Tal Be'ery

@TalBeerySec

All things . Security Research Manager. Co-Founder (KZen). Formerly, VP of Research @ acquired by (.)

Israel
Vrijeme pridruživanja: travanj 2014.

Tweetovi

Blokirali ste korisnika/cu @TalBeerySec

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @TalBeerySec

  1. Prikvačeni tweet
    22. velj 2015.
    Poništi
  2. prije 5 sati

    When attackers compromise a browser they don't necessarily need to go deeper and escape the sandbox. They can stay within the sandbox and steal victims data by shutting down SOP and create UXSS. An innovative concept by

    Poništi
  3. prije 7 sati
    Poništi
  4. prije 8 sati

    "0days are expensive; mistakes are free" Excellent quote by

    Poništi
  5. prije 22 sata
    Poništi
  6. 3. velj

    6/ Network capture files can be found here

    Prikaži ovu nit
    Poništi
  7. 3. velj

    5/ and one exploit based detection rule to detect exploit of the degenerate case (private key = 1)

    Prikaži ovu nit
    Poništi
  8. 3. velj

    4/ Detecting rogue certificates with a trusted public key (with an idea stolen from 😋)

    Prikaži ovu nit
    Poništi
  9. 3. velj

    3/ Detecting non-standard base points (but standard a and b parameters)

    Prikaži ovu nit
    Poništi
  10. 3. velj

    2/ detecting non-standard elliptic curve params

    Prikaži ovu nit
    Poništi
  11. 3. velj

    1/ I just published Hitting a CurveBall Like a Pro! Using to detect and hunt exploits by following the NSA advisory

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    30. sij
    Odgovor korisnicima

    But honestly I prefer due to the combination of usability and security. World class cryptography.

    Poništi
  13. 30. sij
    Prikaži ovu nit
    Poništi
  14. 30. sij
    Prikaži ovu nit
    Poništi
  15. 30. sij

    The lesson: If something is missing in , just open a bug! Thanks to for fixing it in 1 week time since I reported. Which version will include it and when will it be released?

    Poništi
  16. proslijedio/la je Tweet
    27. sij

    Move Faster, Stay Longer blog about extending CS and tools to go with it.

    Poništi
  17. proslijedio/la je Tweet

    SharePoint vulnerability CVE-2019-0604 from a year ago has been used to hack the UN. Three different UN agencies got owned, about 20 domain admin accounts accessed and implants on 40 servers. They didn’t disclose.

    Prikaži ovu nit
    Poništi
  18. 29. sij
    Poništi
  19. 28. sij

    Some exchanges take pretty wild fees on staking (source: ) Caveat emptor!

    Poništi
  20. proslijedio/la je Tweet
    28. sij

    NYTimes journalist targeted w/ mobile spyware Pegasus from NSO Group; evidence also suggests an NSO Group operator may have been infecting targets while impersonating the Washington Post in the weeks leading up to and after Khashoggi’s killing in 2018

    Poništi
  21. proslijedio/la je Tweet
    28. sij

    We ❤️ ! And now that is integrated into our mobile wallet (staking delegation included), it's a good opportunity to look back at the technology behind it

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·