Tweetovi

Blokirali ste korisnika/cu @x0rz

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @x0rz

  1. Prikvačeni tweet
    23. lis 2018.

    Btw, feel free to join our growing community at We're trying to keep this server a non-skid and toxic-free area for friendly InfoSec practitioners from all around the globe 🌍

    Poništi
  2. prije 8 sati

    Have this ever happened to you? You end up on a vendor website and have ABSOLUTELY no idea what the hell they are supposed to provide, technically speaking: is this a physical firewall? Or some kind of SaaS SIEM? Maybe an EDR 🤔 The bullshit is strong in this industry 💩

    Poništi
  3. proslijedio/la je Tweet
    31. sij

    Weirdest thing about guns in the Kentucky Capitol: if you have one, you’re told to walk around the metal detector. Others must pass through and get wanded.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    prije 11 sati

    2020-02-03:🉑 🔒 "Logging enabled | Maze" Note: 1⃣Hacked network 2⃣Downloaded a lot of data from network 3⃣Google "Allied Universal Maze Ransomware" 4⃣If paid, the data will be removed & decryptor will be given h/t 🔽🇰🇵:

    Poništi
  5. proslijedio/la je Tweet

    Wow. This is simultaneously the worse idea ever and the best Defcon contest ever. Morning session- who can hack the stroller and kill the baby (sensor package) first. Afternoon session- who can hack the stroller, abduct a "baby" and successfully retrieve a bitcoin ransom.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet

    The cloud is just Jeff Bezos's computer.

    Poništi
  7. proslijedio/la je Tweet
    2. velj

    This is cyberpunk. Changing the physical changes the digital which changes the physical. Power held by governments and corporate powers can be subverted and redirected by regular people who understand how the system feeds upon itself.

    Prikaži ovu nit
    Poništi
  8. 2. velj

    Funny to think that getting its files encrypted by ransomware could actually save you from data theft 😂

    Poništi
  9. proslijedio/la je Tweet
    30. sij

    In my team at GitHub, we'd like to study examples of "nefarious commits" in open source, which introduce a bug on purpose. Can you point me at such commits? Could it have been detected by analysing the committer's behaviour as well as the code change itself?

    Poništi
  10. proslijedio/la je Tweet
    31. sij

    Good news — since China stole the IP of F-35 for their J-31 it means their software is crap too. NSA can just patch diff between the current builds and the stolen builds and they’ll have hundreds of 1day exploits! China’s industrial espionage is a vulnerability!! 😋

    Tweet je nedostupan.
    Poništi
  11. 30. sij

    We need an vigilante, but for authors.

    Poništi
  12. proslijedio/la je Tweet
    30. sij

    My write-up on how I tracked down an alleged member of REvil group utilizing methods. If you enjoyed reading this please share it and I will work hard to create more write-ups like this!

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    30. sij

    I really liked this walk-through of writing code based signatures with YARA

    Poništi
  14. proslijedio/la je Tweet

    Fun Fact #1: “Top Secret/SCI” refers to information so highly classified that it may be discussed only in a Sensitive Compartmented Information Facility (SCIF). FF#2: Bringing cell phones, cameras, or even thumb drives into a SCIF is forbidden. Tweeted tonight by POTUS:

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    30. sij
    Odgovor korisniku/ci
    Poništi
  16. proslijedio/la je Tweet
    29. sij
    Odgovor korisnicima i sljedećem broju korisnika:

    What % of malware uses non-TLS vs TLS for C2? Based on a (super biased) sample of ~10k binaries over 10 years I estimate it’s 90/10. Would love to see someone do a broader, less biased eval to see if it is on the rise (I don’t think it is)

    Poništi
  17. proslijedio/la je Tweet
    30. sij

    CVE-2020-0674: Internet Explorer Remote Code Execution Vulnerability Exploited in the Wild Zero-day remote code execution vulnerability Triggers 0. JScript 1. used in 2. ... Proof of Concept Demo Video

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  18. proslijedio/la je Tweet
    29. kol 2018.

    YMMV, but my private taxonomy for ‘advanced’ (🤮) campaigns : • STATE-OPERATED : e.g., GRU hands on GRU keyboards • STATE-AFFILIATED : extracurriculars by gov’t units, contractors • STATE-SPONSORED : gov’t funding to non-affiliates • STATE-TOLERATED : crime anywhere but here

    Prikaži ovu nit
    Poništi
  19. 30. sij
    Poništi
  20. proslijedio/la je Tweet
    30. sij

    I think I’m gonna add “former 8200” to my resume so I can get a C level job at a cyber security company. What are they going to do, call 8200 and ask for a reference??

    Poništi
  21. proslijedio/la je Tweet
    28. sij

    Let's talk about email tracking pixels for a minute and how sales/marketing (as well as real threat actor's) can use them to evaluate the success of an email marketing (or phishing) campaign...or for information gathering before sending a follow-up payload.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·