Tweetovi

Blokirali ste korisnika/cu @omerd9

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @omerd9

  1. proslijedio/la je Tweet
    4. velj
    Odgovor korisnicima

    Investment in infosec can help to either extend the expected risk-realization time horizon or reduce the impact when it is realized. Or both. Or neither if it's not taken seriously and senior management doesn't buy-in.

    Poništi
  2. proslijedio/la je Tweet
    2. velj

    Decided to make some sledgehammers to help fix issues with AWS not making new accounts secure by default.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    31. sij

    Critical vulns found in Azure by CheckPoint researcher . This would have allowed compromise of Azure infrastructure to compromise other tenants (ie. the worst thing that can happen with cloud threats).

    Poništi
  4. proslijedio/la je Tweet
    31. sij

    The CFP for fwd:cloudsec is now open! Details at Also we've got a logo, so finally we can start handing out stickers soon.

    Poništi
  5. proslijedio/la je Tweet
    12. pro 2019.

    The video for my and 's Black Hat USA talk, "The Path Less Traveled: Abusing Kubernetes Defaults" is now up! ✨ Slide deck here: Demos and manifests used for the talk here: Video here:

    Poništi
  6. proslijedio/la je Tweet
    18. sij

    Very helpful design principles for zero-trust network architectures (aka BeyondCorp, BeyondProd) from UK :

    Poništi
  7. proslijedio/la je Tweet
    11. sij

    How do you integrate with the project? How do you convert 300+ rules to ES query strings & pack them as part of notebooks to query ES? All from code 😱. I wrote about it here! Weekend readings! 🍻

    Poništi
  8. proslijedio/la je Tweet
    10. sij

    Okay. For every retweet this gets (TO A POINT!) I'll add a thought / tip / observation about speaking at conferences.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    5. sij

    SkyArk. SkyArk is a cloud security tool, helps to discover, assess and secure the most privileged entities in AWS

    Poništi
  10. proslijedio/la je Tweet
    1. stu 2019.

    As a security team, you could ignore vulnerable dependencies. You could scan and report vulnerable dependencies. You could even own the tooling for safely deploying patches for vulnerable dependencies. But the move is to *prevent people from introducing unnecessary dependencies*.

    Poništi
  11. proslijedio/la je Tweet
    2. sij

    I've been using for 8+ years now, so IAM is relatively second-nature to me. But I just sat down to explain it to someone new to AWS and... wow, it is a confusing service. (thread)

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    3. sij

    Solid write-up on how Square uses VPC endpoints to access AWS services without giving the VPC resources direct Internet connectivity, and ensure only their own resources are accessed, with a Shared VPC model.

    Poništi
  13. proslijedio/la je Tweet
    30. pro 2019.

    Awesome Forensics Resources. Almost 300 open source forensics tools, and 600 blog posts about forensics.

    Poništi
  14. proslijedio/la je Tweet
    31. pro 2019.

    i love how people are shocked that doesn’t like security researchers (see drama), meanwhile i’ve been banned from doing research for them for 8 years.

    Poništi
  15. proslijedio/la je Tweet
    30. pro 2019.

    Here’s the thing. In the enterprise, free software is free as in puppy.

    Poništi
  16. proslijedio/la je Tweet

    Great example to remember on social media platforms.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    28. pro 2019.

    Cross-Origin Resource Sharing (CORS) can be used to bypass the Same Origin Policy(SOP) and read sensitive user data if implemented improperly. Easy wins all day. Learn more on my blog:

    Poništi
  18. proslijedio/la je Tweet
    24. pro 2019.

    Ep 54: NotPetya Huge thanks to for sharing his story and research he did for his new book Sandworm. How do you define a "cyber war"? Listen to this episode to hear what I think is the first cyber war we've seen yet.

    Poništi
  19. proslijedio/la je Tweet
    23. pro 2019.

    We are considering sharing our Cartography data to our Bugbounty researchers to help increase coverage & scope (all dns, ip, micro services, github projects ...). Anything specific researchers are looking for?

    Poništi
  20. proslijedio/la je Tweet
    23. pro 2019.

    Sorry if I seem salty today. I hate disabling user accounts. The revolving door of talent here is getting to me. We hire great people, only to see them leave because they aren’t supported, respected, and listened to.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·