John Leyden

@jleyden

IT security journalist, sports fan and travel enthusiast. Proud Mancunian. Tips? Signal: +34 602 42 53 20

Manchester, UK and Salamanca, Spain
Vrijeme pridruživanja: listopad 2008.

Tweetovi

Blokirali ste korisnika/cu @jleyden

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @jleyden

  1. proslijedio/la je Tweet

    Booter boss busted by bacon pizza buy gets probation Delivering FBI agents hot and fresh to your door!

    Poništi
  2. proslijedio/la je Tweet
    4. velj

    PerimeterX researcher has discovered a security vulnerability in WhatsApp that can be used to aid campaigns, spread and put millions of users at risk. Learn more in the new blog from CTO :

    Poništi
  3. proslijedio/la je Tweet
    prije 9 sati

    Hackers abuse BitBucket to infect 500K+ hosts with arsenal of malware: Threat actors are abusing the Bitbucket code hosting service to host seven types of malware that has already claimed more than 500,000 business computers. Cybereason researchers…

    Poništi
  4. proslijedio/la je Tweet
    4. velj
    Poništi
  5. proslijedio/la je Tweet
    4. velj

    2020-02-03: 📌🔥[Researcher Pin] 🐍/ Ransomware Analysis & ICS Targeting Perspective 🔦As the ransomware strain was first identified and discovered with myself & hunting for Golang ransomware. 💭Sober outlook & analysis from the intel perspective.

    Poništi
  6. proslijedio/la je Tweet
    3. velj

    ☠️ : is a banking Trojan that functions as a downloader or dropper of other banking Trojans. It continues to be among the most costly and destructive affecting state & local governments.

    Poništi
  7. proslijedio/la je Tweet
    4. velj

    Damn you Iowa. My election security class had a perfectly good syllabus and there you go ruining it.

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet

    Our researchers have scoured thousands of sources to bring you the top 10 being actively exploited by in 2019. Read the new report here:

    Poništi
  9. proslijedio/la je Tweet
    3. velj

    A quarter of Brits (26%) - and 41% Leave voters - say they're bothered when they hear those from a non-English speaking country talking to each other in their own language whilst in the UK

    Poništi
  10. proslijedio/la je Tweet
    1. velj

    99 smartphones are transported in a handcart to generate virtual traffic jam in Google Maps. Through this activity, it is possible to turn a green street red which has an impact in the physical world by navigating cars on another route!

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    4. velj
    Poništi
  12. proslijedio/la je Tweet

    To the person who figured out my honeypot is a honeypot could you please stop putting the picture of Pooh bear with a jar of honey on it? Its like this person's life mission, I've blocked him on: - Client - IPs (now on Tor ffs) - The image (he just edits 1 pixel every time...)

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    3. velj

    We've determined that an authentication certificate has expired causing, users to have issues using the service. We're developing a fix to apply a new certificate to the service which will remediate impact. Further updates can be found under TM202916 in the admin center.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    31. sij

    Vade Secure has detected a new extortion scam leveraging personal data from the Ashley Madison data breach of 2015. See the new threat and learn how hackers use leaked data to design personalized extortion scams.

    Poništi
  15. proslijedio/la je Tweet
    31. sij

    , , and I are starting a new security blog. In our first write-up, we will discuss the impact of "SameSite by default" and how it affects web app sec. Feel free to request future topics you would like us to cover.

    Poništi
  16. proslijedio/la je Tweet
    2. velj

    If you're a foreign intelligence entity, your targets getting ransomed in the middle of your operation is now definitely in your threat model. RYUK deployments against defense contractors. This is 2020. Scraping the bottom of intrusion operations objectives. Absolutely lit.

    Poništi
  17. proslijedio/la je Tweet
    31. sij

    We are not leaving the We are being forced out. Against our will. By a cabal of right wing ideologues, kleptocrats, swindlers, con artists, shills, fraudsters, criminals, liars, mobsters, and snake-oil salesmen. RT if you are with us.

    Poništi
  18. proslijedio/la je Tweet

    It's . While very little will change immediately, it's a once-in-a-generation event that will have far-reaching implications, so find out what it really means for you

    Poništi
  19. proslijedio/la je Tweet

    10M€ for a impacting Bouygues Construction. IT impact estimated to at least 1 month. Secure your IT! (excellent article)

    Poništi
  20. 31. sij

    Looking into this recently resolved MS Azure vuln. as a story for Monday am. Seems rare to get any such flaws in the cloud - any experts care to comment? (cc , )

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·