Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @ling_sec
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ling_sec
-
Ling proslijedio/la je Tweet
1/ Practically every startup ends up writing code, even if technology wouldn't be the main focus of the company. Here’s a checklist I made to help you and your hot new startup avoid the most common infosec pitfalls. [thread]
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ling proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Ling proslijedio/la je Tweet
I really liked this walk-through of writing code based signatures with YARAhttps://blog.reversinglabs.com/blog/hunting-for-ransomware …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ling proslijedio/la je Tweet
Our research team just discovered a new campaign from
#APT34. Tools were modified, shows that the Iranian government-backed group is doing an effort to evade future detection. Well.. they should try harder. Good job@polarply@kajilot@ulexec https://intezer.com/blog-new-iranian-campaign-tailored-to-us-companies-uses-updated-toolset …pic.twitter.com/4vm1Q8mCFP
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ling proslijedio/la je Tweet
New: leaked documents, data, contracts show how hugely popular antivirus Avast now harvests internet browsing data and sells it for millions of dollars. Clients included Home Depot, Google, Microsoft. Documents show a product called "All Clicks Feed"https://www.vice.com/en_us/article/qjdkq7/avast-antivirus-sells-user-browsing-data-investigation …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ling proslijedio/la je Tweet
Twitter has a new security feature, if you tweet a password it put asterisks instead. Try it now ******
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ling proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Ling proslijedio/la je Tweet
Launch Day
It’s official this project that @seanmw and I have been a part of for 5 years is now available as a free public Beta! Automated malware unpacking! https://www.unpac.me/#malware#ReverseEngineering#automation#toolsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ling proslijedio/la je Tweet
#Tesla ”The length of data to copy is calculated by substracting 4 bytes (length of action header) from length of action frame. But if the action frame only contains a header and the length of the header is only 3 bytes, the length to copy becomes 0xffffffff”https://twitter.com/keen_lab/status/1212587186970738688 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ling proslijedio/la je Tweet
Also while I am on twitter :P https://github.com/Fire30/bad_hoist … PS4 Webkit exploit for 6.XX consoles. Gains addrof/fakeobj and arbitrary read and write primitives. Fixed in 7.00. Uses bug from: https://bugs.chromium.org/p/project-zero/issues/detail?id=1665 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ling proslijedio/la je Tweet
New digital skimmer/
#magecart technique: steganography A colleague found this a couple of days ago while searching through our SIEM. The skimmer group uploads or modifies an existing image and appends the JS code. 1/5Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ling proslijedio/la je Tweet
If you ever wondered why 60 cards is the upper limit for YuGiOh! decks it's because someone once entered a tournament with a 2222 card deck with the intent of wasting as much time as possible by shuffling it frequently. These are pictures of the deckbox and list.pic.twitter.com/rAD1VaXlOR
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ling proslijedio/la je Tweet
NEW REPORT:
#MyKings botnet spreads headaches, cryptominers, and#Forshare malware... This botnet is a relentlessly redundant attacker, targeting primarily Windows-based servers hosting any of a variety of services: MySQL, MS-SQL, Telnet, ssh, IPC, etc. https://news.sophos.com/en-us/2019/12/18/mykings-botnet-spreads-headaches-cryptominers-and-forshare-malware/?cmp=30728 …pic.twitter.com/xaadROtiGK
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ling proslijedio/la je Tweet
https://sandboxescaper.blogspot.com/2019/12/chasing-polar-bears-part-one.html … Here is part one. Pretty sure the attack surface described has many more bugs (not just the vmware tools installer.. I doubt this bug is exploitable in the first place, just wanted something to demo that is unpatched, easier for folks to learn!)
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ling proslijedio/la je Tweet
Hey, all! I just made this neat little python script. It takes an arbitrary piece of information about you and uses it to calculate which Pokemon you'd be! How fun! You should all try it out and see what Pokemon you are. It's fun!pic.twitter.com/iuu9q5H05H
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ling proslijedio/la je Tweet
We present
#plundervolt TL;DR First ever fault injection attack on Intel SGX enclaves. Abuses an undocumented software-based interface to undervolt the CPU. Extract full crypto keys and trigger memory safety violations in bug-free code. Read the paper at http://plundervolt.com pic.twitter.com/ozuCF4Vzhh
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ling proslijedio/la je Tweet
I decided to create a tutorial called "Reversing Windows Internals" and explain about Windows Internals. The first part describes about Handles, Callbacks and Hidden Callbacks and ObjectTypes in Windows Thanks to
@Dark_Puzzle for answering my questions.https://rayanfam.com/topics/reversing-windows-internals-part1/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ling proslijedio/la je Tweet
Avast, a cybersecurity company, sells its customers' browsing data https://www.forbes.com/sites/thomasbrewster/2019/12/09/are-you-one-of-avasts-400-million-users-this-is-why-it-collects-and-sells-your-web-habits/ …pic.twitter.com/wDlQjcVPkN
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ling proslijedio/la je Tweet
Deep dive analysis of Emotet - http://www.neil-fox.com Includes breakdown of how the malware generates its filename using the volume serial number of the infected machine and a list of of pre-configured strings.
#dfir#malware#x32dbgpic.twitter.com/gqS8Cqxj7n
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ling proslijedio/la je Tweet
(1/2) Here is my analysis of Tencent's Legu: https://blog.quarkslab.com/a-glimpse-into-tencents-legu-packer.html … Most of the analysis was done thanks to open source tools: - Frida (devkit) for hooking - QBDI (AArch64) for memory traces and instruction traces - Kaitai struct for reverse engineering the custom formatspic.twitter.com/dcWpjju4gl
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.