Costin RaiuOvjeren akaunt

@craiu

Romanian antihacker from another planet; chief paleontologist; director of Global Research and Analysis Team at . Tweets are my own. 1. e4

Bucharest
Vrijeme pridruživanja: listopad 2007.

Tweetovi

Blokirali ste korisnika/cu @craiu

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @craiu

  1. Prikvačeni tweet
    22. ožu 2019.

    When Lily from Human Resources develops BIOS code in her spare time.

    Poništi
  2. proslijedio/la je Tweet
    4. velj

    The agenda is live! This is an example of the quality (back-to-back-to-back) 🔥

    Poništi
  3. proslijedio/la je Tweet
    3. velj

    BREAKING: Twitter says a suspected state-sponsored actor used its API to match usernames to phone numbers - Attack took place on December 24, 2019 - Twitter said attack came from IPs in Iran, Israel, and Malaysia

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    3. velj

    Guide on upgrading your SSH keys to Ed25519

    Poništi
  5. proslijedio/la je Tweet
    3. velj

    Today we'll have the very last flow of acceptance/rejection mails. Folks, you made our job incredibly challenging! Anyways, we are grateful for all your submissions! agenda is almost there)

    Poništi
  6. proslijedio/la je Tweet
    24. sij
    Poništi
  7. proslijedio/la je Tweet
    23. sij

    The Bezos forensic report is not very good. The forensic analysis should be done by who at least have the relevant experience. The MP4 file should contain the exploit (if it is CVE-2019-11931). The exploit trigger should be visible with ffmpeg

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    15. sij

    Just published a blog explaining the root cause of the recent crypto vulnerability (CVE-2020-0601 / ?) using some "Load Bearing Analogies" to make it more accessible. CC:

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    14. sij

    “NSA discovered an error in the Microsoft code that verifies those signatures, potentially enabling a hacker to forge the signature and install spyware or ransomware on a computer.” Is this whole thing just a public relations move for NSA to earn points after EternalBlue debacle?

    Poništi
  10. proslijedio/la je Tweet
    14. sij

    The report makes a strong attribution claim (no estimative language, no analysis of competing hypotheses) solely based on TTPs, without access to any victim network (it appears, unless I'm missing something). That's problematic. This isn't wrong:

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    13. sij

    🔥 with !🔥 Only today and tomorrow we offer 40% off on selected training courses! ⚡️Remote Forensics ⚡️Body Language and Nonverbal Skills ⚡️IoT Vulnerability Research Book fast at

    Poništi
  12. proslijedio/la je Tweet
    11. sij

    I often hear: 'but, but attackers will use a modified version of my tool to evade the detection method that you've just published' Truth is, 98% of attackers use your tools exactly as you've dropped them.

    Poništi
  13. proslijedio/la je Tweet
    5. stu 2019.
    Poništi
  14. proslijedio/la je Tweet
    9. sij

    I'm so excited! I get the chance to return to ! I'll be presenting "A Walk on the Wild Side: An In-Depth Analysis of 0-days Used in the Wild". It was one of my favorite conferences last year and I'm honored to be going back!

    Poništi
  15. proslijedio/la je Tweet
    8. sij

    [Securelist] Operation AppleJeus Sequel: Lazarus continues to attack the cryptocurrency business with enhanced capabilities

    Poništi
  16. proslijedio/la je Tweet
    8. sij

    Watch out for these fake news outlets. They typically: - Don't link to any article/source - Don't have any website - Use embedded media w/o links - Use extensively hashtags to spread (such as ) - Use generic "news" stock images - Are authorless/anonymous

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    4. sij
    Poništi
  18. proslijedio/la je Tweet
    31. pro 2019.

    After almost ten years and more than 19,000 tweets I am handing over this account to the rest of the great VB team. Thank you all for following, all the best for 2020 and beyond and keep doing great things! ─

    Poništi
  19. proslijedio/la je Tweet
    30. pro 2019.

    Time to get back to work on our body language training for ! Converting non verbal foundations and recent research to social engineering is a blast! We have so much stuff for this training already!!

    Poništi
  20. proslijedio/la je Tweet

    Within a three month period, we detected three zero-days in the wild. Our security researcher shares the details of how vulnerabilities CVE-2018-8453, CVE-2018-8589 and CVE-2018-8611 were detected:

    Poništi
  21. proslijedio/la je Tweet
    10. pro 2019.

    Rounding out the program committee working on another kickass agenda: - Ivan Shadrin ()

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·