Rezultati pretraživanja
  1. You'd think people had learned from but here we are again! wrecking havock

  2. prije 7 sati

    , , … This decade has proven that among nations is constant, and some sophisticated tools developed in this war are used by criminals to extort, harass and ruin regular citizens, organizations and businesses

  3. prije 9 sati

    Let's dive into this beauty. Thanks for the tip - keep up the great work with your amazing podcast!

  4. 3. velj

    I got bored and patched the original petya skull back into the MBR. Inspired by

  5. 2. velj

    Remember , the largest, most widespread , and one of the most costly global disasters in history? When traced back to the small accounting firm in Ukraine where the worm was first planted, company officials said.. 1/4

    Prikaži ovu nit
  6. 2. velj

    En godt skrevet antologi over de mest berømte og berygtede destruktive cyberangreb siden og Estland 2007 over 2010 og Sony 2014 til Ukraine 2015 og og (Mærsk) 2017. |⁦

  7. 1. velj

    Someone just paid 0.02291 BTC ($214.81 USD) to a bitcoin wallet tied to / ransomware

  8. 1. velj

    Petya has a new tx (📈 input: 0.02291000 BTC / 214.92 USD) Final balance (2 addresses): 0.23861513 BTC / 2.24K USD 🦄👾😮

  9. 29. sij

    Most execs unprepared for and other extinction-level

  10. 29. sij

    Coordinated international for => no glob.ransomware attacks since and - interesting observation by Estonia’s Cyber Ambassador at . Having proper attribution framework in place a key, adds from

  11. 29. sij
    Odgovor korisnicima

    Für einen erfolgreichen Hackback muss man Sicherheitslücken kaufen und dann zurückkhalten. Was passiert wenn man das tut? Nun, z.B. , und . Kannst mir nicht erzählen, das wenn die NSA an Geheimhaltung scheitert, das die BPol das dann schafft.

  12. 28. sij
  13. 15. sij
  14. 14. sij

    La faille CVE-2020-0601 fait couler beaucoup d’encre, heureusement ce n’est pas demain matin. Mais il faut patcher vite! Une question m’interpelle, comment une faille comme ça n’apparaît que ds ? Comment et qd a-t-elle été introduite?

  15. 3. pro 2019.

    Good article on — Collateral damage & corporate insurance — — White House: “most destructive” cyberattack in history

  16. If insurers won’t pay up bc they readily rely on government attribution and argue that a ‚cyber-attack’ was an „act of war“, who is going to buy their cyber-insurance in the first place? This Merck-case, aftermath of , is stunning

  17. Russian group shows “we are all ” on the internet. The group has launched some of the most destructive in history -- and any country can be the next victim.

  18. Don't think is useful only to detect APTx. Since we've seen a ton of behaving more like , and is no different: runs arp, nslookup, dumps creds with & moves laterally using :

  19. 6. stu 2019.
    Prikaži ovu nit
  20. Want to know why weaponizing malware might not be a good idea? Well, have you ever heard of , , or ? If not, you got some Googling to do.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.