Discover and read the best of Twitter Threads about #vulnerabilities

Most recents (9)

So #ICYMI #OnThisDay in 1974, and into the following day, was the #Tornado #SuperOutbreak This montage of images is on the @NWS pages at: weather.gov/iln/19740403 Image
I have the following image as a poster in my office for several reasons, which I will expound upon in subsequent tweets. Firstly it was produced by hand by Theodore ‘Ted’ Fujita, who developed the F-scale (later the EF-Scale based in wind intensity and damage. Image
What I really noticed in the key/legend on the map was how he was also looking at the type of structure where fatalities occurred, something that other scientists (@StephenMStrader) were looking at before I came along, but once you start, you can’t stop. I’m pretty much obsessed. Image
Read 11 tweets
This thread brings together all my #infographics until today (2years of work).

These are all infographics about #infosec 🔐

Feel free to share this tweet if you think it may be useful for your #community 📚

Follow me ➡ @SecurityGuill fore more about #security #hacking #news ImageImageImageImage
How does an #Antivirus works? Image
Quick presentation of the different #Bluetooth Hacking Techniques Image
Read 44 tweets
Daily Bookmarks to GAVNet 01/12/2021 greeneracresvaluenetwork.wordpress.com/2021/01/12/dai…
Math Can Help In Deciding How To Distribute The Vaccine : NPR

npr.org/2021/01/10/955…

#vaccine
Crisis In Cosmology Gets Worse

forbes.com/sites/drdonlin…

#cosmology #crisis
Read 8 tweets
It’s our birthday! #CISAgov was established on November 16, 2018. From elections to COVID-19 to natural disasters and more, year two has been action-packed. Let’s take a trip down memory lane…
Informed by #cyber intelligence and real-world events, we issued several insight products, providing background on #cyber threats, #vulnerabilities, and mitigation activities: cisa.gov/insights #InfoSec
One key insight was in in January when we warned partners about potential Iranian retaliation against U.S. organizations—and advised them on how to assess and strengthen their physical & cyber security. This is the kind of rapid information-sharing we aim for! #InfoSecurity
Read 15 tweets
#ICS Advisory (ICSA-20-203-01) - #Wibu-Systems #CodeMeter

* Affected? Multiple #KRITIS sectors worldwide!
* CVSSv3 score? 10.0!
* Exploitable remotely? With low skill level to exploit!
#RCE 1/3
us-cert.cisa.gov/ics/advisories…
Risk Evaluation?
#exploitation of #vulnerabilities could allow an attacker to alter & forge a license file, cause a DoS condition, potentially attain remote code execution #RCE, read heap data, and prevent normal operation of third-party software dependent on the #CodeMeter! 2/3
Vulnerabilities?
Buffer Access with Incorrect Length Value, Inadequate Encryption Strength, Origin Validation Error, Improper Input Validation, Improper Verification of Cryptographic Signature, Improper Resource Shutdown or Release! 3/3
Read 3 tweets
My current #Working #Research #Topic: "A Review of the #CommonMonetaryArea of #SouthernAfrica: Are Client Countries Better-off De-Linking from the #Anchor #Economy?". I'm using #OptimumCurrencyArea #OCA #Theory to analyse the #CMA arrangement. Draft will be ready January end..!
The #CommonMonetaryArea of #SouthernAfrica or #CMA could seem to some (mostly the technically inclined) to be a no-brainer & a clear natural #OptimumCurrencyArea given the historical links between the #anchor #SouthAfrica & the #clients (#Lesotho #Eswatini & #Namibia)...
Be that as it may, 2020 marks 46 years since the #RandMonetaryArea - #RMA agreement and 34 years since the RMA was revised to establish the #CommonMonetaryArea - #CMA between #SouthAfrica, #Lesotho, Swaziland (now, #Eswatini) and #Namibia...
Read 10 tweets
#Nmap comes with 586 #NSE scripts. 148 of them are default (-sC) or version (-sV) scripts. The rest (438) have to be invoked directly or by category, so many folks don't use them. Here are my top 18 NSE scripts you should run in 2018: #DiscoveringNSE
#DiscoveringNSE 1/18: Fingerprint 100s of web apps and embedded devices with http-enum. Got Nikto? http-enum uses that fingerprint file, too. nmap.org/nsedoc/scripts… Found a device with a web interface? Check for default creds with http-default-accounts. nmap.org/nsedoc/scripts…
#DiscoveringNSE 2/18: Import a list of targets to scan directly from the XML output of another scan with targets-xml. Lots of scripts that discover new addresses let you scan them in the same command with --script-args newtargets nmap.org/nsedoc/scripts…
Read 19 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!