rayh4c (@rayh4c) 's Twitter Profile
rayh4c

@rayh4c

ID: 179411715

calendar_today17-08-2010 06:23:46

119 Tweet

1,1K Followers

3,3K Following

rayh4c (@rayh4c) 's Twitter Profile Photo

Although many security companies have published detailed reports of attacks, for most customers, this is an unsuspecting massacre. Shameful~huntress.com/hubfs/Mass%20E…

rayh4c (@rayh4c) 's Twitter Profile Photo

In fact, the attack log has already given clues to the vulnerability...&schema=ResetOABVirtualDirectory ~ reddit.com/r/sysadmin/com…

rayh4c (@rayh4c) 's Twitter Profile Photo

Yes, APT actors have also noticed this, and the IE 0day (CVE-2021-26411) attack carried out in the wild was also hunted down by the Chinese security team.

rayh4c (@rayh4c) 's Twitter Profile Photo

The security of cloud-based IOT devices concentrates all the key points on the supplier company itself, and getting one company puts the entire industry at risk ~ verkada.com/security-updat…

rayh4c (@rayh4c) 's Twitter Profile Photo

Godaddy's sso api does not seem to be secure, it is full of security holes, such as yenthanh.medium.com/how-did-i-hack…. But the official should have a better security plan to deal with, and give users an account of the loss.

Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Automatic on-premises Exchange Server mitigation is now in Microsoft Defender Antivirus. We have taken this additional step to further support our customers who have not yet implemented the complete security update. Learn more: msft.it/6017VMA3d

rayh4c (@rayh4c) 's Twitter Profile Photo

This is not a new thing, a semi-public red team technique, Microsoft's official domain name can become the c&c of cobalt strike! Reference vullnerability.com/blog/microsoft…

rayh4c (@rayh4c) 's Twitter Profile Photo

A joke, the automatic discovery of the windows client normally does not request the TLD, but the external network firewall may block all the automatic discovery requests of the client, causing it to eventually go to the TLD.

rayh4c (@rayh4c) 's Twitter Profile Photo

The ultimate problem of security, all operable and input variables are code execution loopholes, because all variables may be printed in logs. This is a loophole in the annals of history, the ultimate dream of hackers, and the jewel in the crown.