-
@Yousef_dly is the man in the video. Please feel free to say Hello.#BlackHat2019#CyberWarfare#MAGAROLLERCOASTER#MAGA2020https://twitter.com/mel_faith1/status/1175580247661731840 … -
Wie US-Militär und Unternehmen um Hacker buhlen https://www.heise.de/ct/artikel/Wie-US-Militaer-und-Unternehmen-um-Hacker-buhlen-4505800.html?wt_mc=rss.ho.beitrag.atom …
#BlackHat2019#DEFCON2019 -
OH FOR FUCK'S SAKE. Same measles exposure window applies to
#BlackHat2019#DEFCON27#BSidesLV attendies as well as#EVO2019 Fortunately i got my booster a few months ago but yeah.https://twitter.com/chibilola/status/1162149154191056897 …Prikaži ovu nit -
This year's favorite talk! Details on bug, exploit dev, mitigation bypass, discussion on dead ends, reliability estimates, accompanied by hardening measures and how Microsoft is working on eradicating such issues
#BlackHat2019 https://twitter.com/JosephBialek/status/1161669764940324871 … -
My
#BlackHat2019 slides on exploiting Hyper-V are now on the MSRC Github page: https://github.com/microsoft/MSRC-Security-Research/blob/master/presentations/2019_08_BlackHatUSA/BHUSA19_Exploiting_the_Hyper-V_IDE_Emulator_to_Escape_the_Virtual_Machine.pdf … -
Always great catching up with the brilliant
@Sidragon1! Enjoyed our panel video#webcast with@ITSPmagazine@BrightTALK led -@sean_martin@MarcoCiappelli amazing group@InfoSecRick@gebl@AttivoNetworks @CarbonBlack_Inc@Toyota#BlackHat2019#CyberSecurity#infosec#BlackHatUSApic.twitter.com/6ITf8jHpQf
-
Ataques SDR a Smart TV's: URL y channel injection. Una vez más me quito el sombrero ante ti
@PCabreraCamara :*#defcon2019#BlackHat2019#drones https://www.wired.com/story/smart-tv-drone-hack/ …pic.twitter.com/MmmY7NlzaK
-
Some highlights from
#Blackhat2019 including:@attcyber@ATTBusiness@InfoSecRick@CarbonBlack_Inc@Sidragon1@AttivoNetworks@sean_martin@MarcoCiappelli@BrightTALK@ITSPmagazine@RonGula@gebl@Toyota#CyberSecurity#infosec#DigitalTransformation#IoTSecurity#AI#BlackHatUSApic.twitter.com/i1Zkc1O5fs
-
In case you missed it –our Head of Security and MLS expert
@raphaelrobert led the conversation on shifting towards the new era of secure group messaging at Black Hat Official. Presentation now available here: https://i.blackhat.com/USA-19/Wednesday/us-19-Robert-Messaging-Layer-Security-Towards-A-New-Era-Of-Secure-Group-Messaging.pdf …#blackhat2019#industryexpert#MLS#newerapic.twitter.com/OosmDImrSP
-
FOR IMMEDIATE RELEASE - Threatbutt SWATCH TIME AI https://pastebin.com/mjtBcxbr
#Blackhat2019#BlackHatUSA#defcon2019#DEFCON27#FridayFeeling#toiletops#ai#moneygrab -
I haven’t done a
#FF in a long time, but here are the women whose work I was really impressed with this year at#Blackhat2019 and who I’d absolutely recommend following:@IanColdwater@natashenka@swagitda_@nicolefv@justinembone@bubblewire@maddiestone -
Tomorrow Land #2
@ITSPmagazine With@MarcoCiappelli@Sidragon1@gebl@InfoSecRick@sean_martin@Shirastweet#technology At#BlackHatUSA#Blackhat2019#Webcast and#Podcast coming soon...#cybersecurity#automation#DigitalTransformation#security#diversity#CEO#CIO#infosecpic.twitter.com/rt8IHfvNtY -
We’re all tired of sitting through presentations where technical bullshit and snake oil go unchallenged because “let’s hear them out”. I only wish Dan ended with “You’re in violation of being a jackass!” before getting thrown out
#Blackhat2019 https://twitter.com/veorq/status/1159575080109662208 …
0:26 -
OK, so we can all agree that the
#Blackhat2019 sponsored talk magic crypto thing was bad and they should feel bad - but is it acceptable or desirable to "shout down" a presentation as it is unfolding?Prikaži ovu nit -
For people who have been asking how this made it to
#Blackhat2019; it’s a sponsored talk. Those don’t go through the CFP review process. Frustratingly yours, Your friendly neighborhood Review Board member https://twitter.com/veorq/status/1159559785068429312 …
Prikaži ovu nit -
We're up at 5p today in Lagoon JKL! Here's everything you need to know about
#Windows10 MemCompression.#blackhat2019@BlackHatEvents
BLOG.P1: https://www.fireeye.com/blog/threat-research/2019/07/finding-evil-in-windows-ten-compressed-memory-part-one.html …
BLOG.P2: https://www.fireeye.com/blog/threat-research/2019/08/finding-evil-in-windows-ten-compressed-memory-part-two.html …
BLOG.P3: https://www.fireeye.com/blog/threat-research/2019/08/finding-evil-in-windows-ten-compressed-memory-part-three.html …
WHITEPAPER: https://www.fireeye.com/content/dam/fireeye-www/blog/pdfs/finding-evil-in-windows-10-compressed-memory-wp.pdf … -
Really fascinating security properties and amazing execution of them in Apple’s Find My, presented by
@radian at#Blackhat2019 pic.twitter.com/CcVeVLl7HZ
-
The real Aram’s.
@CISecurity not for profit cyber protection. The Good guy hackers. Great dudes.#Blackhat2019 pic.twitter.com/PLA5VoeqTa
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
is abusing the poor baby
And is that the mama on the couch sleeping?
