Tweetovi

Blokirali ste korisnika/cu @a_rdbeg

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @a_rdbeg

  1. proslijedio/la je Tweet
    26. sij

    Military grade security

    Poništi
  2. proslijedio/la je Tweet
    23. sij

    Even with end to end encryption, metadata matters

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    13. sij

    <looks askance at security training programs>

    Poništi
  4. proslijedio/la je Tweet
    16. sij
    Poništi
  5. proslijedio/la je Tweet
    8. sij

    new version of Boneh-Shoup's magnificent book is out!

    Poništi
  6. proslijedio/la je Tweet

    New email signature disclaimer for work sorted.

    Poništi
  7. proslijedio/la je Tweet

    10 years difference in the robotics at Boston Dynamics.

    Poništi
  8. proslijedio/la je Tweet
    10. pro 2019.

    possible (and wrong) interpretations: - designing crypto is easy and implementing stuff is hard - cryptographers are smarter than implementers - to be secure, crypto should not be implemented - implementations break because of the crypto - a break is equally bad in crypto or code

    Poništi
  9. proslijedio/la je Tweet
    10. pro 2019.

    In Chrome 79, once you're synced into your Google account, Chrome will tell you (via the new built-in Password Checkup tool) if you're using leaked credentials for any of your accounts Think of it as HIBP right in your browser

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    10. pro 2019.

    This organization is a great resource for data on ransomware. Looking at the most common ransomware, I can say in my experience Sodinokibi and Ryuk are deployed post-compromise using Offensive Security Tools such as EMPIRE and Cobalt Strike.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    9. pro 2019.

    Network coming from nowhere...

    Poništi
  12. proslijedio/la je Tweet
    5. pro 2019.

    Final slides of my presentation yesterday at Black Hat Europe 2019, about malicious VBA macros and recent advances in the attack & defence sides: Featuring /olevba, ViperMonkey, MacroRaptor, EvilClippy

    Poništi
  13. 3. pro 2019.

    The Difference Between Red, Blue, and Purple Teams | Daniel Miessler

    Poništi
  14. proslijedio/la je Tweet

    12 factor auth: Something you know. Something you have. Something you are. Something you were. Something you've lost. Something you've forgotten. Something you seek. Something you find. Something you steal. Something you create. Something you destroy. Something you sacrifice.

    Poništi
  15. proslijedio/la je Tweet
    28. stu 2019.

    A decade of hacking: The most notable cyber-security events of the 2010s by

    Poništi
  16. proslijedio/la je Tweet

    The undercover mode is the coolest part of Kali 2019 4.

    Poništi
  17. proslijedio/la je Tweet
    29. stu 2019.

    1)Known your systems 2)patching 3)privileged access management with PAW 4)app whitelisting 5)Proper Windows firewall config 1-5 FREE Each time you read a cyberattack report check if it can happen while you have implemented 1-5. Add 6)logging to be able to investigate few cases

    Poništi
  18. proslijedio/la je Tweet

    Sandworm. One of the best books I’ve read this year. If democracy, security, safety, maintaining secure systems, records, a safe supply chain, bank account, or simply a functioning society—interests you? (And it should...) Get this book today.

    Poništi
  19. proslijedio/la je Tweet
    29. stu 2019.

    Signal's secure iOS messenger now supports iPads

    Poništi
  20. proslijedio/la je Tweet
    25. stu 2019.

    Inspired by 's mindmaps, I've created one for Gamaredon Group, targeting Ukraine from 2013. ➡️

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·