Tweetovi

Blokirali ste korisnika/cu @ch3tanK

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ch3tanK

  1. prije 12 sati

    31-days-of-API-Security-Tips/README.md at master · smodnix/31-days-of-API-Security-Tips · GitHub by

    Poništi
  2. proslijedio/la je Tweet
    4. velj
    Poništi
  3. 30. sij
    Poništi
  4. proslijedio/la je Tweet

    Joint press conference by Indonesian National Police & on Operation Night Fury led by INTERPOL’s Desk, sharing the successful arrest of 3 suspects involved in JS-sniffer campaign compromising e-commerce websites to steal credit card or online payment information

    Poništi
  5. proslijedio/la je Tweet
    25. sij

    If anyone is interested by an example of the Windows Next Generation Cryptography API (bcrypt.lib) - especially after CVE-2020-0601 - I wrote a simple C++ program that encrypt and decrypt a string. Link:

    Poništi
  6. proslijedio/la je Tweet

    Because I prefer C, little POC to create your own EC alternative keys > With a lots of keys included in the release.

    Poništi
  7. 17. sij

    404 Exploit Not Found: Vigilante Deploying Mitigation for Citrix NetScaler Vulnerability While Maintaining Backdoor | FireEye Inc

    Poništi
  8. proslijedio/la je Tweet

    That epic Microsoft moment❤️ Recently worked on and ECC, so yes, 10 and 2016/2019 only. Previous versions like Windows 7 did not support personnal EC curves (only few NIST standard ones)

    Prikaži ovu nit
    Poništi
  9. 16. sij

    courtesy to good work by

    Prikaži ovu nit
    Poništi
  10. 16. sij

    CVE-2020-0601 - PoC for code signing PE files using a Certificate Authority using ECC

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    14. sij

    No fancy EDR required to capture CVE-2020-0601 attempts (after patching). Just ensure you're forwarding Application log events. Currently, CVE-2020-0601 is the only Microsoft code (AFAIK) that calls the CveEventWrite API so event noise is not a concern.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    13. sij
    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    Poništi
  14. 13. sij

    Microsoft spots malicious npm package stealing data from UNIX systems | ZDNet

    Poništi
  15. proslijedio/la je Tweet
    12. sij
    Poništi
  16. proslijedio/la je Tweet
    12. sij
    Poništi
  17. 12. sij

    New Iranian data wiper malware hits Bapco, Bahrain's national oil company | ZDNet

    Poništi
  18. proslijedio/la je Tweet
    11. sij

    We have just released a new tool for exploiting CVE-2019-19781. Our goal was to keep private as long as possible to have a longer window to fix. Other researchers have published the exploit code in the wild already. Cats out of the bag.

    Poništi
  19. proslijedio/la je Tweet
    11. sij

    Proof-of-concept code published for Citrix bug as attacks intensify * Not one, but two PoCs have been published for CVE-2019-19781 (also known as Shitrix now) * PoC 1: * PoC 2:

    Poništi
  20. proslijedio/la je Tweet
    10. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·