Rezultati pretraživanja
  1. 11. sij

    We have just released a new tool for exploiting CVE-2019-19781. Our goal was to keep private as long as possible to have a longer window to fix. Other researchers have published the exploit code in the wild already. Cats out of the bag.

  2. 11. sij

    We've just released a scanner that checks to see if a server is vulnerable for CVE-2019-19781. It does not actually exploit the target and is erfectly safe with no impact on the system.

    Prikaži ovu nit
  3. We will be publishing our legal documents for physical security tests for companies to use soon on GitHub. Hopefully helps out newer companies and ensure they are protected when doing engagements. Has max protections in place for employees and scope verification.

    Prikaži ovu nit
  4. 16. sij

    Exciting announcement from today! Find out what's coming next for 's bright ✨ and secure 🔒 future! From the Desk of the CEO: Securing the Future - Junior and Internship Programs | TrustedSec

  5. Yay!!! Our new and spiffy website is live! Our teams did an amazing job and lots of work went into this. Love the design. Thank you to the team over at for all their hard work.

  6. Osobe Vidi sve

  7. We will have a blog coming tonight from on forensics analysis and identifying if you've been hit with CVE-2019-19781. We've already done IOC analysis and how to best detect this in the wild.

  8. Really excited about this program. We now have a dedicated program for new folks coming into infosec to get amazing training and employment from .

    Prikaži ovu nit
  9. 19. stu 2019.

    We have open sourced our legal documentation used for physical penetration tests. The purpose is to help the community and organizations protect their employees when conducting testing. Includes three docs: MSA SOW Authorization Letter

    Prikaži ovu nit
  10. 1. pro 2018.

    My column today: Get a behind-the-scenes look at the Dark Web and a professional break-in artist from the good guys. Make sure to check out the video! @ohiodotcom

  11. 24. lis 2019.

    Did you catch 's new talk "Baselining Behavior Tradecraft through Simulations" at this morning? Find more at our booth too

  12. 27. lip 2019.

    "RT RT TrustedSec: Magic Unicorn 3.8.1 released. Adds new method for platform detection, obfuscation, and a fix for python2 raw_input when using AMSI bypass. "

  13. Magic Unicorn v3.6.7 released. Adds better handling and obfuscation on Win32Functions for evasion.

  14. Come see the team at Blackhat this year with an incredible course focusing on Purple Teaming ! I’ll be there with everyone and really a great way to learn offense and defense.

  15. 31. sij

    Training for 2020 is open for registration! has a 4-day course called "Attack and Defense - Hands-on Purple Team Simulations." Secure early pricing until May 22!

  16. Really a dream come true! Happy to announce our brand new location in Fairlawn Ohio and creating a state of the art cyber security headquarters. Will have an advanced training center available for the industry, community and customers. So proud of the team at

  17. The pogo stick arrived.. it’s actually a pretty good workout 😂

  18. 29. sij

    We think should keep his job at after seeing his skills at the this morning 🎮

  19. Prikaži ovu nit
  20. We’ve just released a blog from on IoCs, forensics, and how to identify if CVE-2019-19781 was exploited on your NetScalers/ADC.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.