Rezultati pretraživanja
  1. 22. lip 2015.
  2. 28. ruj 2018.

    Our final presentation of the event is on threat hunting techniques. A strong technical end to this

  3. 18. lip 2019.
  4. 16. ruj 2019.

    Good morning and a special welcome to our newly appointed Steering Committee. New chair: Silvio Oertli from and members Rosella , Andre from KPN-CERT and Rogerio from .

  5. 13. velj 2014.

    Passive DNS - Common Output Format published joint work between and presented at

  6. 28. ruj 2018.

    And we are done. Thanks to our hosts, speakers and attendees st 55. We look forward to welcoming you to Tallinn in January with our friends - annonucements coming soon!

  7. 27. sij 2015.

    I like the Mantis project you presented at / today:

  8. great présentation Thanks for all

  9. 30. sij

    Thank you, for a great conference! Intense brain-picking and in-depth conversations about post-hoc log investigation and proactive threat hunting with the CSIRT-crowd. We like this!

  10. 30. sij

    Interesting... it was mentioned by at two days ago and now here at : RPKI ()

  11. 30. sij

    Another scrapping tool presented by : "Pastelizer" (). It looks to be a decent competitor of !

  12. 30. sij

    Everything is said in one slide!

  13. 30. sij

    Interesting fact... Legit websites might redirect users to malicious sites just because developers or content writers made typos...

  14. 30. sij

    "Switch on your personal firewall" - Manage your online presence, devices, ...

  15. 30. sij

    Impressive numbers reported by ⁦⁩!

  16. 29. sij

    are with us all the way from Brazil and are on a journey to become accredited with . They are focused on growing the number of teams in Brazil and are active users. Thanks for traveling to be with us.

  17. 29. sij

    CERT RS is attending for the first time and would like to introduce themselves. They are focusing on a new law for information security and a National Cybersecurity strategy.

  18. 29. sij

    Lightning talk time at . First speaker that didn’t need a toilet break and is in the room is from who would like you all to use their IPv6 training materials.

  19. 29. sij

    Forensic tools expect proper data in a proper way. So, modifying a USB stick... # hexedit /dev/sdb And change some bytes... What could go wrong? To create a loop of extended partitions and break those tools! Nice demo by Michael Hamm from

  20. 29. sij

    Need to think about technology & policy together. If not, get surprises like WHOIS/GDPR or IRProcess/DNSoverHTTPS

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.