta! Automated malware unpacking!

    Poništi
  11. proslijedio/la je Tweet
    2. sij

    To celebrate this new decade, I have just released a new open source tool that could help security researchers on daily operations: Check out the blog post for further info:

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    29. pro 2019.

    Are you in IT security yet not allowed to patch vulnerable systems? Do you have five bosses, each of which must approve changes? Enter Undocumented Admin! Friendly white-hat hackers who gently access your vulnerable systems and patch them for you Signup

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    29. pro 2019.
    Poništi
  14. proslijedio/la je Tweet
    27. pro 2019.

    Unsure yet what this comeback/evolution, after 2 years missing, of Zloader/Terdot.A is about...but this is one of the emerging trend in december 2019. cc/thx

    Poništi
  15. proslijedio/la je Tweet
    15. pro 2019.
    Poništi
  16. proslijedio/la je Tweet
    12. pro 2019.

    New blog post! "Say hello to Bottle Exploit Kit targeting Japan"🍾

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    5. pro 2019.

    Note:TA505 != Dridex. They were massively spreading it, with, as customer, Necurs. Dridex 125 then 220 and 7200, but also Locky 3, Trickbot mac1 before moving to ServerHelper and FlawedAmmyy. Other actor are spreading Dridex. Smilex was part of the team spreading Dridex 120.

    Poništi
  18. proslijedio/la je Tweet
    25. stu 2019.

    targeted Italy start to spread Subjects: 1Sollecito di pagamento FineName: 02{DIGIT[5]}-{DIGIT[4]}6{DIGIT[1]}.xls ex) 0226858-418969.xls

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    21. stu 2019.

    1. packer - has a slight change - decrypt payload&dave with 2 export function - replace VirtualAlloc with GetCurrentPorcess & NtAllocateVirtualMemory 2. dave(payload loader) - no change 3. payload - no change yara update to cover c6a0a8a847cf60fcb84fcd41ff43609e

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    18. stu 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·