/r/blueteamsec

@blueteamsec1

Twitter bot for the Blue Teamers - semi automated. Main .

Vrijeme pridruživanja: ožujak 2019.

Tweetovi

Blokirali ste korisnika/cu @blueteamsec1

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @blueteamsec1

  1. prije 2 sata

    TeamViewer stored user passwords encrypted with AES-128-CBC

    Poništi
  2. prije 5 sati

    Explorer Notebook Series: The Linux Host Explorer (on Azure Sentinel) - Microsoft Tech Community

    Poništi
  3. prije 8 sati

    Getting DNS Client Cached Entries with CIM/WMI

    Poništi
  4. prije 11 sati

    Slides/materials from the Japan Security Analyst Conference 2020

    Poništi
  5. prije 14 sati

    Looking back on the incidents in 2019 from JPCert

    Poništi
  6. 2. velj
    Poništi
  7. 2. velj

    DKOM – Now with Symbolic Links! – Winsider Seminars & Solutions Inc.

    Poništi
  8. proslijedio/la je Tweet
    26. sij

    From Hyper-V Admin to SYSTEM

    Poništi
  9. 2. velj

    Online translator for SIEM saved searches, filters, queries and Sigma rules

    Poništi
  10. proslijedio/la je Tweet
    26. sij

    TransparentTribe Maldoc used against Indian forces by Pakistan analysis

    Poništi
  11. proslijedio/la je Tweet
    25. sij

    Reduce attack surfaces with attack surface reduction rules for Windows Defender ATP

    Poništi
  12. proslijedio/la je Tweet
    25. sij

    Extracting Config and payloads from the Hak5 Cable

    Poništi
  13. 1. velj
    Poništi
  14. proslijedio/la je Tweet
    25. sij

    Project TajMahal IOCs and Registry Data Decrypter

    Poništi
  15. 1. velj
    Poništi
  16. proslijedio/la je Tweet
    25. sij

    NetWire RAT Delivered via IMG Attachment - IBM X-Force Collection

    Poništi
  17. 1. velj

    AMSI (Antimalware Scripting Interface) bypass by patching memory seen in the wild

    Poništi
  18. 1. velj

    Abusing DLL Misconfigurations — Using Threat Intelligence to Weaponize R&D

    Poništi
  19. 1. velj
    Poništi
  20. 1. velj

    The Chicken keeps laying new eggs: uncovering new GC MaaS tools used by top-tier threat actors

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·