Kok Koon

@nkokkoon

Log Analysis, Threat Intelligence and Incident Response

Singapore
Vrijeme pridruživanja: travanj 2009.

Tweetovi

Blokirali ste korisnika/cu @nkokkoon

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @nkokkoon

  1. proslijedio/la je Tweet
    2. velj

    Slides from talk on Adversary Detection Pipelines Ty everyone for coming to my talk! ❤️

    Poništi
  2. proslijedio/la je Tweet

    A SharePoint vulnerability that allegedly led to a United Nations' data breach in July is still being exploited by attackers to target Middle Eastern governments. Our latest research found nearly 29,000 unpatched servers still vulnerable:

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    27. sij

    Network Security Perspective on Preparedness

    Poništi
  4. proslijedio/la je Tweet
    24. sij

    NEW: Hackers target unpatched Citrix servers to deploy ransomware * REvil gang attacks confirmed * Maze also suspected * Other groups are selling access to hacked Citrix systems on hacking forums

    Poništi
  5. proslijedio/la je Tweet

    We are getting to the good bit now! 🙌🏼 Let's take a look at how Enigma was broken…

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet

    So who was the first to break German Enigma? 🤔 In this thread, we are going to be looking at the role of Polish Mathematicians in the lead up to breaking Enigma 🇵🇱

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet

    We're pleased to say that no Bombe machines are needed to decrypt the tweets for our Twitter Takeover 🔍

    Poništi
  8. proslijedio/la je Tweet
    21. sij

    Lets assume you have DNS logs. What is some stuff you like to look for when hunting through DNS logs? Personally, I like looking for dynamic DNS stuff because if it isn't malicious, a lot of the time its plan and out bizarre. How bout you?

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    17. sij

    I hereby present my top 20 presentations for 2019! Kudos to all the presenters that shared their knowledge and their insights for tradecraft, threats and best practices. Hope you enjoy them!

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    17. sij

    Vulnerability severity levels

    Poništi
  11. proslijedio/la je Tweet
    17. sij

    BREAKING: Microsoft warns about Internet Explorer zero-day * No patch out yet * No CVE, for now * This is the IE zero-day that Qihoo 360 mentioned last week in a now-deleted tweet * Connected to last week's Firefox zero-day

    Poništi
  12. proslijedio/la je Tweet
    14. sij

    To coincide with the visit launches a report on the State of Vulnerabilities. Sharing information on vulnerabilities allows for informed decisions to made, remedies to be put in place and risks to be evaluated. Read more:

    Poništi
  13. proslijedio/la je Tweet
    2. sij

    FPGA cards can be abused for faster and more reliable Rowhammer attacks * Academics detail new JackHammer attack * Twice as fast, 4 times more bit flips than Rowhammer * FPGAs are commonly used in cloud services, but don't have same security as CPUs

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet

    Defense in depth is still valuable concept, but it alone is insufficient for justifying expenses because it doesn’t answer the question, “How much defense is enough?”

    Poništi
  15. proslijedio/la je Tweet
    22. pro 2019.
    Poništi
  16. proslijedio/la je Tweet
    Poništi
  17. proslijedio/la je Tweet
    19. pro 2019.

    The DCART (Decoupled Components for Automated Ransomware Testing) github repo is now live and I swear that the code actually works!

    Poništi
  18. proslijedio/la je Tweet

    Awesome piece from w/ great visuals showing the movements of millions of mobile phones (and their owners). Data compiled by a location data company, “one of dozens quietly collecting precise movements using software slipped onto mobile phone apps”

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    19. pro 2019.

    Wawa discloses mammoth card breach that impacted almost all locations * Wawa operates 860+ convenience stores (600 double as gas stations) * Malware was installed on Wawa's payment processing servers * Malware stayed undetected for 8 months (Mar -> Dec)

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    18. pro 2019.

    The former Siemens engineer who planted logic bombs inside the company's spreadsheets was sentenced on Monday to six months in prison, followed by a two-year term of supervised release and a $7,500 fine Story from July:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·