Rezultati pretraživanja
  1. prije 3 sata

    Great example of high quality providers leading the way on market structure mechanics and insight discovery

  2. See how can protect against threats such as the Spoofing Vulnerability in our new Management blog:

  3. It's now February, has your org installed all January 2020 Patch Tuesday patches to mitigate the Spoofing Vulnerability yet? If not, see how 2020 solutions can help:

  4. 31. sij

    : (CVE-2020-0601) Read 's latest blog for info on a recent vulnerability dubbed or that affects Windows 10, Windows 2016, and the 2019 version of crypt32.dll that implements Windows' :

  5. 31. sij
  6. 29. sij

    2020 is uniquely positioned to help you mitigate critical vulnerabilities like the Spoofing Vulnerability. Get more info in our new Management blog:

  7. 29. sij

    En 2020 - Primera reunión hablamos de , les comparto los slides presentados en la sesión via

  8. 24. sij

    See brilliant blogpost on having patched a vulnerability in their own Windows that allows an attacker to use a spoofed signing certificate to sign their very own malicious executables and run them on your system!

  9. 17. sij

    A lot has been written about CVE-2020-0601 and POCs, the question that you should be asking is does your security solution protect your business? We do, regardless of your Windows version.

  10. 16. sij

    I wrote a diary containing research I've done regarding -2020-0601 vulnerability. also put up a test web page at And we managed to circumvent Chrome too (Google fixed that today, patch!). Read at

  11. 16. sij

    In light of Windows vulnerability, see how you can use Salt to quickly discover vulnerable assets, and patch them in minutes:

  12. 16. sij

    Are you vulnerable to "" (CVE-2020-0601) or not? use to test. . Please let us know if you are running into problems.

  13. 15. sij

    Nice idea by If you want to do the same thing in PowerShell, here's a short script that will generate the event in Windows Event Log, Application - great for blue teams to test detection:

  14. 15. sij
  15. 15. sij

    Need to brief your boss about the Microsoft CryptoAPI flaw? We got some PPTs for you to use: .dll -2020-0601

  16. 15. sij

    A serious has been found in 10 and Server 2016. Make sure your security patches are up-to-date.

  17. 14. sij

    If you are running Windows 10, UPDATE NOW. (Report here via : ) Severe Windows spoofing vulnerability (CVE-2020-0601) discovered by the .

  18. WARNING: Install Latest Windows 10 Updates Immediately! Microsoft today released patches for a severe Windows spoofing vulnerability (CVE-2020-0601) that was discovered by the National Security Agency (NSA). Read more:

    Prikaži ovu nit
  19. 14. sij

    my quick take on CVE-2020-0601 ( flaw): Yes, it will affect endpoint protection. But below it in the list is something that looks BlueKeep'ish that I think people should fix quickly too (CVE-2020-0609/0610).

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.