@DuanHork1 Profile picture

Dušan Horák

@DuanHork1

Security at our core routers and switches that monitor the amount of data transmitted. Virtual networks (VLAN) #ITIL #ISMS #NetFlow #NBAD #FlowMon #SIEM #SaaS

Joined December 2013
Similar User
Nik photo

@Security_Sleuth

Carlos Said photo

@cgsaid

Brian Murphy photo

@brianmurphyRQ

Kanwar Sandhu photo

@Sandhu_KP

Redport IA photo

@Redport_IA

John Heijmann photo

@cowboysec

Bob Sipes photo

@BobSipes

Prash photo

@Suren_Pamidi

Pinned

In the past twelve months has faced in the Czech Republic, targeted cyber attacks 13% of the companies. #infosec #cybercrime #cyberattack


Prosperity and indulgence end, you can't buy your life with money and you won't pay for the COVID-19 pandemic. #pandemic #COVID-19

DuanHork1's tweet image. Prosperity and indulgence end, you can't buy your life with money and you won't pay for the COVID-19 pandemic.
#pandemic #COVID-19

Dušan Horák Reposted

Hydra - I have just completed this room! Check it out: tryhackme.com/room/hydra #tryhackme #hydra #bruteforce #hydra via @realtryhackme


The mysterious Russian was reminded again. Hospitals are on call. The attacks are also dealt with by the National Office for Cyber Security (NÚKIB). #Bruteforce and scan


Tajemný Rus se opět připomněl. Nemocnice jsou v pohotovosti seznamzpravy.cz/clanek/tajemny… prostřednictvím @SeznamZpravy


The Rescoms Trojan opens the back door to Windows #Trojan #backdoor

DuanHork1's tweet image. The Rescoms Trojan opens the back door to Windows
#Trojan #backdoor

Is there a second Chernobyl disaster? The giant fire is a kilometer from the power plant #SecurityandRisk View from one of the high-rise buildings in Pripyat. The new cover of the Chernobyl nuclear power plant is circled.

DuanHork1's tweet image. Is there a second Chernobyl disaster? The giant fire is a kilometer from the power plant
#SecurityandRisk 

View from one of the high-rise buildings in Pripyat. The new cover of the Chernobyl nuclear power plant is circled.

Malware authors often use compression and obfuscation methods to disguise the body of malicious programs. 🧐 Packers and Methods of Obfuscation Used by Malware: Detection and Automatic Decompression


Hacks, cracks, and malware attacks – July 2019 techtalk.gfi.com/hacks-cracks-a…


Dušan Horák Reposted

ESET looked at the evolution of the Buhtrap group from cybercrime to espionage and its use of a recently discovered zero-day in Windows welivesecurity.com/2019/07/11/buh… welivesecurity.com/2019/07/10/win…

virusbtn's tweet image. ESET looked at the evolution of the Buhtrap group from cybercrime to espionage and its use of a recently discovered zero-day in Windows <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/JscOD6mbfZ">welivesecurity.com/2019/07/11/buh…</a> <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/DwAk0UxQaw">welivesecurity.com/2019/07/10/win…</a>

What do you want to say about this? Windows zero‑day CVE‑2019‑1132 exploited in targeted attacks welivesecurity.com/2019/07/10/win… prostřednictvím @welivesecurity


Dušan Horák Reposted

Exclusive: New #FinSpy iOS and #Android implants have been spotted in the wild. Read the full report here 👇 securelist.com/new-finspy-ios…


Bypassing the security of the Android operating system has succeeded more than a thousand different mobile applications. Without the knowledge of users, they were able to download confidential information and other sensitive data from smartphones and computer tablets. #Android 📴

DuanHork1's tweet image. Bypassing the security of the Android operating system has succeeded more than a thousand different mobile applications. Without the knowledge of users, they were able to download confidential information and other sensitive data from smartphones and computer tablets. #Android 📴

Email Traffic Overview Přehled návštěvnosti e-mailu talosintelligence.com


HP bet on artificial intelligence to protect your computer HP introduced new computers and security solutions designed for the office of the future. The biggest advancement is HP Sure Sense - an artificial intelligence-based malware protection. #HPSecurityWorld 🛡️

DuanHork1's tweet image. HP bet on artificial intelligence to protect your computer
HP introduced new computers and security solutions designed for the office of the future. The biggest advancement is HP Sure Sense - an artificial intelligence-based malware protection. #HPSecurityWorld 🛡️

In April, Czechs were most at risk of false questionnaires promising valuable prices The malicious HTML code / Adware.Agent.A has returned to the top of the most frequent Internet threats in the Czech Republic. #ESETSecurity 🗓️ 🛡️

DuanHork1's tweet image. In April, Czechs were most at risk of false questionnaires promising valuable prices
The malicious HTML code / Adware.Agent.A has returned to the top of the most frequent Internet threats in the Czech Republic. #ESETSecurity 🗓️ 🛡️

O2 operator is now offering O2 Security to both mobile Internet customers and home users. It is supposed to protect their devices from a number of Internet-based threats such as malware and phishing, as well as participation in botnet attacks. #InternetSecurity 🇨🇿 ☑️ 🛡️

DuanHork1's tweet image. O2 operator is now offering O2 Security to both mobile Internet customers and home users. It is supposed to protect their devices from a number of Internet-based threats such as malware and phishing, as well as participation in botnet attacks. #InternetSecurity 🇨🇿 ☑️ 🛡️

The latest Windows update does not understand antiviruses. Problems with the latest Windows update are reported by Avast, Sophos, Avira, ArcaBit and newly McAfee. #SecurityWorld ⚠️

DuanHork1's tweet image. The latest Windows update does not understand antiviruses.
Problems with the latest Windows update are reported by Avast, Sophos, Avira, ArcaBit and newly McAfee. #SecurityWorld ⚠️

A bug in Windows will allow hackers to have full control over the PC. The attack was targeted to the kernel through a backdoor built on the core Windows components. #SecurityWorld

DuanHork1's tweet image. A bug in Windows will allow hackers to have full control over the PC. The attack was targeted to the kernel through a backdoor built on the core Windows components. #SecurityWorld

Nine companies across the Czech Republic lost millions of crowns when their accountants sent money to foreign accounts on fraudulent emails. They did so after someone hacked into a company email and sent them a payment request on behalf of their manager. #hacking #infosec 😃 📢


United States Trends
Loading...

Something went wrong.


Something went wrong.