What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Blog.webp 2020-07-16 19:17:10 Forensic Investigation: Ghiro for Image Analysis (lien direct) In this article, we will learn how we can use the Ghiro image analysis tool in forensic investigation. Ghiro is a digital image forensic tool. Which is fully automated and opensource. Table of Content What is Ghiro? Features of Ghiro Setup the Ghiro Working on case with Ghiro What is Ghiro? It is developed by... Continue reading → Tool
TechRepublic.webp 2020-07-16 14:44:01 How to recover files from an inaccessible memory card with Disk Drill (lien direct) If you find you have a memory card that can't be accessed, fear not--that data might not be completely lost. With the help of a tool like Disk Drill, you could save those files. Tool
Mandiant.webp 2020-07-16 14:40:00 CAPA: Identifiez automatiquement les capacités de logiciels malveillants
capa: Automatically Identify Malware Capabilities
(lien direct)
capa est le nouvel outil open source de l'équipe Flare \\ pour analyser les programmes malveillants.Notre outil fournit un cadre pour que la communauté puisse encoder, reconnaître et partager des comportements que nous avons vus dans les logiciels malveillants.Quel que soit votre parcours, lorsque vous utilisez CAPA, vous invoquez des décennies d'expérience cumulative d'ingénierie inverse pour comprendre ce qu'un programme fait.Dans cet article, vous apprendrez comment fonctionne CAPA, comment installer et utiliser l'outil, et pourquoi vous devez l'intégrer dans votre flux de travail de triage à partir d'aujourd'hui. Problème Les analystes efficaces peuvent rapidement comprendre et hiérarchiser les fichiers inconnus dans
capa is the FLARE team\'s newest open-source tool for analyzing malicious programs. Our tool provides a framework for the community to encode, recognize, and share behaviors that we\'ve seen in malware. Regardless of your background, when you use capa, you invoke decades of cumulative reverse engineering experience to figure out what a program does. In this post you will learn how capa works, how to install and use the tool, and why you should integrate it into your triage workflow starting today. Problem Effective analysts can quickly understand and prioritize unknown files in
Malware Tool ★★★★
bleepingcomputer.webp 2020-07-16 10:20:38 Scammers hacked Twitter and hijacked accounts using admin tool (lien direct) Hackers were able to hijack dozens of high-profile Twitter accounts on Wednesday after gaining access to internal user administration tools and systems. [...] Tool
TechRepublic.webp 2020-07-15 14:17:38 How to create a Kubernetes ReplicaSet (lien direct) If you're looking to maintain a stable set of Kubernetes replica pods running at any given time, the tool you need is ReplicaSets. Find out how to use this handy feature. Tool Uber
securityintelligence.webp 2020-07-15 11:35:00 A Quick Guide to Using the ONG-C2M2 Model (lien direct) The Oil and Natural Gas Subsector Cybersecurity Capability Maturity Model (ONG-C2M2) can help oil and natural gas (ONG) organizations evaluate their cybersecurity programs and make improvements. These tools allow owners and operators in the electricity and ONG sectors to assess their cybersecurity capabilities. Additionally, the tool can inform individuals on how to address their needs […] Tool
bleepingcomputer.webp 2020-07-13 21:57:16 New AgeLocker Ransomware uses Googler\'s utility to encrypt files (lien direct) A new and targeted ransomware named AgeLocker utilizes the 'Age' encryption tool created by a Google employee to encrypt victim's files. [...] Ransomware Tool ★★★★
bleepingcomputer.webp 2020-07-13 11:01:27 Windows 10\'s Feedback Hub: A forum for political trolls, spammers (lien direct) When Microsoft made the Feedback Hub universal app available to Windows 10 Insiders in March 2016 and generally available two months later, the plan was for the app to be the perfect tool for users to report issues and share suggestions on how to improve Windows experience for all customers. [...] Tool
bleepingcomputer.webp 2020-07-11 11:26:47 How to enable Windows 10\'s hidden features using Mach2 (lien direct) Windows 10 builds contain many hidden features that are used by Microsoft to debug code or test applications that have not been officially released yet. A new tool has been released that enables you to find and enable these hidden features in Windows 10. [...] Tool
TechRepublic.webp 2020-07-10 15:48:20 Stop surveying and start doing: Just because you have the tool doesn\'t mean you should use it (lien direct) Technology has made surveys too easy to execute while organizational culture makes it too hard to do anything with the results. Tool
TechRepublic.webp 2020-07-09 09:00:09 Forter Smart Routing prevents the 10% revenue loss merchants face from falsely declined payments (lien direct) With pre-authentication fraud detection, dynamic 3DS, smart routing, and recovery of declines, the automated tool streamlines successful transactions. Tool
TechRepublic.webp 2020-07-08 14:47:31 How to use the Android 10 Google Pixel Styles feature (lien direct) Android 10 on the Google Pixel phone includes a feature that allows you to customize the style of the UI. Learn how to use this tool that could end up being available on all Android 11 phones. Tool
itsecurityguru.webp 2020-07-08 11:18:32 6000 F5 Devices At Risk of CyberAttack Once Again (lien direct) It has been revealed by security firm, CRITICALSTART, that mitigation of the severely critical security flaw in F5 Networks’ BIG-IP tool can be bypassed. This leaves another 6,000 F5 devices exposed to an attack once again. Source: Computer Business Review Tool
AlienVault.webp 2020-07-08 08:15:00 Zero Trust security model explained: what is Zero Trust? (lien direct) This blog was written by a third party author What is Zero Trust? Zero Trust is a cybersecurity model with a tenet that any endpoint connecting to a network should not be trusted by default. With Zero Trust, everything and everyone— including users, devices, endpoints —must be properly verified before access to the network is allowed. The protocols for a Zero Trust network ensure very specific rules are in place to govern the amount of access granted, and are based upon the type of user, location, and other variables. If the security status of any connecting endpoint or user cannot be resolved, the Zero Trust network will deny the connection by default. If the connection can be verified, it will be subject to a restrictive policy for the duration of its network access. Zero Trust networks operate under the least-privilege principle, in which all programs, processes, devices or users are limited to the minimum privileges required to carry out their functions. Access rights don’t need to be too restrictive; privileges can range from full access to no rights at all, depending on the circumstances. Think of it like the government or military’s “need-to-know” policy. It’s essential to make the distinction that Zero Trust is not a technology and more of a holistic approach to network security. However, achieving ZTA in today’s threat landscape does require some form of automation, especially in support of a dynamic policy, authorization and authentication. Automated technology is an essential tool for obtaining access, scanning and assessing threats, adapting to behavior changes, and continually re-evaluating confidence in communications. Where did Zero Trust begin? The concept of Zero Trust is largely credited to Forrester Research analyst John Kindervag, who published a paper outlining the framework in 2010. Shortly after the paper’s publishing, Google began adopting the process, and soon, the tech world caught on. Why is Zero Trust so important today? As the work from home (WFH) model is adopted by more organizations to meet the demand of a reshaped economy, scores of endpoints are originating from outside of the protected corporate perimeter. The challenge of managing these connections is increasing dramatically — and protecting personal, financial, and customer data is paramount. The network and workplace of the future, where more remote connections are the norm rather than the exception, has arrived faster than anyone imagined. Architectures like Zero Trust are a critical component for enabling secure, adaptable, and agile networks and systems. What are the core principles of Zero Trust? One of the primary strategies necessary for successful zero trust implementation is network segmentation. Separating your network into smaller networks ensures devices, servers, and services containing sensitive data are isolated from the rest of the network. This process keeps a potential attacker contained within the network segment they’ve accessed. Further, micro-segmentation is crucial, as it adds another preventative layer in reducing lateral network movement. Much like network segmentation, the foundations of Zero Trust include other facets of robust security hygiene: Application of authentication and encryption for all communications independent of location, performed at the application layer closest to the asset in the network Following comprehensive vulnerability and patch management procedures Continuous monitoring of device and application state to identify and address security vulnerabilities as needed, or act on their access privileges accordingly Controlling and monitoring all traffic as access is provided — to improve security posture and create, adjust and enforce policy How do I implement the Zero Trust model? Tool Vulnerability Threat
Mandiant.webp 2020-07-07 13:00:00 Configuration d'un domaine Windows pour analyser dynamiquement un outil de mouvement latéral obscurci
Configuring a Windows Domain to Dynamically Analyze an Obfuscated Lateral Movement Tool
(lien direct)
Nous avons récemment rencontré un grand échantillon de logiciels malveillants obscurcis qui a offert plusieurs défis d'analyse intéressants.Il a utilisé la virtualisation qui nous a empêchés de produire un vidage de mémoire entièrement désobfusé pour une analyse statique.L'analyse statiquement d'un grand échantillon virtualisé peut prendre de plusieurs jours à plusieurs semaines.Le contournement de cette étape chronophage a présenté une opportunité de collaboration entre l'équipe d'ingénierie inverse de Flare et l'équipe de conseil Mandiant qui a finalement économisé de nombreuses heures d'ingénierie inverse difficile. Nous avons soupçonné que l'échantillon était un mouvement latéral
We recently encountered a large obfuscated malware sample that offered several interesting analysis challenges. It used virtualization that prevented us from producing a fully-deobfuscated memory dump for static analysis. Statically analyzing a large virtualized sample can take anywhere from several days to several weeks. Bypassing this time-consuming step presented an opportunity for collaboration between the FLARE reverse engineering team and the Mandiant consulting team which ultimately saved many hours of difficult reverse engineering. We suspected the sample to be a lateral movement
Malware Tool ★★★★
TechRepublic.webp 2020-07-06 15:05:01 How to use virtual desktops on Chrome OS (lien direct) Learn how to make your Chromebook a more efficient and productive tool with the help of virtual desktops. Tool
TechRepublic.webp 2020-07-03 11:16:00 5 tips to take your Gmail use to the next level (lien direct) Google's mail product may be the single most powerful tool in the world for productivity … if you know the power tips. Here are some ways to enhance your Gmail usage. Tool
bleepingcomputer.webp 2020-07-02 17:48:08 Malwarebytes AdwCleaner now removes malware from the command line (lien direct) The popular AdwCleaner tool from Malwarebytes is about to get even more popular as it now can be used entirely from the command line. [...] Malware Tool
bleepingcomputer.webp 2020-07-02 15:23:00 Windows 10 background image tool can be abused to download malware (lien direct) A binary in Windows 10 responsible for setting an image for the desktop and lock screen can help attackers download malware on a compromised system without raising the alarm. [...] Malware Tool
bleepingcomputer.webp 2020-07-02 09:44:33 GoldenSpy backdoor installed by tax software gets remotely removed (lien direct) As soon as security researchers uncovered the activity of GoldenSpy backdoor, the actor behind it fell back and delivered an uninstall tool to remove all traces of the malware. [...] Tool ★★
TechRepublic.webp 2020-06-30 10:24:03 Microsoft Teams is different on desktop, iOS and Android: Here\'s what you need to know (lien direct) Microsoft is rapidly evolving its Teams app on iOS and Android, as the collaboration tool embraces firstline and other mobile workers. Tool
bleepingcomputer.webp 2020-06-29 11:35:39 Microsoft Word to get Bing-powered plagiarism checker (lien direct) Microsoft announced that the similarity checker tool bundled with the AI-powered Microsoft Editor writing virtual assistant will also be available within Microsoft Word, the company's word processor. [...] Tool
itsecurityguru.webp 2020-06-29 11:12:44 Study Tool OneClass Accidentally Exposes Millions of Records (lien direct) Researchers at vpnMentor say that an improperly-secured online database belonging to OneClass has left the private information of more than a million students exposed.  The tool lets students share class notes and study guides. vpnMentor researchers discovered the database while performing a series of routine Internet scans and estimates that the exposed OneClass database included nearly […] Tool
bleepingcomputer.webp 2020-06-27 18:37:23 Microsoft quietly created a Windows 10 File Recovery tool, how to use (lien direct) Microsoft has created a Windows 10 File Recovery Tool that recovers deleted files and forgot to tell anyone. [...] Tool
TechRepublic.webp 2020-06-26 17:36:48 Xerox introduces app to support hybrid workforce needs (lien direct) The quick-to-deploy tool is aimed at organizations that need to keep on top of employee availability during a pandemic, the company says. Tool ★★★
TechRepublic.webp 2020-06-25 19:30:34 Ohio using AI to cull old laws and streamline regulations (lien direct) An AI tool developed by Deloitte is helping Ohio eliminate redundant and unnecessary regulations and rules that cost businesses and taxpayers time and money. Tool Deloitte
TechRepublic.webp 2020-06-25 11:48:06 Slack wants to replace email, and thinks this new tool can finally make it happen (lien direct) Slack Connect lets companies chat with up to 20 other external organizations, instantaneously and securely. Tool
DarkReading.webp 2020-06-25 09:40:00 Lucifer Malware Aims to Become Broad Platform for Attacks (lien direct) The recent spread of the distributed denial-of-service tool attempts to exploit a dozen web-framework flaws, uses credential stuffing, and is intended to work against a variety of operating systems. Malware Tool
TechRepublic.webp 2020-06-24 17:43:36 Puppet launches public beta of Relay tool to automate DevOps tasks (lien direct) Relay promises to automate key processes from a range of cloud-based apps and services, including GitHub, Datadog, Jira, Terraform, and Slack. Tool
TechRepublic.webp 2020-06-24 17:13:44 Databricks\' Delta Engine promises 8 times the speed of Apache Spark (lien direct) Now in general availability, the new analytics tool for use with the Delta Lake schema could make unwieldy data lakes a thing of the past. Tool
no_ico.webp 2020-06-24 14:52:00 Is upatre downloader coming back ? (lien direct) Hi Folks, today I want to share a quantitative analysis on a weird return-match by Upatre. According to Unit42 Upatre is an ancient downloader firstly spotted in 2013 used to inoculate banking trojans and active up to 2016. First discovered in 2013, Upatre is primarily a downloader tool responsible for delivering additional trojans onto the […] Tool
TechRepublic.webp 2020-06-23 14:36:16 How to install the Strapi Node.js headless CMS (lien direct) Looking to develop and consume your own custom APIs? Strapi might be the tool for you. Learn how to quickly spin up this developer-centric CMS tool. Tool
BBC.webp 2020-06-20 13:02:04 Coronavirus: New Covid-19 tracing tool appears on smartphones (lien direct) The new "exposure notification" tool is part of an update to iPhone and Android operating systems. Tool
AlienVault.webp 2020-06-16 11:00:00 Cybersecurity for small business supply chain management (lien direct) This blog was written by an independent guest blogger. small business owners conferring Image Source: Pexels Small businesses are significant contributors to the economy. According to the U.S. Small Administration, they generate approximately 44% of the gross domestic product (GDP) in the U.S. However, small to medium enterprises (SMEs) are also frequently more vulnerable to the threats of our contemporary digital landscape. Small businesses that utilize the supply chain have frequently been subject to risks, as their vetting processes for vendors and partners may be less stringent than larger businesses.  But as the implementation of and reliance upon technology has grown, cybersecurity has become one of the most significant issues for even small businesses. Supply chain management consists of many moving parts and is therefore often subject to various points of vulnerability. For small businesses, if these are mismanaged, cybercriminals have the potential to cause serious damage. We’re going to take a look at some of the key cybersecurity risks that small businesses face. How can leaders manage these risks more effectively, and what tools are at their disposal? The risks Cybersecurity is a prevalent threat in almost every industry. Some are more attractive targets than others; either due to a greater prospect of reward for the criminal or the presence of weaker system protections. Few are immune to risk. However, small businesses utilizing the supply chain are subject to some specific areas of vulnerability, including: Partners. Small businesses are not always able to own or operate every step of their supply chain. This means that they are often reliant upon partners to handle essential elements such as logistics or supply of raw materials. While these relationships are positive for all concerned, there is a risk present in inconsistent cybersecurity protections across all partners. If one link in the chain doesn’t have sufficient system protections, this can present the risk of a breach to all companies they are connected to and even expose customers themselves. Software. Small businesses are unlikely to utilize their own proprietary software solutions and must engage software as a service (SaaS) providers, or outsource their infrastructural needs. While this can be a useful option for many SMEs, leaders are trusting that these third-party vendors are operating robust cybersecurity protocols and providing sufficient protection for data collection, sharing, and storage. Digital Assets. Small businesses in the supply chain must understand that their physical assets are not the only aspects that make them a target. Customer data, operating practices, and financial information can all attract unwanted attention from cybercriminals. Even specific intellectual property, down to the business model, that is unique to your business needs to be protected. Making certain that your company has taken out the correct patents and copyright precautions is an excellent start. However, it's worth remembering that these digital elements are valuable, and therefore a potential point of vulnerability. Solutions Most of us already have some b Tool Vulnerability Threat Guideline
SecurityAffairs.webp 2020-06-12 13:59:06 Gamaredon group uses a new Outlook tool to spread malware (lien direct) Russia-linked Gamaredon APT use a new module for Microsoft Outlook that creates custom emails with malicious documents and sends them to a victim’s contacts. Reseaerchers from ESET reported that Russia-linked Gamaredon APT has a new tool in its arsenal, it is a module for Microsoft Outlook that creates custom emails with malicious documents and sends […] Malware Tool
SecurityAffairs.webp 2020-06-11 18:09:02 Microsoft discovers cryptomining campaign targeting Kubeflow tool for Kubernetes clusters (lien direct) Microsoft's Azure Security Center (ASC) is warning of a hacking campaign that targets Kubeflow, a machine learning toolkit for Kubernetes. Hackers are targeting Kubeflow servers with administration panel exposed online, Microsoft warns. The tech giant has released a report today detailing a novel series of attacks against Kubeflow, a toolkit for deploying machine learning (ML) […] Tool Uber
no_ico.webp 2020-06-11 10:21:57 DIY Tool Website Greenworks Hacked By Self-Destructing Web-Skimmer – Expert Reaction (lien direct) Researchers have observed a highly-sophisticated self-cleaning and self-destructing skimmer on the popular hardware tool website Greenworks. Since the pandemic lockdown there has been an increase in people taking on homeware and gardening improvements. The ISBuzz Post: This Post DIY Tool Website Greenworks Hacked By Self-Destructing Web-Skimmer – Expert Reaction Tool
WiredThreatLevel.webp 2020-06-09 11:00:00 IoT Security Is a Mess. Privacy \'Nutrition\' Labels Could Help (lien direct) Just like foods that display health information the package, researchers are exploring a tool that details how connected devices manage data. Tool
TechRepublic.webp 2020-06-08 20:43:35 How to use the Windows 10 Assessment Tool to measure system performance (lien direct) The Windows 10 Assessment Tool tests the components of your computer then measures their performance. But it can only be accessed from a command prompt. Tool
Blog.webp 2020-06-08 17:31:45 Evil-Winrm : Winrm Pentesting Framework (lien direct) In this post, we will discuss the most famous framework for PS Remote shell hacking tool named as “Evil-Winrm”. It is an opensource tool which is available on GitHub for winrm penetration testing. Table of Content Evil-winrm Features Installation Load PowerShell scripts Pass the Hash Install using its Docker image Evil-winrm This program can be... Continue reading → Tool
SecurityAffairs.webp 2020-06-05 18:24:49 New Cyber Operation Targets Italy: Digging Into the Netwire Attack Chain (lien direct) ZLab malware researchers analyzed the attack chain used to infect Italian speaking victims with the Netwire malware. Introduction Info stealer malware confirms to be one of the most adopted weapons of cyber actors. One of them is Netwire (MITRE S0198), a multiplatform remote administration tool (RAT) that has been used by criminals and espionage groups […] Malware Tool
SecurityAffairs.webp 2020-06-04 20:36:51 Cycldek APT targets Air-Gapped systems using the USBCulprit Tool (lien direct) A Chinese threat actor tracked as Cycldek (aka Goblin Panda, or Conimes) has developed new tool to steal information from air-gapped systems. Security experts from Kaspersky Lab reported that the Chinese threat actor tracked as Cycldek (aka Goblin Panda, or Conimes) has developed new tool to steal information from air-gapped systems. The Cycldek group was […] Tool Threat
TechRepublic.webp 2020-06-04 20:02:34 How to use Excel\'s PivotTable tool to turn data into meaningful information (lien direct) A pivot table in Microsoft Excel reorganizes data quickly into a meaningful report, and it's easy to use! Tool
TechRepublic.webp 2020-06-04 18:26:51 IBM AI Fairness 360 open source toolkit adds new functionalities (lien direct) The new version expands capabilities of its discrimination and bias protection, bringing the tool to R users and scikit-learn. Tool
TechRepublic.webp 2020-06-04 15:46:40 Salary.com releases smart job description management tool for landing top talent (lien direct) The Job Architect platform streamlines the process for creating, sharing, and approving employment listings, keeping posts up to date and accurate. Tool
AlienVault.webp 2020-06-04 11:00:00  Keeping kids safe online (lien direct) This blog was written by an independent guest blogger. As we all know by now, the Internet is an excellent tool for business, learning, and entertainment. Not only is it a tool, but it's also an essential part of our lives. Information, connections, and opportunities at the touch or swipe of a finger. As more and more people go online, the age of the average user becomes lower and lower. What is the responsibility we have to safeguard the wellbeing of those that come after us into this new digital age? Last year, I was out for breakfast with my girlfriend. Across from us was a family of three (mom, dad, and baby girl). The parents were on their cell phones, and the baby, maybe two or three, had a tablet. It made me think, this child will never know a time when she couldn't find or order something by using the device in her hands. She'll never see a time when notifications, news updates, or social media posts were not a part of daily life. Children face a myriad of threats online. We hear all the time about cyberbullying, predators, and kids, either viewing or sharing "adult material."And while there is no way to 100% protect kids from these things, there are steps we can take. First are passwords and passcodes. Parents can set these features, making sure their children have to come to them to unlock the device. Giving parents and children those extra moments to discuss online safety. Many, if not all, tablets and phones produced after 2010, come with some form of parental control. These controls include blocking access to specific websites or blocking particular keywords. iPhone/iPad/iPod touch: Set Content & Privacy Restrictions Google Play (Android): Set up parental controls on Google Play Google Chrome: Change site permissions Parents and Guardians can purchase age-appropriate devices. Devices like the Amazon Fire Kids Edition or the Samsung Galaxy Kids and the PBS Playtime Pad. What about Social Media? Sites like Facebook, Twitter, Snapchat, TikTok, and Instagram are very popular. What precautions exist there? The social media platforms include information on privacy and security settings that can make their platforms safer for children. Unfortunately, these settings are not as front and center as they should be. Provided below are links to the security, privacy, and parental control sections of: Facebook: Messenger Kids Settings Twitter: Control Your Twitter Experience TikTok: Family Safety Mode and Screen Time Management Instagram: Tips for Parents Snapchat: Safety & Education The official minimum age to use many social media sites is thirteen. But, parents of children of all ages should be on their guard. Trolls, Predators, Bullys, and Cyber Criminals use Social Media as a tool for harassment and worse. The most important thing you can do to protect kids online is to teach them awareness. To not share personal information. For example, location, school, full name, age, social security number (if they know it), or tele Tool
CSO.webp 2020-06-04 03:00:00 What is pretexting? Definition, examples and prevention (lien direct) Pretexting definition Pretexting is form of social engineering in which an attacker tries to convince a victim to give up valuable information or access to a service or system. The distinguishing feature of this kind of attack is that the scam artists comes up with a story - or pretext - in order to fool the victim. The pretext generally casts the attacker in the role of someone in authority who has the right to access the information being sought, or who can use the information to help the victim.Pretexting has a fairly long history; in the U.K., where it's also known as blagging, it's a tool tabloid journalists have used for years to get access to salacious dirt on celebrities and politicians. But today it's commonly used by scam artists targeting private individuals and companies to try to get access to their financial accounts and private data. And pretexters can use any form of communication, including emails, texts, and voice phone calls, to ply their trade. Tool
The_Hackers_News.webp 2020-06-04 01:31:39 New USBCulprit Espionage Tool Steals Data From Air-Gapped Computers (lien direct) A Chinese threat actor has developed new capabilities to target air-gapped systems in an attempt to exfiltrate sensitive data for espionage, according to a newly published research by Kaspersky yesterday. The APT, known as Cycldek, Goblin Panda, or Conimes, employs an extensive toolset for lateral movement and information stealing in victim networks, including previously unreported custom Tool Threat
WiredThreatLevel.webp 2020-06-02 20:14:11 Protests Renew Scrutiny of Tech\'s Ties to Law Enforcement (lien direct) Amazon executives tweeted support for protesters. But the company sells a surveillance tool to police that studies say misidentifies darker skinned people. Tool Studies
securityintelligence.webp 2020-06-01 10:00:22 Video Conferencing Security for Businesses Isn\'t a New Issue, It Just Came Into Focus (lien direct) Video conferencing has suddenly become a critical tool for businesses. Here are some tips for increased privacy and control. Tool
Last update at: 2024-07-02 19:08:25
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter