Sachit Malik

@isachitmalik

InfoSec (); Previously: Mathematics and Computing () | InfoSec • Piano • Poetry • Dance

Pittsburgh, PA
Vrijeme pridruživanja: kolovoz 2019.

Tweetovi

Blokirali ste korisnika/cu @isachitmalik

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @isachitmalik

  1. 3. velj

    I don't usually post such stuff, but this needs to be out there. "A conversation any real abuse victim will recognize all too well"

    Poništi
  2. 30. sij

    Will not be surprised if it was admin:admin.

    Poništi
  3. proslijedio/la je Tweet

    Uptane, a software created by Justin Cappos, our professor, is helping to the OTA software updates for vehicles manufactured by one of the three major U.S. automakers. Learn more:

    Poništi
  4. 9. pro 2019.

    By far the best introduction to scaling that I have come across! Builds up from Scratch! A gem.

    Poništi
  5. 6. pro 2019.
    Tweet je nedostupan.
    Poništi
  6. proslijedio/la je Tweet
    Poništi
  7. 5. pro 2019.
    Poništi
  8. proslijedio/la je Tweet
    28. stu 2019.

    Blue Team: Carefully setup defenses Red Team:

    Poništi
  9. proslijedio/la je Tweet
    24. stu 2019.

    Attacker delivering an encapsulated payload...

    Poništi
  10. proslijedio/la je Tweet

    Windows isn't a favorite feature, but details a bug submitted by Eduardo Braun Prado that shows how you can use it to escalate from guest to SYSTEM (includes video)

    Poništi
  11. proslijedio/la je Tweet

    Security researchers have found close to a dozen vulnerabilities in 5G, which they claim can be used to track people's real-time location, spoof emergency alerts or silently disconnect a 5G-connected phone from the network altogether

    Poništi
  12. 9. stu 2019.
    Poništi
  13. 7. stu 2019.
    Poništi
  14. proslijedio/la je Tweet
    7. stu 2019.

    Twitter employees allegedly spied for Saudi Arabia. Are your DMs private? From a random attacker, probably. From a determined nation state? Absolutely not. These cases are particularly challenging due to lack of audit logs. Great write-up by

    Poništi
  15. proslijedio/la je Tweet

    We have been working with peers at , , and the broader IETF to improve the security and performance of TLS with remote keys (like we do with Keyless SSL and Geo Key Manager). The result is Delegated Credentials and it's available for use!

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    4. stu 2019.

    During bug hunting on Antivirus products, I found another vulnerability which is DLL Hijacking that leads to Elevation of Privilege on Windows Service Host. Reported to MSRC and they decided not to fix it. A quick write-up:

    Poništi
  17. proslijedio/la je Tweet
    6. stu 2019.
    Poništi
  18. proslijedio/la je Tweet
    3. lis 2019.

    Hack for Hire: Investigating the emerging black market of retail email account services

    Poništi
  19. 25. lis 2019.

    chaining until the last one destroys it all. :D

    Poništi
  20. proslijedio/la je Tweet
    24. lis 2019.

    Heart attack patients treated at hospitals that have suffered data beaches and ransomware had higher mortality rates. Confidentiality and integrity are important, but in patient care, availability rules. Security controls are literally killing people.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·