DebugPrivilege (@debugprivilege) 's Twitter Profile
DebugPrivilege

@debugprivilege

Self-Claimed Security “Researcher” | Ex-MSFT | @XintraOrg lab contributor | Former Microsoft MVP | Interested in Security, Debugging, and Troubleshooting.

ID: 832855627026354176

linkhttps://github.com/DebugPrivilege calendar_today18-02-2017 07:33:50

6,6K Tweet

38,38K Takipçi

2,2K Takip Edilen

Alice Climent-Pommeret (@alicecliment) 's Twitter Profile Photo

Hi there! My latest article on the HarfangLab blog has just been published! I'm talking about unpacking, XMRig, R77 and FIN7 (or not 🤓) A special S/O to Antonio Cocomazzi Ivan Kwiatkowski and Secure Chicken 🐣 To check it out ➡️ harfanglab.io/insidethelab/u…

OrangeCon (@orangecon_nl) 's Twitter Profile Photo

🍊 OrangeCon 2024 was an absolute blast! 🧡🎉 The videos are now live! 🎥 (Re)watch your favourite talks, and get all the juicy details on our YouTube channel: youtube.com/@OrangeCon #OrangeCon #conference #education #cybersecurity

Semperis (@semperistech) 's Twitter Profile Photo

We are thrilled to announce that #TeamSemperis will be at #InfoSecNashville on September11-12th! To celebrate, we’re offering you a chance to win a ticket to attend the conference of the year, Hybrid Identity Protection 2024 . Visit our booth to find out more! #IdentitySecurity #IAM #HIPConf24

We are thrilled to announce that #TeamSemperis will be at #InfoSecNashville on September11-12th! To celebrate, we’re offering you a chance to win a ticket to attend the conference of the year, <a href="/HIPConf/">Hybrid Identity Protection</a> 2024 . Visit our booth to find out more! #IdentitySecurity #IAM #HIPConf24
DebugPrivilege (@debugprivilege) 's Twitter Profile Photo

Yikes! If this is true, it’s a bad look for Trillium Information Security Systems (TISS). An attacker is claiming they’ve have over 2 years of access to the network of SNGPL Official , including their SCADA environment.

Yikes! If this is true, it’s a bad look for <a href="/TrilliumInfosec/">Trillium Information Security Systems (TISS)</a>. An attacker is claiming they’ve have over 2 years of access to the network of <a href="/SNGPLofficial/">SNGPL Official</a> , including their SCADA environment.
ALI TAJRAN (@alitajran) 's Twitter Profile Photo

All domains in Exchange Online (Microsoft 365) are now FINALLY supported for the modern Internet Standards below: - IPv6: reachable via modern internet address - DNSSEC: domain names signed - DMARC, DKIM and SPF: authenticity marks against email phishing - STARTTLS and DANE:

All domains in Exchange Online (Microsoft 365) are now FINALLY supported for the modern Internet Standards below:

- IPv6: reachable via modern internet address
- DNSSEC: domain names signed
- DMARC, DKIM and SPF: authenticity marks against email phishing
- STARTTLS and DANE:
DebugPrivilege (@debugprivilege) 's Twitter Profile Photo

Hi Black Hat & Black Hat MEA - I noticed the talk 'Super Windows Crash Bros' is no longer listed. Given the significance of the CrowdStrike BSOD issue, I was looking forward to this session. Is there any reason for its removal?

Hi <a href="/BlackHatEvents/">Black Hat</a> &amp; <a href="/Blackhatmea/">Black Hat MEA</a> - I noticed the talk 'Super Windows Crash Bros' is no longer listed. Given the significance of the <a href="/CrowdStrike/">CrowdStrike</a> BSOD issue, I was looking forward to this session. Is there any reason for its removal?