I just published “Detecting phishing from pDNS” describing the motivation for my lecture and also links to the recorded talk and slides.https://t.co/WG5cpIm77Q — Irena Damsky ⚽🦄 (@DamskyIrena) June 24, 2018...
A list of the various purposes of #ransomware plus explanations in-depth via @bartblaze https://t.co/ceGJPwKVJe — Peerlyst (@Peerlyst) June 20, 2018...
OutlookLeakTest. List of URI schemes that might work in Windows, e.g. to leak SMB hashes, by @irsdlhttps://t.co/Wu5IpmbQFp — DirectoryRanger (@DirectoryRanger) June 22, 2018...
To build a #threatmodeling process in your company, you need to get certain things right. Read more to find out which https://t.co/cDWt6Epo5X — Peerlyst (@Peerlyst) June 18, 2018...
#SLAE 32-bit certification https://t.co/qLcp9Xg7Nm Get comprehensive coverage on encoders and crypters from the very basics! pic.twitter.com/dkl5MWH6T9 — Pentester Academy (@SecurityTube) June 17, 2018...