Pontus Sahlqvist

@z_uz

My tweets are my reading list: Mostly InfoSec, IW, OSINT, TI, Politics etc. RT/follow doesn't mean endorsement. Beware of geeks bearing gifts.

stockholm
Vrijeme pridruživanja: ožujak 2007.

Tweetovi

Blokirali ste korisnika/cu @z_uz

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @z_uz

  1. prije 1 sat

    New ransomware doesn’t just encrypt data. It also meddles with critical infrastructure | Ars Technica

    Poništi
  2. proslijedio/la je Tweet

    Machines can learn to exploit humans' flaws more effectively than humans themselves. That could enable a dramatic scaling in the weaponization of information. RAND experts explain how, the frightening implications, and ways to defend against this:

    Poništi
  3. 29. sij

    Germany has proof that Huawei worked with Chinese intelligence: Handelsblatt - Reuters

    Poništi
  4. proslijedio/la je Tweet
    29. sij

    Mer om 5G, här från fd chef på australiensiska signalspaningen som underkänner UK's resonemang kring Huawei

    Poništi
  5. 27. sij

    bellingcat - Second GRU Officer Indicted in Montenegro Coup Unmasked - bellingcat

    Poništi
  6. proslijedio/la je Tweet
    27. sij

    A massive cyber espionage campaign, which we found so spooked US intelligence that it changed how the government handles DNS registration, was the work of hackers aligned with the Turkish government

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    23. sij

    PoC (Denial-of-Service) for CVE-2020-0609 & CVE-2020-0610 Please use for research and educational purpose only.

    Poništi
  8. proslijedio/la je Tweet
    27. sij
    Poništi
  9. proslijedio/la je Tweet
    26. sij

    Want to watch 6 disinfo operations unfold in 6 minutes? Thanks to a Open Source Support grant, I’ve done just that with network visualization and documented some interesting patterns on Medium 1/

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    25. sij

    Researchers set up a honeypot to monitor what cyber criminals are doing when they target industrial environments - and found that hackers are going after factories in large numbers. via

    Poništi
  11. 25. sij

    Your 5G Phone Won’t Hurt You. But Russia Wants You to Think Otherwise.

    Poništi
  12. proslijedio/la je Tweet

    Australia and Japan have already banned the Chinese firm. A decision in Britain is due this month

    Poništi
  13. 23. sij

    Project TajMahal – a sophisticated new APT framework: via

    Poništi
  14. proslijedio/la je Tweet

    More than 2.7bn people live in an authoritarian regime, the bottom tier of the 's Democracy Index

    Poništi
  15. proslijedio/la je Tweet

    Cyberwar explained

    Poništi
  16. 22. sij

    Säpochef kritiserar regeringen: ”Är allvarligt” | SvD

    Poništi
  17. proslijedio/la je Tweet
    20. sij

    Technology (so not only facial recognition tech) can be used to identify people without their knowledge or consent. The data can be correlated with other data. The purpose of this process is to treat individuals differently.

    Poništi
  18. proslijedio/la je Tweet
    20. sij

    The policy of cyber sovereignty is probably among the biggest threat to open internet. Also because its effects are not seen immediately.

    Poništi
  19. proslijedio/la je Tweet
    20. sij
    Poništi
  20. proslijedio/la je Tweet
    19. sij

    Fler borde göra som och bli månadsgivare till Doku.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·