Tweetovi

Blokirali ste korisnika/cu @artem_i_baranov

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @artem_i_baranov

  1. Prikvačeni tweet
    18. lis 2018.

    My note about Google Chrome and why I have decided not to throw its use - "Why Google Chrome runs so much processes". TL;DR It's about usability and security.

    Poništi
  2. proslijedio/la je Tweet
    prije 3 sata

    Microsoft Forgets to Renew Certificate, Teams Goes Offline -

    Poništi
  3. proslijedio/la je Tweet
    prije 3 sata

    A new search engine from NSA, apparently.

    Prikaži ovu nit
    Poništi
  4. Behind the Scenes Mortal Kombat 3 [Rare Footage]

    Poništi
  5. proslijedio/la je Tweet
    2. velj

    Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.

    Poništi
  6. proslijedio/la je Tweet
    2. velj

    This site claims to offer a vaccine for the 2019-nCoV "Coronavirus". And it only costs you .1 BTC (~$1,000)! Bet we'll see a few more of these, maybe even with better grammar. Experts say it will probably be at least another year before a real vaccine is available.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    2. velj

    KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore,

    Poništi
  8. proslijedio/la je Tweet
    31. sij

    junior SOC analyst returning from a threat hunt

    Poništi
  9. proslijedio/la je Tweet
    1. velj
    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet

    Remote Code Execution and Sensitive Information Theft in Microsoft Azure, along with infrastructure overview (2 Parts):

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet

    See the Sun like never before! ’s Inouye Solar Telescope produces first detailed images of the sun’s surface. 📷: / / NSF

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    30. sij

    Remote Cloud Execution - Critical Vulnerabilities in Azure Cloud Infrastructure (Part II) - Check Point Research

    Poništi
  13. proslijedio/la je Tweet
    29. sij

    (1/2) The Russian government has blocked ProtonMail and ProtonVPN within Russia. We are reaching out to the appropriate authorities to get the block lifted as soon as possible.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    28. sij

    About the security content of macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra

    Poništi
  15. proslijedio/la je Tweet
    27. sij

    Windows Kernel _IMAGE_DOS_HEADER::e_lfanew Denial Of Service/Memory Corruption

    Poništi
  16. proslijedio/la je Tweet
    27. sij

    New cache attack against Intel CPUs:

    Poništi
  17. proslijedio/la je Tweet
    27. sij

    New: leaked documents, data, contracts show how hugely popular antivirus Avast now harvests internet browsing data and sells it for millions of dollars. Clients included Home Depot, Google, Microsoft. Documents show a product called "All Clicks Feed"

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    26. sij

    Who would have thought such an scenario would be possible, eh? "Chinese hackers have used a zero-day in the Trend Micro OfficeScan antivirus during their attacks on Mitsubishi Electric"

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet

    Notorious downloader Trojan sLoad's version 2.0, Starslord, has new functionality that can track the stage of infection + an anti-analysis trap that can identify and profile analyst machines. Learn how these new powerful features can pose even higher risk:

    Poništi
  20. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    24. sij

    You heard it here first, we're sharing an outline of some the exploitation and infection strategies used in Microsoft Rich Text format files and examine key takeaways that can help automate the analysis of RTF exploits.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·