Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @snaropanth
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @snaropanth
-
Sumanth Naropanth proslijedio/la je Tweet
The 3rd one on the list is from us! Interested in a multi-pronged approach to learning IoT security? We cover Bluetooth/BLE, Zigbee-style networks, AWS IoT Core and more. Here’s a quick preview of what you’ll learn in our program: https://youtu.be/Dg5eovo-ydI .
#iotsecurity#TR20https://twitter.com/WEareTROOPERS/status/1222780241103458304 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Team
@Deep_Armor is excited to be teaching at Troopers 2020 in March! Give us a shout if you’d like to know more before signing up#TR20#IoTSecurity#Pentestinghttps://twitter.com/WEareTROOPERS/status/1220293855926505472 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
This is really cool. In my own experience, I’ve realized that the people in the audience want to talk to you (obviously), but are hesitant initially when they do not know you. Breaking the ice this way is a great ideahttps://twitter.com/taylonr/status/1216044482216579072 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sumanth Naropanth proslijedio/la je Tweet
I have 0 CVEs. I've found many many bugs, but I don't need a CVE to prove anything. If you seemingly think a CVE makes you l337, you need to rethink.pic.twitter.com/tLMSD4BmNH
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sumanth Naropanth proslijedio/la je Tweet
Our next story is on a popular topic among cloud software professionals, yet one that is complex and often misunderstood. Read our piece on 'Introduction to Container Security' at: https://medium.com/deep-armor/introduction-to-container-security-ca9b5e50a787 … More content on container security tools & benchmarks in the coming weeks
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sumanth Naropanth proslijedio/la je Tweet
As I’ve been saying, cyber-insurance WILL influence every role and aspect of InfoSec. Get ahead of it. "Cyber insurance carriers are assuming greater control over how enterprises conduct incident response, which has caused angst and frustration among some security vendors."https://twitter.com/faisaly/status/1205404242317631488 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sumanth Naropanth proslijedio/la je Tweet
Over and over again, kids tracking watching have egregiously bad security. Also over and over again, manufacturers say “we take security seriously”https://www.cnet.com/news/these-kids-smartwatches-have-security-problems-as-simple-as-1-2-3/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sumanth Naropanth proslijedio/la je Tweet
The breadth of AWS is just ridiculous—take any software company, and it's likely AWS has a direct competitor. As a standalone company, your product better be 5x better. Or else the AWS default product wins.pic.twitter.com/7ZuJqgY9mD
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sumanth Naropanth proslijedio/la je Tweet
#IoTNext 2019 Panel:IoT Security policy tunnel vision of FreshThinking? Arnab Chattopadhay, AssocDir, IBM, Giri Govindaraju CISO, Cisco APAC, Amit Rao VP, Trusted Objects and Sumant Naropanth, CEO, Deep Armour#RaiseIoTQuotientpic.twitter.com/0Mv2oqUS2i
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sumanth Naropanth proslijedio/la je Tweet
Me: “How did our port scan truncate your database table?” Him: “The application expects incoming data on that port.” Me:
Turned out that TRUNCATE happens on a TCP connect.
True story.
Expect the unexpected.Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sumanth Naropanth proslijedio/la je Tweet
The CapitalOne hack that occurred earlier this year was an interesting case from a technical perspective. Read our story on how exactly it happened, and the options available to prevent such attacks in the future:https://lnkd.in/fbbk4RS
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The IoTSF annual conference kicks off. Excited to be presenting our work this afternoon on practical exploitation of IoT wireless protocols
#iotsf19@Deep_Armorpic.twitter.com/1EzKvYgnpE
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
We've been wanting to do this for a long time at
@Deep_Armor. Share some cool stories about our research, tools, and also frustrations when we hit a wall while working on some interesting problems. Watch our Twitter/LinkedIn for our posts.https://twitter.com/Deep_Armor/status/1196404488182976514 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sumanth Naropanth proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Sumanth Naropanth proslijedio/la je Tweet
It’s the season of lights and sweets. Happy Diwali, from team Deep Armor!pic.twitter.com/HkOIaVei9p
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sumanth Naropanth proslijedio/la je Tweet
Colleagues had a car broken into and laptops stolen in downtown Mountain View last night while we were at dinner. We wondered how they knew to break into the hatchback when it is not see- through. They turn on bluetooth scanners and follow the beacon to find electronics.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sumanth Naropanth proslijedio/la je Tweet
Ken Thompson's Unix password: Somewhere around 2014 I found an /etc/passwd file in some dumps of the BSD 3 source tree, containing passwords of all the old timers such as Dennis Ritchie, Ken Thompson, Brian W. Kernighan, Steve Bourne and Bill Joy. https://leahneukirchen.org/blog/archive/2019/10/ken-thompson-s-unix-password.html …pic.twitter.com/W2kXzD2sdM
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sumanth Naropanth proslijedio/la je Tweet
Dear InfoSec, as predicted… the shift is already starting to happen. The purchase of various product & services will be increasingly economically dictated by cyber-insurance carriers. Whether we like it, or not.https://twitter.com/Garin_Pace/status/1176932263218561026 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Fork bomb on the CS department cluster, the very first week at Columbia U. The sysadmin thought it was intentional (it wasn't). Still remember how terrified I was when she summoned me.https://twitter.com/labeveryday/status/1174329793158033410 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sumanth Naropanth proslijedio/la je Tweet
okay, thats enough for today. I found out you can control a lake over the internetpic.twitter.com/fNdJfXXqUS
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.