atx crypto club

Category: cybersecurity

#cybersecurity

<502edbb8> &lt;https://twitter.com/AlecMuffett/status/1209227482089607169&gt; <502edbb8> It would appear the ‘lets not release these sophistacted tools’ side is gathering steam. There is precendence…. ^^ twitter thread

#cybersecurity

<502edbb8> pentagon calls tiktok a cybersecurity threat

#cybersecurity

<502edbb8> &lt;https://twitter.com/thegrugq/status/1207989124612755458&gt; The debate continues

#cybersecurity

<403e98f2> I believe Dallas was breached and hasn’t disclosed / covering it up. I started collecting evidence a few weeks ago but decided to wait till beginning of the year. That has changed now and I’m frantically trying to scrape and back up their data <403e98f2> <403e98f2> <403e98f2> Scheduled System Maintenance may impact DWU payment […]

#cybersecurity

<502edbb8> It goes back and forth. The analogy I liked best was the IED bombs in iraq <502edbb8> sometimes measures developed by terrorists put them ahead, then the US would develop counter measures and they would be ahead, then the terrorists would adapt <502edbb8> It just seems like a few things came together and blue […]

#cybersecurity

<403e98f2> Yes <403e98f2> More leaks also empower those tools.

#cybersecurity

<502edbb8> So a meme running through the community is ‘Are all these super dank open source red team tools really good for infosec or just making blue’s team harder?’ <502edbb8> Nearly all the APTs (doesn’t count the US) use them in their kill chain <502edbb8> And it appears like the past 3-4 have seen a […]

#cybersecurity

<502edbb8> &lt;https://www.nytimes.com/interactive/2019/12/19/opinion/location-tracking-cell-phone.html?te=1&amp;amp;nl=the-privacy%20project&amp;amp;emc=edit_priv_20191219?campaign_id=0&amp;amp;instance_id=0&amp;amp;segment_id=0&amp;amp;user_id=7c8ff3fc774920a57c39e5d6cb28327e&amp;amp;regi_id=020191219&gt;

#cybersecurity

<502edbb8> Ill seed this chan with a few articles to get the juices flowin <502edbb8> &lt;https://pastebin.com/8rXhtqgr&gt; <502edbb8> &lt;http://www.harmj0y.net/blog/powershell/command-and-control-using-active-directory/&gt; bending c2c around all network boundaries.\ <502edbb8> harmj0y is one of the best AD pen testers around (that publishes at least) <502edbb8> It’s a brilliant use of AD for c2 <502edbb8> &lt;https://www.dallashackers.com/&gt; &amp;lt;— local dallas clique if […]

Back to top