Twitter | Pretraživanje | |
Roberto Quiñones
PKI, Code Signing, Key Management, Secrets Management @ Intel Corp...
263
Tweetovi
2.213
Pratim
477
Osobe koje vas prate
Tweetovi
Roberto Quiñones proslijedio/la je tweet
Microsoft 365 Status 3. velj
We've determined that an authentication certificate has expired causing, users to have issues using the service. We're developing a fix to apply a new certificate to the service which will remediate impact. Further updates can be found under TM202916 in the admin center.
Reply Retweet Označi sa "sviđa mi se"
Roberto Quiñones proslijedio/la je tweet
Intel Security 31. sij
When you share your data without the right protections, it can be exposed to cyber threats and vulnerabilities. Discover how is uniquely positioned to help customers protect their data and drive with tools like .
Reply Retweet Označi sa "sviđa mi se"
Roberto Quiñones proslijedio/la je tweet
Intel News 30. sij
Join Intel at RSA Conference 2020 in San Francisco to learn firsthand how, together with partners and customers, Intel is building the trusted foundation for computing in a data-centric world:
Reply Retweet Označi sa "sviđa mi se"
Roberto Quiñones 30. sij
Odgovor korisniku/ci @RobertoQuinones
Reply Retweet Označi sa "sviđa mi se"
Roberto Quiñones proslijedio/la je tweet
National Institute of Standards and Technology 30. sij
High school science teachers, share this opportunity with your students! We’re accepting applications for the 2020 Summer High School Intern Program through Feb. 1:
Reply Retweet Označi sa "sviđa mi se"
Roberto Quiñones 30. sij
Professor shares thoughts on quantum computing and data processing at Securtiy Summit
Reply Retweet Označi sa "sviđa mi se"
Roberto Quiñones 30. sij
Digicert CTO Dan talks about innovation in platforms and culture to meet certificate management demands
Reply Retweet Označi sa "sviđa mi se"
Roberto Quiñones 29. sij
Looking forward to learning from all the folks speaking and attending ’s Security Summit!
Reply Retweet Označi sa "sviđa mi se"
Roberto Quiñones proslijedio/la je tweet
/r/netsec 27. sij
MSBuild without MSBuild.exe
Reply Retweet Označi sa "sviđa mi se"
Roberto Quiñones proslijedio/la je tweet
Luca Marcelli 26. sij
Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!
Reply Retweet Označi sa "sviđa mi se"
Roberto Quiñones 26. sij
Odgovor korisniku/ci @Viss @__apf__
Or a chancla?
Reply Retweet Označi sa "sviđa mi se"
Roberto Quiñones 24. sij
It's 10 PM. Do you know where your passwords are?
Reply Retweet Označi sa "sviđa mi se"
Roberto Quiñones 24. sij
Vote by smartphone... What could go wrong
Reply Retweet Označi sa "sviđa mi se"
Roberto Quiñones proslijedio/la je tweet
Barry Dorrans 20. sij
Who thought private keys in firmware was a good idea?
Reply Retweet Označi sa "sviđa mi se"
Roberto Quiñones proslijedio/la je tweet
Ryan Hurst 16. sij
Google Trust Services has several open roles for Security Engineer / Site Reliability Types in NYC and Zurich. If your impacted by the Mozilla layoffs and those locals and type of work are interesting reach out. DMs open.
Reply Retweet Označi sa "sviđa mi se"
Roberto Quiñones proslijedio/la je tweet
NSA/CSS 14. sij
This you are strongly encouraged to implement the recently released CVE-2020-0601 patch immediately.
Reply Retweet Označi sa "sviđa mi se"
Roberto Quiñones proslijedio/la je tweet
SwiftOnSecurity 14. sij
Odgovor korisniku/ci @tqbf
NEW: along with several other cryptographers speculate on how CVE-2020-0601 works at a technical level:
Reply Retweet Označi sa "sviđa mi se"
Roberto Quiñones proslijedio/la je tweet
Kaspersky 14. sij
Digital signatures inside PDFs are a great way to ensure trust, but can they themselves be trusted?
Reply Retweet Označi sa "sviđa mi se"
Roberto Quiñones 25. pro
Feliz Nochebuena! 🎄🥂🎁 Jugando “Millennial Lotería” con la familia
Reply Retweet Označi sa "sviđa mi se"
Roberto Quiñones proslijedio/la je tweet
Catalin Cimpanu 23. pro
Chinese hacker group caught bypassing 2FA * Report details new APT20 activity * Attacks discovered in 10 countries * Primary victims include govt entities and MSPs
Reply Retweet Označi sa "sviđa mi se"