Mitja Kolsek

@mkolsek

CEO of ACROS Security; Co-founder of 0patch ()

Vrijeme pridruživanja: siječanj 2012.

Tweetovi

Blokirali ste korisnika/cu @mkolsek

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @mkolsek

  1. Prikvačeni tweet
    15. velj 2019.

    I'm entirely biased here, but one thing I love about is that you get security bugs fixed without ANY unwanted "enhancements" such as user interface changes, new features you don't need and hidden behavioral changes that break your processes in most inexplicable ways.

    Poništi
  2. proslijedio/la je Tweet

    Nice write up of Genesis Market, a site selling data taken from a quarter of a million endpoint PCs - including harvested cookies so you can bypass MFA.

    Prikaži ovu nit
    Poništi
  3. prije 2 sata

    Lost your phone and now can't login to MFA-protected web apps anymore? If you're lucky, these guys have pwned your computer and you can buy your own cookies from them to access your MFA-protected web apps.

    Poništi
  4. proslijedio/la je Tweet
    prije 13 sati

    Using Windows Server 2008 without support? Here are the ways I've found to protect yourself: Options for the Windows Server 2008 End of Life Blues

    Poništi
  5. proslijedio/la je Tweet
    prije 21 sat

    Paging 24 million instances of now-unsupported Windows Server 2008! 0patch will have security micropatches to keep you patched for three more years, along with Windows 7. Contact sales@0patch.com for details on enterprise deployment and central management.

    Poništi
  6. proslijedio/la je Tweet
    3. velj
    Poništi
  7. proslijedio/la je Tweet
    30. sij

    Disabling the loading of unsigned drivers may be the most jarring "only ever stops the good guys" security measure.

    Poništi
  8. proslijedio/la je Tweet
    31. sij

    Three suspects arrested in Bank of Valletta cyber-heist - In Feb 2019, hackers used malware to steal €13m from Malta's biggest banks - €950k was sent to the 3 suspects - They used the funds to buy Rolex watches, along with a Jaguar and an Audi A5

    Poništi
  9. 1. velj

    These are not real hackers. Real hackers would not have bought Rolexes and Jaguars but all IDA Pro licenses.

    Poništi
  10. proslijedio/la je Tweet
    31. sij

    How will our users running Windows 7 and Windows Server 2008 R2 learn about the status of our monthly security micropatches?

    Poništi
  11. 31. sij

    Ever wondered why in epidemiology the name of the first infected patient is "patient zero"? Their apps are written in C++.

    Poništi
  12. proslijedio/la je Tweet
    31. sij

    If you are concerned about Windows "Apple Mobile Device Service" security bug (), keep in mind that the in place upgrade from iTunes will not solve the issue!

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    31. sij

    A researcher has discovered more than 60 vulnerabilities across 20 video surveillance and access control systems, including critical flaws that can be exploited remotely to take complete control of a device.

    Poništi
  14. proslijedio/la je Tweet

    We’re excited to announce the Xbox Bounty Program, which awards up to $20,000 for vulnerabilities in the Xbox network space. Find out more information:

    Poništi
  15. proslijedio/la je Tweet
    30. sij

    Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!

    Poništi
  16. proslijedio/la je Tweet
    30. sij

    Upon popular demand, we have just ported our "CVE-2020-0674 workaround" micropatch to both 32-bit and 64-bit: Windows 10 v1903 Windows 10 v1909 Both are included in 0patch FREE

    Prikaži ovu nit
    Poništi
  17. 30. sij

    Hey twitter, anyone have any idea who to contact about randomly rejecting our email sent to their users (e.g., account activation, payment confirmation), and occasionally even blocking users' connections to our server on AWS? This is ridiculous. /cc

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    30. sij

    CVE-2020-0674: Internet Explorer Remote Code Execution Vulnerability Exploited in the Wild Zero-day remote code execution vulnerability Triggers 0. JScript 1. used in 2. ... Proof of Concept Demo Video

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  19. proslijedio/la je Tweet
    29. sij
    Poništi
  20. 30. sij

    Malicious RTF files exploiting Equation Editor vulnerabilities are being detected across the globe. Everyone: 0patch FREE includes free micropatches for all known Equation Editor vulnerabilities and will block these attacks. Did I mention it was FREE? Use it.

    Poništi
  21. proslijedio/la je Tweet
    29. sij

    Project: Windows 7/Server 2008/R2 Life Extension & 0patch one month trial

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·