Koen Van Impe  

@cudeso

CSIRT work. Incident Response. security, ids, php, linux, openbsd, firewalls, honeypots, jazz, literature, modern art.

Europe / Belgium / Brugge
Vrijeme pridruživanja: siječanj 2008.

Tweetovi

Blokirali ste korisnika/cu @cudeso

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @cudeso

  1. proslijedio/la je Tweet
    4. velj

    We ( and from ) will be at the FIRST Cyber Threat Intelligence Symposium in Zurich (9-11 March) to talk about "Turning Data into Actionable Intelligence - Advanced Features in MISP Supporting Your Analysts and Tools"

    Poništi
  2. 4. velj

    Program for the CTI Symposium in Zürich is out

    Poništi
  3. 2. velj

    Excellent advice from concerning Citrix CVE-2019-19781

    Poništi
  4. 31. sij
    Poništi
  5. 27. sij
    Poništi
  6. proslijedio/la je Tweet
    25. sij

    Do you want to know how to use the platform? There is a -free- MISP Training for Analysts and Administrators on 18-Feb

    Poništi
  7. 24. sij

    Citrix CVE-2019-19781 vulnerability leading to ransomware. This is getting better by the day ...

    Poništi
  8. proslijedio/la je Tweet
    21. sij

    This is a foundational presentation everyone should watch from . Check out his slides here: - video will be posted in the next few months!

    Poništi
  9. proslijedio/la je Tweet
    22. sij

    FireEye and Citrix tool scans for indicators of compromise related to CVE-2019-19781. We urge you to run the tool if you have not implemented the workaround before 2020-01-10.

    Poništi
  10. 22. sij
    Poništi
  11. 19. sij

    Working on a integration but the master doesn't seem to care ...

    Poništi
  12. 17. sij

    Love the advice from : shut down those Citrix devices (dutch) ; if you can Will then re-imburse licences for flawed products?

    Poništi
  13. proslijedio/la je Tweet
    17. sij

    A few of our colleagues have teamed up with other security enthusiasts to organize the first edition of Bsides Brussels! We 💚 this initiative & are proud to sponsor! Their CFP just opened, so check it out and submit your (lightning) talks & workshops! 🎉

    Poništi
  14. 14. sij

    It doesn't take long to catch those CVE-2019-19781 Citrix exploit attempts.

    Poništi
  15. proslijedio/la je Tweet
    13. sij

    New blog post! | Creating Responders in The Hive, with lots of practical tips to avoid some of the most common pitfalls!

    Poništi
  16. proslijedio/la je Tweet
    13. sij

    We just released a new version of MONARC with some important fixes as described in our changelog:

    Poništi
  17. 12. sij

    Snort rule and detection advice for exploits Citrix cve-2019-19781

    Poništi
  18. proslijedio/la je Tweet
    11. sij

    A public exploit for cve-2019-19781 is out, and exploit attempts are streaming in quickly. If you didn't patch before leaving work today: Monday will be incident response day!

    Poništi
  19. 8. sij

    SNAKE ransomware, written in Golang; kills processes related to SCADA, ICS, virtualization and then starts encrypting.

    Poništi
  20. proslijedio/la je Tweet
    6. sij

    I just did a very simple API to query the threat actors from the galaxy. There is a public API and the server is also open source. You can find threat actors name, synonyms and all meta-data with a simple curl query.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·