Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @dnpushme
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @dnpushme
-
b0ring proslijedio/la je Tweet
#ESETresearch uncovered a new campaign of the#Winnti Group targeting#HongKong universities with ShadowPad and Winnti.@mathieutartare https://www.welivesecurity.com/2020/01/31/winnti-group-targeting-universities-hong-kong/ … 1/3pic.twitter.com/d57V1rhBR1
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
b0ring proslijedio/la je Tweet
The 360 Alpha team helped Apple to fix 0-click RCE & memory leak bugs in CoreBluetooth, which could allow attackers near by to remote control any Mac systems with zero interaction.https://support.apple.com/en-us/HT210919
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b0ring proslijedio/la je Tweet
Who would have thought such an scenario would be possible, eh? "Chinese hackers have used a zero-day in the Trend Micro OfficeScan antivirus during their attacks on Mitsubishi Electric"https://www.zdnet.com/article/trend-micro-antivirus-zero-day-used-in-mitsubishi-electric-hack/ …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b0ring proslijedio/la je Tweet
Zero-day is CVE-2019-18187. When Trend Micro patched the bug last year, the company warned that it was being abused in the wild. https://success.trendmicro.com/solution/000151730 …pic.twitter.com/BWhwO3SoUv
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b0ring proslijedio/la je Tweet
No fix yet, but
#Microsoft released an advisory for active attacks in#IE. Restrict access to JScript.dll as a workaround. Hurray for Friday afternoon releases. https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200001 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Mozilla patches Firefox zero-day reported by Qihoo 360 that's actively exploited in the wild. https://zd.net/2T0GHKa via
@ZDNet &@campuscodiHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tweet je nedostupan.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
b0ring proslijedio/la je Tweet
A few days ago our technologies caught a new Chrome 0day exploit used in the wild and we reported it to Google. Just released-Chrome 78 patches it, credits to my colleagues
@antonivanovm and Alexey Kulaev for finding the bug.https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_31.html …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b0ring proslijedio/la je Tweet
Back in 2016, Gdata published about a mysterious APT and their malware named COMPfun. For years, we couldn’t find anything connected. Using code similarity, we discovered a new, related implant that patches RNG libraries to subvert SSL crypto https://securelist.com/compfun-successor-reductor/93633/ …pic.twitter.com/XUufAdJXCq
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b0ring proslijedio/la je Tweet
What will happen if you can trigger arbitrary callback during a JavaScript garbage collection? Story about how I abuse a VBScript feature to trigger such callback in JavaScript engine, mass up the JS world and pop calculator: http://blogs.360.cn/post/When%20GC%20Triggers%20Callback.html …pic.twitter.com/sov3HtRFHu
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b0ring proslijedio/la je Tweet
In mid-June, a sophisticated attack leveraging two Firefox 0-day vulnerabilities, spear phishing, and social engineering targeted our employees. Coinbase Security detected and blocked the attack. We talk about how it unfolded for the first time: https://blog.coinbase.com/responding-to-firefox-0-days-in-the-wild-d9c85a57f15b …pic.twitter.com/e03rU2lyX8
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b0ring proslijedio/la je Tweet
Congrats to Yuki
@guhe120 of 360Vulcan, the No.1 on 2019 MSRC Most Valuable Security Researchers list. Qixun Zhao@S0rryMybad ranks No.2, he also won the Pwnie for Best Privilege Escalation Bug. Another 8 researchers on the list are also from 360 security teams. Congrats!pic.twitter.com/DHdX2e8JuW
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
b0ring proslijedio/la je Tweet
New blogpost by
@0vercl0k "A journey into IonMonkey: root-causing CVE-2019-9810" https://doar-e.github.io/blog/2019/06/17/a-journey-into-ionmonkey-root-causing-cve-2019-9810/ …pic.twitter.com/8DOlaICGrh
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.



