Medijski sadržaj
- Tweetovi
- Tweetovi i odgovori
- Medijski sadržaj, trenutna stranica.
-
Did you enjoy "Overview of the latest Windows OS kernel exploits found in the wild" ? It was about 0days that we found in 2018. Tomorrow at
@BlueHatIL I present Part 2 about stuff that we found in 2019.#BlueHatILpic.twitter.com/2i1HmGXNlo
-
Hacking Sony PlayStation Blu-ray Drives
#36c3 [SLIDES] https://github.com/oct0xor/presentations/blob/master/Hacking%20Sony%20PlayStation%20Blu-ray%20Drives.pdf …pic.twitter.com/nM0HklOyAO
-
Uploaded updated slides for our webinar "The evolution and future of supply chain attacks", as today they seem to be more relevant than ever https://github.com/oct0xor/presentations/blob/master/2019-04-The%20evolution%20and%20future%20of%20supply%20chain%20attacks.pdf …pic.twitter.com/TjQRYs1UUB
Prikaži ovu nit -
We accidentally stayed near PlayStation themed building in Leipzigpic.twitter.com/snoWG0zznB
-
Greatness Awaits! Lecture hall "Saal Borg" 2019-12-28 at 22:10 +0100 CET
#36c3pic.twitter.com/WKxbUfjh2R
-
CODE BLUE 2019 programme is really well put together. Supply chains, vuln research, IoT, malware analysis https://codeblue.jp/2019/en/time_table/ …
#codeblue_jppic.twitter.com/7shNijSA2g
Prikaži ovu nit -
-
Second day of ISC 2019 was very interesting. Kudos to
@mj0011sec@wangtielei@PanguTeam@natashenkapic.twitter.com/ipS01azekr
-
-
Little tired of travel... but I just could not refuse an offer to give a keynote at Internet Security Conference 2019 by Qihoo 360! https://isc.360.cn/ pic.twitter.com/kxEtoULMgM
Prikaži ovu nit -
Shanghai skyline is beautiful at any time of night and daypic.twitter.com/4rGMW9qR0q
-
.
@dwizzzleMSFT just announced CFG 2.0 and new hardware security improvements at#bluehat#bluehatshanghaipic.twitter.com/jDbgMuUiuh
-
Very excited to talk about latest zero-days that we found together with
@antonivanovm at first ever BlueHat Shanghai next week! Lineup of talks looks incredible#bluehat#bluehatshanghaipic.twitter.com/5lzSB1RkQN
-
We analyzed the vulnerability CVE-2019-0708 and can confirm that it is exploitable. We have therefore developed detection strategies for attempts to exploit it and would now like to share those with trusted industry parties. Please contact: nomoreworm@kaspersky.compic.twitter.com/pEzuEzok0d
-
I had to write a lot of RDP related code lately... Only because zero details shared and we need to protect our customers
#CVE-2019-0708pic.twitter.com/8e1DZdzzjm
-
3/3 "Catching multilayered zero-day attacks on MS Office".
@0x1ffffffffffff, me and@_xdanx with shout out to@vladhiewsha who was not able to attend#TheSAS2019pic.twitter.com/dzLPj2mI0l
Prikaži ovu nit -
-
This time I give 3 presentations at SAS! 1/3
#TheSAS2019@TheSASconpic.twitter.com/aDcuMevvjP
Prikaži ovu nit -
POC for
#CVE-2018-8453 that was sent to Microsoft at time of original blog postpic.twitter.com/WmiDNd8XYQ
-
I can't believe that it's been more than a month since amazing
@rootconph and@virusbtn conferences! I have really enjoyed presenting my research here and met a lot of cool people.pic.twitter.com/eqgSinQAR7
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.