Tweetovi

Blokirali ste korisnika/cu @vash0702

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @vash0702

  1. proslijedio/la je Tweet
    20. sij
    Poništi
  2. proslijedio/la je Tweet
    16. sij

    CVE-2020-2551 WebLogic RCE via IIOP protocol.

    Poništi
  3. proslijedio/la je Tweet
    16. sij

    Do you have a wonderful Central Storage? Yes, you have a problem: there is a RCE 0day, at the moment unpatched. Remotely Exploitable: Yes Authentication Required: NO Date of found: 19 Dec 2019 cc:

    , , i još njih 5
    Poništi
  4. proslijedio/la je Tweet
    16. sij

    2020-01-16 - and infection traffic - of the infection, the email, associated malware, and some indicators available at:

    Poništi
  5. proslijedio/la je Tweet
    16. sij

    - CryptoAPI (Crypt32.dll) Elliptic Curve Cryptography (ECC) Code-Signing

    Poništi
  6. proslijedio/la je Tweet
    16. sij
    Poništi
  7. proslijedio/la je Tweet
    16. sij

    Do patch -2020-0601 ASAP to avoid attacks. The delicately crafted signed with root certificate in our test could pass certificate verification and detection rate drops dramatically afterwards.

    Poništi
  8. proslijedio/la je Tweet
    16. sij

    -2020-2551 Weblogic RCE via iiop protocol, funny bug:D

    Poništi
  9. proslijedio/la je Tweet
    16. sij
    Poništi
  10. 15. sij
    Poništi
  11. proslijedio/la je Tweet
    Poništi
  12. proslijedio/la je Tweet
    14. sij

    Windows Defender Antivirus detects files w/crafted certificates exploiting the certificate validation vulnerability: ​Exploit:Win32/CVE-2020-0601.A (PE files) Exploit:Win32/CVE-2020-0601.B (Scripts) Also, Defender ATP has a threat report on your posture. -2020-0601

    Poništi
  13. proslijedio/la je Tweet
    14. sij

    I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell PoC exploit code:

    Poništi
  14. proslijedio/la je Tweet
    13. sij

    Update CVE-2019-19781 You can exploit the vulnerability without the file and only use the file ! You can inject your payload inside the name of the XML file and fire the command execution ! 🔥💪

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    13. sij

    A group of anonymous security analysts have tracked down 13 front companies operating in the island of Hainan through which they say the Chinese state has been recruiting hackers. FireEye and Kaspersky say this is APT40.

    Poništi
  16. proslijedio/la je Tweet
    23. ruj 2019.
    Poništi
  17. proslijedio/la je Tweet
    21. ruj 2019.

    MobSF V2.0 is released! New Dynamic Analyzer supports Android v4.1-9.0. Now you can perform instrumented security tests with ease. ZERO configuration, just run a Genymotion VM before Dynamic Analysis and that’s it.

    Poništi
  18. proslijedio/la je Tweet
    22. ruj 2019.
    Poništi
  19. proslijedio/la je Tweet
    18. ruj 2019.

    Hacking-Security-Ebooks : Top 100 Hacking & Security E-Books (Free Download) : (Pl. buy authentic books to support writers 🙏 )

    Poništi
  20. proslijedio/la je Tweet
    5. ruj 2019.

    GhIDA: Ghidra decompiler for IDA Pro

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·