Dušan Horák
@DuanHork1Security at our core routers and switches that monitor the amount of data transmitted. Virtual networks (VLAN) #ITIL #ISMS #NetFlow #NBAD #FlowMon #SIEM #SaaS
Similar User
@Security_Sleuth
@cgsaid
@brianmurphyRQ
@Sandhu_KP
@Redport_IA
@cowboysec
@BobSipes
@Suren_Pamidi
In the past twelve months has faced in the Czech Republic, targeted cyber attacks 13% of the companies. #infosec #cybercrime #cyberattack
Prosperity and indulgence end, you can't buy your life with money and you won't pay for the COVID-19 pandemic. #pandemic #COVID-19
Hydra - I have just completed this room! Check it out: tryhackme.com/room/hydra #tryhackme #hydra #bruteforce #hydra via @realtryhackme
The mysterious Russian was reminded again. Hospitals are on call. The attacks are also dealt with by the National Office for Cyber Security (NÚKIB). #Bruteforce and scan
Tajemný Rus se opět připomněl. Nemocnice jsou v pohotovosti seznamzpravy.cz/clanek/tajemny… prostřednictvím @SeznamZpravy
Is there a second Chernobyl disaster? The giant fire is a kilometer from the power plant #SecurityandRisk View from one of the high-rise buildings in Pripyat. The new cover of the Chernobyl nuclear power plant is circled.
Malware authors often use compression and obfuscation methods to disguise the body of malicious programs. 🧐 Packers and Methods of Obfuscation Used by Malware: Detection and Automatic Decompression
ESET looked at the evolution of the Buhtrap group from cybercrime to espionage and its use of a recently discovered zero-day in Windows welivesecurity.com/2019/07/11/buh… welivesecurity.com/2019/07/10/win…
What do you want to say about this? Windows zero‑day CVE‑2019‑1132 exploited in targeted attacks welivesecurity.com/2019/07/10/win… prostřednictvím @welivesecurity
Exclusive: New #FinSpy iOS and #Android implants have been spotted in the wild. Read the full report here 👇 securelist.com/new-finspy-ios…
Bypassing the security of the Android operating system has succeeded more than a thousand different mobile applications. Without the knowledge of users, they were able to download confidential information and other sensitive data from smartphones and computer tablets. #Android 📴
HP bet on artificial intelligence to protect your computer HP introduced new computers and security solutions designed for the office of the future. The biggest advancement is HP Sure Sense - an artificial intelligence-based malware protection. #HPSecurityWorld 🛡️
In April, Czechs were most at risk of false questionnaires promising valuable prices The malicious HTML code / Adware.Agent.A has returned to the top of the most frequent Internet threats in the Czech Republic. #ESETSecurity 🗓️ 🛡️
O2 operator is now offering O2 Security to both mobile Internet customers and home users. It is supposed to protect their devices from a number of Internet-based threats such as malware and phishing, as well as participation in botnet attacks. #InternetSecurity 🇨🇿 ☑️ 🛡️
The latest Windows update does not understand antiviruses. Problems with the latest Windows update are reported by Avast, Sophos, Avira, ArcaBit and newly McAfee. #SecurityWorld ⚠️
A bug in Windows will allow hackers to have full control over the PC. The attack was targeted to the kernel through a backdoor built on the core Windows components. #SecurityWorld
United States Trends
- 1. Warriors 70,1 B posts
- 2. Rockets 44,3 B posts
- 3. Steve Kerr 6.355 posts
- 4. Draymond 8.538 posts
- 5. Selena 111 B posts
- 6. Papoose N/A
- 7. Diligence 4.644 posts
- 8. #playstationwrapup N/A
- 9. Voice of America 28,6 B posts
- 10. Steph 27,2 B posts
- 11. Podz 5.523 posts
- 12. Benny Blanco 18,1 B posts
- 13. #Survivor47 12,8 B posts
- 14. Knicks 35,9 B posts
- 15. Sengun 6.138 posts
- 16. Whataburger 1.316 posts
- 17. #AEWDynamite 27,5 B posts
- 18. Rejected 38,5 B posts
- 19. Kari Lake 32,3 B posts
- 20. Hawks 32,2 B posts
Something went wrong.
Something went wrong.