Wicus Ross

@wicusross

Solutions are the cause of all problems. | I do not know.

Over there...
Vrijeme pridruživanja: listopad 2010.

Tweetovi

Blokirali ste korisnika/cu @wicusross

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @wicusross

  1. proslijedio/la je Tweet
    4. velj

    I've worked professionally in software for 18 years and I can say with certainty that you should not use software for anything

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    3. velj

    Ownership transfer of my projects started with - P4wnP1 (legacy) - LOGITacker - munifying ... to one of my Gurus and earliest InfoSec idols: Mr. !!!

    Poništi
  3. 3. velj

    Military view on cross domain engagement when responding to a "cyber" domain threat.

    Poništi
  4. proslijedio/la je Tweet
    30. sij

    Thanks for the heads up on these ... Mine arrived today!

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet

    - what a cool project. Especially for those of us with a few nRF52840 dongles laying around 😁

    Poništi
  6. proslijedio/la je Tweet
    23. lis 2019.

    Smallest PE file that downloads a file from the Internet Oh my, I love this. 💛 Has anyone already done this for x64 executables? That DLL import from a network share looks as if ... 😬

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    27. sij

    If you're asking yourself "is this the first time an AV was targeted by someone to own someone", you need to check this Github repository by

    Poništi
  8. proslijedio/la je Tweet
    27. sij

    If Flamingo isn't your jam, here are some other projects doing similar credential capture work (beyond Responder): * go-camouflage: * SWARM framework: The awesome-honeypots list includes many others:

    Poništi
  9. proslijedio/la je Tweet
    21. sij

    Shodan keeps a full history for every IP it's ever seen. If you're a member you can see the historical data on the beta website (or API). For example, identify when a service was hit with ransomware:

    Poništi
  10. proslijedio/la je Tweet
    21. sij
    Poništi
  11. proslijedio/la je Tweet
    19. sij

    I created a simple flow-chart to assist in Citrix CVE-2019-19781 mitigation decision making. This is based on the latest information from and .

    Poništi
  12. 20. sij

    The irony - Oman United Insurance Co SAOG hit with ransomware in period from 10/12/2019 to 1/1/2020

    Poništi
  13. 17. sij

    Does anyone know if deleting the offending Perl scripts associated with the Citrix ADC/Gateway vuln CVE-2019-19781 breaks any functionality in the Citrix appliance?

    Poništi
  14. 17. sij

    Microsoft Windows Defender also spotting CVE-2020-0601

    Prikaži ovu nit
    Poništi
  15. 17. sij

    Native Symantec Endpoint Protection is also flagging this:

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet

    That epic Microsoft moment❤️ Recently worked on and ECC, so yes, 10 and 2016/2019 only. Previous versions like Windows 7 did not support personnal EC curves (only few NIST standard ones)

    Prikaži ovu nit
    Poništi
  17. 16. sij

    Kudos to for being so quick out of the gateway with CVE-2020-0601 detection on spoofed code signing:

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    16. sij
    Poništi
  19. proslijedio/la je Tweet
    14. sij
    Poništi
  20. proslijedio/la je Tweet
    14. sij

    A good local perspective - The Rise of Ransomware | Carte Blanche via

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·