#technews
https://www.forbes.com/sites/gordonkelly/2020/06/16/google-chrome-critical-problems-windows-10-warning-update-chrome-browser/amp/
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
https://www.forbes.com/sites/gordonkelly/2020/06/16/google-chrome-critical-problems-windows-10-warning-update-chrome-browser/amp/
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Forbes
Google Confirms Serious New Problems For Chrome Users
Chrome has run into serious problems and Google knew they were coming months ago...
[Udemy] The Ultimate Cyber Security and Ethical Hacking Course 2020
Claim It Before Expired Coupon Code π
πLink:- https://bit.ly/2YLdt3c π
Limited Time Period
#share & #supportus
π @geekcodeπ
Don't forget to join us ππ»
Claim It Before Expired Coupon Code π
πLink:- https://bit.ly/2YLdt3c π
Limited Time Period
#share & #supportus
π @geekcodeπ
Don't forget to join us ππ»
Udemy
Online Courses - Anytime, Anywhere | Udemy
Udemy is the world's largest destination for online courses. Discover an online course on Udemy.com and start learning a new skill today.
π°Kaspersky Malware Analysis and Reverse Engineering courseπ°
βοΈ These courses are intended for security researchers and incident response personnel,
malware analysts, security engineers, network security analysts, APT hunters and IT security
staff. Students will become familiar with the scope of reverse engineering applications,
assembly language, corresponding tools, common techniques used by malware authors
to maintain persistence, avoid detection, inject into system processes memory etc.
The advanced course will cover most of the steps required to analyze a modern APT
toolkit, from receiving the initial sample, all the way to producing a deep technical
description with IOCs
β’ Basic analysis using IDA Pro
β’ Dynamic analysis using popular virtualization solutions and debuggers
β’ Malicious documents analysis
β’ Unpacking
β’ Decryption
β’ Shellcodes analysis
β’ Exploit analysis
β’ Reversing tips and tricks
πLab Download :
https://mega.nz/folder/u5JnhCga
Pass : _PwXA4xcKRzK5hKwDq7eeA
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
βοΈ These courses are intended for security researchers and incident response personnel,
malware analysts, security engineers, network security analysts, APT hunters and IT security
staff. Students will become familiar with the scope of reverse engineering applications,
assembly language, corresponding tools, common techniques used by malware authors
to maintain persistence, avoid detection, inject into system processes memory etc.
The advanced course will cover most of the steps required to analyze a modern APT
toolkit, from receiving the initial sample, all the way to producing a deep technical
description with IOCs
β’ Basic analysis using IDA Pro
β’ Dynamic analysis using popular virtualization solutions and debuggers
β’ Malicious documents analysis
β’ Unpacking
β’ Decryption
β’ Shellcodes analysis
β’ Exploit analysis
β’ Reversing tips and tricks
πLab Download :
https://mega.nz/folder/u5JnhCga
Pass : _PwXA4xcKRzK5hKwDq7eeA
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
mega.nz
File folder on MEGA
Uploading large payload on domain instructions causes server-side DoS
https://hackerone.com/reports/887321
#share & #supportus
π @geekcode π
Don't forget to join us,ππ»
https://hackerone.com/reports/887321
#share & #supportus
π @geekcode π
Don't forget to join us,ππ»
HackerOne
HackerOne disclosed on HackerOne: Uploading large payload on domain...
This was a DoS vulnerability in a specific endpoint that didn't limit the size of the upload. As explained in the hacker summary, we limited the payload to mitigate the attack.
https://www.microsoft.com/en-us/research/blog/high-resolution-network-a-universal-neural-architecture-for-visual-recognition/
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Microsoft Research
High-Resolution Network: A universal neural architecture for visual recognition - Microsoft Research
HRNet, created from general vision tasks, leads in many computer vision fields like semantic segmentation, human pose estimation, and object detection. Discover how HRNet achieves better results with fewer parameter and computation complexities.
#technews #cybersecurity
Hundreds of malicious Chrome browser extensions used to spy on you!
https://securityaffairs.co/wordpress/105007/cyber-crime/chrome-browser-extensions-surveillance.html?utm\_source=rss&utm\_medium=rss&utm\_campaign=chrome-browser-extensions-surveillance
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Hundreds of malicious Chrome browser extensions used to spy on you!
https://securityaffairs.co/wordpress/105007/cyber-crime/chrome-browser-extensions-surveillance.html?utm\_source=rss&utm\_medium=rss&utm\_campaign=chrome-browser-extensions-surveillance
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Security Affairs
Hundreds of malicious Chrome browser extensions used to spy on you!
Malicious Chrome extensions were employed in surveillance campaign on a large scale, millions of users potentially impacted.
How to Avoid Data Leakage When Performing Data Preparation
https://machinelearningmastery.com/data-preparation-without-data-leakage/
#share & #supportus
π @geekcodeπ
Don't forget to join us ππ»
https://machinelearningmastery.com/data-preparation-without-data-leakage/
#share & #supportus
π @geekcodeπ
Don't forget to join us ππ»
MachineLearningMastery.com
How to Avoid Data Leakage When Performing Data Preparation - MachineLearningMastery.com
Data preparation is the process of transforming raw data into a form that is appropriate for modeling. A naive approach to preparing data applies the transform on the entire dataset before evaluating the performance of the model. This results in a problemβ¦
ββπ°GetAltName β Discover Sub-Domains From SSL Certificatesπ°
GetAltName itβs a little script to discover sub-domains that can extract Subject Alt Names for SSL Certificates directly from HTTPS websites which can provide you with DNS names or virtual servers. Itβs useful in a discovery phase of a pen-testing assessment, this tool can provide you with more information about your target and scope.
πDownload: https://bit.ly/2AiTrEM
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
GetAltName itβs a little script to discover sub-domains that can extract Subject Alt Names for SSL Certificates directly from HTTPS websites which can provide you with DNS names or virtual servers. Itβs useful in a discovery phase of a pen-testing assessment, this tool can provide you with more information about your target and scope.
πDownload: https://bit.ly/2AiTrEM
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
#technews
A group of hacktivists and transparency advocates has published a massive 269 GB of data allegedly stolen from more than 200 police departments, fusion centers, and other law enforcement agencies across the United States. Dubbed BlueLeaks, the exposed data leaked by the DDoSecrets group contains hundreds of thousands of sensitive documents from the past ten years with official and personalMedia
https://thehackernews.com/2020/06/law-enforcement-data-breach.html
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
A group of hacktivists and transparency advocates has published a massive 269 GB of data allegedly stolen from more than 200 police departments, fusion centers, and other law enforcement agencies across the United States. Dubbed BlueLeaks, the exposed data leaked by the DDoSecrets group contains hundreds of thousands of sensitive documents from the past ten years with official and personalMedia
https://thehackernews.com/2020/06/law-enforcement-data-breach.html
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Learn To Invest All Your Money Someplace where it grows ( not in banks , but in such platforms )
There are More platforms other than these one's where you can invest all your money but this are THE TOP 4 Money Investing Platform which gives lot of profit over the time ...
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
There are More platforms other than these one's where you can invest all your money but this are THE TOP 4 Money Investing Platform which gives lot of profit over the time ...
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Missing Photoshop on Linux? Use PhotoGIMP and Convert GIMP into Photoshop
Itsfoss --> kutt.it/fN8USo
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Itsfoss --> kutt.it/fN8USo
#share & #supportus
π @geekcode π
Don't forget to join us ππ»