Tomáš Jirsík (@jirsik_tomas) 's Twitter Profile
Tomáš Jirsík

@jirsik_tomas

ID: 1135863090799611905

calendar_today04-06-2019 10:57:18

91 Tweet

8 Takipçi

63 Takip Edilen

KELA (@intel_by_kela) 's Twitter Profile Photo

Our new report sheds light on Telegram's growing #cybercrime activities, including data theft, financial #fraud, #ransomware, hacktivism, and illegal product sales. Read how Telegram became cybercriminals’ favorite place for their malicious operations: ke-la.com/wp-content/upl…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🔥 First-ever #Linux variant of Clop #ransomware has been spotted! But do not panic, it uses a flawed #encryption algorithm, so it is possible to reverse engineer the process. Read: thehackernews.com/2023/02/linux-… #malware #cybersecurity #informationsecurity #hacking

Cybersecurity and Infrastructure Security Agency (@cisagov) 's Twitter Profile Photo

🚨We released an ESXiArgs ransomware recovery script on GitHub to allow organizations to attempt recovery of virtual machines affected by the ESXiArgs ransomware attacks: github.com/cisagov/ESXiAr… #StopRansomware

concordia-h2020.eu (@concordiah2020) 's Twitter Profile Photo

Did you know that KYPO Cyber Range Platform won the 7th edition of the European Commission's Innovation Radar competition in the Disruptive Technologies category? 🛡️ Learn what this #opensource software can mean for your company and Europe. 👇 🔗 concordia-h2020.eu/blog-post/do-y… #CONCORDIAdelivers

Did you know that <a href="/KYPOCRP/">KYPO Cyber Range Platform</a> won the 7th edition of the European Commission's Innovation Radar competition in the Disruptive Technologies category? 🛡️ Learn what this #opensource software can mean for your company and Europe. 👇

🔗 concordia-h2020.eu/blog-post/do-y…

#CONCORDIAdelivers
The Hacker News (@thehackersnews) 's Twitter Profile Photo

Researchers have uncovered four new malicious packages in the #Python Package Index (PyPI) that sneak #malware onto developers' systems and manipulate their SSH authorized_keys. Read: thehackernews.com/2023/02/resear… #programming #coding #hacking #cybersecuritynews

Will (@bushidotoken) 's Twitter Profile Photo

My first blog of 2023 - Tips for Investigating Cybercrime Infrastructure 🔗blog.bushidotoken.net/2023/03/tips-f… #CTI #ThreatIntel #Cybercrime #Crypter

My first blog of 2023 - Tips for Investigating Cybercrime Infrastructure

🔗blog.bushidotoken.net/2023/03/tips-f…

#CTI #ThreatIntel #Cybercrime #Crypter
Martin Husák (@_martin_husak_) 's Twitter Profile Photo

The deadline for ARES Conference submissions is today but the call for workshop papers will be open for much longer, check GRASEC among others: ares-conference.eu/workshops/gras…

CSIRT-MU (@csirtmu) 's Twitter Profile Photo

📢 Milan Cermak is currently at the DFRWS EU 2023 Conference in Bonn to present his and Petr Velan's poster. It's great to see all of you again and hear the latest developments in the field of #digitalforensics. 👉Check the program dfrws.org/eu-2023-progra… and stay tuned! 🔥

📢 Milan Cermak is currently at the <a href="/DFRWS/">DFRWS</a> EU 2023 Conference in Bonn to present his and Petr Velan's poster. It's great to see all of you again and hear the latest developments in the field of #digitalforensics. 👉Check the program dfrws.org/eu-2023-progra… and stay tuned! 🔥
CSIRT-MU (@csirtmu) 's Twitter Profile Photo

🧐 How can #network traffic lie? This topic was presented by Milan Cermak at the DFRWS EU 2023 Conference. The poster covered #manipulation methods, tools, and #indicators for identifying and preventing hidden deception. 👉Read the full poster here: muni.cz/go/de67c2

🧐 How can #network traffic lie? This topic was presented by Milan Cermak at the <a href="/DFRWS/">DFRWS</a> EU 2023 Conference. The poster covered #manipulation methods, tools, and #indicators for identifying and preventing hidden deception. 👉Read the full poster here: muni.cz/go/de67c2
BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Microsoft announces a new GPT-4 powered AI assistant known as Security Copilot to help with incident response and threat hunting bleepingcomputer.com/news/microsoft…

AI at Meta (@aiatmeta) 's Twitter Profile Photo

To better enable the community to build on our work — and contribute to the responsible development of LLMs — we've published further details about the architecture, training compute, approach to fine-tuning & more for Llama 2 in a new paper. Full paper➡️ bit.ly/44JAELQ

To better enable the community to build on our work — and contribute to the responsible development of LLMs — we've published further details about the architecture, training compute, approach to fine-tuning &amp; more for Llama 2 in a new paper.

Full paper➡️ bit.ly/44JAELQ
Cisco Security (@ciscosecure) 's Twitter Profile Photo

Cisco XDR is now available! 🎉 💡 Simplify your #security operations and see what a powerful, data-backed #XDR tool built for #SOC analysts can do for your business 📈: cs.co/6019PZjel

NÚKIB (@nukib_cz) 's Twitter Profile Photo

🤝 Spolupráce se soukromým sektorem je významnou součástí kybernetické bezpečnosti. Zástupci NÚKIB navštívili pražskou centrálu společnosti Cisco, kde probírali aktuální trendy v oblasti detekce a analýzy kybernetických hrozeb. #jsmeNÚKIB

🤝 Spolupráce se soukromým sektorem je významnou součástí kybernetické bezpečnosti.

Zástupci NÚKIB navštívili pražskou centrálu společnosti Cisco, kde probírali aktuální trendy v oblasti detekce a analýzy kybernetických hrozeb.

#jsmeNÚKIB
Peter Shor (@petershor1) 's Twitter Profile Photo

I've put my lecture notes from my Fall 2022 Quantum Computation course online. math.mit.edu/~shor/435-LN/ I don't guarantee that there aren't any mistakes left in them, although I've tried to eradicate them all. If you find any, feel free to email me.