Twitter | Pretraživanje | |
Pretraživanje Osvježi
2*yo 15. velj
Reply Retweet Označi sa "sviđa mi se"
TwisTfashion 5 h
Reply Retweet Označi sa "sviđa mi se"
taschekats 8 h
Reply Retweet Označi sa "sviđa mi se"
Steven Nabil 2. velj
Newest member of the showing his proud
Reply Retweet Označi sa "sviđa mi se"
CapitalWatch 31. sij
Blue Hat Plunges 15% Despite Strong Sales of Interactive Toys - - via
Reply Retweet Označi sa "sviđa mi se"
Mark Frazier 30. sij
Reply Retweet Označi sa "sviđa mi se"
Alexandre Zapolsky 30. sij
Odgovor korisniku/ci @bzg2
Cest super ! Bravo à vous et la communauté ! Comment peut on participer/contribuer en tant qu'entreprise ?
Reply Retweet Označi sa "sviđa mi se"
Antoinescuras 30. sij
Reply Retweet Označi sa "sviđa mi se"
League of Men Voters 29. sij
Clearly the lefties in the thread and need a safe space by MUTING of BLOCKING.
Reply Retweet Označi sa "sviđa mi se"
taschekats 28. sij
Reply Retweet Označi sa "sviđa mi se"
Anonymous 21. sij
T𝕳E ᴡA͢͢͢TC𝕳ER VS An๏nץmͥ๏uͣsͫ☘ The Architect Of Fear We Are Anonymous We Are Legion We Do Not Forgive We Do Not Forget Expect Us !
Reply Retweet Označi sa "sviđa mi se"
Anonymous 20. sij
Reply Retweet Označi sa "sviđa mi se"
Brutum For Yang 🧢 Iowa Caucus Day!!!!! 31. lis
Reply Retweet Označi sa "sviđa mi se"
Graphistry 31. lis
1/3: Our demos on 100Xing investigations with graph GPU/viz/automation are up! Highlights: 1:55: -> -> Graphistry! 12:45: Logs are hypergraphs! 16:05: Visually automate your plays! 19:40: Use graph to autogen cool queries! ..
Reply Retweet Označi sa "sviđa mi se"
InsanityBit 30. lis
My talk is up. I explain why I believe that modeling attacker behaviors is more effective with a graph based approach, and demonstrate how with Grapl. Grapl, an open source detection and response platform Talk: Github:
Reply Retweet Označi sa "sviđa mi se"
InsanityBit 26. lis
Here are my slides from my talk on Graph based Detection and Response.
Reply Retweet Označi sa "sviđa mi se"
Jay Beale 25. lis
started this morning hardcore, with API-hacking talk by , "I'm in your cloud: A year of hacking Azure AD." Awesome findings, incl. an "internal" API version that was available publicly. Access policies set via API, but invisible in the portal. Attack your APIs!
Reply Retweet Označi sa "sviđa mi se"
Security Response 24. lis
The way that Microsoft has protected from hacking applies elsewhere. Keep design simple. Slow down attackers with encrypted code. Attestation and a separate security processor both helps. And note that existing hardware is not resistant against physical attack.
Reply Retweet Označi sa "sviđa mi se"
Platform Security Summit 24. lis
Reply Retweet Označi sa "sviđa mi se"
KymPossible 24. lis
Someone I hadn’t seen in a few years said this morning that they were surprised to see me back at Microsoft. I’m lawful good. A corporate culture of integrity and customer protection is my everything. There is no compensation package that would replace this for me. ❤️
Reply Retweet Označi sa "sviđa mi se"