SecurityTrails

@securitytrails

We strive to make the biggest treasure-trove of cyber intelligence data available in an instant.

Los Angeles, CA
Vrijeme pridruživanja: prosinac 2017.

Tweetovi

Blokirali ste korisnika/cu @securitytrails

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @securitytrails

  1. Prikvačeni tweet
    30. sij

    Team retreats are crucial for remote teams so, in November, our engineering team packed their bags and headed to Bali to work on the new IP current system and, of course, spend some time together:

    Poništi
  2. Employees are bringing their own Internet of Things connected devices to the workplace without disclosing it to their IT department could be putting organisations at risk from cyber attacks:

    Poništi
  3. prije 3 sata

    Who doesn't like free stuff, but when the price is your computer becoming infected with adware, ransomware, and password-stealing Trojans, you should think again about downloading pirated software:

    Poništi
  4. prije 4 sata

    Cybercriminals appear to be exploiting the Coronavirus outbreak: one email claims that the infections have been reported in a specific region, and that details of prevention can be found in the attachment.

    Poništi
  5. prije 5 sati

    Four years after hackers dumped the intimate details of 32 million Ashley Madison subscribers, they have revived an extortion scheme that targets people who used the dating website to cheat on their partners.

    Poništi
  6. proslijedio/la je Tweet
    1. velj

    99 smartphones are transported in a handcart to generate virtual traffic jam in Google Maps. Through this activity, it is possible to turn a green street red which has an impact in the physical world by navigating cars on another route!

    Prikaži ovu nit
    Poništi
  7. Poništi
  8. Threat actors are taking over and leveraging smart-building access systems to conduct DDoS attacks, according to new research

    Poništi
  9. 2. velj

    The National Science Foundation has awarded researchers at a $2.5M grant to build a high-performance computer system for hosting research using data that by law must be protected

    Poništi
  10. 2. velj

    The German privacy watchdog has opened an investigation against H&M amid evidence that the retailer was spying on customer service employees

    Poništi
  11. 2. velj

    Oman United Insurance Company(SAOG) had its main server attacked with ransomware that caused the lost of data for 2 months. Operations apparently remain unaffected though

    Poništi
  12. 2. velj

    In some positive news, charges have been dropped against the security professionals who were arrested and jailed last year for breaking into an Iowa courthouse as part of their pentest

    Poništi
  13. 1. velj

    Owners of Magento e-commerce stores are encouraged to update to 2.3.4 due to a number of bugs, which could lead to card-skimming/Magecart exploits

    Poništi
  14. 1. velj

    Law experts explain the EARN IT Act and how it intends to ban end-to-end encryption without actually banning it

    Poništi
  15. 1. velj

    Maryland lawmakers have introduced a bill making it a criminal offense to be in possession of ransomware. The bill also intends to grant victims of attacks the right to sue hackers for damages in a civil court

    Poništi
  16. 1. velj

    The Winnti Group is targeting Hong Kong universities using ShadowPad and Winnti malware, according to new research

    Poništi
  17. 1. velj

    The following insightful article discusses a zero-trust, prevention-first approach to protect critical infrastructure now and in the future

    Poništi
  18. 1. velj

    A whistleblower has exposed the UN org International Civil Aviation Organization (ICAO) for the coverup of a cyberattack that compromised the son of ICAO's current council president

    Poništi
  19. 31. sij
    Poništi
  20. 31. sij

    British police arrested 3 people in the UK for the February 2019 hack of Bank of Valletta (BoV), one of Malta's biggest banks

    Poništi
  21. 31. sij

    Researchers were able to bruteforce Zoom meeting URLs to find and possibly join meetings that had no password requirements via a bug that returned whether the URL was valid

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·