 |
Contribuez à SecuObs en envoyant des bitcoins ou des dogecoins.
Contribute to SecuObs by sending bitcoins or dogecoins.
|  |
|
|
|
|
|
Mini-Tagwall | | | |
Revue de presse : security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone
+ de mots clés pour la revue de presse
Annuaires des videos : curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit
+ de mots clés pour les videos
Revue Twitter : security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall
+ de mots clés pour la revue Twitter
| |
|
|
|
Les Tweets pour anton_chuvakin |
Si vous voulez bloquer un compte Twitter ou nous en proposer un
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Les Tweets filtrés pour " anton_chuvakin" (663 résultats)S'abonner au fil RSS SecuObs pour le compte Twitter anton_chuvakin[2012-10-07] - 17:17:05 - G+: while the DDoS got the press because of potential geopolitical connections, the real story is what was going on? http://t.co/Md8vDU7Z[2012-10-06] - 02:31:22 - Scanning legacy system with nmap -T0: http://t.co/EJdYhCT9 via @sec_reactions[2012-10-06] - 02:31:22 - RT @sec_reactions: What happens when you use nmap on an Industrial Control System - by @chrissistrunk http://t.co/ESVePwJM[2012-10-02] - 01:08:47 - G+: Unlike Google Chrome and Mozilla Firefox users, IE users were exposed to active attacks against unpatched,? http://t.co/QcAF5dCm[2012-09-27] - 20:48:22 - G+: To better enable effective incident response using virtual machine logging and events in a cloud provider? http://t.co/X044DRyC[2012-09-27] - 20:48:22 - @BrandenWilliams PCI Compliance, 3rd Ed is currently ranked #93,618 out of over 8,000,000 books. :-) We need to push it to top 10,000...[2012-09-19] - 03:17:05 - G+: The [Flame] CC developers didn't use professional [ha-ha A.C.] terms such as bot, botnet, infection,? http://t.co/Ew8uDN6P[2012-09-19] - 03:17:05 - Clouds over Honolulu #yes-Iamhereonbusiness http://t.co/dMlnbY6R[2012-09-19] - 03:17:05 - RT @RolfRolles: Thought of the day: vulnerability analysis is to reverse engineering as physics is to mathematics[2012-09-11] - 07:53:10 - G+: Jam-packed with pure awesomeness and PCI DSS references! Aggregate the logs!!! http://t.co/RcW99fOY[2012-09-06] - 03:46:48 - @BrandenWilliams, I beat you this time by posing with a PCI DSS 3rd edition first :-) http://t.co/tbY2tB7T[2012-09-06] - 03:46:48 - G+: PCI DSS 3rd edition is here in the flesh (where is yours, +Branden Williams?) http://t.co/VyMrcKdz[2012-08-18] - 11:10:06 - RT @BrandenWilliams: PCI Compliance 3e is out! You can get the kindle version today and have the paper version delivered next week! http ...[2012-08-18] - 11:10:06 - @Beaker @BrandenWilliams Dude, PCI compliance ain't cheap! :-)[2012-08-18] - 11:10:06 - @BrandenWilliams , we should add @Beaker to The List (of people who get a review copy of The PCI Book)[2012-08-18] - 11:10:06 - @BrandenWilliams We also promised a review copy of PCI v3 to @benrothke ....[2012-08-18] - 11:10:06 - BlackHat 2012 Impressions: (yes, I know my BlackHat 2012 post is woefully late, but such is life) So, BlackHat t... http://t.co/e3ipoFwU[2012-08-18] - 11:10:06 - RT @cloud_borat: Prospect: We having CloudFirst strategy Azamat: Excellent - we have perfect On-Premise product for you to do that V ...[2012-08-18] - 11:10:06 - RT @cloud_borat: prospect: How much your cloud costing? Azamat: We not disclose our pricing - it enterprise sales model - just give u ...[2012-08-16] - 19:32:51 - G+: (yes, I know my BlackHat 2012 post is woefully late, but such is life) http://t.co/LHJaEb8z http://t.co/Jv965LCO[2012-08-14] - 21:57:49 - RT @stefant: Join the quest - help us decrypt the mysterious #Gauss payload! http://t.co/JHLn0PZ2[2012-08-11] - 18:27:06 - RT @syngress: New Book! #PCI Compliance, 3rd Ed: Understand and Implement Effective PCI Data Security Standard Compliance.http://t.co/Rj ...[2012-08-09] - 17:25:20 - G+: The first step is to determine how securely you've configured your cloud service accounts?and how much? http://t.co/TsYBjYOK[2012-08-09] - 17:25:20 - G+: PCI DSS applies wherever cardholder data (CHD) and/or sensitive authentication data (SAD) is stored, processed? http://t.co/new40R30[2012-08-04] - 19:51:27 - G+: ... three out of four clients calling [Gartner[ about PCI inquire about tokenization http://t.co/udkUiVeV http://t.co/toqsnuAb[2012-08-02] - 18:06:52 - @FierceStrategy Re:maturity vs adoption. Yes, indeed. And the lag seems to grow - see mobile sec and (sort of) cloud/virtualization as well[2012-07-27] - 08:23:03 - RT @roman_soft: #blackhat Most epic fail #pwnie goes to F5 (static root ssh key)[2012-07-26] - 07:59:54 - G+: ri-f*cking-diculous: we propose a new IDS for the cloud ... we test it on KDD1999 dataset [that, FYI, predates? http://t.co/BQfb3jFh[2012-07-25] - 03:06:27 - G+: A great write-up on REAL PCI DSS in the cloud: I?ll first talk about foundational principles and mindsets, then? http://t.co/9S1vgYoA[2012-07-25] - 03:06:27 - @sec_prof Phil, your awesomeness knows no bounds (re: PCI DSS + IaaS write-up http://t.co/sb5qMQ4m) :-)[2012-07-17] - 19:25:45 - Cloud/SaaS logs, insiders and honeytokens: http://t.co/cr8WF0Iq via @prismatic[2012-07-17] - 19:25:45 - @stiennon review posted to amazon and my blog (NOT work blog tho :-))[2012-07-16] - 08:02:37 - RT @jeremiahg: ORGs spend 1/10th as much on appsec as they do on netsec, even though SQLi is the highest root cause of data breaches h ...[2012-07-16] - 08:02:37 - G+: A really fun deck on REAL security in the cloud: http://t.co/ZGesJotS (thanks +Lawrence Pingree) http://t.co/O7e4tPQT[2012-07-16] - 08:02:37 - G+: Imagine in 1980, if the highest goal of every start-up was to be bought by DEC or IBM for $20M in a couple of? http://t.co/snoxMggg[2012-07-16] - 08:02:37 - G+: Nice new feature for authors at Amazon: http://t.co/whVvD1qk http://t.co/rQtMwFFH[2012-07-11] - 16:10:38 - @randomuserid Well, supply = total botnet population which is (reportedly) in low millions / high hundreds of thousands?[2012-07-11] - 16:10:38 - RT @ChrisJohnRiley: Dear journalists that trumpeted the end of the internet due to the DNSCHANGER? please post your appropriate apologie ...[2012-07-11] - 16:10:38 - RT @SecurityBorat: Borat says, why accept advice of security for cloud from evangelist who implemented cloud solution never?[2012-06-23] - 02:27:34 - RT @InfosecIsland: More on PCI Scoping - ?At least annually and prior to the annual assessment, the assessed entity should confirm the . ...[2012-06-22] - 12:05:49 - G+: 4. If it's inside my perimeter firewall, that means I have total control over it (@armorguy) 5. If it doesn't? http://t.co/vCY8jAkg[2012-06-19] - 14:44:11 - G+: As a striking example, the botnet behind a third of the spam in 2010 earned its owner about $2.7m while the? http://t.co/T9P4tR3C[2012-06-16] - 20:55:15 - RT @TheOtherMichael: Paraphrase @anton_chuvakin on cloud security #GartnerSEC: people seem surpised Security doesn't magically appear ...[2012-06-16] - 20:55:15 - Pro tip: ... as an absolute last resort weapon, you can trump any cloud security debate with a hoff-quote (Cc: @beaker)[2012-06-16] - 20:55:15 - G+: The first time a client brought intellectual property lawyer Janine Anthony Bowen a cloud computing contract to? http://t.co/44ns2ysB[2012-06-16] - 20:55:15 - @dimitrimckay blackhat?[2012-06-13] - 10:38:40 - RT @ma08: You need to view PCI as something that provides operational value, not something they make you do - @anton_chuvakin #GartnerSec[2012-06-13] - 10:38:40 - PCI Compliance, 3rd edition - Out On August 6, 2012: A new edition (3rd) of our book PCI Compliance is comi... http://t.co/Xi49x4Fk[2012-06-13] - 10:38:40 - G+: Dr Anton Chuvakin Blog PERSONAL Blog: PCI Compliance, 3rd edition - Out On August 6, 2012 http://t.co/5G3ckHTA[2012-06-12] - 17:06:10 - G+: The advisory states that certain BigIP devices contain a SSH private key on its filesystem that is trusted for? http://t.co/KooMnHrJ[2012-06-07] - 19:39:19 - The 93.000 Firewall Rules Problem and Why Cloud is Not Just Orchestration http://t.co/yTrngCg0 via @prismatic[2012-06-07] - 19:39:19 - G+: ?? they [93,000] are a lot but the record is a Cisco device (somewhere on this earth) with 750.000 rules?. http://t.co/Vk62wT5f
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|
|
|
|