Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @steff0683
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @steff0683
-
Stefan Does proslijedio/la je Tweet
CVE-2020-7471: SQLI in Django: django.contrib.postgres.aggregates.StringAgg aggregation function was subject to SQL injection, using a suitably crafted delimiter. https://djangoproject.com/weblog/2020/feb/03/security-releases/ … FIX: https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136 …pic.twitter.com/NljqLmin93
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Stefan Does proslijedio/la je Tweet
Holy shit. Researcher discovers that TeamViewer stores user passwords encrypted and finds the encryption key and initialization vector in the windows registry https://whynotsecurity.com/blog/teamviewer/ …
#InfosecHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Stefan Does proslijedio/la je Tweet
#Chemie'unternehmen#Lanxess ist Opfer eines Hacker-Angriffs geworden! Angreifer Gruppe mit dem Namen#Winnti hat jahrelang deutsche Konzerne ausgespäht. Experten vermuten, dass die Angreifer eine Verbindung zur chinesischen Regierung habenhttps://www.tagesschau.de/investigativ/ndr/hackerangriff-chemieunternehmen-101.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Stefan Does proslijedio/la je Tweet
I’m not sure what’s going on here, but I needed to see it!
pic.twitter.com/EN5DHRkOvWPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Stefan Does proslijedio/la je Tweet
Log Sources - ordered by priority - with ratings in different categories - personal and highly subjective assessment - from my most recent slide deck on low hanging fruits in security monitoring
#SIEM#SecurityMonitoring#ThreatHuntingpic.twitter.com/wuWImWLB77
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Stefan Does proslijedio/la je Tweet
Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!pic.twitter.com/FekupjS6qG
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Stefan Does proslijedio/la je Tweet
Ep 57: MS08-067 With special guest
@JohnLaTwC. Hear what goes on internally when Microsoft discovers a major vulnerability within Windows. https://darknetdiaries.com/episode/57/ pic.twitter.com/Dd2VrQTpMR
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Stefan Does proslijedio/la je Tweet
We released a Red Teaming book! Red Team Development and Operations. It's been a crazy project that has existed in many forms. It started as simple notes, came together as a SANS class, and will now live as a book. Read about it here. http://threatexpress.com/blogs/2020/red-team-development-and-operations/ … https://twitter.com/minis_io/status/1219710714790567936 …pic.twitter.com/DvdRa4mGWw
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Stefan Does proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Stefan Does proslijedio/la je Tweet
Jetzt patchen! Exploit-Code für die NSA-Windows-Lücke aufgetaucht https://www.heise.de/security/meldung/Jetzt-patchen-Exploit-Code-fuer-die-NSA-Windows-Luecke-aufgetaucht-4639532.html …
#CVE20200601#ExploitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Stefan Does proslijedio/la je Tweet
Microsoft added Event ID 1 to the Application Log to show attempted exploitation of CVE-2020-0601 (via new CveEventWrite function). Use Splunk? Collect that EID and alert on: sourcetype=WinEventLog EventCode=1 LogName=Application Message="*[CVE-2020-0601]*" (tweak as needed)
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Stefan Does proslijedio/la je Tweet
I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell https://srcincite.io/blog/2020/01/14/busting-ciscos-beans-hardcoding-your-way-to-hell.html … PoC exploit code: https://srcincite.io/pocs/cve-2019-15975.py.txt … https://srcincite.io/pocs/cve-2019-15976.py.txt … https://srcincite.io/pocs/cve-2019-15977.py.txt …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Stefan Does proslijedio/la je Tweet
I'm seeing some evidence that researchers are already figuring out ways to exploit this CVE-2020-0601 flaw patched by Microsoft today. This is a serious bug for which exploitation tools will almost certainly soon be available. Please don't delay updating.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Stefan Does proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Stefan Does proslijedio/la je Tweet
My Opinion: Waiting for the disaster Eng: https://www.hannovermesse.de/files/files/001/media/downloads/news/industrial-pioneers/industrial-pioneers-magazine-319.pdf … Ger: https://www.hannovermesse.de/files/files/001/media/downloads/news/industrial-pioneers/industrial-pioneers-magazin-319.pdf …pic.twitter.com/zzlxGnAQym
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Stefan Does proslijedio/la je Tweet
...and CERT's take on CVE-2020-0601: Crypt32.dll fails to validate ECC certificates in a way that properly leverages protections that ECC should provide. As a result, an attacker may be able to craft a certificate that appears to have the ability to be traced to a trusted root CAhttps://twitter.com/tababodash/status/1217147738443350018 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Stefan Does proslijedio/la je Tweet
Sources say Microsoft on Tuesday will fix an extraordinarily scary flaw in all Windows versions, in a core cryptographic component that could be abused to spoof the source of digitally signed software. Apparently DoD & a few others got an advance patch https://krebsonsecurity.com/2020/01/cryptic-rumblings-ahead-of-first-2020-patch-tuesday/ …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Stefan Does proslijedio/la je Tweet
Follow this step-by-step guide to properly test for
#XSS… Like a#KNOXSS! https://brutelogic.com.br/blog/testing-for-xss-like-a-knoxss/ … by@rodoassis@brutelogicHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Stefan Does proslijedio/la je Tweet
Citrix Netscaler AMIs on
@awscloud default vulnerable out of the box. The root password is set to the instance ID; that can be read from the metadata URL. CVE-2019-19781 from nobody to ssh as root in seconds.pic.twitter.com/an2jZ7qtcM
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Stefan Does proslijedio/la je Tweet
US-gefördertes Handy kommt mit Malware aus China https://www.heise.de/security/meldung/US-gefoerdertes-Handy-kommt-mit-Malware-aus-China-4633759.html …
#Android#FCCHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.