Michael Weisgerber (@m__weisgerber) 's Twitter Profile
Michael Weisgerber

@m__weisgerber

ID: 3334669558

calendar_today19-06-2015 11:50:31

136 Tweet

13 Followers

149 Following

Johannes Weber 🎸 (@webernetz) 's Twitter Profile Photo

After almost 6 years, 1100 commits, 7 major OS versions, and about 50 blogposts I am shutting down my Palo Alto Networks PA-200 firewall. Rest in peace. ;) blog.webernetz.net/category/vendo…

After almost 6 years, 1100 commits, 7 major OS versions, and about 50 blogposts I am shutting down my <a href="/PaloAltoNtwks/">Palo Alto Networks</a> PA-200 firewall. Rest in peace. ;) blog.webernetz.net/category/vendo…
Johannes Weber 🎸 (@webernetz) 's Twitter Profile Photo

In der aktuellen c't 11/2019: Mein Artikel über Last-Analysen von NTP-Servern und wie es zu einem neuen #Wireshark Feature kam: heise.de/select/ct/2019…

In der aktuellen c't 11/2019: Mein Artikel über Last-Analysen von NTP-Servern und wie es zu einem neuen #Wireshark Feature kam: heise.de/select/ct/2019…
René Bonvanie (@renebonvanie) 's Twitter Profile Photo

Welcome Prisma by Palo Alto Networks ! Prisma is the industry's most complete and comprehensive cloud security suite. paloaltonetworks.com/cloud-security Palo Alto Networks

KT (@koczkatamas) 's Twitter Profile Photo

LOL it turned out that Google's CTF team won Facebook's CTF (by solving ALL the challenges btw)!! And now they are trolling the #fbctf scoreboard by redirecting users to their Google CTF website... (We finished 5th btw by solving 27/33 challenges.)

LOL it turned out that Google's CTF team won Facebook's CTF (by solving ALL the challenges btw)!!

And now they are trolling the #fbctf scoreboard by redirecting users to their Google CTF website...

(We finished 5th btw by solving 27/33 challenges.)
Unit 42 (@unit42_intel) 's Twitter Profile Photo

Our researcher @jgrunzweig analyzed 10,700 samples of malware written in the the #GoLang programming language. Read his full report to understand how and why "Go" is poised to become more widely used by #malware developers: bddy.me/2J3KZLt

Our researcher @jgrunzweig analyzed 10,700 samples of malware written in the the #GoLang programming language. Read his full report to understand how and why "Go" is poised to become more widely used by #malware developers:  bddy.me/2J3KZLt
Sergej Epp (@eppsecurity) 's Twitter Profile Photo

Have you heard about the Cybersecurity #TailRisk and which role #ThreatIntelligenceSharing might play to address this problem? We are investing millions of Euros in Threat Intelligence feeds but fail to process around 80-86% of collected information. bit.ly/304yFjB

Unit 42 (@unit42_intel) 's Twitter Profile Photo

We have released 11 new Adversary Playbooks as part of our mission to provide actionable threat intelligence. Learn more: bddy.me/2YylUws

We have released 11 new Adversary Playbooks as part of our mission to provide actionable threat intelligence. Learn more: bddy.me/2YylUws
Lore Frost (@lobot) 's Twitter Profile Photo

Ich arbeite in einem IT-Unternehmen in einer Region Südhessens, in der die Wörter „Azure“ und „Ärger“ sich (bei Sprecher*innen des lokalen Dialekts) phonetisch völlig identisch darstellen.

Ryan Olson (@ireo) 's Twitter Profile Photo

Today I was reminded of the 2015 "Women with Purses" paper. A vendor produced document on exploit kits, in which 13 of the 15 pages contain the same picture of women, walking away, with purses. bit.ly/2sK9UOd

Johannes Weber 🎸 (@webernetz) 's Twitter Profile Photo

Ab heute in der c‘t 4/2020: Mein Artikel über Netzwerk-Live-Monitoring mit ntop. Artikelserie zusammen mit Jasper 🤙🏻 heise.de/select/ct/2020…

Ab heute in der c‘t 4/2020: Mein Artikel über Netzwerk-Live-Monitoring mit <a href="/ntop_org/">ntop</a>. Artikelserie zusammen mit <a href="/PacketJay/">Jasper</a> 🤙🏻 heise.de/select/ct/2020…
Unit 42 (@unit42_intel) 's Twitter Profile Photo

When reviewing suspicious network activity, we often run across encrypted traffic. This tutorial describes how to decrypt HTTPS traffic from a pcap in Wireshark. bit.ly/34pyRiP

When reviewing suspicious network activity, we often run across encrypted traffic. This tutorial describes how to decrypt HTTPS traffic from a pcap in Wireshark. bit.ly/34pyRiP
Michael Weisgerber (@m__weisgerber) 's Twitter Profile Photo

"Tag italki with #italkiRefresh for a shot at winning up to $50 credits!", hieß es. Hiermit getan. Lernen wirklich so wenige Italienisch, dass ich mit 5 Lektionen zu den Top 48% gehöre? Schon wieder so ein chinesischer Marktplatz, der post-faktisch arbeitet?

"Tag <a href="/italki/">italki</a> with #italkiRefresh for a shot at winning up to $50 credits!", hieß es. Hiermit getan. Lernen wirklich so wenige Italienisch, dass ich mit 5 Lektionen zu den Top 48% gehöre? Schon wieder so ein chinesischer Marktplatz, der post-faktisch arbeitet?