Tweetovi

Blokirali ste korisnika/cu @vxradius

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @vxradius

  1. proslijedio/la je Tweet
    4. velj

    My take at what can be done with infosec stickers: put them into a frame instead of mutilating a laptop

    Poništi
  2. proslijedio/la je Tweet
    29. sij

    A fake VeraCrypt installer is distributed from [https://][vera-crypt][.][.com], packing official files from 1.23-Hotfix2 and modified TrueCrypt.exe and TrueCrypt-x64.exe files from 1.23. Seems malicious: it fetches a DLL from [http://]188[.]225[.]35[.]8/getdll.php?x64

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    30. sij

    Today I'm very happy to announce that we released , an open-source security key implementation written on , based on OS and powered by a dongle dev kit! Learn more at: We're even releasing a custom 3D-printable enclosure!

    Poništi
  4. proslijedio/la je Tweet
    25. sij

    I'm working on a new project for Android reversers called Smali Debugger. It's like gdb but for Smali. It uses smalivm () for execution. Here's a quick video of me stepping through two similar methods.

    Poništi
  5. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  6. proslijedio/la je Tweet
    11. pro 2019.

    Join me next Friday 13th to talk about firmware implants/rootkits and how you can catch it in your infrastructure. I will be disclosing some intriguing details regarding the class in Berlin Jan 2020. Stay tuned!

    Poništi
  7. proslijedio/la je Tweet
    6. pro 2019.

    If you missed my talk at (or you want to know even more about this campaign) you can read the full blog post about Zen here:

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    6. pro 2019.
    Poništi
  9. proslijedio/la je Tweet
    5. pro 2019.

    The registration closes this Sunday. Make sure to RSVP if you're in the Bay Area on Dec 12th and want to talk / listen about fuzzing! SPOILER: besides great content, there'll be swag, food, and drinks -- all free of charge :)

    Poništi
  10. proslijedio/la je Tweet

    Read about the implementation of pseudo-random number generation () on Windows 10:

    Poništi
  11. proslijedio/la je Tweet
    21. stu 2019.

    Blog post on CVE-2019-2215, the Android binder bug that was exploited in-the-wild and affected most Android devices manufactured prior to Fall 2018.

    Poništi
  12. proslijedio/la je Tweet
    20. stu 2019.

    Paged Out! #2 (Nov 2019) is out! And it's free to download :) This issue has 55 articles in 11 categories: Programming OS Internals Assembly Operating Systems GameDev Electronics Security/Hacking SysAdmin Reverse Engineering Algorithms Writing Articles

    Poništi
  13. proslijedio/la je Tweet
    6. stu 2019.

    Firmware threats hunting capabilities become a new trend! recently add YARA rules to LVFS and now MS extended Defender ATP. I hope it will help to gain more visibility not only on supply chain problems but also to detect malicious implants in the wild.

    Poništi
  14. proslijedio/la je Tweet
    6. stu 2019.

    Fuzzing Bay Area meetup #2: Join us Dec 12th at Facebook's office in Menlo Park. Send your talk proposals to fuzzing-bay-area@googlegroups.com until Nov 17th. Format: 3 talks (20 mins each) + Q&A + networking. See you there!

    Poništi
  15. proslijedio/la je Tweet
    30. lis 2019.

    Google Online Security Blog: Protecting against code reuse in the Linux kernel with Shadow Call Stack via

    Poništi
  16. proslijedio/la je Tweet
    24. lis 2019.

    [BLOG] Analysis of Qualcomm Secure Boot Chains Nice work by Elouan during his internship: congrats :)

    Poništi
  17. proslijedio/la je Tweet
    17. lis 2019.

    : researchers reveal how , the group suspected of breaching , has been busy compromising government targets while staying under the radar for years. Read about the newly-uncovered .

    Poništi
  18. proslijedio/la je Tweet
    15. lis 2019.

    The writeup and release is here! Tailoring CVE-2015-2215 to Achieve Root -

    Poništi
  19. proslijedio/la je Tweet
    8. lis 2019.

    Starting with the telemetry data gathered by ESET’s scanner, machine learning specialists and malware researchers devised a method to spot rare UEFI/based .

    Poništi
  20. proslijedio/la je Tweet
    6. lis 2019.

    HackQuest 2019 starts today at 20:00 (Moscow Time (UTC+3))

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·