peterkruse

@peterkruse

Peter Kruse is founder and eCrime specialist working with CSIS Security Group A/S in Denmark.

Denmark
Geregistreerd in januari 2009

Tweets

Je hebt @peterkruse geblokkeerd

Weet je zeker dat je deze Tweets wilt bekijken? @peterkruse wordt niet gedeblokkeerd door Tweets te bekijken.

  1. heeft geretweet
    22 uur geleden
    Ongedaan maken
  2. Ongedaan maken
  3. 27 jun.

    Det kan jeg kun glæde mig over! Virksomheder afviser statens værn mod cyberangreb,

    Ongedaan maken
  4. 27 jun.

    Did you know that CSIS Security Group can assist and help protect any brand against the impact of phishing through our: Anti-Phishing platform for rapid identification and takedowns? Get more details here:

    Ongedaan maken
  5. heeft geretweet
    27 jun.

    Mining Bot Targets Devices With Running SSH Service via Potential Scam Site -

    Ongedaan maken
  6. heeft geretweet
    27 jun.

    Guess what? While preparing our presentation on iLO4, Alex found another critical vulnerability ;) Patch now! -2018-7078

    Deze collectie tonen
    Ongedaan maken
  7. 27 jun.

    Vi har udsendt en advarsel på Platinum Alert (PAS) vedr. en spear phishing kampagne mod flere danske virksomheder. Payloaden leveres via en .iqy (Excel Web Query File). Du kan læse mere på CSIS PAS om denne og andre trusler som vi løbende observerer,

    Ongedaan maken
  8. 26 jun.

    Tusindvis af godtroende danskere er hoppet på siden "Kærlighed[.]nu", der primært eksisterer som "syntes godt om" plaster () og reklame søjle. Lad nu være med det, ik?

    Ongedaan maken
  9. heeft geretweet
    25 jun.

    According to the NIS, North Korea's cyber hacking organization has 1,700 hackers from 6 organizations and about 5100 from 17 organizations supporting the hacking.

    Ongedaan maken
  10. 25 jun.

    Let me just say that, if it wasn’t easy earlier to do mass online criminal tracking and ID, then the impact on makes it a lot more troublesome for the good guys. This is actually a clear advantage for the bad actors :(

    Ongedaan maken
  11. heeft geretweet
    23 jun.

    Employees of private US company Mandiant hacked into computers of Chinese military, eventually resulting in APT1 report. The privatized hackback enabled US gov to more vocally criticize Chinese military hacking of US companies since there was now public unclassified reporting.

    Deze collectie tonen
    Ongedaan maken
  12. 24 jun.

    Seriously what's wrong with you people? You seriously need to step up. What are you looking at? A swarm of domains related to various browser hijackers. That's what.

    Ongedaan maken
  13. 20 jun.
    Ongedaan maken
  14. 20 jun.

    analysis Oh btw, I came up with the name Tinba back then :-)

    Ongedaan maken
  15. heeft geretweet
    19 jun.

    HP iLO4 authentication bypass: curl -H "Connection: AAAAAAAAAAAAAAAAAAAAAAAAAAAAA" No, that's not a crash PoC. That's a full blown auth bypass. sscanf into fixed buffer overwrites a flag field that bypasses auth. Yes, really.

    Deze collectie tonen
    Ongedaan maken
  16. heeft geretweet
    19 jun.

    Malicious doc used in recent attacks references the Spiez Convergence conf: MD5: 0e7b32d23fbd6d62a593c234bafa2311 File Type: Microsoft Office Word Last saved date: 2018-05-14 15:32:17 (GMT) Known file name: Spiez CONVERGENCE.doc

    Ongedaan maken
  17. 18 jun.

    Enjoying this cold beer brought to me by . This is just one fantastic beer!! Thanks buddy!

    Ongedaan maken
  18. heeft geretweet
    16 jun.
    Ongedaan maken
  19. heeft geretweet
    16 jun.
    Ongedaan maken
  20. heeft geretweet

    Folkemødet-update: Hvordan sikrer vi os mod cyberangreb? Hvordan forholder vi os til Rusland? Kom til debat om aktuelle trusler med bl.a. , og . Læs mere:

    Ongedaan maken

Het laden lijkt wat langer te duren.

Twitter is mogelijk overbelast of ondervindt een tijdelijke onderbreking. Probeer het opnieuw of bekijk de Twitter-status voor meer informatie.

    Je bent misschien ook geïnteresseerd in

    ·