Tweetovi

Blokirali ste korisnika/cu @steharringer

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @steharringer

  1. proslijedio/la je Tweet
    31. sij
    Poništi
  2. proslijedio/la je Tweet
    30. sij

    Google OpenSK is an open-source security key that supports FIDO and U2F:

    Poništi
  3. proslijedio/la je Tweet
    28. sij

    🇪🇺 Heute ist Europäischer Datenschutztag 🇪🇺 Am 28. Jänner 1981 wurde die Europäische Datenschutzkonvention unterzeichnet. Bei der Herstellung von Ausweisdokumenten ist der garantierte Schutz deiner persönlicher Daten für uns zu jeder Zeit oberstes Credo!

    Poništi
  4. proslijedio/la je Tweet
    26. sij

    Das ist wieder ein Sonntag mit , der einem den Mund offen stehen lässt. Liest man ein zweites Mal, weil man ganz sicher gehen will, dass das wirklich da steht. Und dann ein drittes Mal, weil: steht das wirklich genau so in der Krone? Stark. Klar. Klug. Wow.

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    26. sij
    Odgovor korisnicima
    Poništi
  6. proslijedio/la je Tweet
    25. sij

    If you're not retaining things like DHCP logs, DNS logs, RDP logs, some kind of internal network monitoring/visibility, you should do that. Trying to hunt through 2 month old traffic is hard when you can't correlate IP to Endpoint because DHCP.

    Poništi
  7. proslijedio/la je Tweet
    24. sij

    Advance copy. Coming soon!

    Poništi
  8. proslijedio/la je Tweet
    24. sij

    Do you have a firm opinion about the ? Maybe this interview with can challenge your view. We give answers to all the though questions!

    Poništi
  9. proslijedio/la je Tweet
    21. sij
    Odgovor korisniku/ci

    Habe gerade erfahren, dass die Standard-Bearbeitungszeit in D 4-6 Wochen ist. Da ist A mit 5 Tagen natürlich Weltspitze! Kudos.

    Poništi
  10. proslijedio/la je Tweet
    19. sij

    Aaia - AWS Identity And Access Management Visualizer And Anomaly Finder

    Poništi
  11. proslijedio/la je Tweet

    A reminder that S3 logging is *disabled by default* and you have to manually enable it. If you have an S3 bucket breach you often won’t know as there zero logs of access.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    11. sij

    CHAPS - Configuration Hardening Assessment PowerShell Script

    Poništi
  13. proslijedio/la je Tweet
    8. sij

    new version of Boneh-Shoup's magnificent book is out!

    Poništi
  14. proslijedio/la je Tweet
    7. sij
    Poništi
  15. proslijedio/la je Tweet
    5. sij

    Attack Methods for Gaining Domain Admin Rights in AD: techniques described here “assume breach” where attacker already has a foothold & has gained domain user credentials. Reality: it does not take long for attackers to go from domain user to domain admin.

    Poništi
  16. proslijedio/la je Tweet
    5. sij
    Poništi
  17. proslijedio/la je Tweet
    4. sij

    AWS Nitro Enclaves are little "sidecar" isolated VMs with no network access or storage that you can create and communicate to only from an EC2 VM to eg store secrets and keys in, do crypto. they also have attestation. Currently in preview.

    Poništi
  18. proslijedio/la je Tweet

    📢 CVE-2019-0604 is being exploited in the wild 📢 It's a web based remote code execution vuln without need for authentication, plus Microsoft had to reissue the patch later as the first one didn't fix the vulnerability - so lots of places are exposed.

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    2. sij

    Happy 2020! 🥳 Just published a detailed analysis on all the Mac Malware of 2019 📝🍎👾 For each, includes: ⬇️ download link 📩 infection vector 💿 persistence mechanism 💰 capabilities and payload(s) Read: "The Mac Malware of 2019"

    Poništi
  20. proslijedio/la je Tweet
    31. pro 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·