peterkruse

@peterkruse

Peter Kruse is founder and cybersecurity researcher & specialist working with CSIS Security Group A/S in Denmark.

Denmark
Vrijeme pridruživanja: siječanj 2009.

Tweetovi

Blokirali ste korisnika/cu @peterkruse

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @peterkruse

  1. 2. velj

    From Ivan with love :)

    Poništi
  2. 31. sij

    Fantastic news! Arrests in Belfast and London over Maltese bank heist

    Poništi
  3. proslijedio/la je Tweet
    30. sij

    2020-01-29: [OSINT] Deep " Activity Report" by FINSEC 🇰🇷 🤔Weird phrasing on "Zeus" group and division into "Carbanak" (Anunak) and . 🙏Also please remember != != !=

    Poništi
  4. 29. sij

    For my Danish followers: Der er OWASP møde i morgen i København. Det kan jeg varmt anbefale at man tilmelder sig. Det er gratis og lærerigt. Tilmelding her:

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    29. sij

    I saw only 4 emails today - probably the lowest volume since the break ended. All were url links (no attachments again). The only major change to the Word docs is the crazy number of document forms being used now. Here's what I saw/found:

    Poništi
  6. proslijedio/la je Tweet
    28. sij

    Maze actors doing a false flag or just opsec error?

    Poništi
  7. 28. sij

    I'm happy to announce that I'll be speaking at in Barcelona in April. I hope to see many of you there and to have drinks and share knowledge with both old as well as new friends,

    Poništi
  8. proslijedio/la je Tweet
    27. sij

    From an adware to a banking trojan: - PUA.InstallCapital c4b1077d4954b2536239dd7546ea6202 - Stage2 InstallCapitall: PUA.ImpulseLTD (exee. space/installer/exee.exe) - Stage2 ImpulseLTD : Dreambot (AES (new ?!) dJReCsX8qWlhQ0kv) 34.240.96. 52/files/sp/vvvv.exe

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    27. sij

    📺 New Tutorial Video 📺 Learn how to automaticaly decrypt strings with and python 🐍 The 4th part in our reverse engineering deep-dive series. 👾🔍

    Poništi
  10. 26. sij

    The youngest of my two sons, Laust Kruse turning 12 years today. Happy birthday. Love you 😍🇩🇰❤️

    Poništi
  11. 23. sij

    For my Danish followers: En / spreder sig hastigt via messenger. Klik ikke på linket & opgiv ikke dit brugernavn & password på den forfalskede webside. Er det gået galt skal du reset password & generelt aktivere 2FA.

    Poništi
  12. proslijedio/la je Tweet
    23. sij

    Here is CVE-2019-11932 (double-free vulnerability) analysis + video exploit demo

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    22. sij

    New from - Revisiting Remote Desktop Lateral Movement This post discusses RDP lateral movement by leveraging mstscax.dll. Steven also is releasing SharpRDP with corresponding detection guidance for this attack technique. Post:

    Poništi
  14. proslijedio/la je Tweet
    23. sij

    Forensic analysis of Jeff Bezos hacked iPhone was exploited via vulnerability that probably triggered RCE. Similar exploit was fixed in October 2019- CVE-2019-11932(double-free vulnerability) but instead of video it was triggered by GIF

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    21. sij

    Read CSIS Security Group's latest Threat Matrix Report and get an overview of the latest trends, news and real world scenarios in the cyber security industry.

    Poništi
  16. 19. sij

    Please consider joining CSIS & become part of a team of highly skilled people. Do you have extensive incident response experience, a solid consultancy background and an extrovert positive attitude, then you might be the colleague we are looking for,

    Poništi
  17. 19. sij

    Heads up: Microsoft Internet Explorer Scripting Engine memory corruption vulnerability, (CVE-2020-0674)

    Poništi
  18. proslijedio/la je Tweet
    19. sij

    Co-wrote this OSINT analysis (with nice data visualization) about Facebook Coordinated Inauthentic Behavior (CIB) with - The data is available on GitHub! Twitter will be the next one. cc

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    18. sij

    Super helpful presentation for people looking at possible uses: from

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    18. sij

    I just published a blog post "Attacking Active Directory for fun and profit" with a reference to the talk of

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·