Johannes Ullrich

@johullrich

SANS Internet Storm Center (), SANS Fellow, Dean of Research SANS Technology Inst. , IPv6, Web App Security

Jacksonville, FL, USA
Vrijeme pridruživanja: prosinac 2008.

Tweetovi

Blokirali ste korisnika/cu @johullrich

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @johullrich

  1. 4. velj

    Things people say at the "You wanted the app to be secure. So why are you now complaining about 32 character random passwords? They are good for a full hour before you need to change them."

    Poništi
  2. proslijedio/la je Tweet

    ⚠️Nerd Joke Alert ⚠️ So a TCP packet goes into a bar dressed as a UDP packet... what does he say to the bartender? "QUIC get me a beer!" cc/ 😝

    Poništi
  3. proslijedio/la je Tweet
    3. velj

    This Valentine's Day is spreading the love by releasing the 's Command Line Poster. The EZ tools provide scriptable, scalable, & repeatable results with astonishing speed and accuracy. This poster will show you how to use them. Get yours Feb 14th

    Poništi
  4. proslijedio/la je Tweet
    3. velj

    Calling all veterans! Trust me, if an old tread head can do it, so can you.

    Tweet je nedostupan.
    Poništi
  5. proslijedio/la je Tweet
    31. sij

    Excited to teach Purple Team Tactics at in 3 weeks!! in DC w/ my favorite LoLBINs @ Night session ❤️ just added for Wed 19 FEB.

    Prikaži ovu nit
    Poništi
  6. 30. sij

    Does have a policy against profiteering from emergencies? I see lots of facemasks and similar items at horrendous markups (and wouldn't be surprised if some of them are fake products)

    Poništi
  7. proslijedio/la je Tweet
    28. sij

    During investigations, use always a trusted server because just querying an IP might disclose your investigation to the attacker... Some whois server can also deliver malicious payloads via free-text fields...

    Poništi
  8. 27. sij

    finishing up a major update to our Defending Web Application class. Couple months of work redoing many exercises and always great support from fixing up all the little annoying issues that creep in. A huge effort to keep classes high quality and up to date.

    Poništi
  9. proslijedio/la je Tweet
    25. sij

    Congratulations to the 60 students who began the Accelerated Cybersecurity Training Program today! This exciting initiative will help close the talent gap in Canada and is proud to partner with the Catalyst and its sponsors!

    Poništi
  10. 25. sij

    Happy Lunar New Year! This is a difficult new year for Asia, in particular, China. I hope people still find some time to celebrate with family.

    Poništi
  11. 24. sij

    Anybody here interested in joining me in San Francisco in March to learn how to defend Web Applications?

    Poništi
  12. proslijedio/la je Tweet
    23. sij

    Today, we released permanent fixes to address the vulnerability for Citrix Application Delivery Controller () and versions 12.1 and 13.0. These fixes are available to download now.

    Poništi
  13. 24. sij

    Looks like is starting to run low on surgical face masks and prices are spiking. At this point, the is not as much of a threat as possible panic. Got your BCP sorted out?

    Poništi
  14. 21. sij

    Top 10 commands attackers ran today on exposed ssh/telnet servers. Good reminder to lock up your authorized_keys files and watch them carefully.

    Poništi
  15. proslijedio/la je Tweet
    21. sij

    DeepBlueCLI: Powershell Threat Hunting

    Poništi
  16. proslijedio/la je Tweet
    20. sij

    Congratulations to for hosting the oldest active Emotet site, serving malware for more than 1 1/2 years! /cc

    Poništi
  17. proslijedio/la je Tweet
    19. sij

    Important updates on the , Citrix Gateway vulnerability: (1) Permanent fixes for ADC v11.1 & 12. (2) We have moved forward the availability of permanent fixes for other ADC versions & SD-WAN WANOP from previous target dates.

    Poništi
  18. 20. sij

    Nice Monday morning. All Citrix ADCs have been patched by hackers, curveball is mitigated by endpoint protection and nobody worries about their RD Gateways or the unpatched MSIE 0-day in the wild. Only problem today: Its cold outside! in Florida!!!!

    Poništi
  19. 17. sij

    Summary/Translation of the latest Citrix blog about the ADC vulnerability: We don't really test stuff. And we don't have a security team (yet), so please keep telling us what you find out because we got no clue

    Poništi
  20. 17. sij

    Why are companies hiring security people AFTER the fact? RT : Impact..!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·