gh0std4ncer

@gh0std4ncer

I came,I saw, I stuck around

Vrijeme pridruživanja: srpanj 2014.

Tweetovi

Blokirali ste korisnika/cu @gh0std4ncer

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @gh0std4ncer

  1. proslijedio/la je Tweet

    Turn (unpadded) RSA into a Caesar Cipher using this one weird trick:

    Poništi
  2. proslijedio/la je Tweet
    4. velj

    GrapheneOS 2020.02.04.01 release: .

    Poništi
  3. proslijedio/la je Tweet
    prije 12 sati

    Daily Summary Post for 2020/02/04: E3 doc links hosting E1 docs? New loader on all 3 botnet distro 20:40-22:00UTC? Possible 🔥E4 emerging? We are still attempting to confirm, more details soon! E1 ~124, E2 ~ 121, E3 ~ 71. TT

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    prije 8 sati

    2020-02-05: [Breaking]🔥🆕 "🇷🇺Pro-Russian CyberSpy Intensifies Ukrainian 🇺🇦 Security Targeting" 🔦The 'Fifth Domain': Gamaredon Wages Silent War with Ukranian Military & Law Enforcement ➡️5k Victim Scope in Ukraine Along 'Separation Line'

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet

    Interestingly, AV did alert some infections which led to the clean-up of those machines, but not of the network as a whole. (This is why tools that detect malware on a single machine have fairly limited scope.) Proofpoint post on SDBBot around that time:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    prije 51 minutu

    CVE-2020-3123 A vulnerability in the Data-Loss-Prevention (DLP) module in Clam AntiVirus (ClamAV) Software versions 0.102.1 and 0.102.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vul...

    Poništi
  7. proslijedio/la je Tweet
    prije 3 sata

    Here's what vulnerable [see image below]. Quite a lot. Also, the CERT/CC advisory is out: Along with the actual CDPwn technical report:

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    3. velj

    If you're new to InfoSec & interested in defense or offense, I think you'll do yourself a favor by studying passive recon. Defense: It can help isolate data leakage Offense: As defensive solutions improve (think AI/ML), the less you need to directly touch the target, the better

    Poništi
  9. proslijedio/la je Tweet
    prije 3 sata

    Researchers at firm have created a list of the top ten most commonly exploited software vulnerabilities of 2019.

    Poništi
  10. proslijedio/la je Tweet

    "The rapid acceleration of cases is of concern."

    Poništi
  11. proslijedio/la je Tweet
    prije 3 sata

    Sometimes makes mistakes... Here's their filename generation regex...

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    prije 17 sati

    If you wondered why AV has false positives, take a look at this excel file: 1. Runs code automatically on opening 2. Uses native APIs that manipulate memory 3. Instantiates a COM object defined in a text string in a macro Benign.

    Poništi
  13. proslijedio/la je Tweet
    prije 4 sata

    DOCX files launch powershell.exe with BASE64 parameter, which is merged from (amongst other) document's variables, that are not part of the VBA itself. How to dump these variables? Cc Sample: 9CC6AE3B001A67E54C8DD44B998B2ADD0F7E0D3DA5DEA3EBDCDA12F4DCCD5136

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    prije 8 sati

    Just published a blog post recapping ENISA CTI-EU 2020 conference. Thanks again to the organizers for hosting such a great event for the European CTI community. See you next year!

    Poništi
  15. proslijedio/la je Tweet

    The hackers effectively created a phantom newsroom staffed with digital doppelgängers of (mostly female) reporters and commentators, including NYT's Farnaz Fassihi, CNN's Samantha Vinograd, and Iran International's Azadeh Sharfiee.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    prije 3 sata

    My first-ever blog is live! I hope this helps people discuss attribution in a more productive way.

    Poništi
  17. proslijedio/la je Tweet

    WinPwnage. Elevate, UAC bypass, persistence, privilege escalation, dll hijack techniques

    Poništi
  18. proslijedio/la je Tweet
    prije 4 sata

    Charming Kitten is a group that we follow for the last 5 years. Today, () made a great report based on our on going researches. Thank you Raphael for your great article.

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    prije 2 sata

    PolyShell: a Bash/Batch/PowerShell polyglot template for input injection

    Poništi
  20. proslijedio/la je Tweet
    prije 2 sata

    Exfiltrating Data from Air-Gapped Computers Using Screen Brightness

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·