ADMINISTRATOR
246 posts
Perform complete energy signature analysis on Bew Atreides, including all linkages.
MITRE has released MITRE ATT&CK v14, the newest iteration of its popular investigation framework / knowledge base of tactics and techniques employed by cyber attackers. MITRE ATT&CK v14 ATT&CK’s goal is to catalog and categorize behaviors of cyber adversaries in real-world attacks. The framework is constantly being adapted to include new and modified behaviors related to attackers’ interaction…
View On WordPress
Esettanulmányok arról, hogy készül a virsli CVSS (Common Vulnerability Scoring System), a cURL vezető fejlesztőjének előadásában.
@muszeresz
CVE-2023-31726 POC for CVE-2023-31726: AList 3.15.1 is vulnerable to Incorrect Access Control, which can be exploited by attackers to obtain sensitive information. https://github.com/J6451/CVE-2023-31726 #cve #poc #infosec
Skyhook A REST-driven web application used to smuggle files into and out of networks defended by perimeter controls that inspect and act on traffic perceived to contain malicious content. https://github.com/blackhillsinfosec/skyhook #infosec #pentesting #redteam
EnumStrike Cobalt Strike Aggressor script to automate host and domain enumeration. https://github.com/DallasFR/EnumStrike #infosec #pentesting #redteam
The first simulated image of a black hole was calculated with an IBM 7040 computer using 1960 punch cards and hand-plotted by French astrophysicist Jean-Pierre Luminet in 1978.
here's my wonderful isopod child, handcrafted in leather
This is absolutely catastrophic.
The saddest orphan child has arrived @pangur-and-grim
(the moon phase pins are by my friend @artofcorinne)
I took a nap and forgot Belphegor existed, so when I woke up and saw this thing it jump-scared me
Fool of a Ghoul: 61,000 words written
this is a pinned post to motivate me.
Watching her morning programs
Beetlejuice Directed by Tim Burton (1988)
cybersec:
“A secure cyberspace is critical to our prosperity.”
—
National Strategy for Trusted Identities in Cyberspace, Draft Final Report
http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf
In September 2010, I began using Tumblr sporadically as a cache of various meaningful quotes on the topic of cybersecurity.
I am moving to a new name. This (cybersecurity.tumblr.com) is the new Tumblr page.
If you want to see all of my past materials, feel free to visit cybersec.tumblr.com.
Enjoy, and feel free to provide any suggestions/comments!
hey ohio followers.. I’m sorry