Tweetovi

Blokirali ste korisnika/cu @simakov_marina

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @simakov_marina

  1. proslijedio/la je Tweet
    2. velj
    Poništi
  2. proslijedio/la je Tweet
    15. sij

    Just published a blog explaining the root cause of the recent crypto vulnerability (CVE-2020-0601 / ?) using some "Load Bearing Analogies" to make it more accessible. CC:

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    24. pro 2019.

    As users access applications in hybrid environments, the need to protect these two components become paramount. Join me and as we dive-in with our sponsor ! Register & Watch Now:

    Poništi
  4. proslijedio/la je Tweet
    20. pro 2019.

    I'm happy to share that the talk I've submitted with "Advanced Credential Relaying Techniques and How to Thwart Them" got accepted to . You don't want to miss this talk if you're interested with what is the latest in relay...

    Poništi
  5. proslijedio/la je Tweet
    17. stu 2019.

    The talk I gave with on relay is now available online! If you haven't seen it live and you're interested in security you should definitely check it out!

    Poništi
  6. 14. stu 2019.

    You can use the free AD hygiene tool to analyze your network and discover all machines which don't enforce SMB signing. Enforcing SMB signing on DCs alone (which is the default config) is not enough.

    Poništi
  7. proslijedio/la je Tweet
    12. stu 2019.

    NTLM reflection is back to haunt windows. Read about Ghost Potato here (this time with a fixed link):

    Poništi
  8. proslijedio/la je Tweet

    While we currently see only coin miners being dropped, we agree w/ the research community that CVE-2019-0708 (BlueKeep) exploitation can be big. Locate and patch exposed RDP services now. Read our latest blog w/ assist from &

    Poništi
  9. proslijedio/la je Tweet
    7. stu 2019.

    Even though more than two years had passed, this is still a relevant attack vector...

    Poništi
  10. proslijedio/la je Tweet
    4. stu 2019.

    Just got into the Github Sponsorship program. If you’re a medium/large orginazation that uses some of my tools commercially on a regular basis , please consider donating as I’ve put in a considerable amount of effort to make them and provide them for free.

    Poništi
  11. proslijedio/la je Tweet
    4. stu 2019.

    After more than half a year of work, check out our latest paper Light Commands: Laser-Based Audio Injection on Voice-Controllable Systems. More details at Joint work with Takeshi Sugawara, Benjamin Cyr, Daniel Genkin, and

    Poništi
  12. proslijedio/la je Tweet
    24. lis 2019.

    October ATT&CK update is now live! Lots of new information in Enterprise, Mobile, Groups, and Software. The biggest change is the addition of ATT&CK for Cloud! Thanks to all our contributors that helped with this update and with Cloud! Update notes:

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    14. lis 2019.

    [Blog] Office 365 was vulnerable to network attacks due to a vulnerability in Microsoft Teams. Here's a demo of an attacker obtaining access to all emails and OneDrive/SharePoint files if the victim joins an attacker controlled network. Details:

    Poništi
  14. proslijedio/la je Tweet
    12. lis 2019.

    As promised, here is 's blog about bypassing McAfee's password and admin check which lets you export and import the configuration. This allows viewing exclusions, adding your own or changing the protection password.

    Poništi
  15. proslijedio/la je Tweet
    Poništi
  16. 8. lis 2019.

    If you liked the Drop The MIC vulnerability, be sure to check Drop The MIC 2 to see how we bypassed the original fix + an additional vulnerability abusing any client sending LMv2 responses to bypass the MIC, EPA & more.

    Poništi
  17. 12. ruj 2019.

    After issuing an advisory to turn on LDAP signing & channel binding, is changing the default configuration (starting January 2020) to enable those settings. Really excited about this change! Especially after our latest NTLM Relay talks

    Poništi
  18. 25. kol 2019.

    If you weren’t in Vegas for and , and I will be presenting the results of our NTLM research in a webinar this Tuesday, everyone is welcome, Q&A at the end included 🙂

    Poništi
  19. proslijedio/la je Tweet
    22. kol 2019.

    Muscular Dystrophy killed my mother, her brother, and her father. Now it's killing my sister. Here's my ask: if you have benefited from , don't buy me a beer. Instead, donate whatever amount you can to MDA using this link:

    Poništi
  20. proslijedio/la je Tweet
    21. kol 2019.

    great to see is taking action to reduce attack surface by advising customers to enable LDAP relay mitigations. We talked about these issues at our and talks.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·