dragoneyeintel's profile picture. Cybersecurity Research Group | Founded by @nootsploit

Dragon Eye Intelligence

@dragoneyeintel

Cybersecurity Research Group | Founded by @nootsploit

Dragon Eye Intelligence reposted

It's that time of the year again - time to block off a weekend or two and watch videos from #defcon31 on #YouTube! youtube.com/channel/UC6Om9… We've got all the main stage talks, a bunch of Village Stage talks, War Stories and the Policy series, all waiting to entertain and…


Dragon Eye Intelligence reposted

Just unpacked some of the news from @Apple’s event today, revealing some info that will be of interest to the #DFIR community. While the #iPhone15 will finally move to USB-C ports, only the iPhone 15 Pro will transfer data at USB 3 speeds, while “regular” iPhone 15 models will…

Craig__Bowling's tweet image. Just unpacked some of the news from @Apple’s event today, revealing some info that will be of interest to the  #DFIR community. While the #iPhone15 will finally move to USB-C ports, only the iPhone 15 Pro will transfer data at USB 3 speeds, while “regular” iPhone 15 models will…

Dragon Eye Intelligence reposted

🚨🚨WE URGE EVERYONE TO UPDATE THEIR APPLE DEVICES AS SOON AS POSSIBLE. We have found an actively exploited #zero #click vulnerability that was used to deliver #NSO group’s #Pegasus #spyware. citizenlab.ca/2023/09/blastp…


Dragon Eye Intelligence reposted

🎉 Excitement is in the air! 🥳 Mark your calendars for the #HTCIA #LunchandLearn event on September 6th! 📅🎈 We can hardly contain our enthusiasm for this amazing opportunity! Have you secured your spot yet? @Hexordia @HTCIA Register Here: …tigationassociation.growthzoneapp.com/ap/Events/Regi…

Contact_APF's tweet image. 🎉 Excitement is in the air! 🥳 Mark your calendars for the #HTCIA #LunchandLearn event on September 6th! 📅🎈 We can hardly contain our enthusiasm for this amazing opportunity! Have you secured your spot yet? @Hexordia @HTCIA

Register Here: …tigationassociation.growthzoneapp.com/ap/Events/Regi…

Dragon Eye Intelligence reposted

TikTok has more than a billion users. What many of them don’t know, however, is that TikTok is a Chinese business. While there’s no law against that, what is worrying is the amount of personal data the company harvests from its followers. Watch #60Mins on @9Now


Dragon Eye Intelligence reposted

Microsoft has released CVE-2023-23397 to address the critical elevation of privilege (EoP) vulnerability affecting Microsoft Outlook for Windows. We strongly recommend all customers update Microsoft Outlook for Windows to remain secure. Learn more ⬇️ msft.it/6018504d4


Dragon Eye Intelligence reposted

Uploaded all my Offensive Security & Reverse Engineering (OSRE) course labs (docx) to my repo found below. Most of them have very detailed instructions and should be great to get you started in Software Exploitation. 1/n #Offsec #SoftwareExploitation #RE exploitation.ashemery.com

binaryz0ne's tweet image. Uploaded all my Offensive Security & Reverse Engineering (OSRE) course labs (docx) to my repo found below. Most of them have very detailed instructions and should be great to get you started in Software Exploitation. 1/n
#Offsec #SoftwareExploitation #RE

exploitation.ashemery.com

Dragon Eye Intelligence reposted

If you are new to Mobile Forensics or if you are looking for quality ***FREE*** Mobile Forensics training to supplement your training then look no further than Cyber 5W. @hexordia and her team have some excellent free training. academy.cyber5w.com/collections/mo…


Dragon Eye Intelligence reposted

I have created a guide on several methods for screen sharing an iOS device to a PC. I personally use screen sharing along with a live timestamp counter when populating data for DFIR application testing dragoneyeintel.com/papers-pdf/scr…


Dragon Eye Intelligence reposted

During my talk at HTCIA I claimed that the vulnerability in Adirondack Solutions worked on every school I tested except for MIT. Turns out I was wrong, MIT worked as well. It was in my junk folder :p

nootnoot4n6's tweet image. During my talk at HTCIA I claimed that the vulnerability in Adirondack Solutions worked on every school I tested except for MIT. Turns out I was wrong, MIT worked as well. It was in my junk folder :p

Loading...

Something went wrong.


Something went wrong.