The contents of my tweets are my own personal opinions and do not represent my employer's.
Also you remember www.yahcoo .net ?
CVE-2013-1493 ImAlpha.class and others, sample in the wild
yes I have check and recheck the certificate is valid ! http://pastebin.com/FuRzKcXa http://pastebin.com/myu4SMs0
Oh NBC . com :)
@michaelmcg19 @stopmalvertisin And you can see this
@michaelmcg19 @stopmalvertisin yes but
@michaelmcg19 @stopmalvertisin I think under investigation but confirm that the 23/01 was still active
@michaelmcg19 @stopmalvertisin Yop I also found it on way back
Avec 7U11 j'ai le message d'erreur suivant
@artem_i_baranov As "Protected view" is off by default, so default #Adobe Reader and Acrobat XI are vulnerable
Oh JSbug backend in Space Foundation drive by attack http://eromang.zataz.com/2013/01/06/forgotten-watering-hole-attacks-on-space-foundation-and-rsf-chinese/ also used with CVE-2013-0634 :)
Oups, should I updated my Flash or not ? Seem that I have the latest version on Mac OS X.
“@Billaut: This Crazy Map Has One Dot for Every Person in the United States http://t.co/eYiGyQTv” <- I'm here
CFR.org #0day Website comprised before 7 December #infosec @jaimeblascob @threatpost @Mike_Mimoso
My next post will cover the targeted attacks against RSF-chinese.org and spacefoundation.org through Jsbug backend
cfr.org 0day drive-by attack was not only targeting chinese visitors
My next post will be regarding http://pastebin.com/rDwncbTq and the attached screenshot
Confirmed it is CVE-2011-1999
©2016 Twitpic Inc, All Rights Reserved