Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @verbumrosini
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @verbumrosini
-
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Goodbye old friend, Retina. https://www.beyondtrust.com/vulnerability-management …pic.twitter.com/pE2cM5GrzD
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
(ca)sey proslijedio/la je Tweet
Here my GitHub with many scripts useful for red teamers - Enjoy! https://github.com/BankSecurity/Red_Team …
#redteamHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
(ca)sey proslijedio/la je Tweet
We have a working proof-of-concept exploit for ‘Whose Curve is it Anyway?’ — NSA’s bug in Microsoft’s Crypto API. Read on for our explainer:https://blog.trailofbits.com/2020/01/16/exploiting-the-windows-cryptoapi-vulnerability/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
(ca)sey proslijedio/la je Tweet
We need your help to select the top 10 web hacking techniques of 2019! Cast your vote here:https://portswigger.net/polls/top-10-web-hacking-techniques-2019 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
(ca)sey proslijedio/la je Tweet
COMMENTARY ON CVE-2020-0601: I have been speaking to several players on this on background and there are a few things they want to highlight / clarify based on the public discourse so far.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
CVE-2020-0601: A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates. https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0601 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
(ca)sey proslijedio/la je Tweet
If you haven’t read the original
@ESETresearch Stantinko paper then you should https://www.welivesecurity.com/wp-content/uploads/2017/07/Stantinko.pdf … This malware family stands out to me for its subtle yet extensive modularity and subversive techniques. In 2017 this family had few if any detections by any security vendor.Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
(ca)sey proslijedio/la je Tweet
It's great that people are reading this and applying it. But when you're testing a race condition on registration, there is no need to use my email address!https://portswigger.net/research/cracking-recaptcha-turbo-intruder-style …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
(ca)sey proslijedio/la je Tweet
We have open sourced our legal documentation used for physical penetration tests. The purpose is to help the community and organizations protect their employees when conducting testing. Includes three docs: MSA SOW Authorization Letter https://github.com/trustedsec/physical-docs …
#TrustedSecHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
(ca)sey proslijedio/la je Tweet
FFRIエンジニアブログ、第二十四回目はFFRI Dataset 2019の紹介記事です。FFRI Dataset 2018からパワーアップした、マルウェア・クリーンウェアの表層情報データセットについて、ご紹介いたします。 https://engineers.ffri.jp/2019/10/24/ffri-dataset-2019/ …
#ffri_researchHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
(ca)sey proslijedio/la je Tweet
A message from me and the support for the
@CoalfireSys consultants who were wrongfully charged and arrested and a call for all charges to be dropped@IAGovernor.https://twitter.com/TrustedSec/status/1189566078395015169 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
And special thanks (and even probably some apologies) to
@tacticalrce,@Laughing_Mantis,@stobal,@marcmaiffret and@geeslinappsec. You all have made these years unforgettable and have made a lasting impression on my work in this industry. To the years to come ... Cheers!Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
12 years ago this month, I was given an amazing opportunity to start a career in infosec. I made mistakes and have regrets. But I try to grow each day. I'm so thankful for the mentors and friends along the way, and for the unsung people who (+/-) impact me here daily. Thank you!
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
(ca)sey proslijedio/la je Tweet
@Th3Zer0 &@zi0Black just published their#XXE to#RCE#exploit chain on#LSP4XML which impacts#VSCode#EclipseIDE#Theia and others!
https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/ …pic.twitter.com/uQgDGbPkP7Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
(ca)sey proslijedio/la je Tweet
If you're not already aware of it, Apple's MacOS XProtect is fueled by YARA and UXProtect (https://digitasecurity.com/uxprotect/ ) is a graphical frontend from
@patrickwardle (the wizard behind all the awesome https://objective-see.com utilities) and the fellas from@digita_security.https://twitter.com/InQuest/status/1187413359077085184 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
(ca)sey proslijedio/la je Tweet
Our team represented by
@a1exdandy published technical analysis of the checkm8 exploithttps://habr.com/en/company/dsec/blog/472762/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.