Tweetovi

Blokirali ste korisnika/cu @aboutsecurity

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @aboutsecurity

  1. Prikvačeni tweet

    If you’re thinking about taking the SEC530: Defensible Security Architecture and Engineering in 2020, check out this review from a recent student that attended my class in Tokyo last week:

    Poništi
  2. ⚠️Nerd Joke Alert ⚠️ So a TCP packet goes into a bar dressed as a UDP packet... what does he say to the bartender? "QUIC get me a beer!" cc/ 😝

    Poništi
  3. Poništi
  4. proslijedio/la je Tweet

    This is for anyone who wonders about the utility of in 2020. Not everyone computes in a 5g, cloud-first, beyond corp, zero trust, next-gen, SDN, whatever-else-hotness environment. Thousands of orgs just have to secure their Internet-connected things.

    Poništi
  5. On my way to to teach getting some great news! (1) - I’m going to be doing a webinar on Architecting for with a good friend and co-founder by the end of this month (stay tuned for details!) and (2) I just got upgraded on my flight to 🛫

    Poništi
  6. proslijedio/la je Tweet
    2. velj

    Looking for more memory dumps to dig into? Here is my newest one! -> Win10x64_18362 DevVM Gargoyle-laden (thx ) acquired with dumpit (thx ) & analyzed with win10compression support (thx )

    Poništi
  7. Poništi
  8. Unpacking and tidying up some of my SANS books I still had in boxes after the move (still more to go in the garage). I’ve referred back to these tons of times since my very 1st class, w/ in 2007. As would ask: do they spark joy? Absolutely!! 📚💥😅

    Poništi
  9. I love to use the SimpleHTTPServer module to run a quick web server to test payloads, POCs, etc. Here's a version that adds SSL+BasicAuth that is pip installable (still Python 2.7) pip install git+git://github.com/tianhuil/SimpleHTTPAuthServer.git@master

    Poništi
  10. Mitigations against actively exploited IE Zero-Day (CVE-2020-0674/ADV200001) with PowerShell and Intune. WARNING: Mitigations come with "side-effects", most notably breaking PAC scripts. Details here via

    Poništi
  11. Poništi
  12. proslijedio/la je Tweet
    28. sij

    Thanks for the inclusion in the awesome new book. and . Flipped through it, and it looks great! Very excited to dig into it on my flight tomorrow. Edition 😁👌🤣

    Poništi
  13. proslijedio/la je Tweet
    28. sij

    Winter is Coming to the SANS Blue Team Summit training event Get ready for the debut of Cyber Defense NetWars II! Will you be the first to win this coin?

    Poništi
  14. proslijedio/la je Tweet
    23. sij

    Adversary Tactics: PowerShell Course book for Free.

    Poništi
  15. I doubt this is the full technical report. There’s gaps i.e. the link between the egress traffic & NSO / HackingTeam infra (diamond model) among others. It’s a fun reading though with references to common techniques & tools like &

    Poništi
  16. proslijedio/la je Tweet
    21. sij

    Our latest blogs provides technical detail and timeline of the work we did to analyze, reverse engineer and develop working exploits for the file signing certificates CVE-2020-0601 H/T

    Poništi
  17. Poništi
  18. On why you need a : ‘When asked why he published such a massive list of "bots," the leaker said he upgraded his service from working on top of IoT botnets to a new model that relies on renting high-output servers from cloud service providers.’

    Poništi
  19. Poništi
  20. proslijedio/la je Tweet
    16. sij

    I'm very excited to announce the release of the highly anticipated SANS SEC588 - Cloud Penetration Testing course. Congratulations to on completing it. Watch for the beta announcement date soon:

    Poništi
  21. proslijedio/la je Tweet
    15. sij

    Potential passwords in scripts are bad... But shouldn't we find and fix those rather than blinding ourselves to modern malware?

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·