Evasive QBot Malware Leverages Short-lived Residential IPs for Dynamic Attacks
Secureworks strengthens industrial cybersecurity with two new offerings
Cobalt Iron Compass NAS Protector simplifies management of NAS data
WithSecure's USB armory enables post-quantum cryptography in space
Resecurity presents Digital Identity Product to protect digital identities
1Kosmos BlockID available in AWS Marketplace
Russia says US hacked thousands of iPhones in iOS zero-click attacks
Harvard Pilgrim Health Care ransomware attack hits 2.5 million people
Horabot Campaign Targets Spanish-Speaking Users in the Americas
S3 Ep137: 16th century crypto skullduggery
AI: War crimes evidence erased by social media platforms
Bumsys Business Management System 1.0.3-beta Shell Upload
Rukovoditel 3.3.1 CSV Injection
Red Hat Security Advisory 2023-3388-01
Online Security Guards Hiring System 1.0 Cross Site Scripting
New Zero-Click Hack Targets iOS Users with Stealthy Root-Privilege Malware
Unmasking XE Group: Experts Reveal Identity of Suspected Cybercrime Kingpin
Amazon fined $31 million over privacy breaches, including snooping on kids
Uptycs integrates with Amazon Security Lake to provide telemetry across workloads
CYTRACOM improves efficiency for MSPs with ControlOne platform updates
Critical zero-day vulnerability in MOVEit Transfer exploited by attackers!
New Relic launches Amazon Security Lake integration
Nozomi and Cynalytica team to deliver security solutions to OT & IoT environments
Uncovering the Nature of BEC & Supply Chain Attacks
New MOVEit Transfer zero-day mass-exploited in data theft attacks
Google triples rewards for Chrome sandbox escape chain exploits
Meet Charlotte, CrowdStrike's New Generative AI Assistant
Top macOS Malware Threats: Here Are 6 to Watch
Yet Another Toyota Cloud Data Breach Jeopardizes Thousands of Customers
Void Rabisu's RomCom Backdoor Reveals Shifting Threat Actor Goals
Potential Backdoor in Gigabyte PCs Exposes Supply Chain Risks
Acelle Email Marketing 3.0.15 Arbitrary File Upload
Red Hat Security Advisory 2023-3394-01
Menorah Restaurant 1.0.0 Insecure Settings
Red Hat Security Advisory 2023-3387-01
Faculty Evaluation System 1.0 Shell Upload
Red Hat Security Advisory 2023-3403-01
Red Hat Security Advisory 2023-3397-01
Flexense HTTP Server 10.6.24 Buffer Overflow / Denial Of Service
Russia says U.S. accessed thousands of Apple phones in spy plot | Reuters
Ubuntu Security Notice USN-6127-1
Amazon to pay $30.8M for Alexa and Ring privacy violations
Red Hat Security Advisory 2023-3408-01
New vulnerability gives MacOS users a 'Migraine'
STARFACE 7.3.0.10 Broken Authentication
Red Hat Security Advisory 2023-3415-01
Researchers tell owners to “assume compromise” of unpatched Zyxel firewalls
AIEngine 2.4.0
Ubuntu Security Notice USN-6128-1
Increasingly Sophisticated Cyberattacks Target Healthcare
Malicious PyPI Packages Using Compiled Python Code to Bypass Detection
Stellar Cyber integrates with Amazon Security Lake to boost data processing and threat detection
Code42 names Wayne Jackson to its Board of Directors
Threat actors can exfiltrate data from Google Drive without leaving a trace
Safe Security unveils Cyber Risk Cloud of Clouds platform
CrowdStrike Invests In and Partners With Prelude Security - CrowdStrike
BlackCat claims the hack of the Casepoint legal technology platform used by US agencies
How Wazuh Improves IT Hygiene for Cyber Security Resilience
Syxsense partners with VLCM to provide customers with endpoint security and management solutions
Resecurity appoints Shawn Loveland as COO
Amazon to Pay $31m After FTC's Security and Privacy Allegations
Zyxel Customers Urged to Patch Exploited Bug
HMRC in New Tax Credits Scam Warning
Improved BlackCat Ransomware Strikes with Lightning Speed and Stealthy Tactics
Zyxel firewalls under attack by Mirai-like botnet
OverTheWire Bandit: Conquer Levels 0-5 | InfoSec Write-ups
Widespread exploitation by botnet operators of Zyxel firewall flaw
N. Korean ScarCruft Hackers Exploit LNK Files to Spread RokRAT
Urgent WordPress Update Fixes Critical Flaw in Jetpack Plugin on Million of Sites
Active Mirai Botnet Variant Exploiting Zyxel Devices for DDoS Attacks
Being Prepared for Adversarial Attacks
Why organizations should adopt a cloud cybersecurity framework
Disaster recovery challenges enterprise CISOs face
Infosec products of the month: May 2023
Navigating cybersecurity in the age of remote work
Fighting ransomware: Perspectives from cybersecurity professionals
Phishing campaigns thrive as evasive tactics outsmart conventional detection
Exploit released for RCE flaw in popular ReportLab PDF library
Amazon faces $30 million fine over Ring, Alexa privacy violations
Can Cloud Services Encourage Better Login Security? Netflix's Accidental Model
MacOS 'Migraine' Bug: Big Headache for Device System Integrity
Experts warn of backdoor-like behavior within Gigabyte systems
Crypto Discord Communities Targeted by Malicious Bookmarks & JavaScript
Kali Linux 2023.2 released with 13 new tools, pre-built HyperV image
Terminator antivirus killer is a vulnerable Windows driver in disguise
Critical Barracuda 0-day was used to backdoor networks for 8 months
Machine Learning Applications in the Cybersecurity Space
Buy-Now-Pay-Later (BNPL) is Revolutionising the E-Commerce Landscape
Stealthy SeroXen RAT malware increasingly used to target gamers
Hackers exploit critical Zyxel firewall flaw in ongoing attacks
New "Migraine" Flaw Enables Attackers to Bypass MacOS Security
Serious Security: That KeePass “master password crack”, and what we can learn from it
Microsoft GamingServicesNet 12.77.3001.0 Unquoted Service Path
Lost And Found Information System 1.0 Broken Access Control / Privilege Escalation
WordPress ReviewX 1.6.13 Privilege Escalation
Debian Security Advisory 5416-1
Software liability: The hard truths of holding manufacturers responsible
Ubuntu Security Notice USN-6122-1
Ubuntu Security Notice USN-6123-1
Cyberweapon manufacturers plot to stay on the right side of US
Ubuntu Security Notice USN-6124-1
Bugs in ex-SGI XFS coincide with effort to revive IRIX • The Register
Ubuntu Security Notice USN-6117-1
Organizations Warned of Backdoor Feature in Hundreds of Gigabyte Motherboards - SecurityWeek
Ubuntu Security Notice USN-6125-1
Ubuntu Security Notice USN-6126-1
Debian Security Advisory 5417-1
Qualcomm Adreno/KGSL Unchecked Cast / Type Confusion
Qualcomm Adreno/KGSL Data Leakage
Vaskar Courier 3.2.0 Insecure Settings
Apple Zeed ALL YOUR STYLE CMS 2.0 SQL Injection
Armenia targeted with Pegasus spyware
Offensive, defensive cybersecurity to be consolidated by US Army
Predator spyware examined
Bitdefender Introduces GravityZone Security for Android, iOS, and Chromebook
Toyota finds more misconfigured servers leaking customer info
7 Stages of Application Testing: How to Automate for Continuous Security
Mirai Variant Opens Tenda, Zyxel Gear to RCE, DDoS
IDSA: Only 49% of Firms Invest in Identity Protection Before Incidents
SpinOk Trojan Compromises 421 Million Android Devices
New IARPA initiative seeks to evaluate cyber psychology in fight against hackers
Cybercriminals Targeting Apache NiFi Instances for Cryptocurrency Mining
Rezilion Smart Fix improves software supply chain security
Bitdefender GravityZone Security for Mobile provides protection against mobile attack vectors
Salesforce 'Ghost Sites' Expose Sensitive Corporate Data
Threat actors are exploiting Barracuda ESG bug since October 22
Swiss real estate agency Neho fails to put a password on its systems
Beware of Ghost Sites: Silent Threat Lurking in Your Salesforce Communities
Critical Firmware Vulnerability in Gigabyte Systems Exposes ~7 Million Devices
ConnectSecure enhances its cybersecurity platform with deep attack surface scanning and EPSS
Hitachi Data Reliability Engineering improves the consistency of business-critical data
Permit.io launches FoAz to give frontend developers the keys to security
PingSafe helps organizations securely deploy containers with KSPM module
Someone is roping Apache NiFi servers into a cryptomining botnet
Taking a Proactive Approach to Mitigating Insider Threats
Can Organizations Combat Malicious Password-Protected File Attacks?
Danni Brooke, to Spotlight the Role of Women in Cyber at Infosecurity Europe 2023
6 Steps to Effective Threat Hunting: Safeguard Critical Assets and Fight Cybercrime
Microsoft Details Critical Apple macOS Vulnerability Allowing SIP Protection Bypass
Zyxel patches vulnerability in NAS devices (CVE-2023-27988)
Netskope integrates with AWS to simplify security data management
PingOne Protect prevents account takeover
How APTs target SMBs
Protect Cloud Email Accounts with TAP Account Takeover
Pentagon Cyber Policy Cites Learnings from Ukraine War
WordPress Rushes Out Jetpack Patch to Millions
Dark Pink APT Group Expands Tooling and Targets
Microsoft found a new bug that allows bypassing SIP root restrictions in macOS
Dark Pink APT Group Leverages TelePowerBot and KamiKakaBot in Sophisticated Attacks
RomCom RAT Using Deceptive Web of Rogue Software Sites for Covert Attacks
Mirantis Lens Control Center simplifies secure Kubernetes deployments
Dark Pink hackers continue to target govt and military organizations
Kali Linux 2023.2 released: New tools, a pre-built Hyper-V image, a new audio stack, and more!
Attackers leave organizations with no recovery option
RootMe CTF [Writeup] TryHackMe. Deploy The Machine | by Bishal Poudel | May, 2023 | InfoSec Write-ups
Automated Monitoring + Time = Bug, the bug on HackerOne Target (8x8) | by Shriyans Sudhi | May, 2023 | InfoSec Write-ups
Alert: Hackers Exploit Barracuda Email Security Gateway 0-Day Flaw for 7 Months
Student Loan Breach Exposes 2.5M Records
The strategic importance of digital trust for modern businesses
Managing mental health in cybersecurity
Sophos NDR Live Discover reports are now available
Organizations are placing OT cybersecurity responsibility on CISOs
Web3 Needs A Truly Decentralized Infrastructure That IPFS Alone Cannot Deliver
BlackCat (ALPHV) Ransomware Levels Up for Stealth, Speed and Exfiltration
SimpleTire Database Leak: Over 2.8 Million Records Exposed
Tenet and LayerZero Forge Cross-Chain LSD Adoption
WordPress force installs critical Jetpack patch on 5 million sites
Barracuda zero-day abused since 2022 to drop new malware, steal data
421M Spyware Apps Downloaded Through Google Play
Human-Assisted CAPTCHA-Cracking Services Supercharge Shopper Bots
Microsoft finds macOS bug that lets hackers bypass SIP root restrictions
RomCom malware spread via Google Ads for ChatGPT, GIMP, more
WordPress plugin ‘Gravity Forms’ vulnerable to PHP object injection
Gentoo Linux Security Advisory 202305-32
Gentoo Linux Security Advisory 202305-35
PyPI enforces 2FA to prevent maintainers' account takeover
Now Social Engineering Hackers Have AI. Do You?
Attackers hacked Barracuda ESG appliances via zero-day since October 2022
Microsoft shares fix for cameras not working on Surface laptops
Undetected Attacks Against Middle East Targets Conducted Since 2020
9M Dental Patients Affected by LockBit Attack on MCNA
Human Error Fuels Industrial APT Attacks, Kaspersky Reports
Nigerian Cybercrime Ring's Phishing Tactics Exposed
Serious Security: Verification is vital – examining an OAUTH login bug
Widevine Trustlet 5.x drm_verify_keys Buffer Overflow
ABB confirms data stolen in Black Basta ransomware attack
Widevine Trustlet 5.x / 6.x / 7.x PRDiagVerifyProvisioning Buffer Overflow
Artificial intelligence could lead to extinction, experts warn
Widevine Trustlet 5.x / 6.x / 7.x PRDiagParseAndStoreData Buffer Overflow
Hackers Win $105,000 for Reporting Critical Security Flaws in Sonos One Speakers
Ubuntu Security Notice USN-6111-1
Ubuntu Security Notice USN-6119-1
Ubuntu Security Notice USN-6120-1
Ubuntu Security Notice USN-6121-1
Gentoo Linux Security Advisory 202305-33
PrinterLogic Build 1.0.757 XSS / SQL Injection / Authentication Bypass
Ubuntu Security Notice USN-6113-1
Papaya Medical Viewer 1.0 Cross Site Scripting
Ubuntu Security Notice USN-6114-1
Pydio Cells 4.1.2 Privilege Escalation
Ubuntu Security Notice USN-6116-1
Pydio Cells 4.1.2 Cross Site Scripting
Ubuntu Security Notice USN-6115-1
Pydio Cells 4.1.2 Server-Side Request Forgery
Ubuntu Security Notice USN-6118-1
Serenity / StartSharp Software File Upload / XSS / User Enumeration / Reusable Tokens
Widevine Trustlet 5.x drm_save_keys Buffer Overflow
Wekan 6.74 Cross Site Scripting
Widevine Trustlet 5.x drm_save_keys Buffer Overflow
Widevine Trustlet 5.x drm_verify_keys Buffer Overflow
CERN spots strange Higgs boson decay behavior • The Register
Android apps with spyware installed 421 million times from Google Play
DogeRAT Malware Impersonates BFSI, Entertainment, E-commerce Apps
Pentagon updates cyber strategy, incorporating lessons learned in Ukraine
Database containing 478,000 RaidForums members leaked online
Raidforums Database Leak: Data of 460,000 Users Dumped Online
Implementing Risk-Based Vulnerability Discovery and Remediation
CAPTCHA-Breaking Services with Human Solvers Helping Cybercriminals Defeat Security
CrowdStrike Introduces Charlotte AI, Generative AI Assistant - CrowdStrike
Now Social Engineering Hackers Have AI. Do You?
Hackers Win $105,000 for Reporting Critical Security Flaws in Sonos One Speakers
Ransomware Gangs Adopting Business-like Practices to Boost Profits
Beware of the new phishing technique "file archiver in the browser" that exploits zip domains
Nine Million MCNA Dental Customers Hit by Breach
Dark Web Data Leak Exposes RaidForums Members
Retailer Database Error Leaks Over One Million Customer Records
BrutePrint Attack allows to unlock smartphones with brute-forcing fingerprint
Sneaky DogeRAT Trojan Poses as Popular Apps, Targets Indian Android Users
RedBus + MakeMyTrip bug bounty (requests tampering) | by Vishnu Thulasidoss | May, 2023 | InfoSec Write-ups
Discovering C2 IPs Through Shodan? | by Paritosh | May, 2023 | InfoSec Write-ups
Watering Hole Attacks Push ScanBox Keylogger
Generative AI: The new attack vector for trust and safety
Penetration tester develops AWS-based automated cracking rig
The root causes of API incidents and data breaches
Organizations spend 100 hours battling post-delivery email threats
Enhancing API Gateway Security: Integrating AWS Cognito User Pools with Authorization Code Grant | by Yani | May, 2023 | InfoSec Write-ups
Explanation of CSRF ( Cross-Site Request Forgery ) | by Vignesh | May, 2023 | InfoSec Write-ups
FOSS BUFF3R CTF WRITEUP. I organized my second CTF named, FOSS… | by Krishnadev P Melevila | May, 2023 | InfoSec Write-ups
Gain Full Control Over The Target Machine Using BeEF & Shellter | by Frost | May, 2023 | InfoSec Write-ups
How I Move Web App Data to Splunk using HEC Tokens | by R. Eric Kiser | May, 2023 | InfoSec Write-ups
How to Set up an Access Point with Hostapd | by Frost | May, 2023 | InfoSec Write-ups
I Helped Prevent A Major PII Leak For India’S Top Health Benefits Management Platform By Ethically Hacking Their SQL Servers & IT Infrastructure. | by nav1n | May, 2023 | InfoSec Write-ups
IDOR Vulnerability that exposed 17 Million user data (IDOR Diaries) | by Supun Halangoda (Suppa) | May, 2023 | InfoSec Write-ups
Let’s know these basic server types! | by Suprajabaskaran | May, 2023 | InfoSec Write-ups
Linking the Pieces: A Journey into ROP Chains for Beginner Explorers | by Ori Roza | May, 2023 | InfoSec Write-ups
Precious — HTB Walkthrough. This post is regarding an HTB machine… | by Manish Kumar | May, 2023 | InfoSec Write-ups
Impact of AI on Cybersecurity! (AI vs Hacking) | by ZeusCybersec | May, 2023 | InfoSec Write-ups
Detecting DLL Injection in Windows | by Suprajabaskaran | May, 2023 | InfoSec Write-ups
Top 5 Google Dorks for Hackers. In the Modern world of Infosec there… | by Haction0x01 | May, 2023 | InfoSec Write-ups
URN Injection. High-severity vulnerability enables… | by ASWIN K V | May, 2023 | InfoSec Write-ups
New hacking forum leaks data of 478,000 RaidForums members
Lockbit ransomware attack on MCNA Dental impacts 8.9M individuals
Work at Medium | by Jobs @ Medium | Jobs at Medium | Medium
OpenAI cybersecurity grant program
Radare2 Power Ups | Delivering Faster macOS Malware Analysis With r2 Customization - SentinelOne
Disney MagicBand Hacking Part 2 -RF Firmware reversing - YouTube
Researchers tell owners to “assume compromise” of unpatched Zyxel firewalls | Ars Technica
Reversing Pickles with r2pickledec · Doyensec's Blog
TyphoonCon Capture The Flag 2023 – TyphoonCon
Amazon’s Ring doorbell was used to spy on customers, FTC says in privacy case | Amazon | The Guardian
Security.txt now mandatory for Dutch government websites
Full Disclosure: Printerlogic multiple vulnerabilities
Operation Triangulation: iOS devices targeted with previously unknown malware | Securelist
Rapping About His SPAM Empire Made Him a World-Famous Musician🎙Darknet Diaries Ep. 78: Nerdcore - YouTube
Shoutout Thursday - June 1st, 2023 - #locksport - YouTube
RedTeam Pentesting GmbH - STARFACE: Authentication with Password Hash Possible
[CVE-2021-33690] SSRF vulnerability in SAP NetWeaver DI
CSP Bypass Unveiled: The Hidden Threat of Bookmarklets
ChatGPT for Pentesters. Can we use generative AI or ChatGPT… | by SOCRadar® Extended Cyber Threat Intelligence | May, 2023 | Medium
Chris's Wiki :: blog/tech/DNSSECFailureDrivesDisablement
Hacking the Disney MagicBand that tracks you! + nRF31512 Glitching - YouTube
chonked pt.1: MiniDLNA 1.3.2 HTTP Chunk Parsing Heap Overflow - Root Cause Analysis | hyprblog
[L158] EVVA MCS Picked and Gutted - YouTube
Dish confirms 300,000 people's data was exposed in February • The Register
Criminals lurked, stole data on 9M from dental group systems • The Register
Millions of Gigabyte Motherboards Were Sold With a Firmware Backdoor | WIRED
Protecting the overclaimers in cybersecurity w/ Dr. Daniel N. Jones | CSI Talks #7 - YouTube
Supply Chain Risk from Gigabyte App Center Backdoor - Eclypsium | Supply Chain Security for the Modern Enterprise
Sean Pesce's Blog: Bypassing SELinux with init_module
Who’s behind the "hacktivist" network Anonymous? | DW Documentary - YouTube
VSCode Remote Code Execution advisory – Ammar's Blog
More malicious extensions in Chrome Web Store | Almost Secure
InfoSec Handlers Diary Blog - SANS Internet Storm Center
The peculiarities of security maintainership with Filippo Valsorda | Open Source Stories
741. Large vintage Chubb lever padlock with loose post picked open - YouTube
Hacking my “smart” toothbrush - The Twenty Percent
Daxin Backdoor: In-Depth Analysis, Part One | Symantec Enterprise Blogs
Undercovering drIBAN fraud operations 2 | Cleafy Lab
XSS vulnerability in the ASP.NET application: examining CVE-2023-24322 in mojoPortal CMS
GitHub - gcarmix/HexWalk: Hex Viewer/Editor/Analyzer compatible with Linux/Windows/MacOS
Pass the eWPTXv2 Exam on Your First Attempt in 2023!
The great CISO resignation: Why security leaders are quitting in droves - SDxCentral
How Mastering Rust Can Advance Your Career in Cybersecurity?
Critical Barracuda 0-day was used to backdoor networks for 8 months | Ars Technica
Columbus Project - Advanced subdomain enumeration service
CVE-2020-16040 Analysis and Exploitation
DOM RS8 pick + gut - YouTube
Hack the Planet Embroidered Hoodie - Etsy
New macOS vulnerability, Migraine, could bypass System Integrity Protection | Microsoft Security Blog
New macOS vulnerability, Migraine, could bypass System Integrity Protection | Microsoft Security Blog
Edition 20: Degrading UX to improve security hurts both UX and security
Cyber Attack on UAE Banking Sector: ADCB, NBF Websites Hit
The answer to the FBI's advanced persistent threat • The Register
India Malware Attacks: India sees 31% surge in malware attacks in 2022: report - The Economic Times
Solar panel inverters easy to hack, study shows - IO
Introducing Scraping Kit
A deep-dive on Pluck CMS vulnerability CVE-2023-25828 | Synopsys
7 steps to gear up for an AI-enabled phishing era | Security Info Watch
Exploring Android Heap allocations in jemalloc 'new'
Fickle Multi-Factor Authentication in Microsoft 365
Indian agencies gear up for more Cyber attacks – Indian Defence Research Wing
RedTeam Pentesting GmbH - Pydio Cells: Unauthorised Role Assignments
GobRAT malware written in Go language targeting Linux routers - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
The Gemini protocol seen by this HTTP client person | daniel.haxx.se
ROP Exploits
Efficient TFHE Bootstrapping in the Multiparty Setting, Thu, Jun 1, 2023, 4:00 PM | Meetup
Hacking my friends instagram account 2022 (OSINTGRAM) - YouTube
AceCryptor: Cybercriminals' Powerful Weapon, Detected in 240K+ Attacks
013 Avocet ABS Exterior 360 degree pick and gut. Purple. - YouTube
Humble Tech Book Bundle: Cybersecurity and Forensics by CRC Press (pay what you want and help charity)
Malvertising via brand impersonation is back again
SpringSecurity3.1.3
Proof of concept for multi-tenant mobile app with offline syncing.
Udacity Ethical Hacker NanoDegree | Audit ExampleCorp Project
This is an proof of concept, used to demonstrate an audio-player in atoms.
A collection of snippets, hacks, etc.
POJO web component proof of concept
Design event booking app on blockchain. Features: event creation, ticket issuance, booking, payment processing . Offers security, transparency, immutability. Choose blockchain platform, develop smart contracts. Ensure user registration, identity managemen
Zackworld-webapp-hacking
Proof of Concept for Using Prisma ORM along with Postgres 15
spring-hibernate-jpa-security-database-paaswd
hacker news proxy server
Content repo for the binder for July hack n yack
djfakiajk.ddslfvbsdcvnvdsvndsvknkdsfnkwqfiolevihevoec calwcnnkgklnfdsfvjkldvbqf;wfde;kbf;fbjw f;wfj qfw d fs ds fsa hacking into the mainfframee
Practicando una prueba tecnica de "hacker news" presentada en una clase de "Midudev"
This repo is made for learning Hacking
OverWatch 2 Hack Private 2023 Aim Esp And More
Relational and non-relational databases applied to an electronic device repair technical services project.
Access This Link 👉 https://cutt.ly/Swwr5NSt 👈 🟢 It's Free 100% Online Instagram Hack Tool update 2023 work on iOS Android 100% Working and Updated
This repository holds different proof of concepts
Minecraft cheat AltiumWare PROJECT (+ spoofer)
akto-api-security_run-scan
-Database-system-security
Simple-Company-Login-Page-by-Spring-Security-Thymeleaf
securitypipeline
This project contains everything I have learned from the beginning, handling ajax to start a session, create a session, add stories or delete stories, in this project I use the Hack or Snooze API.
Covering Authentication, Authorization, JDBC, JPA, LDAP, JWT, OAuth
spring-security-jwt
PP_Boot_Security_BootStrap_final_version
DVWA-BruteForce-HighSecurity
securityimlementation
A proof of concept for two applications to communicate some arbitrary bitcoin data
This project is the proof of concept for the blood donation certificate management system based on the Blockchain, Smart contract, NFT and IPFS technologies
My hacker rank solutions
Spring Boot Security Demo
This the proof of concept for the real estate system based on the Blockchain, Smart contract, NFT and IPFS technologies
Avang Licenser is a PHP library designed to enhance the security of PHP scripts by implementing a robust license system, preventing unauthorized access and usage.
This the proof of concept for the medical record storage system based on the Blockchain, Smart contract, NFT and IPFS technologies
Hacker rank sql problem solution
Farm-Field-Security-System
This the proof of concept for the waste treatment system based on the Blockchain, Smart contract, NFT and IPFS technologies
Contribution for The Microsoft Teams Global Hack 2023 - the idea is to give admins a better overview of which external collaborators have access to their environment
Proof of concept web application that communicates with IOT devices over MQTT
Exercises from Hacker Rank on Python 3
Proof of concepts
A simple proof-of-concept using custom hooks to render components based on the browser's viewport size.
Hacks
Login-system-spring-security-Database-Authentication
A browser extension providing diffrent hacking utilitys
2D Hack and Slash game where you Possess your enemies.
Como hackear contas [cookies]
All hacks are made by:https://twitter.com/glizuwu
Switches soundtracks for MSU-1 hacked audio
Spring Security is a powerful and highly customizable authentication and access-control framework. It is the de-facto standard for securing Spring-based applications​
spring-boot-security-oauth2-google
This is a Network Security course by Cisco Networking Academy.
SpringSecurity3_1_3
Build Spring Boot Rest API using Spring Data, MVC and Security
A small, simple tool with a user-friendly GUI which scans the user's installed Chrome extensions and checks their dir for suspicious URLs in the files, as well potentially dangerous permissions which are given to said extensions. The tool aims to simplify
Notes about pentest, red team and security.
This project is useful for the private organization for internal mail system. To share some confidential data within organization. This system is useful for maintaining security.
Esp32 kullanılarak wokwi üzerinde çalışan bir simülasyon ve Thingspeak ile iletişimde olan bir sistemdir. Wokwi üzerindeki simülasyonda hareket algıladığında Thingspeak''e veri gönderir,Thingspeak'te bize email ile bu durumu haber verir
FreeCodeCamp info Security
Document Search using Chat GPT proof of concept in Google Colab
an poc on proof of the concept on ANTI BIKILI on margin in business
Full Stack YelpCamp in Node.js with security
a *slightly* buggy website with HTML, CSS and Javascript for hacking
"UnixSysAdmin2023-Mastering-Shell-to-Cloud: Comprehensive repo for CS 470 course, covering Unix system administration, shell programming, networking, security, automation, and cloud orchestration."
Cheats For Titanfall 2 Download 2023! God Mode, Wallhack, Aimbot Hacks For Titanfall 2. Hacks For Titanfall 2 Download.
Cheats For The Witcher 3 Download 2023! God Mode, Unlimited Stamina, Teleportation Hacks For The Witcher 3. Hacks For The Witcher 3 Download.
Practice using Snowflake RBAC, DAC, Row Access Policies and Column Level Security
ASPNetSecurity
Cheats For The Legend of Zelda: Tears of the Kingdom Download 2023! Unlimited Rupees, Infinite Arrows, Bow Aimbot Hacks For Tears of the Kingdom. Hacks For The Legend of Zelda: Tears of the Kingdom Download.
Cheats For The Legend of Zelda: Breath of The Wild Download 2023! God Mode, Infinite Arrows, Unlimited Rupees Hacks For The Legend of Zelda Breath of the Wild. Hacks For Breath of the Wild Download.
Case Study: Hacker Statistics of the Datacamp course "Intermediate Python"
securityanalyst
A collection of frameworks, guides, standards, and other resources to implement security controls
Proof of concept that harvests local decision using linked traversal
CLI application to show top Hacker News stories
Cheats For The Last Of Us Part I Download 2023! No Reload, Wallhack, God Mode Hacks For The Last Of Us Part I. Hacks For The Last Of Us Part I Download.
Israel X - Unlocking Information Security I: From Cryptography to Buffer Overflows
information-security-Group4.github.io
RBAC with Spring security
Cheats For The Elder Scrolls V: Skyrim Download 2023! God Mode, No Fall Damage, Unlimited Gold Hacks For The Elder Scrolls V: Skyrim. Hacks For Skyrim Download.
Project 28 Hacking With Swift
Microservice with SpringBoot 3.1.0 with Java 17 and Jakarta EE 10. Microservice with Redis as Distributed cache and with Kafka Client for async communications along with AOP, Exception, Crypto and Security (JWT) Framework.
ansible-role-security-updates
Tools, hack, scripts and more random stuff.
overthewire-bandit-hacking-game
Cheats For Team FOrtress 2 Download 2023! God Mode, Esp, Aimbot For Team Fortress 2. Hacks For Team Fortress 2 Download.
Apuntes hechos de Hack4u Introduccion al hacking
Cheats For Subnautica Download 2023! No Creature Agression, Instant Crafting, Unlimited Oxygen Hacks For Subnautica. Hacks For Subnautica Download.
These are my personal solutions for Hacker Rank problems. These are usually working on progress solutions so you might or not use them. Most of them are commented to understand why it is done that way Each class represent an individual problem and contai
This repository holds different proof of concepts.
Hacking
Cheats For Rust Download 2023! God Mode, Esp, No Recoil, Aimbot Hacks For Rust. Hacks For Rust Download.
This is a pdf cracking tool with wordlist of your own or rockyou.txt in kali or other you can u use any wordlist or your own wordlist you make..Plz keep in mind plz do not missuse this tool this is powerfull password cracking tool and plz dont do hacking
Personal repository for notes on vision language models with small proof-of-concept implementations for my own understanding
Following along the SwiftUI tutorial on Hacking with Swift by Paul Hudson
Cheats For Rocket League Download 2023! Auto-Win, Speed Hack, Unlimited Boost Hacks For Rocket League. Hacks For Rocket League Download.
Slides I will use for btc prague dev/hack/day
Cheats For Hollow Knight 2023! God Mode, Unlimited Geo, Teleport Hacks For Hollow Knight. Hacks For Hollow Knight Download.
Code security sniffer for Laravel based web project
A peer to peer chat application focused on privacy and security
Ethical-Hacking-Blog
A Look Into Spring Security
JubeChecker (Jubelio Checker) is a tools for compliance checking, security checking, and many more. But, right now this tools only can compliance checking (v1) wkwkwk. More feature coming soon...
Assault Cube hacks done via function hooking
Security-and-Reliability-Project
ProjetoCyberSecurity
Exercises of hacker rank python for study
MTTCoHackHacking-Game
Proyecto final de seguridad
Get AI's To help with work or hacks!
Auth_Security
Hacking with Swift by Paul Hudson. StormViewer.
Gmail Phishing Hacking
Inofficial extension for the MoneyMoney macOS App that fetches all available balances from the KuCoin API and returns them as securities
security.recpes
Just a simple Ethical Hacking Tool | Contain: Tokens Grabber Discord, Browsers Passwords & Cookies Stealer, Discord Injection JS, Chrome Injection JS, Roblox Session Stealer, Window Info Stealer, Data Files Sniper, Wallet Stealer, Minecraft Account Steale
Hacking With Swift Projects
HackingWeb
PassFort is a password strength tester whose aim is to evaluate how resistant a password is to hacking attempts and to assist users in creating strong and safe passwords in accordance with OWASP standards.
Most targeted up-to-date Database Security interview questions and answers list
Proof of Concept for a Laravel application with Breeze & Sanctum with a backend API connected to Next.Js and a Blade frontend.
Security networks project for 2nd year of ISEP cybersec master. Group 1
Setup-S3-and-Macie-for-Data-Security
This project includes commands which you can use in your daily life as a Cyber Security Engineer. You won't be needed to fire each command every time you want to run the command, just run the software and choose which commands you want to fire, and save a
security-in-computing-assignment
angular-rest-api-security
Wwise source project for the Russian dubbing FNAF Security Breach. With the joint participation of the projects "BitModding" and "Енотий Дом - Dubbing Studio"
home_security_system
SecurityControlTesting
This repository will act a storage medium for the final project submission at PLP academy Software Development course. The idea will be creating some sort of theoretical security company intranet. WIP.
manufacturing AI proof of concept
Automation and Security System
Proof of Concept using Nuxt 3, Pinia and JWT with SMS auth
SpringSecurity
Proof of concept perspective adjustment in Three.js scenes using MediaPipe face detection to find the viewer
HomeSecurityIot
This has Tambola random number generation API and login and register user API's along with Token security.
Network-Security-Lab
Spring-boot-security-jpa-config-
Nginx ModSecurity OWASP Filebeat Redis Logstash GeoIP Elasticserch and Grafana
0-1 proof-of-concept prototype for adding an email knowledge base to ChatGPT in order to converse with the chatbot about said emails using natural language.
spring security - jwt
Proof of concept to automate importing job data from weekly customer data into company job data sheets.
Simple MERN Stack (MongoDB, Express, React, Node.js) proof of concept app
WIP: An APP that generates QR code IDs for residences.
Libro - Spring Security In Action 2020 - Capítulo 6: Práctico una pequeña aplicación web segura
Spring_Security_with_BootStrap_PP3.1.4
Attempting to create a program that can easily hack ATM cards and machines
uipath-calculate-client-security-hash-process
Course Documents for Ethical Hacking Course on Classpert
100 Days Of Swift, Hacking With Swift
This project lets you check if your password has been hacked (and how many times) in a safe way.
Hypr S3C Custom | S3C | Fully Nvidia | Rog Strix | Security | Hacking | Developing |
Hacking
封装了基于数据库和Redis的QPS/每天最大调用量限流(可配置,默认不限流); 封装了数据库数据模型的自动加解密,业务服务仅需配置注解后即可实现数据的加解密; 封装了sleuth/zipkin,并同时整合了logback,做到每个Web服务的Access Log和运行日志均具有链路追踪ID;
💀 - SkullSage | Entorno enfocado al hacking y con un toque verde 💻
This is a source code for task 1 in information security virus work
zimbo hack team
Free_-hackingtool
Clone of a popular news site - Hacker News
Your account already hacked
Scraping the website "Hacker News" and filtering all the news that have above 100 points in the first and second page.
Spring_Boot_Security-1
security
hack Bank account
Primer proyecto en HACK A BOSS
Simple MERN Stack (MongoDB, Express, React, Node.js) proof of concept app
KeychainSecurity
SpringMVC-Security
Golang For Ethical Hackers
spring-security-study
Repo with a proof of concept of Groovy parser
This app allows easy uploading of PDF files and adds QR code accreditation, providing a simple and efficient way to enhance document security and access additional information. Simplify the process with this convenient and innovative app.
Spring-Security
Matrix code for 3 star hackers
Various items related to cyber security endeavors
Scrape Google search quickly
Project to show how to implement JWT security using java17 and spring3
Sysadmin-security
hack
Registration and Login System using springboot, spring mvc, spring security and thymeleaf
create code that can automatically exploit its documented vulnerabilities.
📰 A crossplatform minimalistic Hacker News reader (work in progress)
Initial network and web application enumeration script for OSCP and Hack The Box
proof-of-concept_nuxt-ssr__be
For the HuBMAP - Hacking the Human Vasculature 2023 Competition
BuzzBuzz is a social network proof of concept that run on NestJS using serverless
HNPES - Hacker News Previous Entry Search
Cyber-Security-Projects-for-Learning
Send SMS Security
the proof of concept written in Python for an unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups. This is a critical
SpringSecurity
Net-security
Proof of Concept Text Adventure Game
Proof of concept programming language
This is a project for GoLinks Hack day Interview session. It uses next.js, tailwindCSS, and axios
here we are going to test the opencart functionalties and security testing and passwordless authenication
Oauth, JWT, Spring Security
aks-security-workshop
LLMIA-security
a proof of concept of using local websockets with Figma
Fortnite Hack 2023 Aim Esp
free external valorant cheat/valorant hack base source
Showcasing the build and development of my home ethical hacking lab
Hacking with Swift, days 16 - 34
For the martian defense security team, the contributions to the martian defense security gitbook SECTION - Golang
Fortnite Hack 2023
FirstSecurityApp2
Hacking
Javascript Scripts to Hack Google's Main Page (paste in console to see output)
YamatoSecurity
Generates a Baseline of NIST Rev 4 Security Controls Based off of User-Provided Impact Categories
Platform 2.0 - Proof Of Concept
Proofs of concept based on future features
spring-security-full
This full E-Commerce API build using Express and MongoDb, and other Npm Packages listed below , for learning purposes. Here it contains all the required functionalities of a full-fledged E-commerce API
Proof-of-concept. Pow-Fiat-Shamir
🧬 Biometra | One Scan, Endless Possibilities!
Proof of Concept Setup Wizard for Lazarus
An interactive character sheet app for the Destiny hack of LUMEN rpg system.
SecurityQuestions
View, Explore, Copy, Report, and Disconnect PCs connected to your network by IP.
SpringSecurity
The new and improved Homesef Security Agency Official Website
Entire Source Code for A IOT Android project which collects sensor data from existing phone sensors , and Using Arduino Uno board and a Circuit you can lock and unlock a Electromagnetic lock or Rotational motor
Creacion de Login con Spring Security
ActiveDirectoryMenu is a PowerShell GUI script for user management in Active Directory. It streamlines operations like account unlocking, user closure, remote access, group access, software deployment via SCCM, password resetting, and user details viewing
Tutorials Apache2 install /configs / security modules
kubernetes-devops-security
Spring-security
Concept of a new WWW focussing on security, privacy and efficiency.
JdbcUserDetailsManagerSecurity
I am an hacker
The ITU Knowledge Sharing Platform for Digital Finance Security is designed to foster collaboration among regulators and other stakeholders in the development and implementation of security guidelines and best practices for Digital Financial Services (DFS
Showcasing the build and development of my ethical hacking home lab
Proof of Concept (PoC) script implementing password reset flow for Beeper / Matrix
Demos about hacking on the JVM
Security-fag
Hack the Socials Now! This tool will allow you to gain access to many Social Media Accounts in a click. Using for unethicall purposes is prohibited.
Simple note-taking web app to practice data security and managing users.
Writeup for Basic Pentesting, a hacking lab from TryHackMe platform.
Test de faille de sécurité MDS
VmsAat_Security
Windows Subsystem for Linux hacks for doing expo development.
By building a Social Media API with FastAPI, this project aims to provide a solid foundation for creating a social media platform with a robust backend that can handle user management, post management, interactions, search functionality, and notifications
Hacks de varios juegos ( gratis )
This is a simple, proof of concept "orientation analyzer" project.
Projet avec des failles de sécurités
Fortnite Hack Elite 2023 Aim Esp Spoofer And More
security-force
hacking-train
A proof of concept of .csv reader with NodeJS
kWall is a firewall utility improves your network security.
SpringSecurityusingPreAuthorized
A repository for the 2023 Hackathon "So you think you can hack"
HackingHHHHHHH
Proof-of-concept implementation in SageMath of binSIDH, terSIDH, and their hybrid variants
Our MEV-BOT automates MEV extraction on Ethereum, maximizing miner profits while ensuring blockchain security.
자격증 문제풀이 사이트
Security-May
A proof of concept of reporting with NodeJS and PDFMake
Today I'm hacking into Kioptrix 1.1. Or Kioptrix #2. Whatever. This is one of the many beginner-friendly OSCP-like CTFs of Vulnhub. So it's a great starting point for preparing the OSCP tests.
Working around security issues
SDN controller with security and machine learning modules
Security Operations Center implementation using ELK stack
Heavily modified Sonic 1 ROM hack base
Application folder structure design to quickly implement Rest APIs using Node.js, Express.js and MongoDB
login and registration functionality implemented using Spring Security, Spring Boot, Spring Data JPA, and MVC.
Unit test and Spring Security project
This is a Pangea project built using Pangea's security technologies for their hackathon named Pange-securathon
Won 1st place at MLH hackathon(TechTogether 2023 NYC, Best Financial Hack). Used Capital One's API's and hosted on Microsoft Azure
Process injection through entry points hijacking.
DANGER! DO NOT USE IT! I WARN YOU BEFORE!
BedWars Roblox mod/hack menu 2023! Newest version. Built in AntiBan Software. Guarrantee no ban.
Arsenal Roblox mod/hack menu 2023! Newest version. Built in AntiBan Software. Guarrantee no ban.
html5-hacking-app
All Star Tower Defense Roblox mod/hack menu 2023! Newest version. Built in AntiBan Software. Guarrantee no ban.
Adopt Me Roblox mod/hack menu 2023! Newest version. Built in AntiBan Software. Guarrantee no ban.
A simple authentication example using Spring Security with a secured API endpoint but public root
World of Warcraft mod/hack menu 2023! Newest version. Built in AntiBan Software. Guarrantee no ban.
Spring_security_exapmle
Wolfenstein: The Old Blood mod/hack menu 2023! Newest version. Built in AntiBan Software. Guarrantee no ban.
Appcircle Snyk Scan Security Component
spring-boot-3-jwt-securityPOSTGRES
Watch Dogs 2 mod/hack menu 2023! Newest version. Built in AntiBan Software. Guarrantee no ban.
CS305 Software Security
ProjectA3-CyberSecurity
Valorant mod/hack menu 2023! Newest version. Built in AntiBan Software. Guarrantee no ban.
SpringSecurityProject
Proof of Concept DCS mission for dynamically "buildable" FARPs from which players can then spawn from.
XWT (XML Web Token) is a personal experiment concept by modifying the JWT (JSON Web Token) algorithm into XML for the development of SOAP (Simple Object Access Protocol) security.
spring-security-authentication-postgresql-new
Spring Boot, spring Security and OpenApi3 combined
PP_3_1_2_Boot_Security
WebSecurityFinal
"# CS533-copilotSecurity"
core-spring-security
Hacks
Notes regarding the CompTIA Security+ SY0-601
Hacking of the Disno Band Version 2 and its internal NRF31512
MDISec-Web-Security-and-Hacking-Notes
In this lesson, we will learn how to create a proof of concept application that utilizes Azure SQL Database's Always Encrypted functionality. We will store the encryption keys and secrets in Azure Key Vault and register the application in Azure Active Dir
Helmet security event handler for the Nitro web server
A character generator for the Ironsworn roleplaying game, using a homebrew Witcher hack.
This repository is a personal collection of resources and information I find valuable during my study of cyber security and Red Team operations. AI - Formating
JPA Implementation of `UserDetailsService` of Spring Security
This repository is prepared for the personal who want to attack kubernetes and similar environments and see the maturity of the environments in terms of security. In this repo, manifest files and some medium links have been created to set up the attack en
Разработана серверная часть MVC-приложения по продаже походного снаряжения. Используется PostgreSQL, Spring Security, Validation, Boot, Thymeleaf, JPA, JDBC
CLI Tool to quickly search for Red Team/CTF/Hacking command syntax. It's like having a terminal history and history search for commands you never type in your terminal with the added benefit of automatically copying selected commands to the clipboard wit
All the essential resources for your non-college route, to learning cyber security & computer science. All resources down below are provided free of charge and only ask add on to what you see missing :)
To adopt a hardened Flask application, Docker, and Kubernetes environment.
A collection of projects for learning to process User data management, data privacy and security, Authentication and Authorization in Python.
Simple Proof of Concept on Lightning lending
Introduction page of cyber security roadmap and dedicated virtual machine training courses of unk9vvn cyber security research team
spring security practice
core-spring-security
Spring_Boot_and_Spring_Security-
spring-boot-3-jwt-security
Um projeto de autenticação jwt com spring boot security
Looks up security info on domains
sum23_vdt_container_security
laboratorio-8-Security-Data-Science
A partly-completed, proof of concept distributed monolith powered by Spring Boot & Netflix Eureka.
🐛 NeuVector SDK for Controller
Terraform NeuVector provider
Windows Defender contains several functions for tools to secure Windows machine and get compliant with common regulations.
fran-spring-security
security-analytics-immersion-day
How to get hacked and install virus on your device
Scans a GraphQL API for security vulnerabilities
Social media SPA served by Django backed by a django-ninja API. CSRF and X-CSRF security fully enabled
https://www.theregister.com/2023/05/09/intel_oem_private_keys_leaked/
Security_Dtection
spring-security
Motion detection security camera, using ESP32-CAM, Raspberry Pico W & micropython
Automated security decision making under uncertainty
Bachelor thesis
Your platform for extracting and shipping security value from your data lake to Sentinel.
Neon wallet is an opensource package project that will want to be a wallet allowing you to integrate several currencies and crypto currencies within your crypto wallet, it will want a wallet that supports the assets you want to hold, according to a level
Solutions to the hacker rank questions solved.
Software and Data Security course
A Security Infrastructure for IoT Devices Based on Machine Learning
Jack to Hack Compiler
Future of Registered National Securities Exchange for Cryptocurrency Token Trading
Network-Security-Groups-NSGs-and-Inspecting-Network-Protocols
BeSLab: Empowering Open Source Project Security , This Repository includes BeS Environment Scripts to launch an instance of BeSLab
"JMT" stands for "Jonna Michine Tool" and is a tool for diagnosing vulnerabilities in websites. This tool is a 2023 senior project and was created for security checks by startups and small businesses by determining website vulnerabilities through the Goog
GPT-Security-Adventures
codeSecurity
Proof-of-concept Akinator using Wikidata as its database.
HITsz Network and System Security Lab
Automatic centralized windows 10-11 update manager. Updates all PC across a LAN network in a intelligent manner. Requires little setup.
security-project
Computing-for-Food-Security
IntruderShield-Advancing-Security-through-Intelligent-Monitoring
Hacking walkthroughs, Exercises, Reports, and Notes
This solution provides SSH hardening for Linux ECSs, helping you secure remote access for Linux servers.
Elysium-security : une plateforme de discussion similaire à la plateforme reddit.
Web-App-Security-Input-Validation-Client-Server-Side-
Spring Boot starter project to work with joko-security
React starter project to work with security-starter-backend
Security-project
A small guide to help when performing CTFs or ethical hacking audits.
spring-security
Simple clustering by consensus protocol proof of concept library in Python
You just found a hidden gem 💎 This repo contains a massive amount (8000+) of WordPress related Nuclei templates. Updated daily!
Proof of concept for canshare
EPSS(Exploit Prediction Scoring System) API client
An Emacs framework for the stubborn martian hacker
Write-ups on challenges for various CTFs (cyber security competitions)
Repositorio de Hack a Boss con todos los documentos del curso
NoRoad is a secure and anonymous instant messaging application using React and Node.js. Users can register without personal information and create encrypted chats with others. The app ensures user information privacy and security.
An Interactive venv hacking shell
RythmHacks hacker dashboard and application portal
A curated list of awesome Proof of Concept projects to learn patterns, libraries, programming, architecture, etc
Liquid Collective security information
Deploy Cyber Security Awareness Lab on Cloud with Terraform
security-front
Python_Cyber_Security_Game
Web developer , Network Security ، Linux expert Website: Funnylearn.ir
A collection of POCs for Windows to serve as a reference for other projects and security research.
CCSP Notes
A 1.8.8 hacked client coded by mkeo102
Prepare a Virtual Machine libvirt XML config and the host to match a specific scenario usage
security system
A cool telegram bot for free streaming search (Not only VF) https://t.me/Mehliug_bot
A hack for Edgenuity
terraform-azurerm-network-security-group
Repo of security tools and scripts for penetration testing.
data structures and algorithms Describes the nostalgia of the 2nd year student of C++ code, the classic math problems in programming but very brain-hacking. Luckily I didn't fail this course! I will update often, mainly brain training the old exercises
Design System proof of concept
WebSite Jornada Profissão Hacker
OpenSource, frictionless and secure way to share and manage app secrets across teams.
proof-of-concepts
Hacking-Equity
some sort of lua security
Python programming for hackers and pentesters
A set security auditing tools and scripts for Linux, macOS, and UNIX-based systems.
Hack space for release testing
Data-Privacy-and-Security
MLighter: The holistic tool for security evaluations of machine learning systems. http://mlighter.freedevelop.org/
Data for 'Hacking stylometry' paper in DSH
Proof of concept (POC) of the PLAY! Summit Kiosks demo application using data from Content Hub ONE.
Proof-of-concept for a data portal using static pages.
Operation system security labs
A series of questionable hacks to allow for unconventional experimentation with Loom
Analysis of financial forms from the SEC (Securities and Exchange Commision)
Tencent Kona SM Suite is a set of Java security providers, which support algorithms SM2, SM3 and SM4, and protocols TLCP/GMSSL, TLS 1.3 (with RFC 8998) and TLS 1.2.
The WingStack IDE project is an Integrated Development Environment for my proof-of-concept language "WingStack". Write your code, see it highlighted in real time and run it with its javascript interpreter.
ROM hack of Fire Emblem the Sacred Stones USA
A proof of concept program that pulls and parses security.txt files at mass.
Antrea-managed security policies in the public cloud
Smart Contract security audit reports. More on kryptaudit.com
In this repository you may find KQL (Kusto Query Language) queries and Watchlist schemes for data sources related to Microsoft Sentinel (a SIEM tool).
security-hub-sync
MyHackingPath
Fuzzie is a simple Rest API and GraphQL fuzzer built as VSCode extension
How to protect FINOS hosted projects from security threats
Tweaks and configurations to QubesOS (and other digital security implementations) for use by journalists and at-risk populations.
Fortify Helm Charts to automate deployment of Software Security Center (SSC), ScanCentral SAST and ScanCentral DAST to a Kubernetes
HackTheBox Academy Modules writeups and notes
A cheat menu for Prodigy. The ultimate tool for Prodigy Hacking!
Web3 security DAO.
A proof-of-concept. To be discussed/considered/rejected/revised.
unciv mod. welcome to hack land! hack land is a place of great power, money and production! communism can finally be a thing!!!!! (op hack nation) pls star if you like!
Open Source Platform for storing, organizing, and searching documents related to cyber threats
cifuzz makes fuzz tests as easy as unit tests
Cyber_Security
Write-ups for various CTFs that I participated in + HackTheBox + Hacking Tutorials
A Proof-of-Concept Web-Based Barcode Scanner
Powerful security network python package
Security vulnerability database inclusive of CVEs and GitHub originated security advisories from the world of open source software.
Ethical_Hacking_MA1
A Sliding Block Puzzle game made for Flutter Puzzle Hack
Demo/proof of concept application for using the camera of a Windows or Android device. The Kivy framework is used for the UI only. OpenCV is used for the backend communication with the camera modules. Written in Python 3.9.
a burp extension for dynamic payload generation to detect injection flaws (LFI, RCE, SQLi), creates access matrix based user sessions to spot authentication/authorization issues, and converts Http requests to Javascript for further XSS exploitations.
All the Hacker Rank solutions are here
wp-plugin-security-enhancements
Tool for disassembling and assembling scripts .mes from the visual novel's engine AI5WIN.**//** Средство для разборки и сборки скриптов .mes движка визуальных новелл AI5WIN.
Fuzz Introspector -- introspect, extend and optimise fuzzers
my notes
Kubernetes controller to enable automatic kubelet CSR validation after a series of (configurable) security checks
Sub graphs of payments, loans, issuing and investments in securities for transactions on Verified Network
Quarkus XML Security extension
Obsidian vault notes collection on Ethical Hacking Tools and Techniques, HackTheBox, and HTB Academy
Rekono is an automation platform that combines different hacking tools to complete pentesting processes
Script that automates the installation of the main tools used for web application penetration testing and Bug Bounty.
unciv mod. welcome to hack land! hack land is a place of great power, money and production! communism can finally be a thing!!!!! (op hack nation) pls star if you like!
Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker on your journey.
Proof of concept: Simple AR Demo using QRCode as Marker
Artifact for "Benchmarking and configuring security levels in intermittent computing"
Notes relating to the research on trying to crack the Lenovo Smart Clock device.
EXPERIMENTAL: OWASP Coraza middleware for Caddy. It provides Web Application Firewall capabilities
Library for improving app security and threat monitoring on iOS mobile devices.
Some basic security tools
The modpack for the Hack Club modded minecraft server
gnsi
Autohack is a scripting framework to help save you time. Whether you're in a hurry or have a lot of time on your hands, learning and remembering all the syntax required to use all the sorts of tools can be a lot, Autohack automates this issue. Hacking mad
All-in-One Hacking Tools For Hackers! And more hacking tools! For termux.
Framework to automate working with AST in IDA Pro
Own take on Ikea Duktig hack
:department_store: :handbag: NGSI-v2 Tutorials based around a Smart Supermarket
Bored. Trying to proof of concept while streaming webcam from Aforge, can I check for barcodes.
Awesome Github Profile Readme. Hack my profile! (game in readme). Fork and invent your own rules to your profile!
Guarani is a Web Security Framework aimed at providing Authentication, Authorization, Identity Management and much more.
IBM FortiGate Deployment Templates
mockup proof of concept for chromium
What's in your data? Extract schema, statistics and entities from datasets
As a result of researching bugs, I often come across new and interesting vulnerabilities. I finally decided to create a centralized repository for proof of concepts. Everything is sorted by vendor with subdirectories for each product.
SAP security maturity model
The most flexible and standards-compliant OpenID Connect and OAuth 2.x framework for ASP.NET Core
An example scaffolding from scratch for React SPA with CI using Github Actions that cover, linting, formatting, unit testing, e2e testing, visual regression, security scanning, coverage, performance checking, accessibility and simple deployment to github
This repository demonstrates how to implement security in a business scenario using the Node.js framework. The application is secured using the SAP BTP, Cloud Foundry environment Authorization and Trust Management Service.
Arsenal is just a quick inventory and launcher for hacking programs
EMBA - The firmware security analyzer
Proof of concept. Zabbix templates.
Private front-end for Reddit
2021 hacker rank challenges
Evervault JavaScript SDK.
Fast, secure JSON library with tight ZIO integration.
Infer# is an interprocedural and scalable static code analyzer for C#. Via the capabilities of Facebook's Infer, this tool detects null dereferences, resource leaks, and thread-safety violations. It also performs taint flow tracking to detect critical sec
Proof of concept to show SASjs base64 encoding on a "SAS Rap" mp3
Thoth's Security Indicator using cloc
Find and fix 360+ types of hardcoded secrets and 70+ types of infrastructure-as-code misconfigurations.
DNS over QUIC Proof of Concept
DNS over WebSocket Proof of Concept
Hackers Toolkit
HIL-based Augmented ICS (HAI) Security Dataset
Semgrep rules registry
Genuine Fake means an imitation of a (usually) valuable object that is so good that it is, to all intents and purposes, identical. Literally genuine fake means something that is real but not real at the same time. Take it like this, it's more of a perfect
A (nearly) production ready Dockered MISP
A personal portfolio created during Cyber Security Bootcamp at Rice University in 2020 -- Contents are meant to illustrate competencies and skills acquired as well as serve as a display of writing samples authored by myself.
SecurityService
Capture The Flag competition challenge write-ups
Some dummy hacks.
Linux Runtime Security and Forensics using eBPF
WebAuthn security keys and TOTP multi-factor authentication for Django
🛡Security library covering Cryptography, Hashing, HMAC, Random, PBKDF, PKCS, X509, PKCS10
EnRoute Ingress API Gateway - Connectivity and Security for your Microservice at Kubernetes Ingress using one helm command. Built on Envoy Proxy.
Run Capture the Flags and Security Trainings with OWASP Juice Shop
A Rust implementation of the Security Support Provider Interface (SSPI) API
Anti-Malware for minecraft
unicef-security
🏠 Dev-Contents-House
Remote Repositories Head/Repositories Ready to Hack
Go packages built on go-tpm providing a high-level API for using TPMs
项目基于 Spring Boot 2.1.0 、 Jpa、 Spring Security、redis、Vue的前后端分离的后台管理系统,项目采用分模块开发方式, 权限控制采用 RBAC,支持数据字典与数据权限管理,支持一键生成前后端代码,支持动态路由
.NET Nuget Packages.
Quick hack job of a flight monitoring test
Manage your dotfiles across multiple diverse machines, securely.
A Go implementation of in-toto. in-toto is a framework to protect software supply chain integrity.
A few projects I've done on my own in spare time, most of these are to test proof-of-concepts.
A naive forwarding protocol. This is a proof of concept (PoC).
A few utilities to work with JWTs.
Security risk analysis for Kubernetes resources
Fast passive subdomain enumeration tool.
bots, clients and other software people have made for hack.chat
ai-in-security
Automated Adversary Emulation Platform
Scripts to aid in offensive security engagements
Osmocom TTCN3 tests suites; mirrored from https://gitea.osmocom.org/ttcn3/osmo-ttcn3-hacks
Contains sample code (NOT PRODUCTION READY) for building SuperOffice CRM Online applications. Use these samples as examples of proof of concepts. Do not use any of this code in your production applications!
🌐Collate and develop network security, Hackers technical documentation and tools, code.
Utility to test Java code for SQL injection vulnerabilities.
http://firewalla.com
Random notes from a security-aware software engineer, open-source advocate and occasional lecturer.
Sentry, feature-complete and packaged up for low-volume deployments and proofs-of-concept
XML Security Library
Dradis Framework: Colllaboration and reporting for IT Security teams
syzkaller is an unsupervised coverage-guided kernel fuzzer
A proof-of-concept cracker for cryptocurrency brainwallets and other low entropy key alogrithms.
American Fuzzy Lop fork server and instrumentation for pure-Python code
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
:newspaper: A responsive interface of Hacker News with summaries and thumbnails.
An Emacs framework for the stubborn martian hacker
Zuul is a gateway service that provides dynamic routing, monitoring, resiliency, security, and more.
Visualize your aws security groups.
CVE-2010-10010 -- A vulnerability classified as problematic has been found in Stars Alliance PsychoStats up to 3.2.2a. This affects an unknown part of the file upload/admin/login.php. The manipulation of the argument ref leads to cross site scripting. It is possible to ini
CVE-2014-125104 -- A vulnerability was found in VaultPress Plugin up to 1.6.0 on WordPress. It has been declared as critical. Affected by this vulnerability is the function protect_aioseo_ajax of the file class.vaultpress-hotfixes.php of the component MailPoet Plugin. The m
CVE-2015-10109 -- A vulnerability was found in Video Playlist and Gallery Plugin up to 1.136 on WordPress. It has been rated as problematic. Affected by this issue is some unknown functionality of the file wp-media-cincopa.php. The manipulation leads to cross-site request
CVE-2018-25086 -- A vulnerability was found in sea75300 FanPress CM up to 3.6.3. It has been classified as problematic. This affects the function getArticlesPreview of the file inc/controller/action/system/templatepreview.php of the component Template Preview. The manipula
CVE-2022-35742 -- Microsoft Outlook Denial of Service Vulnerability
CVE-2022-4332 -- In Sprecher Automation SPRECON-E-C/P/T3 CPU in variant PU244x a vulnerable firmware verification has been identified. Through physical access and hardware manipulation, an attacker might be able to bypass hardware-based code verification and thus inject a
CVE-2022-4333 -- Hardcoded Credentials in multiple SPRECON-E CPU variants of Sprecher Automation allows an remote attacker to take over the device. These accounts should be deactivated according to Sprecher's hardening guidelines.
CVE-2022-43760 -- An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SUSE Rancher allows users in some higher-privileged groups to to inject code that is
CVE-2023-22647 -- An Improper Privilege Management vulnerability in SUSE Rancher allowed standard users to leverage their existing permissions to manipulate Kubernetes secrets in the local
CVE-2023-22648 -- A Improper Privilege Management vulnerability in SUSE Rancher causes permission changes in Azure AD not to be reflected to users
CVE-2023-22652 -- A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files.
CVE-2023-23952 -- Advanced Secure Gateway and Content Analysis, prior to 7.3.13.1 / 3.1.6.0, may be susceptible to a Command Injection vulnerability.
CVE-2023-23953 -- Advanced Secure Gateway and Content Analysis, prior to 7.3.13.1 / 3.1.6.0, may be susceptible to an Elevation of Privilege vulnerability.
CVE-2023-23954 -- Advanced Secure Gateway and Content Analysis, prior to 7.3.13.1 / 3.1.6.0, may be susceptible to a Stored Cross-Site Scripting vulnerability.
CVE-2023-23955 -- Advanced Secure Gateway and Content Analysis, prior to 7.3.13.1 / 3.1.6.0, may be susceptible to a Server-Side Request Forgery vulnerability.
CVE-2023-2598 -- A flaw was found in the fixed buffer registration code for io_uring (io_sqe_buffer_register in io_uring/rsrc.c) in the Linux kernel that allows out-of-bounds access to physical memory beyond the end of the buffer. This flaw enables full local privilege es
CVE-2023-28399 -- Incorrect permission assignment for critical resource exists in CONPROSYS HMI System (CHS) versions prior to 3.5.3. ACL (Access Control List) is not appropriately set to the local folder where the affected product is installed, therefore a wide range of p
CVE-2023-28651 -- Cross-site scripting vulnerability exists in CONPROSYS HMI System (CHS) versions prior to 3.5.3. If a user who can access the affected product with an administrative privilege configures specially crafted settings, an arbitrary script may be executed on t
CVE-2023-28657 -- Improper access control vulnerability exists in CONPROSYS HMI System (CHS) versions prior to 3.5.3. A user of the PC where the affected product is installed may gain an administrative privilege. As a result, information regarding the product may be obtain
CVE-2023-28713 -- Plaintext storage of a password exists in CONPROSYS HMI System (CHS) versions prior to 3.5.3. Because account information of the database is saved in a local file in plaintext, a user who can access the PC where the affected product is installed can obtai
CVE-2023-28824 -- Server-side request forgery vulnerability exists in CONPROSYS HMI System (CHS) versions prior to 3.5.3. A user who can access the affected product with an administrative privilege may bypass the database restriction set on the query setting page, and conn
CVE-2023-28937 -- DataSpider Servista version 4.4 and earlier uses a hard-coded cryptographic key. DataSpider Servista is data integration software. ScriptRunner and ScriptRunner for Amazon SQS are used to start the configured processes on DataSpider Servista. The cryptogr
CVE-2023-29154 -- SQL injection vulnerability exists in the CONPROSYS HMI System (CHS) versions prior to 3.5.3. A user who can access the affected product with an administrative privilege may execute an arbitrary SQL command via specially crafted input to the query setting
CVE-2023-29159 -- Directory traversal vulnerability in Starlette versions 0.13.5 and later and prior to 0.27.0 allows a remote unauthenticated attacker to view files in a web service which was built using Starlette.
CVE-2023-29748 -- Story Saver for Instragram - Video Downloader 1.0.6 for Android has an exposed component that provides a method to modify the SharedPreference file. An attacker can leverage this method to inject a large amount of data into any SharedPreference file, whic
CVE-2023-2977 -- A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans t
CVE-2023-2985 -- A use after free flaw was found in hfsplus_put_super in fs/hfsplus/super.c in the Linux Kernel. This flaw could allow a local user to cause a denial of service problem.
CVE-2023-3026 -- Cross-site Scripting (XSS) - Stored in GitHub repository jgraph/drawio prior to 21.2.8.
CVE-2023-3028 -- Insufficient authentication in the MQTT backend (broker) allows an attacker to access and even manipulate the telemetry data of the entire fleet of vehicles using the HopeChart HQT-401 telematics unit. Other models are possibly affected too.
CVE-2023-3029 -- A vulnerability has been found in Guangdong Pythagorean OA Office System up to 4.50.31 and classified as problematic. This vulnerability affects unknown code of the file /note/index/delete. The manipulation of the argument id leads to cross-site request f
CVE-2023-3035 -- A vulnerability has been found in Guangdong Pythagorean OA Office System up to 4.50.31 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Schedule Handler. The manipulation of the argument descriptio
CVE-2023-30758 -- Cross-site scripting vulnerability in Pleasanter 1.3.38.1 and earlier allows a remote authenticated attacker to inject an arbitrary script.
CVE-2023-32181 -- A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files
CVE-2023-33461 -- iniparser v4.1 is vulnerable to NULL Pointer Dereference in function iniparser_getlongint which misses check NULL for function iniparser_getstring's return.
CVE-2023-33544 -- hawtio 2.17.2 is vulnerable to Path Traversal. it is possible to input malicious zip files, which can result in the high-risk files after decompression being stored in any location, even leading to file overwrite.
CVE-2023-33546 -- janino 3.1.9 and earlier are subject to denial of service (DOS) attacks when using the expression evaluator.guess parameter name method. If the parser runs on user-supplied input, an attacker could supply content that causes the parser to crash due to a s
CVE-2023-33551 -- Heap Buffer Overflow in the erofsfsck_dirent_iter function in fsck/main.c in erofs-utils v1.6 allows remote attackers to execute arbitrary code via a crafted erofs filesystem image.
CVE-2023-33552 -- Heap Buffer Overflow in the erofs_read_one_data function at data.c in erofs-utils v1.6 allows remote attackers to execute arbitrary code via a crafted erofs filesystem image.
CVE-2023-33716 -- mp4v2 v2.1.3 was discovered to contain a memory leak via the class MP4StringProperty at mp4property.cpp.
CVE-2023-33719 -- mp4v2 v2.1.3 was discovered to contain a memory leak via MP4SdpAtom::Read() at atom_sdp.cpp
CVE-2023-33778 -- Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attack
CVE-2023-33965 -- Brook is a cross-platform programmable network tool. The `tproxy` server is vulnerable to a drive-by command injection. An attacker may fool a victim into visiting a malicious web page which will trigger requests to the local `tproxy` service leading to r
CVE-2023-34312 -- In Tencent QQ through 9.7.8.29039 and TIM through 3.4.7.22084, QQProtect.exe and QQProtectEngine.dll do not validate pointers from inter-process communication, which leads to a write-what-where condition.
CVE-2012-10015 -- A vulnerability was found in BestWebSoft Twitter Plugin up to 2.14 on WordPress. It has been classified as problematic. Affected is the function twttr_settings_page of the file twitter.php of the component Settings Page. The manipulation leads to cross-si
CVE-2014-125103 -- A vulnerability was found in BestWebSoft Twitter Plugin up to 1.3.2 on WordPress. It has been declared as problematic. Affected by this vulnerability is the function twttr_settings_page of the file twitter.php. The manipulation of the argument twttr_url_t
CVE-2015-10107 -- A vulnerability was found in Simplr Registration Form Plus+ Plugin up to 2.3.4 on WordPress and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting. The attack may be initiated remotely. Up
CVE-2015-10108 -- A vulnerability was found in meitar Inline Google Spreadsheet Viewer Plugin up to 0.9.6 on WordPress and classified as problematic. Affected by this issue is the function displayShortcode of the file inline-gdocs-viewer.php. The manipulation leads to cros
CVE-2021-31233 -- SQL Injection vulnerability found in Fighting Cock Information System v.1.0 allows a remote attacker to obtain sensitive information via the edit_breed.php parameter.
CVE-2021-45039 -- Multiple models of the Uniview IP Camera (e.g., IPC_G6103 B6103.16.10.B25.201218, IPC_G61, IPC21, IPC23, IPC32, IPC36, IPC62, and IPC_HCMN) offer an undocumented UDP service on port 7788 that allows a remote unauthenticated attacker to overflow an interna
CVE-2022-35743 -- Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability
CVE-2022-35744 -- Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability
CVE-2022-35747 -- Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability
CVE-2022-35748 -- HTTP.sys Denial of Service Vulnerability
CVE-2022-35749 -- Windows Digital Media Receiver Elevation of Privilege Vulnerability
CVE-2022-35751 -- Windows Hyper-V Elevation of Privilege Vulnerability
CVE-2022-35754 -- Unified Write Filter Elevation of Privilege Vulnerability
CVE-2022-35755 -- Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2022-35756 -- Windows Kerberos Elevation of Privilege Vulnerability
CVE-2022-35757 -- Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2022-35759 -- Windows Local Security Authority (LSA) Denial of Service Vulnerability
CVE-2022-47525 -- Fox-IT DataDiode (aka Fox DataDiode) 3.4.3 suffers from a Divide-by-Zero vulnerability in the packet parser. A remote attacker could leverage this vulnerability to cause a denial-of-service. Exploitation of this issue does not require user interaction.
CVE-2022-47526 -- Fox-IT DataDiode (aka Fox DataDiode) 3.4.3 suffers from a path traversal vulnerability with resultant arbitrary writing of files. A remote attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the downstream node
CVE-2022-48502 -- An issue was discovered in the Linux kernel before 6.2. The ntfs3 subsystem does not properly check for correctness during disk reads, leading to an out-of-bounds read in ntfs_set_ea in fs/ntfs3/xattr.c.
CVE-2023-1661 -- The Display post meta, term meta, comment meta, and user meta plugin for WordPress is vulnerable to Stored Cross-Site Scripting via post metadata in versions up to, and including, 0.4.1 due to insufficient input sanitization and output escaping. This make
CVE-2023-2304 -- The Favorites plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'user_favorites' shortcode in versions up to, and including, 2.3.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes i
CVE-2023-23562 -- Stormshield Endpoint Security 2.3.0 through 2.3.2 has Incorrect Access Control that allows an authenticated user can update global parameters.
CVE-2023-2434 -- The Nested Pages plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'reset' function in versions up to, and including, 3.2.3. This makes it possible for authenticated attackers, with editor-level permi
CVE-2023-2435 -- The Blog-in-Blog plugin for WordPress is vulnerable to Local File Inclusion in versions up to, and including, 1.1.1 via a shortcode attribute. This allows editor-level, and above, attackers to include and execute arbitrary files on the server, allowing th
CVE-2023-2436 -- The Blog-in-Blog plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'blog_in_blog' shortcode in versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes
CVE-2023-2545 -- The Feather Login Page plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'getListOfUsers' function in versions starting from 1.0.7 up to, and including, 1.1.1. This makes it possible for authenticat
CVE-2023-2547 -- The Feather Login Page plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'deleteUser' function in versions starting from 1.0.7 up to, and including, 1.1.1. This makes it possible for authenticated att
CVE-2023-2549 -- The Feather Login Page plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions starting from 1.0.7 up to, and including, 1.1.1. This is due to missing nonce validation in the 'createTempAccountLink' function. This makes it possible fo
CVE-2023-2612 -- Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu Linux kernel contained a race condition when handling inode locking in some situations. A local attacker could use this to cause a denial of service (kernel deadlock).
CVE-2023-26131 -- All versions of the package github.com/xyproto/algernon/engine; all versions of the package github.com/xyproto/algernon/themes are vulnerable to Cross-site Scripting (XSS) via the themes.NoPage(filename, theme) function due to improper user input sanitiza
CVE-2023-26277 -- IBM QRadar WinCollect Agent 10.0 though 10.1.3 could allow a local user to execute commands on the system due to execution with unnecessary privileges. IBM X-Force ID: 248156.
CVE-2023-26278 -- IBM QRadar WinCollect Agent 10.0 through 10.1.3 could allow a local authenticated attacker to gain elevated privileges on the system. IBM X-Force ID: 248158.
CVE-2023-26842 -- A stored Cross-site scripting (XSS) vulnerability in ChurchCRM 4.5.3 allows remote attackers to inject arbitrary web script or HTML via the OptionManager.php.
CVE-2023-2749 -- Download Center fails to properly validate the file path submitted by a user, An attacker can exploit this vulnerability to gain unauthorized access to sensitive files or directories without appropriate permission restrictions. Download Center on ADM 4.0
CVE-2023-2758 -- A denial of service vulnerability exists in Contec CONPROSYS HMI System versions 3.5.2 and prior. When there is a time-zone mismatch in certain configuration files, a remote, unauthenticated attacker may deny logins for an extended period of time.
CVE-2023-28344 -- An issue was discovered in Faronics Insight 10.0.19045 on Windows. The Insight Teacher Console application allows unauthenticated attackers to view constantly updated screenshots of student desktops and to submit falsified screenshots on behalf of student
CVE-2023-28345 -- An issue was discovered in Faronics Insight 10.0.19045 on Windows. The Insight Teacher Console application exposes the teacher's Console password in cleartext via an API endpoint accessible from localhost. Attackers with physical access to the Teacher Con
CVE-2023-28346 -- An issue was discovered in Faronics Insight 10.0.19045 on Windows. It is possible for a remote attacker to communicate with the private API endpoints exposed at /login, /consoleSettings, /console, etc. despite Virtual Host Routing being used to block this
CVE-2023-28347 -- An issue was discovered in Faronics Insight 10.0.19045 on Windows. It is possible for an attacker to create a proof-of-concept script that functions similarly to a Student Console, providing unauthenticated attackers with the ability to exploit XSS vulner
CVE-2023-28348 -- An issue was discovered in Faronics Insight 10.0.19045 on Windows. A suitably positioned attacker could perform a man-in-the-middle attack on either a connected student or teacher, enabling them to intercept student keystrokes or modify executable files b
CVE-2023-28349 -- An issue was discovered in Faronics Insight 10.0.19045 on Windows. It is possible for an attacker to create a crafted program that functions similarly to the Teacher Console. This can compel Student Consoles to connect and put themselves at risk automatic
CVE-2023-28350 -- An issue was discovered in Faronics Insight 10.0.19045 on Windows. Attacker-supplied input is not validated/sanitized before being rendered in both the Teacher and Student Console applications, enabling an attacker to execute JavaScript in these applicati
CVE-2023-28351 -- An issue was discovered in Faronics Insight 10.0.19045 on Windows. Every keystroke made by any user on a computer with the Student application installed is logged to a world-readable directory. A local attacker can trivially extract these cleartext keystr
CVE-2023-28352 -- An issue was discovered in Faronics Insight 10.0.19045 on Windows. By abusing the Insight UDP broadcast discovery system, an attacker-controlled artificial Student Console can connect to and attack a Teacher Console even after Enhanced Security Mode has b
CVE-2023-28353 -- An issue was discovered in Faronics Insight 10.0.19045 on Windows. An unauthenticated attacker is able to upload any type of file to any location on the Teacher Console's computer, enabling a variety of different exploitation paths including code executio
CVE-2023-2836 -- The CRM Perks Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form settings in versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers,
CVE-2023-2909 -- EZ Sync service fails to adequately handle user input, allowing an attacker to navigate beyond the intended directory structure and delete files. Affected products and versions include: ADM 4.0.6.REG2, 4.1.0 and below as well as ADM 4.2.1.RGE2 and below.
CVE-2023-29742 -- An issue found in BestWeather v.7.3.1 for Android allows unauthorized apps to cause a code execution attack by manipulating the database.
CVE-2023-29747 -- Story Saver for Instragram - Video Downloader 1.0.6 for Android exists exposed component, the component provides the method to modify the SharedPreference file. The attacker can use the method to modify the data in any SharedPreference file, these data wi
CVE-2023-2987 -- The Wordapp plugin for WordPress is vulnerable to authorization bypass due to an use of insufficiently unique cryptographic signature on the 'wa_pdx_op_config_set' function in versions up to, and including, 1.5.0. This makes it possible for unauthenticate
CVE-2023-2999 -- Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.14.
CVE-2023-3003 -- A vulnerability classified as critical was found in SourceCodester Train Station Ticketing System 1.0. Affected by this vulnerability is an unknown functionality of the file manage_prices.php of the component GET Parameter Handler. The manipulation of the
CVE-2023-3004 -- A vulnerability, which was classified as critical, has been found in SourceCodester Simple Chat System 1.0. Affected by this issue is some unknown functionality of the file /ajax.php?action=read_msg of the component POST Parameter Handler. The manipulatio
CVE-2023-3006 -- A known cache speculation vulnerability, known as Branch History Injection (BHI) or Spectre-BHB, becomes actual again for the new hw AmpereOne. Spectre-BHB is similar to Spectre v2, except that malicious code uses the shared branch history (stored in the
CVE-2023-3007 -- A vulnerability was found in ningzichun Student Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file resetPassword.php of the component Password Reset Handler. The manipulation of the argum
CVE-2023-3008 -- A vulnerability classified as critical has been found in ningzichun Student Management System 1.0. This affects an unknown part of the file login.php. The manipulation of the argument user/pass leads to sql injection. It is possible to initiate the attack
CVE-2023-3009 -- Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.
CVE-2023-3013 -- Unchecked Return Value in GitHub repository gpac/gpac prior to 2.2.2.
CVE-2023-3014 -- A vulnerability, which was classified as problematic, was found in BeipyVideoResolution up to 2.6. Affected is an unknown function of the file admin/admincore.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotel
CVE-2023-3015 -- A vulnerability has been found in yiwent Vip Video Analysis 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file data/title.php. The manipulation of the argument titurl leads to server-side request forgery
CVE-2023-3016 -- A vulnerability was found in yiwent Vip Video Analysis 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file admin/admincore.php. The manipulation leads to cross site scripting. The attack may be launched remo
CVE-2023-3017 -- A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been classified as problematic. This affects an unknown part of the file admin/?page=user/manage_user of the component Manage User Page. The manipulation of the argu
CVE-2023-3018 -- A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/?page=user/list. The manipulation leads to improper access controls. The attack
CVE-2023-30197 -- Incorrect Access Control in the module "My inventory" (myinventory) <= 1.6.6 from Webbax for PrestaShop, allows a guest to download personal information without restriction by performing a path traversal attack.
CVE-2023-3020 -- Cross-site Scripting (XSS) - Reflected in GitHub repository mkucej/i-librarian-free prior to 5.10.4.
CVE-2023-3021 -- Cross-site Scripting (XSS) - Stored in GitHub repository mkucej/i-librarian-free prior to 5.10.4.
CVE-2023-30285 -- An issue in Deviniti Issue Sync Synchronization v3.5.2 for Jira allows attackers to obtain the login credentials of a user via a crafted request sent to /rest/synchronizer/1.0/technicalUser.
CVE-2023-31548 -- A stored Cross-site scripting (XSS) vulnerability in the FundRaiserEditor.php component of ChurchCRM v4.5.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
CVE-2023-33287 -- A stored cross-site scripting (XSS) vulnerability in the Inline Table Editing application before 3.8.0 for Confluence allows attackers to store and execute arbitrary JavaScript via a crafted payload injected into the tables.
CVE-2023-33485 -- TOTOLINK X5000R V9.1.0u.6118_B20201102 and V9.1.0u.6369_B20230113 contains a post-authentication buffer overflow via parameter sPort/ePort in the addEffect function.
CVE-2023-33486 -- TOTOLINK X5000R V9.1.0u.6118_B20201102 and V9.1.0u.6369_B20230113 contain a command insertion vulnerability in setOpModeCfg. This vulnerability allows an attacker to execute arbitrary commands through the "hostName" parameter.
CVE-2023-33487 -- TOTOLINK X5000R V9.1.0u.6118_B20201102 and V9.1.0u.6369_B20230113 contains a command insertion vulnerability in setDiagnosisCfg.This vulnerability allows an attacker to execute arbitrary commands through the "ip" parameter.
CVE-2023-33507 -- KramerAV VIA GO² < 4.0.1.1326 is vulnerable to Unauthenticated arbitrary file read.
CVE-2023-33508 -- KramerAV VIA GO² < 4.0.1.1326 is vulnerable to unauthenticated file upload resulting in Remote Code Execution (RCE).
CVE-2023-33509 -- KramerAV VIA GO² < 4.0.1.1326 is vulnerable to SQL Injection.
CVE-2023-33627 -- H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the UpdateSnat interface at /goform/aspForm.
CVE-2023-33628 -- H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the DelvsList interface at /goform/aspForm.
CVE-2023-33629 -- H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the DeltriggerList interface at /goform/aspForm.
CVE-2023-33630 -- H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the EditvsList interface at /goform/aspForm.
CVE-2023-33631 -- H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the DelSTList interface at /goform/aspForm.
CVE-2023-33632 -- H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the ipqos_lanip_dellist interface at /goform/aspForm.
CVE-2023-33633 -- H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the UpdateWanParams interface at /goform/aspForm.
CVE-2023-33634 -- H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the EdittriggerList interface at /goform/aspForm.
CVE-2023-33635 -- H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the UpdateMacClone interface at /goform/aspForm.
CVE-2023-33636 -- H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the ipqos_lanip_editlist interface at /goform/aspForm.
CVE-2023-33637 -- H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the DelDNSHnList interface at /goform/aspForm.
CVE-2023-33638 -- H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the Edit_BasicSSID_5G interface at /goform/aspForm.
CVE-2023-33639 -- H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the SetMobileAPInfoById interface at /goform/aspForm.
CVE-2023-33640 -- H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the SetAPWifiorLedInfoById interface at /goform/aspForm.
CVE-2023-33641 -- H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the AddMacList interface at /goform/aspForm.
CVE-2023-33642 -- H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the Edit_BasicSSID interface at /goform/aspForm.
CVE-2023-33642 -- H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the Edit_BasicSSID interface at /goform/aspForm.
CVE-2023-33643 -- H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the AddWlanMacList interface at /goform/aspForm.
CVE-2023-33718 -- mp4v2 v2.1.3 was discovered to contain a memory leak via MP4File::ReadString() at mp4file_io.cpp
CVE-2023-33722 -- EDIMAX BR-6288ACL v1.12 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the pppUserName parameter.
CVE-2023-33730 -- Privilege Escalation in the "GetUserCurrentPwd" function in Microworld Technologies eScan Management Console 14.0.1400.2281 allows any remote attacker to retrieve password of any admin or normal user in plain text format.
CVE-2023-33732 -- Cross Site Scripting (XSS) in the New Policy form in Microworld Technologies eScan management console 14.0.1400.2281 allows a remote attacker to inject arbitrary code via the vulnerable parameters type, txtPolicyType, and Deletefileval.
CVE-2023-33735 -- D-Link DIR-846 v1.00A52 was discovered to contain a remote command execution (RCE) vulnerability via the tomography_ping_address parameter in the /HNAP1 interface.
CVE-2023-33736 -- A stored cross-site scripting (XSS) vulnerability in Dcat-Admin v2.1.3-beta allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the URL parameter.
CVE-2023-33964 -- mx-chain-go is an implementation of the MultiversX blockchain protocol written in the Go language. Metachain cannot process a cross-shard miniblock. Prior to version 1.4.16, an invalid transaction with the wrong username on metachain is not treated correc
CVE-2023-33966 -- Deno is a runtime for JavaScript and TypeScript. In deno 1.34.0 and deno_runtime 0.114.0, outbound HTTP requests made using the built-in `node:http` or `node:https` modules are incorrectly not checked against the network permission allow list (`--allow-ne
CVE-2023-33967 -- EaseProbe is a tool that can do health/status checking. An SQL injection issue was discovered in EaseProbe before 2.1.0 when using MySQL/PostgreSQL data checking. This problem has been fixed in v2.1.0.
CVE-2023-33971 -- Formcreator is a GLPI plugin which allow creation of custom forms and the creation of one or more tickets when the form is filled. A probable stored cross-site scripting vulnerability is present in Formcreator 2.13.5 and prior via the use of the use of `#
CVE-2023-33979 -- gpt_academic provides a graphical interface for ChatGPT/GLM. A vulnerability was found in gpt_academic 3.37 and prior. This issue affects some unknown processing of the component Configuration File Handler. The manipulation of the argument file leads to i
CVE-2023-34088 -- Collabora Online is a collaborative online office suite. A stored cross-site scripting (XSS) vulnerability was found in Collabora Online prior to versions 22.05.13, 21.11.9.1, and 6.4.27. An attacker could create a document with an XSS payload as a docume
CVE-2023-34218 -- In JetBrains TeamCity before 2023.05 bypass of permission checks allowing to perform admin actions was possible
CVE-2023-34219 -- In JetBrains TeamCity before 2023.05 improper permission checks allowed users without appropriate permissions to edit Build Configuration settings via REST API
CVE-2023-34220 -- In JetBrains TeamCity before 2023.05 stored XSS in the Commit Status Publisher window was possible
CVE-2023-34221 -- In JetBrains TeamCity before 2023.05 stored XSS in the Show Connection page was possible
CVE-2023-34222 -- In JetBrains TeamCity before 2023.05 possible XSS in the Plugin Vendor URL was possible
CVE-2023-34223 -- In JetBrains TeamCity before 2023.05 parameters of the "password" type from build dependencies could be logged in some cases
CVE-2023-34224 -- In JetBrains TeamCity before 2023.05 open redirect during oAuth configuration was possible
CVE-2023-34225 -- In JetBrains TeamCity before 2023.05 stored XSS in the NuGet feed page was possible
CVE-2023-34226 -- In JetBrains TeamCity before 2023.05 reflected XSS in the Subscriptions page was possible
CVE-2023-34227 -- In JetBrains TeamCity before 2023.05 a specific endpoint was vulnerable to brute force attacks
CVE-2023-34228 -- In JetBrains TeamCity before 2023.05 authentication checks were missing – 2FA was not checked for some sensitive account actions
CVE-2023-34229 -- In JetBrains TeamCity before 2023.05 stored XSS in GitLab Connection page was possible
CVE-2023-34255 -- An issue was discovered in the Linux kernel through 6.3.5. There is a use-after-free in xfs_btree_lookup_get_block in fs/xfs/libxfs/xfs_btree.c because fs/xfs/xfs_buf_item_recover.c does not perform buffer content verification when log replay is skipped.
CVE-2023-34256 -- An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset.
CVE-2023-34257 -- ** DISPUTED ** An issue was discovered in BMC Patrol through 23.1.00. The agent's configuration can be remotely modified (and, by default, authentication is not required). Some configuration fields related to SNMP (e.g., masterAgentName or masterAgentStar
CVE-2023-34258 -- An issue was discovered in BMC Patrol before 22.1.00. The agent's configuration can be remotely queried. This configuration contains the Patrol account password, encrypted with a default AES key. This account can then be used to achieve remote code execut
Vulners.com -- Why Attackers Target the Gaming Industry
Vulners.com -- CVE-2022-42856
CVE-2018-8661 -- ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.
CVE-2022-36243 -- Shop Beat Solutions (pty) LTD Shop Beat Media Player 2.5.95 up to 3.2.57 is vulnerable to Directory Traversal via server.shopbeat.co.za. Information Exposure Through Directory Listing vulnerability in "studio" software of Shop Beat. This issue affects: Sh
CVE-2022-36244 -- Shop Beat Solutions (Pty) LTD Shop Beat Media Player 2.5.95 up to 3.2.57 suffers from Multiple Stored Cross-Site Scripting (XSS) vulnerabilities via Shop Beat Control Panel found at www.shopbeat.co.za controlpanel.shopbeat.co.za.
CVE-2022-36246 -- Shop Beat Solutions (Pty) LTD Shop Beat Media Player 2.5.95 up to 3.2.57 is vulnerable to Insecure Permissions.
CVE-2022-36247 -- Shop Beat Solutions (Pty) LTD Shop Beat Media Player 2.5.95 up to 3.2.57 is vulnerable to IDOR via controlpanel.shopbeat.co.za.
CVE-2022-36249 -- Shop Beat Solutions (Pty) LTD Shop Beat Media Player 2.5.95 up to 3.2.57 is vulnerable to Bypass 2FA via APIs. For Controlpanel Lite. "After login we are directly able to use the bearer token or jsession ID to access the apis instead of entering the 2FA c
CVE-2022-36250 -- Shop Beat Solutions (Pty) LTD Shop Beat Media Player 2.5.95 up to 3.2.57 is vulnerable to Cross Site Request Forgery (CSRF).
CVE-2022-39071 -- There is an unauthorized access vulnerability in some ZTE mobile phones. If a malicious application is installed on the phone, it could overwrite some system configuration files and user installers without user permission.
CVE-2022-39074 -- There is an unauthorized access vulnerability in some ZTE mobile phones. If a malicious application is installed on the phone, it could start a non-public interface of an application without user permission.
CVE-2022-39075 -- There is an unauthorized access vulnerability in some ZTE mobile phones. If a malicious application is installed on the phone, it could delete some system files without user permission.
CVE-2022-4240 -- Missing Authentication for Critical Function vulnerability in Honeywell OneWireless allows Authentication Bypass. This issue affects OneWireless version 322.1
CVE-2022-46361 -- An attacker having physical access to WDM can plug USB device to gain access and execute unwanted commands. A malicious user could enter a system command along with a backup configuration, which could result in the execution of unwanted commands. This iss
CVE-2022-4676 -- The OSM WordPress plugin through 6.01 does not validate and escape some of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.
CVE-2022-47028 -- An issue discovered in Action Launcher for Android v50.5 allows an attacker to cause a denial of service via arbitary data injection to function insert.
CVE-2022-47029 -- An issue was found in Action Launcher v50.5 allows an attacker to escalate privilege via modification of the intent string to function update.
CVE-2022-48137 -- ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-26830. Reason: This candidate is a reservation duplicate of CVE-2023-26830. Notes: All CVE users should reference CVE-2023-26830 instead of this candidate. All references and descriptions
CVE-2022-48138 -- ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-26829. Reason: This candidate is a reservation duplicate of CVE-2023-26829. Notes: All CVE users should reference CVE-2023-26829 instead of this candidate. All references and descriptions
CVE-2023-0329 -- The Elementor Website Builder WordPress plugin before 3.12.2 does not properly sanitize and escape the Replace URL parameter in the Tools module before using it in a SQL statement, leading to a SQL injection exploitable by users with the Administrator rol
CVE-2023-0443 -- The AnyWhere Elementor WordPress plugin before 1.2.8 discloses a Freemius Secret Key which could be used by an attacker to purchase the pro subscription using test credit card numbers without actually paying the amount. Such key has been revoked.
CVE-2023-0733 -- The Newsletter Popup WordPress plugin through 1.2 does not sanitise and escape some of its settings, which could allow unauthenticated users to perform Stored Cross-Site Scripting attacks
CVE-2023-0766 -- The Newsletter Popup WordPress plugin through 1.2 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks as the wp_newsletter_show_localrecord page is not protected with a no
CVE-2023-0779 -- At the most basic level, an invalid pointer can be input that crashes the device, but with more knowledge of the device’s memory layout, further exploitation is possible.
CVE-2023-1524 -- The Download Manager WordPress plugin before 3.2.71 does not adequately validate passwords for password-protected files. Upon validation, a master key is generated and exposed to the user, which may be used to download any password-protected file on the s
CVE-2023-1711 -- A vulnerability exists in a FOXMAN-UN and UNEM logging component, it only affects systems that use remote authentication to the network elements.
CVE-2023-1938 -- The WP Fastest Cache WordPress plugin before 1.1.5 does not have CSRF check in an AJAX action, and does not validate user input before using it in the wp_remote_get() function, leading to a Blind SSRF issue
CVE-2023-2023 -- The Custom 404 Pro WordPress plugin before 3.7.3 does not escape some URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting.
CVE-2023-20884 -- VMware Workspace ONE Access and VMware Identity Manager contain an insecure redirect vulnerability. An unauthenticated malicious actor may be able to redirect a victim to an attacker controlled domain due to improper path handling leading to sensitive inf
CVE-2023-2111 -- The Fast & Effective Popups & Lead-Generation for WordPress plugin before 2.1.4 concatenates user input into an SQL query without escaping it first in the plugin's report API endpoint, which could allow administrators in multi-site configuration to leak s
CVE-2023-2113 -- The Autoptimize WordPress plugin before 3.1.7 does not sanitise and escape the settings imported from a previous export, allowing high privileged users (such as an administrator) to inject arbitrary javascript into the admin panel, even when the unfiltere
CVE-2023-2117 -- The Image Optimizer by 10web WordPress plugin before 1.0.27 does not sanitize the dir parameter when handling the get_subdirs ajax action, allowing a high privileged users such as admins to inspect names of files and directories outside of the sites root.
CVE-2023-2223 -- The Login rebuilder WordPress plugin before 2.8.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
CVE-2023-2256 -- The Product Addons & Fields for WooCommerce WordPress plugin before 32.0.7 does not sanitize and escape some URL parameters, leading to Reflected Cross-Site Scripting.
CVE-2023-2287 -- The Orbit Fox by ThemeIsle WordPress plugin before 2.10.24 does not limit URLs which may be used for the stock photo import feature, allowing the user to specify arbitrary URLs. This leads to a server-side request forgery as the user may force the server
CVE-2023-2288 -- The Otter WordPress plugin before 2.2.6 does not sanitize some user-controlled file paths before performing file operations on them. This leads to a PHAR deserialization vulnerability on PHP < 8.0 using the phar:// stream wrapper.
CVE-2023-2296 -- The Loginizer WordPress plugin before 1.7.9 does not escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
CVE-2023-23561 -- Stormshield Endpoint Security 2.3.0 through 2.3.2 has Incorrect Access Control: authenticated users can read sensitive information.
CVE-2023-23754 -- An issue was discovered in Joomla! 4.2.0 through 4.3.1. Lack of input validation caused an open redirect and XSS issue within the new mfa selection screen.
CVE-2023-23755 -- An issue was discovered in Joomla! 4.2.0 through 4.3.1. The lack of rate limiting allowed brute force attacks against MFA methods.
CVE-2023-23956 -- A user can supply malicious HTML and JavaScript code that will be executed in the client browser
CVE-2023-2470 -- The Add to Feedly WordPress plugin through 1.2.11 does not sanitize and escape its settings, allowing high-privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
CVE-2023-24817 -- RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2023.04, an attacker can send a crafted frame to the device resulting in an integer underflow and out
CVE-2023-24825 -- RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2023.04, an attacker can send a crafted frame to the device to trigger a NULL pointer dereference lead
CVE-2023-24826 -- RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2023.04, an attacker can send crafted frames to the device to trigger the usage of an uninitialized ob
CVE-2023-2518 -- The Easy Forms for Mailchimp WordPress plugin through 6.8.8 does not sanitise and escape a parameter before outputting it back in the page when the debug option is enabled, leading to a Reflected Cross-Site Scripting which could be used against high privi
CVE-2023-26130 -- Versions of the package yhirose/cpp-httplib before 0.12.4 are vulnerable to CRLF Injection when untrusted user input is used to set the content-type header in the HTTP .Patch, .Post, .Put and .Delete requests. This can lead to logical errors and other mis
CVE-2023-2650 -- Issue summary: Processing some specially crafted ASN.1 object identifiers or
CVE-2023-27988 -- The post-authentication command injection vulnerability in the Zyxel NAS326 firmware versions prior to V5.21(AAZF.13)C0 could allow an authenticated attacker with administrator privileges to execute some operating system (OS) commands on an affected devic
CVE-2023-2929 -- Out of bounds write in Swiftshader in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2023-2930 -- Use after free in Extensions in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2023-2933 -- Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)
CVE-2023-2934 -- Out of bounds memory access in Mojo in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2023-2936 -- Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2023-2938 -- Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severi
CVE-2023-2939 -- Insufficient data validation in Installer in Google Chrome on Windows prior to 114.0.5735.90 allowed a local attacker to perform privilege escalation via crafted symbolic link. (Chromium security severity: Medium)
CVE-2023-2940 -- Inappropriate implementation in Downloads in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)
CVE-2023-2941 -- Inappropriate implementation in Extensions API in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the UI via a crafted Chrome Extension. (Chromium security severity: L
CVE-2023-2952 -- XRA dissector infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file
CVE-2023-2953 -- A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.
CVE-2023-2968 -- A remote attacker can trigger a denial of service in the socket.remoteAddress variable, by sending a crafted HTTP request. Usage of the undefined variable raises a TypeError exception.
CVE-2023-2970 -- A vulnerability classified as problematic was found in MindSpore 2.0.0-alpha/2.0.0-rc1. This vulnerability affects the function JsonHelper::UpdateArray of the file mindspore/ccsrc/minddata/dataset/util/json_helper.cc. The manipulation leads to memory corr
CVE-2023-2972 -- Prototype Pollution in GitHub repository antfu/utils prior to 0.7.3.
CVE-2023-29726 -- The Call Blocker application 6.6.3 for Android incorrectly opens a key component that an attacker can use to inject large amounts of dirty data into the application's database. When the application starts, it loads the data from the database into memory.
CVE-2023-29727 -- The Call Blocker application 6.6.3 for Android allows unauthorized applications to use exposed components to delete data stored in its database that is related to user privacy settings and affects the implementation of the normal functionality of the appl
CVE-2023-29728 -- The Call Blocker application 6.6.3 for Android allows attackers to tamper with feature-related data, resulting in a severe elevation of privilege attack.
CVE-2023-29731 -- SoLive 1.6.14 thru 1.6.20 for Android has an exposed component that provides a method to modify the SharedPreference file. An attacker can leverage this method to inject a large amount of data into any SharedPreference file, which will be loaded into memo
CVE-2023-29732 -- SoLive 1.6.14 thru 1.6.20 for Android exists exposed component, the component provides the method to modify the SharedPreference file. The attacker can use the method to modify the data in any SharedPreference file, these data will be loaded into the memo
CVE-2023-29733 -- The Lock Master app 2.2.4 for Android allows unauthorized apps to modify the values in its SharedPreference files. These files hold data that affects many app functions. Malicious modifications by unauthorized apps can cause security issues, such as funct
CVE-2023-29734 -- An issue found in edjing Mix v.7.09.01 for Android allows unauthorized apps to cause escalation of privilege attacks by manipulating the database.
CVE-2023-29735 -- An issue found in edjing Mix v.7.09.01 for Android allows a local attacker to cause a denial of service via the database files.
CVE-2023-29737 -- An issue found in Wave Animated Keyboard Emoji v.1.70.7 for Android allows a local attacker to cause a denial of service via the database files.
CVE-2023-29738 -- An issue found in Wave Animated Keyboard Emoji v.1.70.7 for Android allows a local attacker to cause code execution and escalation of Privileges via the database files.
CVE-2023-29739 -- An issue found in Alarm Clock for Heavy Sleepers v.5.3.2 for Android allows unauthorized apps to cause escalation of privilege attacks by manipulating the component.
CVE-2023-29740 -- An issue found in Alarm Clock for Heavy Sleepers v.5.3.2 for Android allows unauthorized apps to cause a denial of service attack by manipulating the database.
CVE-2023-29741 -- An issue found in BestWeather v.7.3.1 for Android allows unauthorized apps to cause an escalation of privileges attack by manipulating the database.
CVE-2023-29743 -- An issue found in BestWeather v.7.3.1 for Android allows unauthorized apps to cause a persistent denial of service attack by manipulating the database.
CVE-2023-2978 -- A vulnerability was found in Abstrium Pydio Cells 4.2.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Change Subscription Handler. The manipulation leads to authorization bypass. Upgrading to vers
CVE-2023-2979 -- A vulnerability classified as critical has been found in Abstrium Pydio Cells 4.2.0. This affects an unknown part of the component User Creation Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. U
CVE-2023-2980 -- A vulnerability classified as critical was found in Abstrium Pydio Cells 4.2.0. This vulnerability affects unknown code of the component User Creation Handler. The manipulation leads to improper control of resource identifiers. The attack can be initiated
CVE-2023-2981 -- A vulnerability, which was classified as problematic, has been found in Abstrium Pydio Cells 4.2.0. This issue affects some unknown processing of the component Chat. The manipulation leads to basic cross site scripting. The attack may be initiated remotel
CVE-2023-2983 -- Privilege Defined With Unsafe Actions in GitHub repository pimcore/pimcore prior to 10.5.23.
CVE-2023-2984 -- Path Traversal: '\..\filename' in GitHub repository pimcore/pimcore prior to 10.5.22.
CVE-2023-2994 -- ** REJECT ** This 2023 CVE was incorrectly assigned instead of a 2022 CVE.
CVE-2023-30196 -- Prestashop salesbooster <= 1.10.4 is vulnerable to Incorrect Access Control via modules/salesbooster/downloads/download.php.
CVE-2023-30601 -- Privilege escalation when enabling FQL/Audit logs allows user with JMX access to run arbitrary commands as the user running Apache Cassandra
CVE-2023-31184 -- ROZCOM client CWE-798: Use of Hard-coded Credentials
CVE-2023-31185 -- ROZCOM server framework - Misconfiguration may allow information disclosure via an unspecified request.
CVE-2023-31186 -- Avaya IX Workforce Engagement v15.2.7.1195 - User Enumeration - Observable Response Discrepancy
CVE-2023-31187 -- Avaya IX Workforce Engagement v15.2.7.1195 - CWE-522: Insufficiently Protected Credentials
CVE-2023-32218 -- Avaya IX Workforce Engagement v15.2.7.1195 - CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
CVE-2023-32342 -- IBM GSKit could allow a remote attacker to obtain sensitive information, caused by a timing-based side channel in the RSA Decryption implementation. By sending an overly large number of trial messages for decryption, an attacker could exploit this vulnera
CVE-2023-32684 -- Lima launches Linux virtual machines, typically on macOS, for running containerd. Prior to version 0.16.0, a virtual machine instance with a malicious disk image could read a single file on the host filesystem, even when no filesystem is mounted from the
CVE-2023-32685 -- Kanboard is project management software that focuses on the Kanban methodology. Due to improper handling of elements under the `contentEditable` element, maliciously crafted clipboard content can inject arbitrary HTML tags into the DOM. A low-privileged a
CVE-2023-32689 -- Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Versions prior to 5.4.4 and 6.1.1 are vulnerable to a phishing attack vulnerability that involves a user uploading malicious files. A malicious user co
CVE-2023-32691 -- gost (GO Simple Tunnel) is a simple tunnel written in golang. Sensitive secrets such as passwords, token and API keys should be compared only using a constant-time comparison function. Untrusted input, sourced from a HTTP header, is compared directly with
CVE-2023-32692 -- CodeIgniter is a PHP full-stack web framework. This vulnerability allows attackers to execute arbitrary code when you use Validation Placeholders. The vulnerability exists in the Validation library, and validation methods in the controller and in-model va
CVE-2023-32696 -- CKAN is an open-source data management system for powering data hubs and data portals. Prior to versions 2.9.9 and 2.10.1, the `ckan` user (equivalent to www-data) owned code and configuration files in the docker container and the `ckan` user had the perm
CVE-2023-32698 -- nFPM is an alternative to fpm. The file permissions on the checked-in files were not maintained. Hence, when nfpm packaged
CVE-2023-32699 -- MeterSphere is an open source continuous testing platform. Version 2.9.1 and prior are vulnerable to denial of service. ?The `checkUserPassword` method is used to check whether the password provided by the user matches the password saved in the database,
CVE-2023-33175 -- ToUI is a Python package for creating user interfaces (websites and desktop apps) from HTML. ToUI is using Flask-Caching (SimpleCache) to store user variables. Websites that use `Website.user_vars` property. It affects versions 2.0.1 to 2.4.0. This issue
CVE-2023-33177 -- Xibo is a content management system (CMS). A path traversal vulnerability exists in the Xibo CMS whereby a specially crafted zip file can be uploaded to the CMS via the layout import function by an authenticated user which would allow creation of files ou
CVE-2023-33178 -- Xibo is a content management system (CMS). An SQL injection vulnerability was discovered in the `/dataset/data/{id}` API route inside the CMS starting in version 1.4.0 and prior to versions 2.3.17 and 3.3.5. This allows an authenticated user to exfiltrate
CVE-2023-33179 -- Xibo is a content management system (CMS). An SQL injection vulnerability was discovered starting in version 3.2.0 and prior to version 3.3.5 in the `nameFilter` function used throughout the CMS. This allows an authenticated user to exfiltrate data from t
CVE-2023-33180 -- Xibo is a content management system (CMS). An SQL injection vulnerability was discovered starting in version 3.2.0 and prior to version 3.3.2 in the `/display/map` API route inside the CMS. This allows an authenticated user to exfiltrate data from the Xib
CVE-2023-33181 -- Xibo is a content management system (CMS). Starting in version 3.0.0 and prior to version 3.3.5, some API routes will print a stack trace when called with missing or invalid parameters revealing sensitive information about the locations of paths that the
CVE-2023-33182 -- Contacts app for Nextcloud easily syncs contacts from various devices with your Nextcloud and allows editing. The unsanitized SVG is converted to a JavaScript blob (in memory data) that the Avatar can't render. Due to this constellation the missing saniti
CVE-2023-33183 -- Calendar app for Nextcloud easily sync events from various devices with your Nextcloud. Some internal paths of the website are disclosed when the SMTP server is unavailable. It is recommended that the Calendar app is updated to 3.5.5 or 4.2.3
CVE-2023-33186 -- Zulip is an open-source team collaboration tool with unique topic-based threading that combines the best of email and chat to make remote work productive and delightful. The main development branch of Zulip Server from May 2, 2023 and later, including bet
CVE-2023-33189 -- Pomerium is an identity and context-aware access proxy. With specially crafted requests, incorrect authorization decisions may be made by Pomerium. This issue has been patched in versions 0.17.4, 0.18.1, 0.19.2, 0.20.1, 0.21.4 and 0.22.2.
CVE-2023-33191 -- Kyverno is a policy engine designed for Kubernetes. Kyverno seccomp control can be circumvented. Users of the podSecurity `validate.podSecurity` subrule in Kyverno 1.9.2 and 1.9.3 are vulnerable. This issue was patched in version 1.9.4.
CVE-2023-33193 -- Emby Server is a user-installable home media server which stores and organizes a user's media files of virtually any format and makes them available for viewing at home and abroad on a broad range of client devices. This vulnerability may allow administra
CVE-2023-33198 -- tgstation-server is a production scale tool for BYOND server management. The DreamMaker API (DMAPI) chat channel cache can possibly be poisoned by a tgstation-server (TGS) restart and reattach. This can result in sending chat messages to one of any of the
CVE-2023-33234 -- Arbitrary code execution in Apache Airflow CNCF Kubernetes provider version 5.0.0 allows user to change xcom sidecar image and resources via Airflow connection.
CVE-2023-33245 -- Minecraft through 1.19 and 1.20 pre-releases before 7 (Java) allow arbitrary file overwrite, and possibly code execution, via crafted world data that contains a symlink.
CVE-2023-33656 -- A memory leak vulnerability exists in NanoMQ 0.17.2. The vulnerability is located in the file message.c. An attacker could exploit this vulnerability to cause a denial of service attack by causing the program to consume all available memory resources.
CVE-2023-33734 -- BlueCMS v1.6 was discovered to contain a SQL injection vulnerability via the keywords parameter at search.php.
CVE-2023-33740 -- Incorrect access control in luowice v3.5.18 allows attackers to access cloud source code information via modification fo the Verify parameter in a warning message.
CVE-2023-33741 -- Macrovideo v380pro v1.4.97 shares the device id and password when sharing the device.
CVE-2023-33955 -- Minio Console is the UI for MinIO Object Storage. Unicode RIGHT-TO-LEFT OVERRIDE characters can be used to mask the original filename. This issue has been patched in version 0.28.0.
CVE-2023-33961 -- Leantime is a lean open source project management system. Starting in version 2.3.21, an authenticated user with commenting privileges can inject malicious Javascript into a comment. Once the malicious comment is loaded in the browser by a user, the malic
CVE-2023-33962 -- JStachio is a type-safe Java Mustache templating engine. Prior to version 1.0.1, JStachio fails to escape single quotes `'` in HTML, allowing an attacker to inject malicious code. This vulnerability can be exploited by an attacker to execute arbitrary Ja
CVE-2023-33973 -- RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. In versions 2023.01 and prior, an attacker can send a crafted frame which is forwarded by the device. During encoding o
CVE-2023-33974 -- RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. In versions 2023.01 and prior, an attacker can send multiple crafted frames to the device to trigger a race condition.
CVE-2023-33975 -- RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. In version 2023.01 and prior, an attacker can send a crafted frame to the device resulting in an out of bounds write in
CVE-2023-34151 -- A vulnerability was found in ImageMagick. This security flaw ouccers as an undefined behaviors of casting double to size_t in svg, mvg and other coders (recurring bugs of CVE-2022-32546).
CVE-2023-34152 -- A vulnerability was found in ImageMagick. This security flaw cause a remote code execution vulnerability in OpenBlob with --enable-pipes configured.
CVE-2023-34153 -- A vulnerability was found in ImageMagick. This security flaw causes a shell command injection vulnerability via video:vsync or video:pixel-format options in VIDEO encoding/decoding.
CVE-2023-34204 -- imapsync through 2.229 uses predictable paths under /tmp and /var/tmp in its default mode of operation. Both of these are typically world-writable, and thus (for example) an attacker can modify imapsync's cache and overwrite files belonging to the user wh
CVE-2023-34205 -- In Moov signedxml through 1.0.0, parsing the raw XML (as received) can result in different output than parsing the canonicalized XML. Thus, signature validation can be bypassed via a Signature Wrapping attack (aka XSW).
cyb3rops: @Purp1eW0lf @HuntressLabs Also see this thread here : don't know if you've seen the webshell samples, yet https://t.co/7GHfWUB3MX -- cyb3rops
cyb3rops: YARA rule https://t.co/jmEkc8WyHS everything is already pushed to signature-base, so it should be usable in THOR Lite https://t.co/T6HSBsJ1EN -- cyb3rops
cyb3rops: I found the webshells "human2.aspx" on VT bf7c1dd613101c0a95027249a5fcb759 e9a5f0c7656329ced63d4c8742da51b4 af136505d384c9a89635b365e55b7fa3 I'm gonna write a YARA rule for them -- cyb3rops
cyb3rops: Rapid7 has more IOCs follow this thread for more rules / updates https://t.co/HnS4HO42kO -- cyb3rops
cyb3rops: @rpsaf No one wants to tell me what the usual .aspx files are I wouldn't want to trigger on every .aspx file in the folder -- cyb3rops
DrunkBinary: Hey @extremeterrain it is super misleading to offer free mount and balance when purchasing wheel and tire package and then not actually deliver on the promise and leave your great customer service reps to deal with frustrated and angry custom -- DrunkBinary
IntezerLabs: NEW🚀 Now you can set up Threat Escalation notifications from Intezer to your chosen communication channels, so your team immediately knows about endpoint alerts that Intezer investigated and confirmed as critical threats. https://t.co/uEVF -- IntezerLabs
IntezerLabs: Read more ^ about how Intezer automatically collects and analyzes evidence, triages alerts, and triggers Threat Escalation notifications to your team via email or any webhook-supported system for fast incident response. -- IntezerLabs
malwrhunterteam: 😂 https://t.co/PB5QmtwyDl -- malwrhunterteam
malwrhunterteam: No one knows anything about this? Something new? -- malwrhunterteam
malwrhunterteam: https://t.co/a2B8GQZ10R https://t.co/899k3dnkCQ -- malwrhunterteam
RansomwareNews: Group: akira Approx. Time: 2023-06-01 16:34:06.884122 Title: Middlesex County Pub lic Schools -- RansomwareNews
reecdeep: #Qakbot #malware JS loader it's ingenious! Uses an old technique for creating 2 scripts starting from the position of the letters in the AudioRecordingDiagnostic.xml system file: 1⃣ 2nd stage downloader 2⃣ 2nd stage exec ⚠️ low detection! #info -- reecdeep
TalosSecurity: This week's Threat Source newsletter looks at some recent headlines around #spyware, including Talos' recent look at #Predator, and other #cybersecurity news you might have missed from the past week https://t.co/kc04YiWzPS https://t.co/FcvZ -- TalosSecurity
vxunderground: Russia: Kaspersky and the Russian FSB disclose information on an iOS 0day exploit NATO Territory: Security vendors are disclosing news on a MOVEit 0day exploit being exploited in the wild to mass exfiltrate data from organizations. Yay! 0 -- vxunderground
vxunderground: Today the FSB (Federal Security Service of the Russian Federation) released a statement stating that the United States government has targeted, and infected, thousands of Russians that were using Apple iPhones devices. More information: ht -- vxunderground
vxunderground: Kaspersky asserts they were NOT the primary target of the attack. Forensic evidence illustrates a long history of this spyware and have stated more details will be released soon. *Original tweet deleted and retweeted for typos and to allow -- vxunderground
vxunderground: Today Kaspersky announced they were a victim of an iOS zero-click 0day exploit. The exploit delivered spyware targetting Kaspersky middle and upper management. They named the attack 'Operation Triangulation' More info: https://t.co/gH13mQ -- vxunderground
Cyb3rWard0g: @jsecurity101 @dcpthepodcast It means a lot! You are the one diving into a lot of those complex topics and putting the hard work to share it with others. Credit where credit is due 🚀 Keep up the great work brother 🍻 -- Cyb3rWard0g
Cyb3rWard0g: @dcpthepodcast @jsecurity101 The telemetry Guru 🔥😎😅 thank you for the invitation 🙏 https://t.co/7M7tbOsbaq -- Cyb3rWard0g
JCyberSec_: 🔒 Did you know? Phishing kits are cybercriminals' secret weapon! ➡️They use pre-designed web pages, email templates, and malicious scripts to create convincing replicas of legit sites, luring you to give away your personal info. Stay sharp! ⚠️ -- JCyberSec_
malwrhunterteam: @sans_isc @xme Thanks, great. Possible those requests are coming from browsers that not handling this code properly (like expecting the " character for the end of the url, and as it is not present, it takes the ");" as part of the url)? -- malwrhunterteam
malwrhunterteam: Don't try to tell me that even the NSA is using Namecheap for registering their C2 domains... 🤔 https://t.co/pp5WKtqZwa -- malwrhunterteam
pmelson: @sherrod_im @DavidSacks Imagine giving an engineering team 3 years to learn a new way of working (say waterfall-to-agile for example), and then declaring that the new thing failed and will never work, despite hundreds of other teams having succes -- pmelson
RansomwareNews: Group: alphv Approx. Time: 2023-06-01 14:36:12.580157 Title: Brinkmann &amp; Niemeijer Motoren -- RansomwareNews
cyb3rops: That's bad ... #MOVEIt #0day https://t.co/vfp637onCZ -- cyb3rops
cyb3rops: @dan__mayer Could you maybe use the Detection Rules License for published YARA rules so that I feel more relaxed when adding them to the public repo / or using them internally? meta: license = "https://t.co/qX0Qi7LxHL" -- cyb3rops
cyb3rops: @dan__mayer That's really cool. If we only had that information on the exact vulnerability for all the drivers and 15 researchers would could process all 500+, that'd be great. But I guess we could just start with: often used drivers + vuln inf -- cyb3rops
GossiTheDog: I have a thread tracking #MoveIT issue. It's only a few thousand orgs however every one is vulnerable right now, shut them down. Big US footprint. https://t.co/7769D5KkED -- GossiTheDog
GossiTheDog: @LawrenceAbrams btw I wouldn't follow their advice on blocking just those ports - shut it down from internet. If you own the webapp you can reset SFTP creds to access data even after patching. -- GossiTheDog
GossiTheDog: @LawrenceAbrams port 443, not 445 -- GossiTheDog
malwrhunterteam: Here is how that phishing page (3rd screenshot in the quoted tweet) is looking now, thanks to @sans_isc. Poor skids... 😂 https://t.co/YsQRZN4AfE https://t.co/yGRucQgWzf -- malwrhunterteam
SpecterOps: Join us on June 27th for our Mythic Developer Series: Laying the Foundation workshop for an in-depth, hands-on example of setting up a dev environment and creating the necessary components for a Mythic C2 agent and custom C2 profile! Registe -- SpecterOps
424f424f: @HackingLZ @thehackerish @chvancooten @domchell Elastic is cheap/free. Kicks ass. Beat it and call it good against the rest IMO. 99% of the time you test against an in-house EDR setup "maxxed" out, then go on client network and get detected beca -- 424f424f
lazyactivist192: @Patrickbigmick @Akron_Bail_Fund @STPAkron Nothing currently, she was found not guilty on all charges. -- lazyactivist192
malwrhunterteam: @sans_isc @xme Thank you for taking action. Not think I did noted before, or at least if I did, I forgot it already. Here is how the page I saw most recently is looking currently: https://t.co/lvT0sr5bmt -- malwrhunterteam
malwrhunterteam: @sans_isc cc @xme as it is your diary... https://t.co/JsEmIG3EXz -- malwrhunterteam
malwrhunterteam: Hey @sans_isc, there's this file: https://t.co/cdjSbZwCIc Used here: https://t.co/bTh3ibmUq7 Now, I keep seeing this file being used in skids' phishing pages. Can you do something? For example, rename this file, then place an image saying -- malwrhunterteam
malwrhunterteam: @sans_isc @xme Just did a quick Paint work. 😂 With that, it would look this: https://t.co/h91qHAH4w8 -- malwrhunterteam
pmelson: @Abjuri5t From the @ScumBots data set: api[.]ipify[.]org automation[.]whatismyip[.]com checkip[.]amazonaws[.]com freegeoip[.]app icanhazip[.]com ipconfig[.]io ipinfo[.]io iplogger[.]org ipv4bot[.]whatismyipaddress[.]com ipwhois[.]app myexternalip -- pmelson
RansomwareNews: Group: trigona Approx. Time: 2023-06-01 12:35:09.578594 Title: Pacific Union College -- RansomwareNews
TalosSecurity: Talos researchers recently discovered a new #botnet called #Horabot that can completely take over targeted users' Outlook mailbox, even using the target's contact list to send more spam https://t.co/YHD8gOBzua https://t.co/n12GfpKgqe -- TalosSecurity
vxunderground: @netspooky We also didn't know. Someone went through wayback machine + Discord logs looking for the link they cited. Doja cat is illegal and for nerds -- vxunderground
vxunderground: This Twitter account has posted some wild things. We have spoken with Threat Actors, disclosed news on leaks, gotten autographs from people on the FBI Most Wanted List, gotten electronic devices from North Korea... Our down fall? A 30 seco -- vxunderground
vxunderground: Earlier this morning vx-underground was temporarily suspended from Twitter due to copyright infringement. Twitter received a DMCA complaint, from a snippet of a music video we shared, on 2023-01-27. https://t.co/Kc0E0crggb -- vxunderground
cyb3rops: Ppl believe that the Sigma project received support from the big SIEM vendors, which is not the case E.g. for the @Elastic backend - which was &amp; is the most complex one - we didn't get a single line of code It was always a one-way street h -- cyb3rops
GossiTheDog: @chrisplummer I was gonna say, open source it. They will end up fixing it and paying you, they botched the triage. -- GossiTheDog
JAMESWT_MHT: @malwrhunterteam Collection samples updated😉 https://t.co/jbMIdoMBtY -- JAMESWT_MHT
SBousseaden: file copy is usually logged as a file creation by EDR/sysmon, using call stack helps target this behv, coupled with DLL sideload (same dir) &amp; the copied PE is MS signed is a use case always wanted to try, ex of matches (UAC bypass &amp; W -- SBousseaden
GossiTheDog: @PirateHeavenEU @Microsoft @FBI 🤣 I wasn’t fired by Microsoft. -- GossiTheDog
JAMESWT_MHT: #GuLoader H/T @malwrhunterteam Samples https://t.co/Dh8OIjq1P9 Lnk 330MB &gt;Ps1&gt;payload https://www.dld[.ae/zp/as.txt https://www.dld[.ae/zp/zpeq0u.exe -- JAMESWT_MHT
malwrhunterteam: Some Turkish gov phishing: https://fassdsdfadsasdasdasd[.]net/ What a great (Google registered) domain, right? 😂 Congrats to everyone who got phished with this... 😫 https://t.co/obEsIcYHOK -- malwrhunterteam
malwrhunterteam: @JAMESWT_MHT Opendir: https://www.dld[.]ae/zp/ https://t.co/yNMP3ZWKUe -- malwrhunterteam
malwrhunterteam: Even like 10MB+ .lnk files should not be allowed to opened by default by Windows itself (and not by Defender, or any 3rd party AV)... 🤷‍♂️ https://t.co/xn7AJGZhhu -- malwrhunterteam
anyrun_app: #Suricata signatures from ANYRUN 🔥 We have added more than 40 network signatures for the first time: 🔹 Gurcu Stealer: https://t.co/kgHO9f16Tj 🔹 Obfuscated Sign-In Page: https://t.co/wzKUjZpOWU 🔹 Ransomware Variant CnC Activity: https://t.c -- anyrun_app
cyb3rops: It's not only because the developer chose that name but also because the users sometimes renamed it to something that ends with Potato.exe Like: myPotato.exe, obfuscated_potato.exe etc. You can even find LPE tools you've never heard before on -- cyb3rops
cyb3rops: Since so many LPE tools are named SomethingPotato.exe I've added a filename IOC pattern that checks if a file ends with that word over a year ago This automatically covers every new Potato they dig up e.g. in Aurora you'd already see an alert -- cyb3rops
malwrhunterteam: https://t.co/UIoD1xff6h -- malwrhunterteam
malwrhunterteam: https://t.co/ta2YiRVZLd -- malwrhunterteam
JAMESWT_MHT: @abuse_ch NetSupport Signature is not correct https://t.co/UFQUwzcwUx https://t.co/q2CMWKtpkg cc @pr0xylife -- JAMESWT_MHT
JAMESWT_MHT: @FBussoletti 📷 Second Zip and Payload &gt; 1000MB #AgentTesla Exfil via https://api.telegram[.org/bot6019964522:AAF4GL7tiulCBCd_CdLMmgPQ-2YhOYdHGMo/sendDocument https://t.co/lgvjWlyU4v -- JAMESWT_MHT
JAMESWT_MHT: @FBussoletti Da notare le dimensionid di 1000MB per il secondo zip e l'exe #AgentTesla Exfil via https://api.telegram[.org/bot6019964522:AAF4GL7tiulCBCd_CdLMmgPQ-2YhOYdHGMo/sendDocument https://t.co/zNiV7OkTzn -- JAMESWT_MHT
vxunderground: Support the people you love ♥️ https://t.co/rDwG633cjU -- vxunderground
58_158_177_102: 昼社食らー サイネージの見本写真と具が違いすぎない? https://t.co/95kIzmeVFO -- 58_158_177_102
58_158_177_102: 品薄のヤクを調達する仕事も https://t.co/KEe6ouLQR1 -- 58_158_177_102
Cyb3rWard0g: 💡I was curious about #LLMs &amp; #Cybersecurity 🎯Goal: Better communicate &amp; collaborate ♻️Method: Take notes, run experiments &amp; share #X33fcon @x33fcon @LangChainAI #BloodHound #ROADtools @Cyb3rPandaH @MITREattack ✅ Repo https://t.c -- Cyb3rWard0g
DrunkBinary: @dannyjpalmer Season 8 is the best season, hands down. Honorable mention to Treehouse of Horrors 3 -- DrunkBinary
hackerfantastic: @BitcoinPierre @druidian @VoteGiovanni @TanParkerTX @TXblockchain_ @lee_bratcher @KristineCranley More laws... Make it make sense. Freedom for crypto! -- hackerfantastic
mrd0x: @mukto_on @MalDevAcademy Maybe later on. For now we’re dropping valuable content on the Discord so it requires a subscription on Maldev Academy. -- mrd0x
424f424f: @UK_Daniel_Card Engineer rush! -- 424f424f
424f424f: @ryanaraine Web5 is here! -- 424f424f
58_158_177_102: なので職場にお菓子を供給する仕事を頑張っています https://t.co/rBhl0zIOge -- 58_158_177_102
58_158_177_102: 4月から専門性の高い仲間が何人もきてくれたので多くのイベントがスピード感をもって高度な対応でケアされていくし、安心感が高い 私もNWログやイベントログとか見たいけど、今は結果を見させて貰ってちょっとインテリジェンス調査擬きをするくらいしかできない。。。 -- 58_158_177_102
58_158_177_102: ブルーチームは総合病院のように、健康相談から急患まで、様々な属性・症例まで持ち込まれる 持ち込まれるイベントを専門性を持ってかつスピードをもって対応していく必要があるし、予め防げるインシデントはビジネスへの影響を最小限に効率的に防疫する計画をたてて実践していく必要がある -- 58_158_177_102
hackerfantastic: @a_greenberg Shocking ;-) https://t.co/J2FUZqvssg -- hackerfantastic
mrd0x: https://t.co/RfGE31smLt https://t.co/V79bQiiRxX -- mrd0x
RansomwareNews: Group: ransomhouse Approx. Time: 2023-06-01 00:48:40.926961 Title: Mission Community Hospital -- RansomwareNews
424f424f: I wish I had stuff like this when I started hacking. Instead, I had to dodge the https://t.co/ilI41FIRZu https://t.co/mo5LefpPF1 -- 424f424f
424f424f: @thehelpdeskgirl 16/hr -- 424f424f
hackerfantastic: @venatiodecorus There are hot 0day exploits in your local area network looking to meet up. -- hackerfantastic
hackerfantastic: @transceiverfreq As long as your eyes are open my friend, don't buy the experimental plane prototypes narratives though, they found crashed saucers and the great cover up began. They had to change the brand from UFO to UAP and paint a thr -- hackerfantastic
Hexacorn: @_JohnHammond if it was one of the fist task bar icons it could be win+&lt;digit&gt; but on your taskbar it is further custom hot key on desktop icon? (lnk with a hot key) -- Hexacorn
malwrhunterteam: "NordVPN Promotional Contract and Payment Information\.zip": 972a3c1a61cdf15a5e611276c3f6c5206e0714cd902461931de33b4ee2c7fde1 Inside "NordVPN Promotional Contract and Payment Information.scr": b303f9bdf8f328c49d618f3ca6f07c1c83a0ce0b8dcbf -- malwrhunterteam
RansomwareNews: Group: alphv Approx. Time: 2023-05-31 22:34:26.843770 Title: https://t.co/1yzSXuKtzY (UPDATE) -- RansomwareNews
424f424f: @HackingLZ https://t.co/NPQ296H9Xh -- 424f424f
424f424f: @n00py1 @nullenc0de even for MSSQL://? -- 424f424f
DrunkBinary: @CyberIRsquared Thanks Andrew, I appreciate the advice. -- DrunkBinary
DrunkBinary: @0x4443 Awesome, thank you, I appreciate the recommendation. -- DrunkBinary
DrunkBinary: @ghosted_sound Awesome, I appreciate this, thank you. -- DrunkBinary
DrunkBinary: @tuckner Awesome thank you, I appreciate the recommendation. -- DrunkBinary
GossiTheDog: @KeirSnelling @wdormann 🤣🤣🤣 -- GossiTheDog
hackerfantastic: Giga-byte supplies software that can be used as "backdoors" in all its hardware? You don't say... ;-) https://t.co/ByCggs5qtS -- hackerfantastic
hackerfantastic: @transceiverfreq I wonder why they decided to have this unprecedented historic press release now though... ;-) https://t.co/QUXd0SKjRU -- hackerfantastic
hackerfantastic: I bet many of you "gamers" didn't know that your giga-byte vendor even added a backdoor user account to your box as "GCC-Filedrop" ... wonder what THAT does eh? :)))) https://t.co/LrantUHpq4 -- hackerfantastic
hackerfantastic: Its not just Giga-byte, but many 3rd party vendors who ship "insecure by design" software with hardware purchases by UPNP. There are multiple hardware vendors that ship "insecure" software including likes of Intel and AMD. Its worth explo -- hackerfantastic
James_inthe_box: @utsuk_ladki @executemalware @JAMESWT_MHT OK...DM me when you're ready...mine are always open :) -- James_inthe_box
malwrhunterteam: @LeviChibuike @ShadowChasing1 @h2jazi @cyb3rops The file you are trying to open is 100% malware (probably DuckTail family, but not matters much here), delete it before you run it by mistake. -- malwrhunterteam
cyb3rops: better don’t like the tweet - your legal team may be watching https://t.co/oJQ9wxn8Ri -- cyb3rops
cyb3rops: Getting several replies to this tweet as private messages is a dead giveaway -- cyb3rops
cyb3rops: @FuzzySec and I thought you were criticizing people laughing about the cheap method using a vulnerable driver instead of something more sophisticated. I did just the same. The method isn’t laughable. It’s what it is and it works. -- cyb3rops
GossiTheDog: One year since I last named a vulnerability 🤣 maybe it was for the best that Elon cancelled Twitter. https://t.co/Ij95FIeY02 -- GossiTheDog
inj3ct0r: #0day #Flexense #HTTPServer 10.6.24 - Buffer Overflow #Exploit https://t.co/WGP2yrjqec -- inj3ct0r
inj3ct0r: #0day #Microsoft #GamingServicesNet 12.77.3001.0 Unquoted Service Path #Vulnerability https://t.co/ZH8YfSR4Cb -- inj3ct0r
inj3ct0r: #0day #LostAndFoundInformation System 1.0 Broken Access Control / Privilege Escalation #Vulnerability https://t.co/9aRmpuTyxQ -- inj3ct0r
inj3ct0r: #0day #WordPress #ReviewX 1.6.13 Privilege Escalation #Vulnerability https://t.co/aQ1V4uFrYw -- inj3ct0r
inj3ct0r: #0day #MotoCMS Version 3.4.3 - Server-Side Template #Injection #Vulnerability https://t.co/X523sYxppN -- inj3ct0r
James_inthe_box: @utsuk_ladki @executemalware @JAMESWT_MHT Ya let me see what I can do. -- James_inthe_box
James_inthe_box: @0xToxin @executemalware @JAMESWT_MHT Also cc @AgidCert -- James_inthe_box
James_inthe_box: Some fresh #netsupport via #malspam: https://t.co/f7sL4LlpO3 js -&gt; drop from https://www.snappyshop[.]it/img/index.php c2 https://t.co/8nK0BHKXCq cc @executemalware @JAMESWT_MHT -- James_inthe_box
malwrhunterteam: 🤔 😂 https://t.co/otxpt207c6 -- malwrhunterteam
malwrhunterteam: Tweet about some bots, get a reply from a scam bot... 😂 https://t.co/HQe7enJlTr -- malwrhunterteam
malwrhunterteam: 😂 https://t.co/SDDDuj71IP -- malwrhunterteam
malwrhunterteam: @1ZRR4H Some IPTV app? 🤔 -- malwrhunterteam
malwrhunterteam: "FUCKJESSICA.macho": ec4798a4ebdcbbf726c7d2121635bda1b8365da1aca984c4844473aa7daabf9b 😂 https://t.co/4bBLmEDZhy -- malwrhunterteam
nullcookies: @malwrhunterteam @1ZRR4H Nice! -- nullcookies
vxunderground: Has science gone too far? A demonstration of generative AI imaging and facial aging https://t.co/o5gfdSDkAv -- vxunderground
cyb3rops: @FuzzySec Hey, now I understand what you meant. It didn’t click right away. I don’t think my comments are contradictory. I laughed about the EDR vendors not being able to block at least the well-known drivers, not the method that he used. -- cyb3rops
cyb3rops: @FuzzySec In fact, let me investigate some ideas to bypass protections using these vulnerable drivers. Maybe I’ll turn red again. -- cyb3rops
cyb3rops: @FuzzySec Nope 🤐 https://t.co/QPzCXI0cnN -- cyb3rops
cyb3rops: I‘ve seen letters that researches got from big corp’s legal team a few days after their resignation They’ll haunt you even after you‘ve left the company - it’s a shame -- cyb3rops
cyb3rops: @FuzzySec Completely agree. That’s exactly what I thought. I mean, it worked, right? He achieved his goal and wasn’t lying. -- cyb3rops
GossiTheDog: @cyb3rops they can try https://t.co/BRxTdoI6Sl -- GossiTheDog
hackerfantastic: More painful to watch than "its a weather balloon", NASA also means deception in Hebrew apparently. -- hackerfantastic
hackerfantastic: NASA says "move along folks, nothing to see here" on UFO's in a very timely FIVEEYE first collaboration and blame shifts leaked material by claiming "pilot and astronauts are in error"... Just show us the little greymen EBE bodies and get -- hackerfantastic
SBousseaden: @cherepanov74 yes but its pretty rare -- SBousseaden
SpecterOps: Ever wonder how attackers operate and how to better detect their nefarious ways? Join us for our Adversary Tactics: Detection course to boost your defensive skills! Register: https://t.co/cB38obbDzI https://t.co/iy6wl9Kcoj -- SpecterOps
vxunderground: Today the FBI announced they're investigating "The Comm" - shortened for "The Community". A community of online simswappers, swatters, cyberstalkers, and individuals who gamble online. They announced the arrest of members in a group titled -- vxunderground
vxunderground: @unHybrideEnExil We invented the typo. -- vxunderground
vxunderground: @MrPlombastic It isn't easy making this many typos. -- vxunderground
vxunderground: Rargb, the famous torrenting site, has shut down. Administrative staff gave a statement on why the site has abruptly shutdown https://t.co/UzqqIjg142 -- vxunderground
424f424f: @nullenc0de WebDav check out that section from here https://t.co/OyiYultcB2 -- 424f424f
cyb3rops: @BushidoToken @nas_bench It did the job … somehow. He didn’t lie about it. -- cyb3rops
cyb3rops: @keydet89 I exaggerated to give the statement a cheekier tone -- cyb3rops
hackerfantastic: Last chance to save 50% on @myhackerhouse on demand training, use code MEMDAY50! https://t.co/Hu2srPqCm1 https://t.co/KaQSrRGLM7 -- hackerfantastic
ItsReallyNick: Nice example of feature scoring for detection at scale by @Cloudflare. Doesn’t have to start as a data science project but author detection rules like it might turn into one. ⬇️ https://t.co/hVaZWKa8SP -- ItsReallyNick
MITREattack: We're two weeks into the ATT&amp;CKcon CFP, and thank you to everyone who has submitted so far! Despite tradition, it is OK to submit before the last day the CFP is open (June 27th). Have something great related to ATT&amp;CK or want to check -- MITREattack
nullcookies: @CayceCrane Stunning. -- nullcookies
RansomwareNews: Group: lockbit3 Approx. Time: 2023-05-31 14:32:28.383829 Title: https://t.co/wCXM18j46x -- RansomwareNews
SBousseaden: https://t.co/qaSlFWFq6Y https://t.co/Lqq4Ts2e1H https://t.co/3u2HXOtokx -- SBousseaden
TalosSecurity: #Webshells are on the rise, but what are they anyway? Read our new "The Need to Know" series to find out. https://t.co/92yenfmmc3 -- TalosSecurity
424f424f: If you're in business and want to extend your runway, check them out. https://t.co/mP2l5aXfTc -- 424f424f
cyb3rops: So that Spyboy Defense Evasion Tool would have been detected by our community Sigma rule written by @nas_bench based on the hash for that vulnerable zam64.sys driver listed in the #LOLDrivers project https://t.co/mGhu3lRzuL https://t.co/8EG64t -- cyb3rops
IntezerLabs: Check out this sneak peak of a weekly report showing results from Intezer's automatic alert triage and remediation! For more details about this report from Intezer, start at this Youtube timestamp to hear Shaul talk about it in our recent we -- IntezerLabs
malwrhunterteam: Some of the target email addresses included .gov.ua ones... -- malwrhunterteam
malwrhunterteam: Inside "рахунок_№415_2023.js": 51073b3884699eb4779004ab08d793635f3913c36139bce9ff0aead9f383849c For that, "акт_звірки_та_рахунки.html" was also seen as parent: c32974b865152c6ca3c5f0cc787319dfc2b32ea1bebc1f37f6c36d2ca75439c8 (2/2) https:/ -- malwrhunterteam
malwrhunterteam: "Акти_та_рахунки.rar", submitted to VT over 30 times, mostly from Ukraine: 24b94fed39c67b5a4f6675dc944b1a17914a90d218432d0aa8714442f6fa77eb Contains "Акти_та_рахунки.vhd", also over 10 submissions to VT: 4eb777f90399df3c658181550b02a247b2 -- malwrhunterteam
malwrhunterteam: 😂 So in other words, AI = 0. 🤷‍♂️ https://t.co/iqxkchaUXG -- malwrhunterteam
RansomwareNews: Group: blackbasta Approx. Time: 2023-05-31 12:31:39.775218 Title: Sur La Table -- RansomwareNews
vxunderground: @BushidoToken Spyboy*? Or did you purposely call them Soyboy? -- vxunderground
vxunderground: @_JohnHammond https://t.co/DQbzTeqef1 -- vxunderground
vxunderground: @HackingLZ https://t.co/nqIH8LwMrX -- vxunderground
vxunderground: Hello. How are you? We've had some individuals reach out to us regarding some of our tweets. It is important to note some of our tweets are satirical, hyperbolic, and/or designed to illustrate the absurdity of some 'hype' seen on social me -- vxunderground
abuse_ch: NetSupport RAT malspam campaign 🔥 Payload URL: 🌐 https://t.co/28J6dLTaX0 Sample (JS): 📄 https://t.co/cOucMxI5nb C2 domain - balibumba1 .com: 📞 https://t.co/SARj2ZtUcv C2 server: 🇷🇺 https://t.co/ZkAdtmmnum https://t.co/O8wQsDk55X -- abuse_ch
cyb3rops: Lol … defeats top notch EDR, gets detected by free Sysmon, free Sigma, free Aurora Lite https://t.co/t3AoxbbmSo -- cyb3rops
TalosSecurity: Hazel Burton from Talos is on the latest @DecipherSec podcast talking about storytelling in security (and how to do with empathy) — plus she has some TV recommendations in case you need to refill your streaming queue. https://t.co/BciiJ8pCT -- TalosSecurity
424f424f: Can't beat em? Steal their staff. #infosecf1 https://t.co/hHe6MKxMGT -- 424f424f
424f424f: @vysecurity @AOCpress @RepAOC @alifarhat79 https://t.co/7OF9iPISOW -- 424f424f
424f424f: @EdwardPrevost @defcon @BSidesLV @SecurityBSides Lost me at forced masking. https://t.co/AvUA3RrXTz -- 424f424f
malwrhunterteam: @1ZRR4H There is a change in the note compared to the first seen one (https://t.co/83JPym6mGr): now it not only contains the domain of Rhysida's Tor site, but also contains 2 email addresses. -- malwrhunterteam
malwrhunterteam: @1ZRR4H Update: yesterday a note of Rhysida ransomware was uploaded to VT from Chile. Now, even thought not impossible, it is very unlikely that this gang would get 2 victims from Chile in a few days period. So, basically it confirms the -- malwrhunterteam
malwrhunterteam: 😂 https://t.co/m74E0HhOyX -- malwrhunterteam
SBousseaden: @securityfreax it adds stack data to existing enabled events (process, file, library, registry) example of added data : https://t.co/wG2AB3f0Ae just an example of a process event with and wo the enrich (depending on stack details approx an -- SBousseaden
GossiTheDog: @CraigHRowland @HackingLZ I wouldn’t say it’s of late, the last decade of vulns that have been exploited in real world has often been InfoSec industry products, with ../.. traversal attacks (hi Fortigate), with web servers running as root. 😬 -- GossiTheDog
JAMESWT_MHT: little errata corrige #BRT spam email #italy spread #Ursnif #Gozi there is second stage JS https://piopler.]com/clienti https://t.co/hyAgEinEfW *Email&gt;Pdf&gt;url&gt;zip&gt;js&gt;url&gt;js&gt;url&gt;dll cc @reecdeep @FBussoletti -- JAMESWT_MHT
virusbtn: Palo Alto Networks researchers observed a Mirai variant called IZ1H9, which used several vulnerabilities to spread itself on multiple IoT devices. https://t.co/TCLazJncUf https://t.co/jUCv3fCC8y -- virusbtn
virusbtn: Zscaler researchers present a technical analysis of Pikabot, a piece of malware that emerged in early 2023 and which consists of two components: a loader and a core module. Pikabot shares similarities with Qakbot in its distribution, behaviour & -- virusbtn
virusbtn: Trend Micro's latest blog post discusses how the use of the RomCom backdoor fits into the current landscape where politically motivated attacks are not committed by nation-state actors alone, and looks at how RomCom has evolved over time &amp; h -- virusbtn
Cyb3rWard0g: It was also great seeing you for two weeks in two different conferences @_dirkjan 😅 Enjoy the alfajores 😉 https://t.co/uarIW4nruH -- Cyb3rWard0g
Cyb3rWard0g: @MarcOverIP @x33fcon @dorotaq @mvelazco @Flangvik @einarssonm @secman_pl @domchell @mrgretzky @pstirparo @chvancooten @WLesicki @Mrtn9 @ShitSecure @alexxisfero @SEKTOR7net Always a pleasure seeing you and catching up with you Marc 🙏 thank yo -- Cyb3rWard0g
Cyb3rWard0g: @Mrtn9 @x33fcon @dorotaq @mvelazco @Flangvik @einarssonm @MarcOverIP @secman_pl @domchell @mrgretzky @pstirparo @chvancooten @WLesicki @ShitSecure @alexxisfero @SEKTOR7net Same here 🙏 Thank you very much to you and your company for all the su -- Cyb3rWard0g
Cyb3rWard0g: @domchell @x33fcon @dorotaq @mvelazco @Flangvik @einarssonm @MarcOverIP @secman_pl @mrgretzky @pstirparo @chvancooten @WLesicki @Mrtn9 @ShitSecure @alexxisfero @SEKTOR7net Same here! It was a pleasure to meet you! Thank you for reaching out a -- Cyb3rWard0g
Cyb3rWard0g: Another great year @x33fcon 🙌 Thank you @dorotaq and team for the opportunity ❤️ It was nice meeting old and new friends @mvelazco @Flangvik @einarssonm @MarcOverIP @secman_pl @domchell @mrgretzky @pstirparo @chvancooten @WLesicki @Mrtn9 @S -- Cyb3rWard0g
cyberwar_15: @ArchinalLee https://t.co/EHL9ekGNGq -- cyberwar_15
cyberwar_15: @MonThreat https://t.co/EHL9ekGNGq -- cyberwar_15
malwrhunterteam: "BeaconLoader-vmssvcfw.exe": a0709b06f6e95c3e86a139f4dba6398cde3200a46d591c90d182153190fd9ad4 From: https://philadelphiapahealth.blob.core\.windows.net/data/BeaconLoader-vmssvcfw.exe (1/3) -- malwrhunterteam
anyrun_app: 📝 Need to analyze a suspicious object or link? Get Started with #ANYRUN We've prepared an easy-to-use tutorial on how to create a task for your #malwareanalysis – follow along and set up the virtual machine with us! See the guide 👇 https: -- anyrun_app
JAMESWT_MHT: @malwrhunterteam yet is wireless😅😅😅 -- JAMESWT_MHT
JAMESWT_MHT: 91.213.50].52 #Ursnif #Gozi https://t.co/nhxZwa1aRF -- JAMESWT_MHT
JAMESWT_MHT: cc @58_158_177_102 @bry_campbell @felixw3000 @1ZRR4H @James_inthe_box @fumik0_ @abuse_ch -- JAMESWT_MHT
JAMESWT_MHT: #BRT spam email #italy spread #Ursnif #Gozi Email&gt;Pdf&gt;url&gt;zip&gt;js&gt;url&gt;dll Samples https://t.co/vfOQWIdOwC Url https://piopler[.com/assistenza https://piopler.[com/ C2 provaterta[.com https://t.co/cgMBmiZ2JO -- JAMESWT_MHT
malwrhunterteam: patientfocus[.]health - @Namecheap registered... 137.135.116[.]203 - Microsoft. @DanielGallagher (3/3) https://t.co/1hIkJ8yuJe -- malwrhunterteam
malwrhunterteam: Next stage / payload: 6055849437031f604a9b0db26a06142fa34de6300339cb2a7c5474d129333616 From: https://shorturl[.]at/efP29 -&gt; https://philadelphiapahealth.blob.core\.windows.net/data/obfuscated.exe Downloaded to: C:\ProgramData\CheckPoin -- malwrhunterteam
aboutsecurity: Operation #CMDStealer: Financially Motivated Campaign Leverages CMD-Scripts and LOLBaS for Online Banking Theft in #Portugal, #Peru &amp; #Mexico https://t.co/QFSsgaPh72 -- aboutsecurity
malwrhunterteam: 🤔 https://t.co/FAi7kjiEy3 -- malwrhunterteam
malwrhunterteam: Above is a good example for this @wdormann: https://t.co/1rzYIg4kOO 13 detections for the .lnk inside, but the .vhd has 0... -- malwrhunterteam
malwrhunterteam: "Invoice.vhd": c7b26a377640285cc93938763542cb05c9b26585c9f4045250a55453ee42e480 The .lnk in it: a08c36812818618f44782c3677c8b8b8159a1beacbad66adbe232e694d91176e Next stage: http://65.109.160[.]103/OPlVpjMq/batdrop.hta https://t.co/54A8TRp -- malwrhunterteam
malwrhunterteam: I need this (except the last second part). 😂 https://t.co/wSPTcGWsCW -- malwrhunterteam
malwrhunterteam: 🤦‍♂️ https://t.co/wHB2xbQn0C -- malwrhunterteam
58_158_177_102: 昼社食皿うどん AIに関するやりとりでちょい不毛な応酬の箇所があって、この対応こそAIに!とか考えがよぎるほどに疲れ https://t.co/Z6qHRrtVdQ -- 58_158_177_102
cyb3rops: @pkbrln Vielleicht übersehe ich etwas, aber die CDU und FDP hätte doch eine Minderheitsregierung bilden und dann konservativ-liberale Politik durchsetzen können, bei der die AfD nicht blockiert hätte -- cyb3rops
JAMESWT_MHT: @diegobetto @signorina37H @sonoclaudio @WebMarkeThink @FBussoletti @AndreaDraghetti @malwrhunterteam @reecdeep @guelfoweb Sinceramente no ma molto basilare il firmware di fatto va a controllare chip hdmi e chip del dac) -- JAMESWT_MHT
424f424f: I'm bringing this to the next LAN party.. https://t.co/AVCKxmqwiM -- 424f424f
424f424f: @jkamdjou Damn you. I sang that tweet in my head. Now it won't stop. -- 424f424f
GossiTheDog: @ged Wetherspoons at 3am in Grimsby is independence hour -- GossiTheDog
mrd0x: @dasgrog @MalDevAcademy Not sure if I used the correct terminology but essentially some registry keys that are related to the EDR are prevented from being modified sort of like tamper protection on these keys -- mrd0x
mrd0x: @dasgrog @MalDevAcademy The EDR itself as far as im aware. Try changing an EDRs registry key you’ll get an error -- mrd0x
424f424f: @j2k3k @DylanMAllman https://t.co/nF7Ft5iUoh -- 424f424f
424f424f: @rootsecdev We'll co-stream. You hack. I'll commenate on your hacking. Like this.. https://t.co/HrxJopmuMz -- 424f424f
424f424f: @checkymander @Antisy_Training https://t.co/AJHIGjVUZD -- 424f424f
424f424f: @chernobylmega @alex_skazka https://t.co/7TAhpWxEau -- 424f424f
58_158_177_102: @hands_of_cat むしろそんな強権発動してリスク隔離できるならヨシ!! -- 58_158_177_102
58_158_177_102: IT担当とかセキュリティ担当の役員のMBO目標(必達)に ・保守切れソフトウェア・機器が組織内にないことを担保する って書こうよ -- 58_158_177_102
ItsReallyNick: @greglesnewich @nicastronaut @ImposeCost COOLHAUS$ leaksite still online https://t.co/tcvU9WvhEx -- ItsReallyNick
424f424f: @jstnkndy Must be your non blue check. -- 424f424f
424f424f: @dez_ @joff_thyer -- 424f424f
mrd0x: @AndrewOliveau Woulda done it 7 days later -- mrd0x
RansomwareNews: Group: lockbit3 Approx. Time: 2023-05-30 22:34:49.812845 Title: https://t.co/yffcE2r8Rx -- RansomwareNews
RansomwareNews: Group: lockbit3 Approx. Time: 2023-05-30 22:34:46.582325 Title: https://t.co/rkBjrmJr1a -- RansomwareNews
RansomwareNews: Group: lockbit3 Approx. Time: 2023-05-30 22:34:45.575626 Title: https://t.co/DOAC7QX1YA -- RansomwareNews
vxunderground: @P4nch019 ??? -- vxunderground
cyb3rops: #OffTopic one of my favorite games has been remastered (btw ShodanHQ is named after the AI antagonist in this game) https://t.co/Z7vR8Ct2UO -- cyb3rops
DrunkBinary: @ravibrewster Oh interesting, thank you. -- DrunkBinary
malwrhunterteam: Seems @1ZRR4H knows more about this case: https://t.co/hhiYNRzSoW -- malwrhunterteam
malwrhunterteam: Next stage: b63c575580d34f066ab3bcdae51289474a606497ff68cceabbc856710f99037d From (gone now): https://usformaz[.]com/down/contract/buildlogs.exe -- malwrhunterteam
malwrhunterteam: "improvements-and-modifications-lease-addendum\.zip": bcf6162acd3b4ed30c90e8d7248bfc2451b9bdfa1c3aad50bb2dac0eae902288 "a-example.doc.lnk": df0c17a34f0c3956cee7095993382e292a2bb322676f5a7c44809b2d8e8f1539 https://t.co/bPqqxWA4nE -- malwrhunterteam
vxunderground: @BrettCallow Vice Society ransomware group like https://t.co/FBOKWJdaPV -- vxunderground
vxunderground: As more and more 'experts' discuss the risk of AI we would like to address the reality of the situation. It is far more disturbing than anyone could ever imagine. https://t.co/PdFdwi6uPU -- vxunderground
vxunderground: We've updated the vx-underground malware family collection. - MidasRansomware - HeaderTip - Mirai - DoubleZeroWiper - Vidar - Conti - RaccoonStealer - CaddyWiper - TinyTurla - IcedId Check it out here: https://t.co/L3GdoH9SAT https://t.co -- vxunderground
DrunkBinary: @Antonlovesdnb Actually I haven't, this looks good, I'll check it out. Thank you for the recommendation, I appreciate it. The CSV is so large, excel won't load it lol -- DrunkBinary
DrunkBinary: @rannahose Ooof yeah and these ones are super skittish won't go near the havaheart traps we got from Texas TNR and HOPE. Did catch an armadillo though lol. -- DrunkBinary
DrunkBinary: Does anyone know of some good visualization tools on GitHub for making graphics of adversary activity like lateral movement and commands run incident data and malware visualization? Take CSV or text file as input. Manual PowerPoint ain't doin -- DrunkBinary
Hexacorn: @LinkedInHelp you are welcome. note that the page you linked to does not seem to be covering the case I have reported ('report dodgy ad') -- Hexacorn
JAMESWT_MHT: Al lavoro firmware per ogni cosa, computer, server, firewall, Nas, switch, ups ecc ecc Arrivo a casa e l'amplificatore cosa mi dice📴🙄 Si sa mai che mi fanno un hacking e mi lanciano un denial service con fusione nucleare dei diffusori 😬 htt -- JAMESWT_MHT
malwrhunterteam: @wdormann @cyb3rops What we have here? Don't know. Let's hope "only" a stolen cert... That's already enough bad for a company with a VPN product. And if that's the case, stolen at least weeks ago. Why still nothing done about? What else t -- malwrhunterteam
malwrhunterteam: @wdormann @cyb3rops If you would do some simple Google searches as "random avg user", you would find it's a legit thing, just not a great one. Their Android app in Play have 500k+ installs... But personally, after some more looks, without -- malwrhunterteam
malwrhunterteam: @cyb3rops @wdormann "Action_Recorder.exe" that was signed with the same cert: 9fc6102d47a8a65e1fe1b16e1f869afdb8083af24aa524974d6a39b005cc66e6 Was seen from here: https://cdn.discordapp[.]com/attachments/1095804733924585653/11059967557970 -- malwrhunterteam
malwrhunterteam: 🤷‍♂️ https://t.co/Nvz14j2qZv -- malwrhunterteam
mrd0x: All security solution vulns I previously found were too easily exploitable. In the newly posted Exploiting EDRs For Evasion module in @MalDevAcademy I demonstrated how changing a non-protected registry key prevents logs from arriving to the EDR co -- mrd0x
TalosSecurity: When we talk about supply chain attacks, we don't mean the supply chain that makes sure grocery store shelves are stocked — it's ways attackers exploit the software we use every day. Learn more in the latest #TheThreatIsReal video series fr -- TalosSecurity
vxunderground: @SeanCPow It is very fitting that this is episode 69 -- vxunderground
James_inthe_box: #agenttesla panel at: http://185.252.179 .22/tom/inc/5de6a3ffd5d23c.php -- James_inthe_box
James_inthe_box: Pretty sure this is a #hagga vbs: https:// bitbucket .org/mounmeinlylo/rikirollin/downloads/tomPayload.vbs -- James_inthe_box
luc4m: @0xToxin Uuuhhh interesting 🤔🤔 @sS55752750 -- luc4m
RansomwareNews: Group: akira Approx. Time: 2023-05-30 16:36:13.365914 Title: SK Life Science -- RansomwareNews
RansomwareNews: Group: lockbit3 Approx. Time: 2023-05-30 16:36:03.529384 Title: https://t.co/2IZ8ssD12h -- RansomwareNews
RansomwareNews: Group: akira Approx. Time: 2023-05-30 16:36:14.183406 Title: The National Associa tion of Home Builder s -- RansomwareNews
SBousseaden: plenty of new detection, hunting and tuning opportunities with the new 8.8 elastic kernel-level call stack enrichment (added to all events minus netcon) https://t.co/zZc0NbA0FH https://t.co/wkC4YguT4i -- SBousseaden
vxunderground: A few days ago Adobe unveiled "Firefly". Firefly is generative AI which is now included in Photoshop. They released a demonstrative video preview. It is interesting. https://t.co/lnSEArjSlh -- vxunderground
vxunderground: We've updated the vx-underground InTheWild collection. - InTheWild.0072 - InTheWild.0073 - 40,000 unique malware samples Image: Win32.GandCrab. Check it out here: https://t.co/DzBr48gq43 https://t.co/X3c47mL14x -- vxunderground
cyb3rops: @cbecks_2 @mariuszbit @x33fcon Yeah, I saw the slides and then the training and noticed that both looked very good and useful -- cyb3rops
cyb3rops: Remember if you want to see your training listed on that site, just create a pull request - see “Contributing” section at the end of the page https://t.co/tHqvh3ClT0 -- cyb3rops
GossiTheDog: @sirjackery @TheDFIRReport No idea other than MDE. MDE is pretty good for it, you can build custom queries and hunt retrospectively. -- GossiTheDog
cyb3rops: I've added @mariuszbit's training to the list in my Cyber Security Hub project Seems to be a very useful training - see his @x33fcon talk slide deck - the training seems to cover parts of it https://t.co/TsjPA93BWI Project (github pages are s -- cyb3rops
malwrhunterteam: Yes, that sure would be a good solution for this problem... 😂 https://t.co/fWimdsFRpK -- malwrhunterteam
malwrhunterteam: "index.htm": f876b9a14d9770212b2dea07d2f2f093be8825de4e13bacb68f49ab29bfd8ca6 From: http://45.32.63[.]189:39544/cwuhe/index.htm "index.html": a0747d99460564e6264dc91d722c0e4165ae0e837f80ca793c6a49a0d7671fc2 From: http://45.32.63[.]189:395 -- malwrhunterteam
424f424f: @francisacer1 @_RastaMouse What was the fix? -- 424f424f
GossiTheDog: @danjconn @AppSecBloke It’s almost like big tech companies are trying to get universal regulation that suits them. -- GossiTheDog
Hexacorn: @LinkedIn you should take a look at ads you promote on the platform the link leads to a scam page hxxs://locust-cp . com/bqwJPdj6 https://t.co/gCGAquBAkC -- Hexacorn
malwrhunterteam: Suspicious "plugin": a7a4fcef579571728f98e2f4e23966f2d6c85aec1f2828fe78b47b02630a9635 2 domains in it: jokesterblob[.]com - seen resolving to 146.70.125[.]109 finaleeject[.]com Both @Namecheap registered, on February 27th, with a few hour -- malwrhunterteam
RansomwareNews: Group: akira Approx. Time: 2023-05-30 12:34:02.982714 Title: Lewis Young Robertso n &amp; Burningham -- RansomwareNews
RansomwareNews: Group: monti Approx. Time: 2023-05-30 12:34:01.511987 Title: Servizi Omnia All data upload -- RansomwareNews
RansomwareNews: Group: blackbasta Approx. Time: 2023-05-30 12:33:52.453269 Title: MFDDS -- RansomwareNews
SpecterOps: 🚨Last call!🚨 Registration closes tonight at 6 PM EDT. You don't want to miss this "Deconstructing Adversary Tradecraft" workshop taught by our Chief Strategist @jaredcatkinson! Secure your spot: https://t.co/U5xbt0ECdF -- SpecterOps
virusbtn: In an excerpt from his new book, @scottjshapiro looks back at the “Bulgarian virus factory” of the 1980s/early 90s, at who was writing the viruses and why, and at how some of the protagonists in the fledgling antivirus industry responded. https: -- virusbtn
vxunderground: https://t.co/qZAibP9bGA -- vxunderground
vxunderground: We've updated the vx-underground malware family collection. - CaddyWiper - IsaacWiper - HermeticWiper - BitRAT - LorenzRansomware - Valyria - WizardUpdate - AridGopher - ClipBanker - Vidar Check it out here: https://t.co/L3GdoH9SAT https: -- vxunderground
58_158_177_102: @papa_anniekey 帰りの新幹線の新大阪ホームでデューク更家さんにお会いして握手していただいたので、腰は治ると思います! -- 58_158_177_102
cyb3rops: @theodoros377 @SystemShockGame I got it on my 14th birthday and loved it. The story is amazing. IIRC I never completed it, because I never allowed myself to lower the difficult levels. -- cyb3rops
cyb3rops: @Gert_Woellmann zahlen wir China eigentlich noch Entwicklungshilfe? hat man im Ahrtal mittlerweile wieder Strom und fließend Wasser? -- cyb3rops
Cyb3rWard0g: @x33fcon “When Red Meets Blue…” 😂 #X33fcon @_dirkjan @mvelazco @einarssonm @dorotaq @Mrtn9 @Flangvik @domchell @MarcOverIP 🍻🏴‍☠️🏴‍☠️ https://t.co/yDOvCPuP7U -- Cyb3rWard0g
IntezerLabs: We uncovered new samples and techniques used by CryptoClippy, a trojan targeting Brazilian financial services evolving fast. This threat has evolved with new stealing capabilities. Check out our blog by @NicoleFishi19 for its technical analy -- IntezerLabs
James_inthe_box: @MalGamy12 @0xbahaa @JAMESWT_MHT @struppigel @nu11charb @malwrhunterteam @th3_protoCOL @vinopaljiri @ale_sp_brazil @Maxmal @ffforward @1ZRR4H @Kostastsale @binaryz0ne @3xp0rtblog @Arkbird_SOLG @ViriBack @AnFam17 @siri_urz @fr0gger_ @dr4k0 -- James_inthe_box
James_inthe_box: @Lokesh42651261 @malwrhunterteam @JAMESWT_MHT @cyb3rops @bohops @demonslay335 Nice....hope to find time this week and poke around at #pikabot. -- James_inthe_box
RansomwareNews: Group: alphv Approx. Time: 2023-05-30 10:40:34.255193 Title: https://t.co/1yzSXuKtzY -- RansomwareNews
blackorbird: Threat report summary report (207 pages) review the year 2022 and discuss trends of 2023 https://t.co/wsvfQMoIJY https://t.co/3ZhYY5Ocbj -- blackorbird
cyb3rops: @theodoros377 @VessOnSecurity @S0ufi4n3 Follow @M_haggis @wdormann for more elaborate takes on the official driver block list -- cyb3rops
cyb3rops: @theodoros377 @VessOnSecurity @S0ufi4n3 In short: it’s shit -- cyb3rops
GossiTheDog: @DAlperovitch Indeed. All they missed with a wink at the camera. -- GossiTheDog
GossiTheDog: @DAlperovitch But they say it’s totally not them 🤪 https://t.co/7Pp2Dk6rPM -- GossiTheDog
malwrhunterteam: "secservice" seen from Brazil: 01667b06fcf9b01b3cb8a11ff2fc60ef0c6dfc077e05a9a18a78e7daeeb1979f @1ZRR4H -- malwrhunterteam
malwrhunterteam: @Artilllerie @JAMESWT_MHT https://t.co/wRj7znrXLH -- malwrhunterteam
virusbtn: CloudSEK’s Anshuman Das (@0x1shu) looks into a DogeRAT Android malware campaign targeting mostly Indian users across multiple industries, particularly banking and entertainment. https://t.co/WoOw1PKrVE https://t.co/xyPFEktOLg -- virusbtn
virusbtn: AhnLab researchers look at recent attack cases of SparkRAT, which downloads MeshAgent, distributed initially through the installer of a Korean VPN company. https://t.co/YzW45T5yau https://t.co/UXmKz0wJwE -- virusbtn
virusbtn: K7's Andrew Shelton analyses the recent Akira ransomware attacks and how Akira is related to the Conti ransomware. https://t.co/MKcneL1bVW https://t.co/6NaH7gE2zb -- virusbtn
58_158_177_102: おやつたこ焼き https://t.co/LEGiPZgQ8k -- 58_158_177_102
anyrun_app: 🔍 Update in Malware Trends Tracker: #DarkSide! It is a RaaS and hacker gang of the same name. This #ransomware is known for high-profile attacks that result in data theft and encryption. DarkSide overview and samples 👇 https://t.co/BwOn88rdy -- anyrun_app
cyb3rops: @VessOnSecurity @S0ufi4n3 Yes, most likely. It could be one of the 300+ vulnerable and signed drivers that haven't been revoked, yet -- cyb3rops
hackerfantastic: LLM made. https://t.co/snuafMaH8M -- hackerfantastic
hackerfantastic: https://t.co/F2A6aVsAle -- hackerfantastic
JAMESWT_MHT: @FBussoletti il file allegato è un immagine First Submission 2015-12-10 23:51:11 UTC https://t.co/SjBJ30VoFG https://t.co/U8je2gfhwW non viene disabilitato nulla con una immagine.. -- JAMESWT_MHT
JAMESWT_MHT: @FBussoletti Attached file is a IMAGE First Submission 2015-12-10 23:51:11 UTC https://t.co/SjBJ30VoFG https://t.co/U8je2gfhwW not disable windows firewall.. https://t.co/FsYRpA1VkG -- JAMESWT_MHT
malwrhunterteam: What a pornographic spyware would be? 🤔 😂 https://t.co/PCT3OBSeJ0 -- malwrhunterteam
malwrhunterteam: https://t.co/CqVCxxJyUb -- malwrhunterteam
malwrhunterteam: https://t.co/146t7VLqry -- malwrhunterteam
malwrhunterteam: https://outlook-1gob-mx.weebly[.]com/ @1ZRR4H https://t.co/2J2MHqdYRX -- malwrhunterteam
JAMESWT_MHT: @googleitalia Cercando "ricable" in Google e cliccando sul risultato corretto si viene dirottati su siti fake spam Da settimane c'è questo problema @ESET giustamente blocca la connessione https://t.co/1O2fnvPM5P -- JAMESWT_MHT
58_158_177_102: 昼らー&おでん 座り続けると再稼働の際に痛い https://t.co/QJwAmJRnXg -- 58_158_177_102
blackorbird: Networking Manual v2.0 https://t.co/EJUj9u2kZo ref: https://t.co/EnVNWPhVkY -- blackorbird
nullcookies: @gregotto 🤝 -- nullcookies
pmelson: @ImposeCost If they have, I’m not aware of the influence. Certainly AFCERT were pioneers in detection &amp; response at scale, but that wasn’t really codified and taught until later. -- pmelson
RansomwareNews: Group: ragroup Approx. Time: 2023-05-30 02:48:12.766469 Title: eastern-media-international-corporation -- RansomwareNews
424f424f: @SubTee https://t.co/tPsVjwuVEn -- 424f424f
424f424f: @HackingDave @bencanning87 https://t.co/QgNlAo7tVG -- 424f424f
424f424f: @rootsecdev You should twitch stream it -- 424f424f
58_158_177_102: シート固定つらかった。。。 https://t.co/Q525tOmrcg -- 58_158_177_102
vxunderground: @FangsEnjoyer no srry, linux is for nerds -- vxunderground
vxunderground: @s3rgiomazari3go CVE-420-6969 -- vxunderground
hackerfantastic: "Swamp gas" https://t.co/xnJrme6r7u -- hackerfantastic
pmelson: @scritches I don’t even mean who cares about it as much as just how the body of knowledge and mental models of one influenced (or didn’t) the other. -- pmelson
pmelson: It’s interesting how Western IC thinking and doctrine permeate cyber on the intel side, but law enforcement has had objectively less influence on cyber incident response &amp; investigation. I know it’s not nothing, but the differences in proces -- pmelson
pmelson: @Dave_Maynor @lcamtuf ☝️☝️literally the tweet I came to send. -- pmelson
cyb3rops: @arekfurt Oh, yes, sorry. The main purpose of that meme was to make fun of the current state of affairs, not @SpyNetGirl’s comment. She’s right asking that. Since they made two videos, they could’ve made one with an older and one with the newest -- cyb3rops
hackerfantastic: @CoyoteDen @deefouren It's from the home of a (former) female skunkworks staffer who worked at Area51 and leaked the photo of the infamous Roswell saucer in error during a Zillow tour. Don't act so surprised, people are careless with clas -- hackerfantastic
RansomwareNews: Group: play Approx. Time: 2023-05-29 22:34:00.401710 Title: Soroc -- RansomwareNews
RansomwareNews: Group: vicesociety Approx. Time: 2023-05-29 22:33:45.710585 Title: Adsboll -- RansomwareNews
vxunderground: @StephAHHHHHn Yes -- vxunderground
vxunderground: We have seen a trend in Threat Actors selling "AV/EDR" killers. We have decided to unveil our own AV/EDR killer program. See attached image for more details. Have a nice day. https://t.co/8fzWIf5UKI -- vxunderground
vxunderground: @rad9800 @redteamraw Nerds -- vxunderground
vxunderground: The RaidForums database has been leaked online. It has information on 478,000+ users. It was leaked on Exposed - an up-and-coming forum wanting to fill the void Breached left. The administrative staff of Exposed would not tell us the sour -- vxunderground
424f424f: https://t.co/CTf2J7smZU -- 424f424f
424f424f: @phr00ts @flavorflamebbq @CheesyVelveeta @MeatChurch Lol ikr. I heard they get surf and turf every day. Not just before you go on patrol... -- 424f424f
424f424f: I won't abuse this, I won't abuse this.. https://t.co/gg53uPfB4e -- 424f424f
424f424f: @phr00ts @FireHatchRubs I know how to social engineer you now. https://t.co/9DakTDNsJ9 -- 424f424f
DrunkBinary: @rannahose We have 4 stray kittens and a momma cat we have been trying to wrangle and find homes for but they are crazy skittish right now, even watching them from a distance, they are just designed to be insanely cute. https://t.co/L83iTSEQV -- DrunkBinary
malwrhunterteam: Anyone seen yet a ransomware that is checking CPU temperature values? These strings are from a Qilin sample... 🤔 https://t.co/JzP4wSbsAM -- malwrhunterteam
malwrhunterteam: "lexus.jpg": 84dcd09754a6b674bef0131b815f3eabbcfba1785b79ceda426b8bf8e3160b5c Contains some ransomware called buhtiRansom... https://t.co/dKVgm4MoVS -- malwrhunterteam
malwrhunterteam: "Photo studio logo animation\.zip": f964f7e146ff3730d4476c8e59d221c4f765915453585d287c4d700d2c3e6eaa 98199550bc64f66cf15a1fd41e0e779aa919d221578abbad13098266ad53d7a2 59afe689583a09580af7d696cad77f581aa93236d4df6d3c1692a4ea82eee8bc https:/ -- malwrhunterteam
Max_Mal_: @TLP_R3D #Qakbot on 🔥 for a long time and pushing phishing campaigns very hard, that is true But, they are not stable with their #TTPs and mostly rely on User Execution, then a long chain of Defence Evasion techniques after that mostly #CobaltS -- Max_Mal_
RansomwareNews: Group: alphv Approx. Time: 2023-05-29 20:31:24.795841 Title: BCATTORNEY -- RansomwareNews
cyb3rops: @nas_bench Ha! Exactly! I almost commented on the same thing. They even took the full tweet from the first guy that tweeted about it and didn’t put it in quotes. It’s basically this : LinkedIn is a lawless place https://t.co/RgY8Z9NoVv -- cyb3rops
cyb3rops: @EricaZelic https://t.co/wiyC5oWNM7 -- cyb3rops
cyb3rops: @0xTriboulet Yes, you are one of those that I highly respect for their calm and sober way to discuss things People often get angry with me and start to hate me. I sense that. It’s not one of my life goals to be hated by as many people as possib -- cyb3rops
GossiTheDog: @cyb3rops @nas_bench In fairness this is basically how corporate life works too - make a PowerPoint, watch as it gets rebranded and shared upwards 🤣 -- GossiTheDog
mrd0x: @equat0rium Just another vector :) -- mrd0x
mrd0x: @curtw Agreed! -- mrd0x
424f424f: @HackingLZ Scope* -- 424f424f
424f424f: @cyb3rops Finally, we agree on something. -- 424f424f
cyb3rops: @UK_Daniel_Card for insulting or annoying me or for liking tweets that insulted me or people that constantly seem to be annoyed by my tweets and tell me that whenever they get the chance - I block them to spare them more frustration -- cyb3rops
inj3ct0r: #0day #eBizTechnocrats Pvt Ltd #SQLi #Injection #Vulnerability #eBiz https://t.co/bHWCTJtq5C -- inj3ct0r
inj3ct0r: #0day #SimpleCustomerRelationship Management #CRM 2023 1.0 #SQLi #Injection #Vulnerability https://t.co/11ZRNab5jT -- inj3ct0r
inj3ct0r: #0day #NewMVCShop 1.0 #SQLi #Injection / Missing Attributes #Vulnerability https://t.co/FXZIA0kV9s -- inj3ct0r
inj3ct0r: #0day #CamaleonCMS v2.7.0 - Server-Side Template #Injection #Vulnerability https://t.co/WBAchB3cIC -- inj3ct0r
inj3ct0r: #0day #SCMManager 1.60 - Cross-Site Scripting Stored (Authenticated) #Exploit #XSS https://t.co/fNSAatk5Vn -- inj3ct0r
malwrhunterteam: https://t.co/jdjW3e7H7K -- malwrhunterteam
malwrhunterteam: Some people saying the Rhysida ransomware gang pwned the Chilean Army. 🤔 Not know yet if true or not, but anyhow, that mention sample is basically surely not the one used in the attack, as it is the one I mentioned as example in the threa -- malwrhunterteam
Max_Mal_: @JustinMason72 Internal telemetry and CTI information, plus I noticed that the community here talks less about it than a few months ago (Loader &gt; Ransomware infection) -- Max_Mal_
Max_Mal_: Is #Emotet dead (again) for real? Thoughts: Ransomware infections led by loaders decrease (?), e.g., #IcedID &gt; #Quantum #Qakbot &gt; #Blackbasta ... Seems ransomware TAs are not satisfied with loaders loots and prefer to strike by themsel -- Max_Mal_
RansomwareNews: Group: lockbit3 Approx. Time: 2023-05-29 18:37:08.005110 Title: https://t.co/hhLwMijZVf -- RansomwareNews
cyb3rops: @UK_Daniel_Card Regarding “divisive” I just recently had an idea for a meme that involves that claim. Good that you mentioned it. I almost forgot about it. -- cyb3rops
cyb3rops: the usual line of thought when I block people is this: »You seem to be very annoyed by what I post &amp; I am annoyed by your aggressive comments. I’ll spare you &amp; me the pain of continuing these confrontations. Life is too short for these a -- cyb3rops
cyb3rops: @BlueTeamJK in my case they usually screenshot the “you’re blocked” page together with a “I only told him my opinion” comment, fully aware that it wasn’t just that and probably trying to make me unblock them to proof them wrong and continue a fr -- cyb3rops
GossiTheDog: @CarlGottlieb Tell Capita that. 🤣 -- GossiTheDog
GossiTheDog: A good test for companies around security incidents, I think, is does the steps taken match what you’d expect your own suppliers to do in similar circumstances. Here’s Capita’s Supplier Charter: https://t.co/Hc9n75l0kG “Notify Capita imm -- GossiTheDog
GossiTheDog: The BBC are reporting almost 100 of Capita’s clients have contacted the ICO. https://t.co/knilJ4Cnxy -- GossiTheDog
JAMESWT_MHT: Dopo un paio di volte che si clicca il Redirect fake sparisce e si riesce a visionare https://t.co/Gfc5wu8Jy9 -- JAMESWT_MHT
mrd0x: @RhysFrost_ Sorry for that 😅 -- mrd0x
mrd0x: Review: https://t.co/12bMrugfe9 -- mrd0x
mrd0x: Reminder that creating a memory dump of Outlook.exe not only produces access tokens but also potentially sensitive email content. https://t.co/HM2m8h35hD -- mrd0x
mrd0x: @NathanMcNulty @neutroncore The second pic is actually contents of an email not my actually password -- mrd0x
mrd0x: @neutroncore I'm really not too sure but maybe @NathanMcNulty can answer this. -- mrd0x
ChicagovoiceD: "To pay or not to pay? According to new data, the answer may have changed." Glenn Baruck, eDot #Ransomware… https://t.co/AjkaM5f2iU -- ChicagovoiceD
Drip7Training: Honored to be mentioned by Startup Bubble as a company on the frontlines of cybersecurity. We appreciate the writ… https://t.co/sny5QbADPB -- Drip7Training
festofauthors: RT @ProvokeIdeas: This Sunday, PIF will be hosting a Critical Conversation on #Cybercrime with @festofauthors. Join @KenrickBagnall, @Bank… -- festofauthors
IST_org: As negotiations over the United Nations global #cybercrime treaty continue, we enjoyed hearing from friends of the… https://t.co/VdUifwfM3g -- IST_org
MeganStifel: RT @IST_org: As negotiations over the United Nations global #cybercrime treaty continue, we enjoyed hearing from friends of the #Ransomware… -- MeganStifel
prhpchandigarh: RT @himachalpolice: Weak coffee is OK, But weak password ISN'T. Strong passwords reduce the risk of #CyberFraud. #CyberCrime #CyberSafety… -- prhpchandigarh
0xtechrock: RT @0xtechrock: OSINT TIP #185 🎭 DigitalSide Threat-Intel ⚡ It contains a set of Open Source Cyber Threat Intelligence information, mostl… -- 0xtechrock
AccountabilIT: 🔒 Ransomware attacks on the rise in #manufacturing industry, warns new report by Black Kite. March saw double the v… https://t.co/hs9T7kr9UP -- AccountabilIT
afilatov1989: RT @onlineosint: DorkGPT Generate Google Dorks with AI https://t.co/qGsr4ETkXl #ai #osint #google #search #ChatGPT https://t.co/h1TwEZtnVb -- afilatov1989
aguilarvelasqu1: RT @TheHackForce: SSO Security Testing Checklist #infosec #cybersecurity #cybersecuritytips #pentesting #redteam #informationsecurity #Cyb… -- aguilarvelasqu1
alone_breecher: Are you a beginner in bug hunting got your back here is a repo that contains resources for beginner bug bounty hunt… https://t.co/CZ3diPec48 -- alone_breecher
AnchoredNarrat1: RT @Volexity: .@Volexity is aware of widespread exploitation of #MOVEIt software published by Progress. Organizations running MOVEIt should… -- AnchoredNarrat1
attrc: RT @Volexity: .@Volexity is aware of widespread exploitation of #MOVEIt software published by Progress. Organizations running MOVEIt should… -- attrc
CoffeTechnology: RT @sallyeaves: Why I Do #Cyber - Series Shining a Light 💡on What Careers in #CyberSecurity really look like &amp; encouraging &amp; fostering #div… -- CoffeTechnology
DelineaInc: Recent research shows #CyberInsurance prices continued to moderate in the first quarter of 2023, even as providers… https://t.co/gSpyCspf7H -- DelineaInc
hacker_jeanson: Offering the best recovery services. And media accounts hacking, Infiltration, and recovery. #hackedinstagram… https://t.co/xLqM2Wq9Jg -- hacker_jeanson
hacker_jeanson: Have exclusive Hacking jobs? and Ask for my service. #hacked #icloud #facebookdown #imessage #ransomware #snapchat… https://t.co/VRixIN3z6e -- hacker_jeanson
hacker_jeanson: Offering the best recovery services. And media accounts hacking, Infiltration, and recovery. #hackedinstagram… https://t.co/N2vjXL5Vew -- hacker_jeanson
iam_abduljalil: RT @hakluke: Perform rDNS lookups en masse with hakrevdns! 🚀 1️⃣ Print IPs in a CIDR block using prips 2️⃣ Pipe into hakrevdns 3️⃣ Get tho… -- iam_abduljalil
InQuest: Roughly 9️⃣ million individuals have been affected by a Lockbit ransomware ☠️ attack on MCNA Dental ➡️… https://t.co/90Q2TpxvZy -- InQuest
IntelskyB: 🇫🇷 French Air Force ✈️ F900 ( Dassault Falcon 900 ) (F-RAFP, #3B77E5) as flight #CTM0006 was just spotted over 🇷🇴 I… https://t.co/HHhbBkebtb -- IntelskyB
JenSutt6971: RT @Pierre_Markuse: 🔴Interested in #OSINT and #Journalism? Then make sure to watch the next @sentinel_hub webinar "Open Source Intelligenc… -- JenSutt6971
kimcumpson: RT @FoodManufacture: Cybersecurity expert, Greg Crowley and chief information security officer for eSentire, talks through the types of cyb… -- kimcumpson
LeVeLzoc: RT @haneeni61853819: How to Hack Like a Legend You can Read and Download it for free from: https://t.co/PJ7hxdAbEs #Linux #Ubuntu #hacki… -- LeVeLzoc
MrHacke01443999: RT @mcipekci: Best bug bounty tip I can give, be polite and mannerful when you submitted an issue, I never had problem with triagers which… -- MrHacke01443999
netsecu: https://t.co/1nLw2yOK5s A Year In HackerOne\xe2\x80\x99s Bug Bounty Program #HackerOne #BugBounty #CyberSecurity' https://t.co/scfaAuZ2ZP -- netsecu
Pawt00tI3B00tIe: RT @AtomSpam: Detected #phishing clone at address: hxxps://www[.]indisciplinati[.]com/Hwaari/Soft/train[.]php #aruba #infosec #cybersecuri… -- Pawt00tI3B00tIe
PriyanshKanoje5: RT @hackinarticles: Bypass Antivirus Cheat Sheet https://t.co/puAKpV7RkD #infosec #cybersecurity #cybersecuritytips #pentesting #redteam… -- PriyanshKanoje5
prudentwizzo: RT @5ireChain: 🐛💰 Tired of encountering bugs in software and not getting any recognition for reporting them? Join our #bugbounty progra… -- prudentwizzo
puzzle_deagle: RT @onlineosint: DorkGPT Generate Google Dorks with AI https://t.co/qGsr4ETkXl #ai #osint #google #search #ChatGPT https://t.co/h1TwEZtnVb -- puzzle_deagle
r00tbsd: RT @Volexity: .@Volexity is aware of widespread exploitation of #MOVEIt software published by Progress. Organizations running MOVEIt should… -- r00tbsd
RedPacketSec: Daily Threat Intelligence - June 01 - 2023 - https://t.co/c6g3jL03om #CyberSecurity #OSINT #ThreatIntel… https://t.co/4F9BP7SQih -- RedPacketSec
salvot80: RT @AllForOsint: Hey 🕵️‍♂️#OSINT🕵️‍♀️ 👀, WiGLE is a submission-based catalog of wireless networks. Submissions are not paired with actual p… -- salvot80
salvot80: RT @osintbear: Operation: Bloodhound #OSINT #Medium https://t.co/PB0Sq8sVgE -- salvot80
scotthack227: Offering the best recovery services. All social media accounts hacking, Infiltration, and recovery.… https://t.co/wvzu6Hx5J0 -- scotthack227
scotthack227: Do you have a dedicated hacking job? DM and ask for my services.; #hacked #icloud #facebookdown #imessage… https://t.co/gtdItR3D2u -- scotthack227
scotthack227: Do you have a dedicated hacking job? DM and ask for my services. #hacked #icloud #facebookdown #imessage… https://t.co/eEIxHidFHO -- scotthack227
Sjuhn_Teremilev: RT @IntelTechniques: Happy New Year Everyone! The 10th Edition of OSINT Techniques is now available! Full details can be found at: https:/… -- Sjuhn_Teremilev
ssaweruo: RT @hackinarticles: History of Artificial Intelligence #infosec #cybersecurity #cybersecuritytips #pentesting #redteam #informationsecurit… -- ssaweruo
tammago: RT @DailyDarkWeb: DetectDee - Hunt down social media accounts by username, email or phone across social networks. https://t.co/v8OqL4AdsG… -- tammago
tammago: RT @0xtechrock: OSINT TIP #184 🔍🔍 De Digger - A search/discovery engine that allows you to find public files on Google Drive! https://t.… -- tammago
teamcymru: Cyber threats are on the rise, and a proactive approach is crucial. Our recent survey of 218 security analysts reve… https://t.co/DEXAPnxhXZ -- teamcymru
thefoss_m: RT @bhttparitosh: I just published Decoding WannaCry Ransomware: The Global Cyber Attack That Shook the World https://t.co/vz4HMVd4rR #in… -- thefoss_m
tlansec: RT @Volexity: .@Volexity is aware of widespread exploitation of #MOVEIt software published by Progress. Organizations running MOVEIt should… -- tlansec
trustedtechteam: Are you aware of the .rpmsg attacks? 👾 These attacks are tricky to counteract as they are "low volume, targeted, an… https://t.co/LfZN7CB1c0 -- trustedtechteam
VikramV19319726: RT @hackinarticles: History of Artificial Intelligence #infosec #cybersecurity #cybersecuritytips #pentesting #redteam #informationsecurit… -- VikramV19319726
Volexity: .@Volexity is aware of widespread exploitation of #MOVEIt software published by Progress. Organizations running MOV… https://t.co/NZuEZmlqQw -- Volexity
1984b0t: RT @TheHackersNews: 🚨 Beware, #iOS users! A new sophisticated and long-running mobile #spywre campaign dubbed "Operation Triangulation" is… -- 1984b0t
AmChemistry: We agree! "Natural gas is essential to a reliable transition. Natural gas will remain essential to reliability for total energy and as a balancing resource." @EnergyDems @EnergyGOP https://t.co/4SCdV1e4s9 -- AmChemistry
AP_Hofleitner: RT @TheHackersNews: 🚨 Beware, #iOS users! A new sophisticated and long-running mobile #spywre campaign dubbed "Operation Triangulation" is… -- AP_Hofleitner
AtomSpam: Detected #phishing clone at address: hxxps://short[.]gy/GDJMMa #posteitaliane #infosec #cybersecurity #atomspam… https://t.co/FCo6pjs0UH -- AtomSpam
AxiadIDS: 🤔 THURSDAY THOUGHTS: What is FIDO Passkey and what does it have to do with passwordless authentication? READ MORE:… https://t.co/DD59TWAp8O -- AxiadIDS
bjCSIRT: Bulletin d’alerte du bjCSIRT sur une vulnérabilité de type Server-Side Template Injection (SSTI) dans Camaleon CMS https://t.co/nEeroRjqL7 -- bjCSIRT
Coin_Crux: Cricket Legend AB de Villiers Loses NFTs in Phishing Scam South African cricketer AB de Villiers revealed that he… https://t.co/CyJ6MXZdOh -- Coin_Crux
Coolcarlos17: RT @AtomSpam: Detected #phishing clone at address: hxxps://shared-drive[.]com/ #microsoft #infosec #cybersecurity #atomspam Follow us ht… -- Coolcarlos17
csirt_it: Rilevata una vulnerabilità, con gravità “critica”, in #MOVEit Transfer di Progress Rischio: 🔴 Tipologia: 🔸 Escalation of Privilege 🔗https://t.co/ZNP9rmqk9F 🔄 Mitigazioni disponibili 🔄 https://t.co/BRP9wVcRDk -- csirt_it
gabriel_hckbea: 8 strange ways emproyees can (accidently) expose data #DataSecurity #Privacy #100DaysOfCode #CloudSecurity… https://t.co/nZyw4Gtmlg -- gabriel_hckbea
gdprAI: RT @scotthack227: For support and help, contact your favorite #Hacker fast and reliable. All social media #CyberSecurity #hacker #infosec #… -- gdprAI
gdprAI: RT @gabriel_hckbea: For support and help, contact your favorite #Hacker fast and reliable. All social media #CyberSecurity #hacker #infosec… -- gdprAI
Jorge_Delrio: RT @MalwarePatrol: Interrupt the cyber kill chain by detecting and blocking C2 traffic. Our C2 URLs feed is correlated with @MITREattack to… -- Jorge_Delrio
McAfee_Help: Protect your computer from viruses, #malware, and other threats by keeping your McAfee #antivirus product up to dat… https://t.co/POLvJ1i8Z1 -- McAfee_Help
RH_ISAC: Are you coming to see us at @Infosecurity? Make sure you get your ticket to visit us in three weeks! We can’t wait to see you there on 20 – 22 June @ExCeLLondon. https://t.co/Zu1naFRDbe https://t.co/bdipUg8AQb -- RH_ISAC
scotthack227: You have any log in complaint? #CyberSecurity #hacker #infosec #security #cyber #opensource #cybercrime #crime… https://t.co/Sab0BgosuQ -- scotthack227
scotthack227: For support and help, contact your favorite #Hacker fast and reliable. All social media #CyberSecurity #hacker… https://t.co/WUtz1T2tm7 -- scotthack227
scotthack227: For #Hacked #Gmail recovery Dm now #Hacked gmail #CyberSecurity #hacker #infosec @reach2ratan #security #cyber… https://t.co/gqFbhRIqwu -- scotthack227
scotthack227: 8 strange ways emproyees can (accidently) expose data #DataSecurity #Privacy #100DaysOfCode #CloudSecurity… https://t.co/vLiJbH5314 -- scotthack227
silentpush_labs: #Phishing #threatintel #cybersecurity : open-gifts[.]com spoofing discord[.]com. AS Name: CLOUDFLARENET (13335). Cu… https://t.co/xJyyYbudAL -- silentpush_labs
US_CYBERCOM: CYBERCOM and JFHQ-DODIN are partnering with @marshallu and @WestVirginiaU to establish a National Center of Excellence for Cyber Security in Critical Infrastructure. The partnership will focus on critical infrastructure protection, cyber secu -- US_CYBERCOM
VaulterVS: The Imperative Of Technology Literacy https://t.co/reNMckYTxU #databrach #cybersecurity #cyberattack #cybercrime… https://t.co/dpuAqGomQg -- VaulterVS
GovCERT_CH: The NCSC is aware of widely and successful exploitation of a critical vulnerability in file transfer software MOVEit Transfer that is currently being abused by unknown threat actors to steal corporate data ⚠️ We urge you to follow the followi -- GovCERT_CH
US_CYBERCOM: CYBERCOM values our FVEY allies. It was a pleasure for our Deputy J5 team to travel to Ottawa and work with the CAF Cyber Forces and @CSE_CST #partnershipsmatter https://t.co/1cMun3JqTB -- US_CYBERCOM
0xedeon: Unmasked: Cybersecurity researchers have identified the true identity of an individual believed to be associated wi… https://t.co/BHkKxCbQVC -- 0xedeon
ADanielHill: RT @davidbombal: Ethical hacker jailed for doing good? YouTube video: https://t.co/uSO7myRRPZ #cyber #hack #hacking #hacker #cybercrime… -- ADanielHill
BubbleSocialMed: Cyberpredators are exploiting unprotected RDPs to extort millions from big &amp; small companies alike. @ThalesGroup ha… https://t.co/nC1BZlSlHd -- BubbleSocialMed
bugbounty18: Urgent WordPress Update Fixes Critical Flaw in Jetpack Plugin on Million of Sites https://t.co/46yk0lHhAW #bugbounty #bugbounties -- bugbounty18
CybersecuritySF: Here's 200 #cybersecurity and #cybercrime statistics from @Termly_io. Includes research from Cybersecurity Ventures… https://t.co/4y6e2ZXnuo -- CybersecuritySF
ferozekhan267oa: RT @haneeni61853819: Certified Information Systems Auditor (CISA) Cert Guide (Certification Guide) You can Read and Download it for free f… -- ferozekhan267oa
GuraniManoj: RT @osce_cthb: Supporting Ukrainian authorities to better combat #HumanTrafficking is an @OSCE priority. Glad to share our work on #tech-fa… -- GuraniManoj
HQ_DG_NCFB: RT @Cyberdost: Be #CyberAware | Read the #DailyDigest for today at https://t.co/9TFyuwgZTy to stay updated with the latest National and Int… -- HQ_DG_NCFB
IKapoor01: RT @Bug_X_hunter: 🔎🌐 Discover The Subdomains with given set of ip's with ease of using the powerful DNSx tool! Using -ptr flag 🚀💡 #bugbou… -- IKapoor01
JayateerthaG: 📢 Attending my very first in-person #infosec conference at #bsidesbangalore on Jun 8th, 2023! 🎉 Super thrilled to… https://t.co/ReGIARVvFQ -- JayateerthaG
Mitchel72543838: If you need Help with recovering any Account,, Tiktok, Snapchat, Instagram etc.. I'm available 24/7 Inbox me… https://t.co/c5wFDn7G48 -- Mitchel72543838
Mitchel72543838: If you need Help with recovering any Account,, Tiktok, Snapchat, Instagram etc.. I'm available 24/7 Inbox me… https://t.co/8Jb7os75mA -- Mitchel72543838
razrshrp68: RT @alone_breecher: Learning to hack like zseano :- credits @zseano https://t.co/JzC6Um5Cfe #BugBounty #bugbountytip #bugbountytips #in… -- razrshrp68
sandp1996: RT @sandp1996: @SmrutiRNayak @BabyPriyansh @IC__ICIBank___ @Cyberdost @CMODelhi @LtGovDelhi @YESBANK @ICICIBank @HDFC_Bank @DCPWestDelhi @D… -- sandp1996
SheilaL94913635: RT @5ireChain: 🐛💰 Tired of encountering bugs in software and not getting any recognition for reporting them? Join our #bugbounty progra… -- SheilaL94913635
sKillseries: RT @hakluke: Perform rDNS lookups en masse with hakrevdns! 🚀 1️⃣ Print IPs in a CIDR block using prips 2️⃣ Pipe into hakrevdns 3️⃣ Get tho… -- sKillseries
spadethrift: RT @haneeni61853819: Certified Information Systems Auditor (CISA) Cert Guide (Certification Guide) You can Read and Download it for free f… -- spadethrift
Sushantsahani_: RT @fattselimi: You can even find sensitive data via inurl:’/content/dam’ intext:.@target.com OR searching intext:”admin, login, password”… -- Sushantsahani_
TechNative: RT @TechNative: As your business expands IT workloads out to the cloud and edge, the potential for a #ransomware attack increases signific… -- TechNative
TuxCare_: #Ransomware attackers have shifted their aim from #SeniorManagement. In May, a #RansomwareGroup exploited an emerge… https://t.co/YHdGYSMdbG -- TuxCare_
VBTamilFM: Interview with Balu Swaminathan, Additional Superintendent of Police (retd) on tackling cyber crimes… https://t.co/fbebcUkT1P -- VBTamilFM
WatchCloudCyber: As a tax or accounting professional, your clients trust you with their sensitive financial data. Show them you take… https://t.co/A9Dzpg0amA -- WatchCloudCyber
Who_4m1: RT @hakluke: Perform rDNS lookups en masse with hakrevdns! 🚀 1️⃣ Print IPs in a CIDR block using prips 2️⃣ Pipe into hakrevdns 3️⃣ Get tho… -- Who_4m1
0xedeon: #Kaspersky reveals a previously unknown advanced persistent threat (APT) targeting iOS devices with zero-click expl… https://t.co/WJr5efaXOJ -- 0xedeon
adlumin: 🔒 Protecting your org from #ransomware is crucial! Understand the types like LockBit, BlackCat, and Medusa, and the… https://t.co/ExtkNk3lPp -- adlumin
AmChemistry: Well said! “The grid of the future will need to adapt to the demands of a different economy…Streamlining the permitting process and accelerating changes already underway in energy markets can help to accelerate investments that are needed.” - -- AmChemistry
AtomSpam: Detected #phishing clone at address: hxxps://webhost-areasistema-operatore-supporto[.]cfolks[.]pl/webauth/confermo-… https://t.co/oqpSgHEw98 -- AtomSpam
CyberIQs_: Chinese state-backed hacking group compromised US critical infrastructure orgs #infosec #infosecurity… https://t.co/SbcLmmUiOP -- CyberIQs_
CyberIQs_: Sony forecasts it will nearly double revenue from PC game ports to $450 million in 2023 #infosec #infosecurity… https://t.co/7w5ao6YPT5 -- CyberIQs_
CyberIQs_: Mobile Spyware—How You Can Keep Stalkers Off Your Phone #infosec #infosecurity #cybersecurity #threatintel… https://t.co/lI1TDzJayL -- CyberIQs_
CyberIQs_: Netwrix Report: Enterprises Suffer More Ransomware and Other Malware Attacks Than Smaller Organizations #infosec… https://t.co/1VKZ3iVeQ9 -- CyberIQs_
cyberriskall: We are honored to have Conor Phoenix of The @FBI and David Palmbach of @CISAgov join us as the opening &amp; closing ke… https://t.co/IWGUKSNfcF -- cyberriskall
DefendCampaigns: Almost every computer user is aware of #phishing. If you work in the political arena on a campaign, for an elected… https://t.co/g4j597Mt0c -- DefendCampaigns
etxxq: RT @fofabot: #CVE-2023-33246: Apache RocketMQ Remote Code Execution🚩 FOFA Query: protocol="rocketmq" Link: https://t.co/cfjg2FLEGj #Thre… -- etxxq
hackwithvictor0: Wondering how to Recover, hacked, retrieve, or protect any accounts or wallets DM now #CyberSecurity #hacker… https://t.co/R1gF26amVF -- hackwithvictor0
hackwithvictor0: Whatsapp account recovery #hackers #hacker #linux #hacking #phishing #hacked #pentest #usa #ethicalhacker… https://t.co/n9ZysNYeso -- hackwithvictor0
hackwithvictor0: Snapchat is the easiest app to get hacked ,text me now if you want to get any Snapchat account hacked #hacked… https://t.co/2IGFO5k9It -- hackwithvictor0
HelloMrBond: RT @Pierre_Markuse: 🔴Interested in #OSINT and #Journalism? Then make sure to watch the next @sentinel_hub webinar "Open Source Intelligenc… -- HelloMrBond
IgnitePR_IR: Rt - .@arcitectaondata new Point in Time Ransomware Rapid Recovery Solution for the M&amp;E industry provides a quick a… https://t.co/GnxoFiR03y -- IgnitePR_IR
IntelskyB: 🇬🇧 Royal Air Force ✈️ G12T ( Grob G-120TP-A Prefect T.1 ) (ZM303, #43C8B6) as flight #WRBYS3 was just spotted over… https://t.co/GuPsEhxmq3 -- IntelskyB
IntelskyB: 🇭🇺 Hungarian Air Force ✈️ FA7X ( Dassault Falcon 7X ) (607, #477FF7) as flight #HUAF596 was just spotted over 🇭🇺 Bu… https://t.co/JraKjC9kFQ -- IntelskyB
ivvil412: RT @DailyDarkWeb: De Digger A search/discovery engine that allows you to find public files on Google Drive https://t.co/JPIjcqUX0l #OSIN… -- ivvil412
JEMPradio: Phish - Halley's Comet&gt;thru&gt;Walls (10-16-18) #JEMPRadio #CommunityRadio #Phish #NowPlaying https://t.co/Bz9yNRAZtE -- JEMPradio
JenBridgesRD: Retweeting just because I loved the headline. 🤣🤣#CyberSecurity #Phishing https://t.co/S36cYs4sVv -- JenBridgesRD
jos1727: #cybersecurity #infosec New Zero-Click Hack Targets iOS Users with Stealthy Root-Privilege #Malware - https://t.co/xgoa8Q0JTe -- jos1727
kkhsiao: The days where #macOS systems not being targeted by #hackers &amp; #badactors have long passed. Here are 6 #malware… https://t.co/uZLNPPBOgs -- kkhsiao
lnxsec: Did you know that hackers can use your own contacts to launch a successful phishing attack? Here's how Kali Linux… https://t.co/c5S2jZfJgT -- lnxsec
MalwarePatrol: Interrupt the cyber kill chain by detecting and blocking C2 traffic. Our C2 URLs feed is correlated with… https://t.co/H9JmUFx9X7 -- MalwarePatrol
martinorob: RT @unix_root: 🚨 Beware, #iOS users! A new sophisticated and long-running mobile #spywre campaign dubbed "Operation Triangulation" is targe… -- martinorob
MutareInc: Attending @CiscoLive? Don’t miss Rich Quattrocchi’s session in the Security Village (June 7 @ 3:00pm), highlightin… https://t.co/znSTw9M4Rz -- MutareInc
ofer_barsadeh: RT @NovoShield_Pro: SUCKERS DON’T DIE – THEY REPEAT #Scammers are extending the life of their #phishing sites by targeting victim IPs. By l… -- ofer_barsadeh
osde8info: RT @DailyDarkWeb: De Digger A search/discovery engine that allows you to find public files on Google Drive https://t.co/JPIjcqUX0l #OSIN… -- osde8info
pseudonyme_ovb: RT @ValeryMarchive: 😍 This is extremely exciting: performing a comparative analysis of #ransomware chat logs. Calvin So did it and already… -- pseudonyme_ovb
RedPacketSec: Cybercriminals Targeting Apache NiFi Instances for Cryptocurrency Mining - https://t.co/7P9apknWUz #OSINT #ThreatIntel #CyberSecurity -- RedPacketSec
RedPacketSec: Malicious PyPI Packages Using Compiled Python Code to Bypass Detection - https://t.co/DapWArDP4k #OSINT #ThreatIntel #CyberSecurity -- RedPacketSec
RedPacketSec: Unmasking XE Group: Experts Reveal Identity of Suspected Cybercrime Kingpin - https://t.co/bArkUENdGw #OSINT #ThreatIntel #CyberSecurity -- RedPacketSec
RedPacketSec: New Zero-Click Hack Targets iOS Users with Stealthy Root-Privilege Malware - https://t.co/JoGHWigdni #OSINT #ThreatIntel #CyberSecurity -- RedPacketSec
Securityblog: RT @unix_root: 🚨 Beware, #iOS users! A new sophisticated and long-running mobile #spywre campaign dubbed "Operation Triangulation" is targe… -- Securityblog
SimonLafleur10: RT @Key_North: Getting ready for another day of in person #OSINT training! Stay tuned for future courses coming to a city near you! https:/… -- SimonLafleur10
TechNative: RT @TechNativeTV: Having the right #PrivateCloud lets you focus on the things that make your business a data-first enterprise. @METCLOUD_c… -- TechNative
TSRSAFETY: Online Phishing Training:Learn about the steps of protecting yourself and information from digital phishing schemes… https://t.co/FOojINOO6Z -- TSRSAFETY
VaulterVS: Companies May Now Prepare for a Shorter TLS Certificate Lifespans https://t.co/CeDCkAHDto #databrach… https://t.co/wQ2sZDfTQO -- VaulterVS
WarnerChad: I just updated my post about lists &amp; profiles of APTs &amp; other threat actors 🦹‍♂️ #CTI #ThreatIntelligence https://t.co/4E5m7AnNGv -- WarnerChad
certbr: Confirme se seus backups estão sendo feitos. Acompanhar notificações do sistema e acessar regularmente os backups evita surpresas, como arquivos corrompidos, opções mal configuradas, mídias defeituosas e áreas de armazenamento cheias. #dicacertbr -- certbr
CERTEU: 💶Cybercrime: Top 5 ransomware in EU: Lockbit, Blackbasta, Play, Royal, Trigona. 🛠️Hacktivism: DDoS attacks on the Swedish Parliament (3/3) -- CERTEU
CERTEU: 🔖Policy: EU highlights lack of pirate site blocking, adds provisions to AI Act on disclosure of copyrighted materials, NATO &amp; JP plan cooperation on cyber threats, US &amp; ROK sanction DPRK for cyber activities. 🕵️Cyberespionage: Activity by -- CERTEU
CERTEU: We have compiled our Cyber Brief for the month of May 2023, with a summary of the main IT security developments, reported by open sources. It is available at https://t.co/ae4Mdu8GpL (1/3) -- CERTEU
certlv: 10 piesardzības pasākumi, kas jāievēro, lai mākslīgā intelekta (AI) rīkus izmantotu droši: https://t.co/SKtz1v9c6f https://t.co/NW7lhhwdde -- certlv
csirt_it: ‼️ Rilevato lo sfruttamento attivo in rete della vulnerabilità CVE-2023-2868 – già sanata dal vendor – nel prodotto Email Security Gateway di #Barracuda Networks Rischio: 🟠 🔗https://t.co/DW6dPuuowg ⚠ Mitigazioni e IoC disponibili https://t.co -- csirt_it
CSIRTGOB: 🐟 ¡A parchar! 📷Compartimos información de las #vulnerabilidades parchadas por #Google en #GoogleChrome 114. Detalles aquí: https://t.co/ryHlnMGufQ #CSIRTGob @subseinterior https://t.co/MoD2R9cGqf -- CSIRTGOB
Blue_LineMag: In this webinar, Ritesh Kotak will be discussing various topics related to cybersecurity and emerging tech and how… https://t.co/aF0wcOI6Z5 -- Blue_LineMag
InsuranceBee: Cybercrime can crash your business under the weight of fines, recovery costs, and reputational damage. Protect your… https://t.co/ZIEUR9mvRt -- InsuranceBee
ravindraryadav: RT @Cyberdost: Be #CyberAware | Read the #DailyDigest for today at https://t.co/9TFyuwgZTy to stay updated with the latest National and Int… -- ravindraryadav
saurabh912523: RT @Cyberdost: Let your meme reflect your creativity! Participate and select any one out of the given 5 problem statements for #Cyber Meme… -- saurabh912523
SofiaSZM: HACKS OF TODAY 01/06/2023 First #HoT of the month! ⤵ 🔴 7 #ransomware 🔴 5 #cybercrime gangs: LockBit 3.0, Akira,… https://t.co/h1BRDzUUDA -- SofiaSZM
AddressIntel: TLP:CLEAR @AddressIntel is tracking and deep monitoring 🇮🇹 verified #phishing URL https://gdarepresentacoes[.]tk/Ve… https://t.co/0hHsSo1NMD -- AddressIntel
AlSanomIV: RT @AllForOsint: Hey 🕵️‍♂️#OSINT🕵️‍♀️ 👀, WiGLE is a submission-based catalog of wireless networks. Submissions are not paired with actual p… -- AlSanomIV
Angelor_4: RT @LindaGrass0: Cyber security is an increasingly important issue for businesses and you need to be well informed. Among the various attac… -- Angelor_4
anthonymfreed: RT @HalcyonAi: #Ransomware Attack on MCNA Dental #Insurance Exposes Data of 9 Million Patients The information stolen includes dates of bi… -- anthonymfreed
assassinarm0r: RT @0xtechrock: OSINT TIP #184 🔍🔍 De Digger - A search/discovery engine that allows you to find public files on Google Drive! https://t.… -- assassinarm0r
clexingtony: RT @haneeni61853819: How to Hack Like a Legend You can Read and Download it for free from: https://t.co/PJ7hxdAbEs #Linux #Ubuntu #hacki… -- clexingtony
Cofense: #Microsoft users were surprised to find that clicking a link in their email redirected them to an unexpected phishi… https://t.co/oN9XaHTXdr -- Cofense
CyberAlliance: RT @RedPiranhaSec: ⚠️THREAT INTEL REPORT ⚠️ As businesses rely more on technology to increase productivity, they also face exposure to #cyb… -- CyberAlliance
CyberIQs_: Harvard Pilgrim Health Care Notifies Individuals of Privacy Incident #infosec #infosecurity #cybersecurity… https://t.co/lAKC5X59tN -- CyberIQs_
CyberIQs_: PowerToys get new Peek and 'Mouse without Borders' utilities #infosec #infosecurity #cybersecurity #threatintel… https://t.co/e5Mj3RkBqi -- CyberIQs_
CyberIQs_: GOP Lawmakers Blast China's Ban On Micron Products #infosec #infosecurity #cybersecurity #threatintel… https://t.co/r4Bjf2xhUO -- CyberIQs_
digitalfolklore: RT @RedPiranhaSec: ⚠️THREAT INTEL REPORT ⚠️ As businesses rely more on technology to increase productivity, they also face exposure to #cyb… -- digitalfolklore
Emerson55512938: RT @HackenProof: vuln: JWT attacks JWTs are most commonly used in authentication, session management, and access control mechanisms, these… -- Emerson55512938
framewerxit: On top of our 3 email filters and our AI driven anti-phishing, Framewerx offers auditable cyber training and simula… https://t.co/k7CceoXvdx -- framewerxit
FREDOTECHNOLOGY: Wondering how to #Recover, #hacked, retrieve, or protect any accounts or wallets DM now #CyberSecurity #hacker… https://t.co/0Ei5WdTH3j -- FREDOTECHNOLOGY
gdprAI: RT @DataDynamicsInc: #Casepoint said it has activated its incident response protocols. Attackers responded by posting additional sensitive… -- gdprAI
gdprAI: RT @AddressIntel: TLP:CLEAR @AddressIntel is tracking and deep monitoring 🇮🇹 verified #phishing URL https://gdarepresentacoes[.]tk/Verifica… -- gdprAI
gdprAI: RT @ScottWelima: For support and help, contact your favorite #Hacker fast and reliable. All social media #CyberSecurity #hacker #infosec #S… -- gdprAI
gowthamsadasiva: RT @hack_git: Bug Bounty scripts The scripts I write to help me on my bug bounty hunting. https://t.co/59Z4MBnans #infosec #pentesting #… -- gowthamsadasiva
HalcyonAi: The Resilient Enterprise: Navigating the Evolving Threat Landscape Key components of adaptive #security architectu… https://t.co/aeNPpAwdvP -- HalcyonAi
HayesConnorSol: 15 #cybercrime statistics you ought to know https://t.co/J9EQBtin6s @Independent -- HayesConnorSol
iExperts10: What to do after being attacked by Ransomware? ⚠️ #cybersecurity #cybersecurityawareness #cybercrime #cyberattack… https://t.co/k4ZXqZzxNG -- iExperts10
InfoSecSherpa: RT @AllForOsint: Hey 🕵️‍♂️#OSINT🕵️‍♀️ 👀, @Reddit has a #feature that tells you if the user account ever existed or deleted. This feature c… -- InfoSecSherpa
InfoSecSherpa: RT @AllForOsint: Hey 🕵️‍♂️#OSINT🕵️‍♀️ 👀, Airportia is a flight tracking website, which currently tracks more than 3,600 airports from all… -- InfoSecSherpa
intelDose: Russia’s mystery drone spotted near Ryazan ⚠️ #intelligence #geopolitics #osint https://t.co/lwTGH8TWmR -- intelDose
IntelskyB: 🇮🇹 Italian Air Force ✈️ A319 ( Airbus ACJ319 115X ) (MM62174, #33FFF9) as flight #IAM3185 was just spotted over 🇮🇹… https://t.co/JNEPZjuhmD -- IntelskyB
IntelskyB: 🇬🇧 Army Air Corps ✈️ H64(ZM701, #43C92F) as flight #AAC320 was just spotted over 🇬🇧 Suffolk, #United Kingdom at ☁️… https://t.co/p8LRespTIH -- IntelskyB
IntelskyB: 🇨🇭 Swiss Air Force ✈️ F900 ( Dassault Falcon 900EX EASy ) (T-785, #4B7F4C) as flight #SUI008 was just spotted over… https://t.co/hfT7fD67U8 -- IntelskyB
IntelskyB: 🇮🇳 Indian Air Force ✈️ B737 ( Boeing 737NG 7HI BBJ ) (K5014, #8002FB) as flight #VUAVC was just spotted over 🇮🇳 Raj… https://t.co/VqP5VDTnqe -- IntelskyB
invisig0th: RT @UK_Daniel_Card: #MoveIT vulnerability being exploited in the wild #ransomware (thanks @hackforfood and @GossiTheDog ) https://t.co/TRE… -- invisig0th
JoneTheHacker: If you need Help with recovering any Account, Mails, Tiktok, Snapchat, Instagram etc.. I'm available 24/7 Inbox me… https://t.co/DLJ9rdb4UD -- JoneTheHacker
JoneTheHacker: Hacking is way Easier when you contact the right. Inbox me now for all your hacking services I'm always available… https://t.co/7zAHsVssMP -- JoneTheHacker
JoneTheHacker: Is there any Hacking attempts on your device? DM now for risk free security solutions. #hacked #icloud… https://t.co/u6jLY2PwiB -- JoneTheHacker
JoneTheHacker: DM for all cyber related problems. #hacked #icloud #facebookdown #imessage #ransomware #snapchat #snapchatsupport… https://t.co/fJYDtxSYDp -- JoneTheHacker
kwesiuponall: RT @haneeni61853819: Certified Information Systems Auditor (CISA) Cert Guide (Certification Guide) You can Read and Download it for free f… -- kwesiuponall
LindaGrass0: Cyber security is an increasingly important issue for businesses and you need to be well informed. Among the variou… https://t.co/wMi9yLFM48 -- LindaGrass0
MaltegoHQ: Human Traffickers act without boundaries and data protection concerns. On June 6, #Maltego and @opencorporates will… https://t.co/zXDwpljkDW -- MaltegoHQ
Mambacmd1: RT @hackinarticles: Computer Networking Notes #infosec #cybersecurity #cybersecuritytips #pentesting #redteam #informationsecurity #CyberS… -- Mambacmd1
MCGlobalTech: #Phishing simulations are an essential tool in preventing data breaches. #securityawareness #databreaches https://t.co/TE53ESPMb9 -- MCGlobalTech
noladefense: Possible #phishing Website Detected #infosec #cybersecurity #フィッシング詐欺 URL: hxxp://smbc-card-zaq[.]tokyo/mem/index… https://t.co/m2PoeUXZed -- noladefense
PhilipLCollins: RT @AuCyble: Visiting #GITEX Africa 2023? Then don’t forget to drop by Cyble’s booth - Hall 7, 7D-20. ​ ​Block your Calendar: https://t.co/… -- PhilipLCollins
pmelson: RT @Abjuri5t: #InfoStealers, #RATs, and even #Ransomware payloads commonly query online resources to determine public #IP address of a vict… -- pmelson
sang_alertboot: #Phishing websites tied to #Freenom dropped precipitously when social networking giant #Meta filed a #lawsuit, alle… https://t.co/sustiY5GEI -- sang_alertboot
ScottWelima: For support and help, contact your favorite #Hacker fast and reliable. All social media #CyberSecurity #hacker… https://t.co/qn0mOLta54 -- ScottWelima
SCV_Cyber: 🔦 Portfolio Spotlight: HackNotice 🌟 Their #threatintelligence platform provides real-time alerts, actionable insig… https://t.co/Ra8pzCAoEA -- SCV_Cyber
SecurityBDog: RT @SecurityBDog: VIDEO: How to set up your account at The Security Bulldog. #cyber #cybersecurity #cloudsecurity #threatintelligence https… -- SecurityBDog
Splintersfury: RT @DailyOsint: Mastodon #OSINT: A Comprehensive Introduction. https://t.co/VMSRmNyc9R @DarknessGate #investigation #CTI #infosec #cyber… -- Splintersfury
Steiner254: RT @krishnsec: Testing multiple targets at a time may or may not lead to good bounties But sticking with one wide-scope target and testing… -- Steiner254
TuxCare_: #Hacker group #UNC3944 has been targeting #Microsoft Azure #admin accounts using advanced #phishing and… https://t.co/XINHf8lVZG -- TuxCare_
VaulterVS: Emby shuts down user media servers hacked in the recent attack https://t.co/5qV3EBs87S #databrach #cybersecurity… https://t.co/ByReCr8cPZ -- VaulterVS
gdprAI: RT @CyberIQs_: Harvard Pilgrim Health Care Notifies Individuals of Privacy Incident #infosec #infosecurity #cybersecurity #threatintel #thr… -- gdprAI
josequinones: RT @TheHackersNews: 😼 Sneakier &amp; faster! New improved BlackCat #ransomware variant Sphynx sharpening claws on evasion techniques &amp; encrypt… -- josequinones
AgidCert: Sintesi riepilogativa delle campagne malevole nella settimana del 27 maggio – 01 giugno 2023 ⚠️ Sempre più sfruttati allegati PDF contenenti link a risorse malevole. 💣 #IoC 1301 🦠 #Malware 5 (famiglie) 🐟 #Phishing 13 (brand) 🔗 https://t.co/v0 -- AgidCert
certbe: CVE-2023-2868 -- certbe
certbe: Warning: Critical actively exploited RCE Vulnerability in Barracuda Email Security Gateway appliances,Successful exploitation has a high impact on Confidentiality, Integrity and Availability. Consult. For more information, consult: https://t.co/zX -- certbe
FIRSTdotOrg: Welcome to the party @Microsoft ! We're thankful to have you on the team. Say hello to all our awesome sponsors at #FIRSTCON23 next week 😎 https://t.co/bNDXKonkoQ -- FIRSTdotOrg
bmurphypointman: RT @deepikanadkarni: #newpost I, who made voting modules in life, failed to understand this hacking process And I Am a Loser https://t.co/… -- bmurphypointman
ci_palakurthy: RT @warangalpolice: Don’t get fooled by fake bank calls telling you about expired KYC or blocked bank account/card. Report any #cybercrime… -- ci_palakurthy
PochampallyPS: RT @TSCSB_: Your #OnlineSafety is in your hands! #BeCyberSmart and immediately #Dial1930 in case of online financial fraud. To report any #… -- PochampallyPS
PochampallyPS: RT @Cyberdost: Read the #DailyDigest for today at https://t.co/9TFyuwgZTy to stay updated with the latest National and International #Cyber… -- PochampallyPS
PochampallyPS: RT @RachakondaCop: Beware of Fake Loan Apps! If you are a victim of cybercrime, #Dial1930 or file a complaint at https://t.co/KsVthauN9Q… -- PochampallyPS
shorayaparthy: RT @warangalpolice: #BeCyberAware | Don’t get fooled by fake bank calls telling you about expired KYC or blocked bank account/card. Report… -- shorayaparthy
ShoWardhannapet: RT @warangalpolice: Don’t get fooled by fake bank calls telling you about expired KYC or blocked bank account/card. Report any #cybercrime… -- ShoWardhannapet
shozaffergadh: RT @warangalpolice: Don’t get fooled by fake bank calls telling you about expired KYC or blocked bank account/card. Report any #cybercrime… -- shozaffergadh
ThomasKurth_ch: RT @wpninjasummit: 📢 Exciting news! We're thrilled to welcome back Sami Laiho (@samilaiho) for the Workplace Ninja Summit 2023. Get ready… -- ThomasKurth_ch
allthe_data: RT @0xtechrock: OSINT TIP #184 🔍🔍 De Digger - A search/discovery engine that allows you to find public files on Google Drive! https://t.… -- allthe_data
allthe_data: RT @AllForOsint: Hey 🕵️‍♂️#OSINT🕵️‍♀️ 👀, @Reddit has a #feature that tells you if the user account ever existed or deleted. This feature c… -- allthe_data
APWAGovAffairs: We do something similar at @APWATWEETS to guard against #phishing and people who want to "sell" us our own lists fo… https://t.co/Wdz56Qw7DQ -- APWAGovAffairs
ArmanLee14: RT @haneeni61853819: RTFM – Red Team Field Manual v2 You can Read and Download it for free from: https://t.co/tIJSowa9GU #Linux #Ubuntu… -- ArmanLee14
Arturo_Harriis: RT @AuCyble: Visiting #GITEX Africa 2023? Then don’t forget to drop by Cyble’s booth - Hall 7, 7D-20. ​ ​Block your Calendar: https://t.co/… -- Arturo_Harriis
AtomSpam: Detected #phishing clone at address: hxxp://mying-paymenthelp[.]com/ #ING #INGdirect #infosec #cybersecurity… https://t.co/Ux9JrdeCur -- AtomSpam
AuCyble: Visiting #GITEX Africa 2023? Then don’t forget to drop by Cyble’s booth - Hall 7, 7D-20. ​ ​Block your Calendar:… https://t.co/4r4hu5yvPl -- AuCyble
Bernice_Vivier: RT @AuCyble: Visiting #GITEX Africa 2023? Then don’t forget to drop by Cyble’s booth - Hall 7, 7D-20. ​ ​Block your Calendar: https://t.co/… -- Bernice_Vivier
CaribCryptoCat: RT @mq_xz_: How I bypassed Two-Factor Authentication with 3 different methods on the same target by: the.bugcrowd.testerpawan https://t.… -- CaribCryptoCat
Carmen_Stewaart: RT @AuCyble: Visiting #GITEX Africa 2023? Then don’t forget to drop by Cyble’s booth - Hall 7, 7D-20. ​ ​Block your Calendar: https://t.co/… -- Carmen_Stewaart
carol__newton: RT @AuCyble: Visiting #GITEX Africa 2023? Then don’t forget to drop by Cyble’s booth - Hall 7, 7D-20. ​ ​Block your Calendar: https://t.co/… -- carol__newton
Chris_hanss: RT @AuCyble: Visiting #GITEX Africa 2023? Then don’t forget to drop by Cyble’s booth - Hall 7, 7D-20. ​ ​Block your Calendar: https://t.co/… -- Chris_hanss
Dani_hack22: send a message now If you need any kind of hacking service #2factorbypass #2factoraut DM and ask for my service.… https://t.co/dhMANC0YCB -- Dani_hack22
DivergentCIO: Salesforce Shield Encryption Best Practices for Secure Data Management https://t.co/fJFg3TsHXG #EmergingTech… https://t.co/ajN53nEXNm -- DivergentCIO
elhaji_leon: RT @hakluke: Perform rDNS lookups en masse with hakrevdns! 🚀 1️⃣ Print IPs in a CIDR block using prips 2️⃣ Pipe into hakrevdns 3️⃣ Get tho… -- elhaji_leon
errorr0x01: RT @disclosedh1: HackerOne disclosed a bug submitted by alone_h1: https://t.co/uaDjhmjm0k - Bounty: $500 #hackerone #bugbounty https://t.co… -- errorr0x01
gdprAI: RT @GeorgeHacks_: for possible social media account resolve DM NOW...!! #australianhacker #londonhacker #londonhackers #southkoreanhacker S… -- gdprAI
GeoPioneerInc: Terrorist killed during clash in DI Khan #Pakistan #OSINT #GEOINT https://t.co/fQO6ibm33o -- GeoPioneerInc
GeorgeHacks_: Snapchat? Twitter? Instagram? Facebook? WhatsApp?? #MachineLearning #CyberSecurity #Python #RStats #TensorFlow… https://t.co/kSnGvbHQJK -- GeorgeHacks_
GeorgeHacks_: for possible social media account resolve DM NOW...!! #australianhacker #londonhacker #londonhackers… https://t.co/QxRhyOD4WK -- GeorgeHacks_
hacktoria: 📰 Last Flight 🧠 Can you identify the airplane? 🔗 https://t.co/NlorTMbqbq #️⃣ #osint #identification https://t.co/n7kCEvaWKH -- hacktoria
James_J_Fox: RT @AuCyble: Visiting #GITEX Africa 2023? Then don’t forget to drop by Cyble’s booth - Hall 7, 7D-20. ​ ​Block your Calendar: https://t.co/… -- James_J_Fox
Jennifer_wWalsh: RT @AuCyble: Visiting #GITEX Africa 2023? Then don’t forget to drop by Cyble’s booth - Hall 7, 7D-20. ​ ​Block your Calendar: https://t.co/… -- Jennifer_wWalsh
JohnCWillard: RT @AuCyble: Visiting #GITEX Africa 2023? Then don’t forget to drop by Cyble’s booth - Hall 7, 7D-20. ​ ​Block your Calendar: https://t.co/… -- JohnCWillard
Justin85563950: RT @disclosedh1: HackerOne disclosed a bug submitted by alone_h1: https://t.co/uaDjhmjm0k - Bounty: $500 #hackerone #bugbounty https://t.co… -- Justin85563950
Justin85563950: RT @0xGreed_: Message that make people crazy -Normal people : "I love you" -Bug bounty hunters : "Submission accepted" #BugBounty #bugbou… -- Justin85563950
Justin85563950: RT @krishnsec: Testing multiple targets at a time may or may not lead to good bounties But sticking with one wide-scope target and testing… -- Justin85563950
KingStreetTech1: It doesn't matter if it’s severe weather or #ransomware, if your systems are offline or you’ve lost valuable client… https://t.co/a8PJFCzCLy -- KingStreetTech1
LandishArthur_: RT @TechNative: #Ransomware affects every aspect of your organisation – here’s how to keep your business-critical applications safe https:/… -- LandishArthur_
LegioCyber: RT @hakluke: Perform rDNS lookups en masse with hakrevdns! 🚀 1️⃣ Print IPs in a CIDR block using prips 2️⃣ Pipe into hakrevdns 3️⃣ Get tho… -- LegioCyber
MiehHack: Snapchat? Twitter? Instagram? Facebook? WhatsApp?? #MachineLearning #CyberSecurity #Python #RStats #TensorFlow… https://t.co/Ka3cIRH94n -- MiehHack
noladefense: Possible #phishing Website Detected #infosec #cybersecurity #フィッシング詐欺 URL: hxxp://aono[.]shop/index[.]php IP: 143… https://t.co/GC8KSQUltP -- noladefense
NST_Online: #NSTworld "The #FSB has uncovered an intelligence action of the American special services using #Apple mobile devic… https://t.co/kwJ3C3MZ4q -- NST_Online
PhenX_: RT @onlineosint: DorkGPT Generate Google Dorks with AI https://t.co/qGsr4ETkXl #ai #osint #google #search #ChatGPT https://t.co/h1TwEZtnVb -- PhenX_
Porag_Majhi: RT @IndiaToday: Dangerous #malware found in over 100 #Android apps, uninstall these apps immediately from your phone https://t.co/OBCHJF70… -- Porag_Majhi
Prycehacksit: Default Credentials Cheat Sheet – Search for Products Default Login/Password Information https://t.co/VcbFO22Keh…… https://t.co/lUdabxGKyP -- Prycehacksit
real_Elmin: RT @Galia_jalili: @Neo19th and I earned 100$ for our submission on @Bugcrowd. Not bad for our second bounty! :)) Thank you to @mzaherii a… -- real_Elmin
RedPacketSec: Microsoft Details Critical Apple macOS Vulnerability Allowing SIP Protection Bypass - https://t.co/dz7LS0GuN4… https://t.co/hjjRdW90yk -- RedPacketSec
RedPacketSec: Cybercriminals Targeting Apache NiFi Instances for Cryptocurrency Mining - https://t.co/tNzhRkoXyL #OSINT #ThreatIntel #CyberSecurity -- RedPacketSec
RedPacketSec: Improved BlackCat Ransomware Strikes with Lightning Speed and Stealthy Tactics - https://t.co/bwilQsixqp #OSINT #ThreatIntel #CyberSecurity -- RedPacketSec
shodevaruppula: RT @warangalpolice: #BeCyberAware | Don’t get fooled by fake bank calls telling you about expired KYC or blocked bank account/card. Report… -- shodevaruppula
StadiumTourLife: Devon Allman &amp; Donavon Frankenreiter Are ‘Calling All You Riders’ To Preview... - - - BROWSE HERE:… https://t.co/sLk2kIehWX -- StadiumTourLife
TactiCoolMemes: RT @osintbear: Suncalc OSINT Tool: Harnessing the Power of Solar Position Analysis #OSINT #Medium https://t.co/A3vjpQzXts -- TactiCoolMemes
TechNative: #Ransomware affects every aspect of your organisation – here’s how to keep your business-critical applications safe https://t.co/hj9J8xvGE7 -- TechNative
W7VOA: #China embraces #OSINT to collect publicly available data from DoD, US think tanks and private firms.… https://t.co/tfs6mdDf3F -- W7VOA
whiteHacks_: Inbox now for all account recovery services,Lost or suspended, Inbox now let's get it done. #hacked #icloud… https://t.co/g5yqHXB2Nl -- whiteHacks_
whiteHacks_: Have a lost account you want to recover but don't know how? Inbox now for guide on how to recover your account imme… https://t.co/dWezbBtL07 -- whiteHacks_
whiteHacks_: Inbox Us, if you need our Hacking Services. We are Available 24/7 Inbox and Smile Again #Hacked #facebookdown… https://t.co/UBAOWIKevQ -- whiteHacks_
whiteHacks_: Hacking is way Easier when you contact the right hacker. Inbox me now for all your hacking services I'm always ava… https://t.co/aWj8xNLP5J -- whiteHacks_
CERTpy: #SegurinfoParaguay2023 | Acceso Libre🔓 ¡Imperdible presentación! 🔝 👉Registro: https://t.co/yqVQaNoJL5 📝Más info: https://t.co/Hmu9qnUvj9 👉Consulta: usuaria@usuaria.org.ar https://t.co/SY45hcveWy -- CERTpy
CyberIQs_: China Hacks US Critical Networks in Guam, Raising Cyberwar Fears #infosec #infosecurity #cybersecurity #threatintel… https://t.co/3fE8sH7E6q -- CyberIQs_
CyberIQs_: Barracuda Alerts Of Breaches In Email Gateways From Zero-Day Flaws #infosec #infosecurity #cybersecurity… https://t.co/78ocPS6F6M -- CyberIQs_
Dani_hack22: Wondering how to #Recover, #hacked, retrieve, or protect any accounts or wallets DM now #CyberSecurity #hacker… https://t.co/9E7ZFSHsTy -- Dani_hack22
lnxsec: It's easy to see that #Linux is more popular than ever, with the vast majority of cloud computing instances powered… https://t.co/5cjcTdR0Wi -- lnxsec
MiehHack: for possible social media account resolve DM NOW...!! #australianhacker #londonhacker #londonhackers… https://t.co/99brOI2iMU -- MiehHack
mundolinuxbot: RT @lnxsec: It's easy to see that #Linux is more popular than ever, with the vast majority of cloud computing instances powered by #opensou… -- mundolinuxbot
NationalCsirtCy: H θεματολόγια του συνεδρίου επικεντρώθηκε σε θέματα ανθρωπίνου δυναμικού, προκλήσεις που αντιμετωπίζουν οι γυναίκες στον κλάδο, δυσκολίες, ανέλιξη και σχέδια για το μέλλον. Έγιναν παρουσιάσεις από εκπρόσωπο του Ευρωπαϊκού Οργανισμού για τ -- NationalCsirtCy
NationalCsirtCy: Με μεγάλη επιτυχία διοργανώθηκε σήμερα από την Αρχή Ψηφιακής Ασφάλειας το 1ο Συνέδριο με θέμα «Γυναίκες στην κυβερνοασφάλεια: Προκλήσεις, Εμπειρίες και Σχέδια για το Μέλλον» στο Lemon Park, Nicosia Χαιρετισμό απεύθυναν: Ο Επίτροπος Επικ -- NationalCsirtCy
netsecu: https://t.co/iO8BpE1VTa Dark Pink APT Group Compromised 13 Organizations in 9Countries #CyberSecurity #CyberAttack… https://t.co/vYgHM3Zkbl -- netsecu
stathacks_: for possible social media account resolve DM NOW...!! #australianhacker #londonhacker #londonhackers… https://t.co/GgsdubrP5B -- stathacks_
abdullahalzakry: RT @haneeni61853819: CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide You can Read and Download it for free from:… -- abdullahalzakry
adahcravktech: Dm for easy way to recover your lost logging details #email #passcode #walletphrase #recoveryphrase #facebook… https://t.co/E6NPdKKJ8Y -- adahcravktech
adahcravktech: Inbox now for all account recovery services,Lost or suspended Inbox now let's get it done #hacked #icloud… https://t.co/UwZzco8Ogk -- adahcravktech
adahcravktech: Inbox Now for help and guidance on how to recover a lost account. #hacked #icloud #facebookdown #imessage… https://t.co/q9udn9MPUy -- adahcravktech
arinze_jojoe: RT @mq_xz_: How I bypassed Two-Factor Authentication with 3 different methods on the same target by: the.bugcrowd.testerpawan https://t.… -- arinze_jojoe
AuwalAbdul59984: RT @officer_cia: GM! This is the most unusual #OSINT guide you've ever seen. This repository is intended for bored professionals only 😅 h… -- AuwalAbdul59984
blackfogprivacy: A ransomware attack on MCNA, one of America's largest dental health insurers, has compromised the personal informat… https://t.co/BQMKfg76yl -- blackfogprivacy
bugbounty18: This Campaign Delivers Three Malware Via Pirated Software Videos On YouTube https://t.co/dBjpQ9enp3 #bugbounty #bugbounties -- bugbounty18
cwindley: RT @CyberPelion: FBI warns of fake job postings for crypto scams, labor trafficking https://t.co/x5Y9bmywdY #CyberCrime #CryptoCurrency #H… -- cwindley
CyberIQs_: Understanding XPath Injection Vulnerabilities #infosec #infosecurity #cybersecurity #threatintel… https://t.co/INmN0wUhfm -- CyberIQs_
CyberIQs_: A Visual Summary of SANS Cybersecurity Leadership Summit 2023 #infosec #infosecurity #cybersecurity #threatintel… https://t.co/4WAZuGsykr -- CyberIQs_
CyberIQs_: Moore's Law, Latent Demand, and the Slowing of Cloud Computing #infosec #infosecurity #cybersecurity #threatintel… https://t.co/huWQPbz1lF -- CyberIQs_
D_Captainkenya: RT @mq_xz_: How I bypassed Two-Factor Authentication with 3 different methods on the same target by: the.bugcrowd.testerpawan https://t.… -- D_Captainkenya
David_hack01: Offering the best recovery services. And media accounts hacking, Infiltration, and recovery. #hackedinstagram… https://t.co/8CbOca1Bev -- David_hack01
David_hack01: l'm always available 24/7 #hacked #icloud #imessage #facebookdown #ransomware #snapchat #discord #havking… https://t.co/ri7uGsRt1X -- David_hack01
educating4us: RT @sallyeaves: Why I Do #Cyber - Series Shining a Light 💡on What Careers in #CyberSecurity really look like &amp; encouraging &amp; fostering #div… -- educating4us
Foooreversally: For support and help, contact your favorite #Hacker fast and reliable. All social media #CyberSecurity #hacker… https://t.co/DWoqzfpFpq -- Foooreversally
FraudWatchUK: Do you want to support victims of #Fraud &amp; #CyberCrime? We are looking for volunteers to join us and @Humberbeat… https://t.co/M5sVKfkkS7 -- FraudWatchUK
hiddenanonym: RT @hackinarticles: Linux Folder Structure #infosec #cybersecurity #cybersecuritytips #pentesting #redteam #informationsecurity #CyberSec… -- hiddenanonym
IntelskyB: 🇨🇿 Czech Air Force ✈️ MI8 ( Mil Mi-171 Å  Hip ) (9781, #498443) was just spotted over Karlovy Vary, #Czechia at ☁️… https://t.co/MZXEgR6eUk -- IntelskyB
JackSpa80402456: RT @HackenProof: vuln: JWT attacks JWTs are most commonly used in authentication, session management, and access control mechanisms, these… -- JackSpa80402456
mayogisense: RT @sallyeaves: Why I Do #Cyber - Series Shining a Light 💡on What Careers in #CyberSecurity really look like &amp; encouraging &amp; fostering #div… -- mayogisense
MICHI_HACKS: send a message now If you need any kind of hacking service #2factorbypass #2factoraut DM and ask for my service.… https://t.co/D6HBGpI85k -- MICHI_HACKS
Mohau_Jockey: RT @haneeni61853819: CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide You can Read and Download it for free from:… -- Mohau_Jockey
MrG6OOT: RT @0xSnowmn: i published my first write up, i hope it gonna help anyone :)) sorry for any mistakes bcz it's my first time😅😂 #bugbountytips… -- MrG6OOT
newsoft53759560: RT @twelvesec: There has been a 60% spike in attempted #cyberattacks on Irish hospitals and healthcare settings. #CyberSecurity #infosec #c… -- newsoft53759560
newsoft53759560: RT @twelvesec: New York county is still dealing with #ransomware eight months after the #cyberattack. #CyberSecurity #infosec #cybercrime h… -- newsoft53759560
olympicBJ: RT @AuCyble: Cyble analyzes SharpPanda, a highly sophisticated APT group utilizing spear-phishing tactics to launch cyberattacks on G20 Nat… -- olympicBJ
Prycehacksit: For support and help, contact your favorite #Hacker fast and reliable. All social media #CyberSecurity #hacker… https://t.co/4xZUdmeMAe -- Prycehacksit
RLDI_Lamy: RT @sallyeaves: Why I Do #Cyber - Series Shining a Light 💡on What Careers in #CyberSecurity really look like &amp; encouraging &amp; fostering #div… -- RLDI_Lamy
Steam4All: RT @sallyeaves: Why I Do #Cyber - Series Shining a Light 💡on What Careers in #CyberSecurity really look like &amp; encouraging &amp; fostering #div… -- Steam4All
tenroou: RT @hack_git: APKLeaks Scanning APK file for URIs, endpoints &amp; secrets. https://t.co/7dr8ozPMIf #pentesting #infosec #bugbounty https://… -- tenroou
trisdell: RT @HackenProof: ✅[New bug bounty] Earn up to $1,000,000 with @KCCOfficialTW 💸You will be rewarded based on these tiers: Critical: $50,00… -- trisdell
0xedeon: Watch out: #BlackCat ransomware's new variant, #Sphynx, is faster &amp; stealthier, making it harder to detect &amp; stop.… https://t.co/vb3hDo6WDw -- 0xedeon
adahcravktech: Want to decrypt a social media message to prank your friend? Dm for a professional exclusive and confidential servi… https://t.co/6VvmQjr0Do -- adahcravktech
adahcravktech: #hacking #hacked #TwitterDown #snapchatdown #phishing Inbox me NOW!!! I'm active Inbox me now !! for Any Account R… https://t.co/z3aGcEnUpP -- adahcravktech
alpha7B5: #CIA hacked #iPhones of diplomats in #Russia - #FSB (RT International, 1 Jun 2023) #USIntelligence #Malware #Apple… https://t.co/U1530IbHqx -- alpha7B5
AtomSpam: Detected #phishing clone at address: hxxps://www[.]lgbttoursneworleans[.]com/img/af/api/app/signin[.]php?… https://t.co/917SAXKZ5j -- AtomSpam
certlv: ‼️ Atklāta kritiska ievainojamība (CVE-2023-2868) Barracuda Email Security Gateway (ESG) iekārtās. Ievainojamības CVSS ir 9.4 un tā tiek aktīvi izmantota uzbrukumos. Aicinām nekavējoties uzstādīt atjauninājumus! Vairāk: https://t.co/ts1FA1BIKX htt -- certlv
CyberIQs_: A Deeper Dive into Human Rights Impact Assessments – Part 1 #infosec #infosecurity #cybersecurity #threatintel… https://t.co/6Bol2BfRGL -- CyberIQs_
donnaWanna19240: Trending https://t.co/4r7lL21NZx #infosec #bugcrowd #bugbountytips #bugbountytip #CyberSecurity #100DaysOfCode… https://t.co/gSl3reQBN8 -- donnaWanna19240
etonnelier: RT @SYSTRAN: 📢 SYSTRAN is back at ISS World® Europe! We will be happy to welcome you on booth n°56 to showcase our latest innovations. Sav… -- etonnelier
EuropAfricAsia: RT @DailyOsint: If you want to investigate flights, https://t.co/xtQwfttfJw helps you track flight and aircraft data in real time. @Rada… -- EuropAfricAsia
Foooreversally: For support and help, contact your favorite #Hacker fast and reliable. All social media #CyberSecurity #hacker… https://t.co/loq1iUpPii -- Foooreversally
frowzen77: RT @cyb_detective: How to know what lists a Twitter user is on? https://t.co/mpnwZVf6Sa (replace sector035 with the username you are inte… -- frowzen77
FSISAC: Showcase your knowledge to hundreds of EMEA financial services industry experts and leaders and submit a proposal to present at the EMEA Summit by 9 June! The event's theme is Forging a Resilient Future. Learn more and submit today https://t.co/Ji -- FSISAC
IndiaToday: Dangerous #malware found in over 100 #Android apps, uninstall these apps immediately from your phone https://t.co/OBCHJF704d -- IndiaToday
IntelskyB: 🇬🇧 Private ✈️ EA50(2-GAYE, #43EE4D) as flight #2GAYE was just spotted over 🇮🇪 Dublin City, #Ireland. 🔴 Live tracki… https://t.co/2TXZceBYpm -- IntelskyB
IntelskyB: 🇬🇧 Royal Air Force ✈️ TEX2(ZM343, #43C924) was just spotted over 🇬🇧 Gwynedd, #United Kingdom at ☁️ 250 ft. 🔴 Live… https://t.co/nQsoib4Lfh -- IntelskyB
IntelskyB: 🇬🇧 Private ✈️ SR22 ( Cirrus Design SR22 GTSx G3 Turbo ) (2-SING, #43ED0E) as flight #2SING was just spotted over 🇬🇧… https://t.co/5XFVK4Tcdj -- IntelskyB
IntelskyB: 🇨🇿 Czech Army ✈️ MI8 ( Mil Mi-171 Å  Hip ) (9806, #49843A) as flight #SUNFL72 was just spotted over Karlovy Vary,… https://t.co/QX87j0sZKP -- IntelskyB
MartyNorthstarr: RT @northstarr_ltd: It can be anybody’s reaction. #cybersecurity #computerscience #informationsecurity #passwords #hacking #application #c… -- MartyNorthstarr
MartyNorthstarr: RT @northstarr_ltd: It’s kind of confusing right now. #cybersecurity #computerscience #informationsecurity #passwords #hacking #applicatio… -- MartyNorthstarr
MdAlamg6289478: AutLand Suite Microsocial v23.33 Full Activated – Social Media Marketing – Discount 100% OFF… https://t.co/0P8oYk2ncA -- MdAlamg6289478
Mitchel72543838: For support and help, contact your favorite #Hacker fast and reliable. All social media #CyberSecurity #hacker… https://t.co/2HIaGRtLMZ -- Mitchel72543838
Mitchel72543838: Now DM restore all social and personal accounts. #Gmailhack #hacked #Hacking #hackaccount #hacked #facebookdown… https://t.co/ZnXrz3YcHq -- Mitchel72543838
netsecu: https://t.co/xb6YNpQj6U The Bookmark Trap: How Discord Admins Fell Prey to SocialEngineering #SocialEngineering… https://t.co/0rvmrA9hyI -- netsecu
newsoft53759560: RT @twelvesec: #Phishing #cyberattacks that are combining the use of compromised #Microsoft 365 accounts and #rpmsg encrypted emails. #Cybe… -- newsoft53759560
noladefense: Possible #phishing Website Detected #infosec #cybersecurity #フィッシング詐欺 URL: hxxps://rewsfsd[.]acmetoy[.]com/mobile… https://t.co/tZYVW89Q48 -- noladefense
omar7rashid: RT @IndiaToday: Dangerous #malware found in over 100 #Android apps, uninstall these apps immediately from your phone https://t.co/OBCHJF70… -- omar7rashid
VaulterVS: US govt contractor ABB confirms ransomware attack, data theft https://t.co/hmhzOdqTN9 #databrach #cybersecurity… https://t.co/5ALl7B4LUV -- VaulterVS
wlaiwan: RT @onlineosint: DorkGPT Generate Google Dorks with AI https://t.co/qGsr4ETkXl #ai #osint #google #search #ChatGPT https://t.co/h1TwEZtnVb -- wlaiwan
0x0SojalSec: Use google cloud shell (Cloud Console) in your Mobile when you are out home and don’t have laptop, it’s fast for ev… https://t.co/ctBPmkWHDH -- 0x0SojalSec
0x0SojalSec: RT @ehsayaan: Found a stored and blind xss on HackerOne through live support chat , &lt;script&gt; tag didn’t worked so I used &lt;iframe src=“java… -- 0x0SojalSec
0x4d_: RT @James_inthe_box: Some fresh #netsupport via #malspam: https://t.co/f7sL4LlpO3 js -&gt; drop from https://www.snappyshop[.]it/img/index.p… -- 0x4d_
ADanielHill: RT @davidbombal: Ethical hacker jailed for doing good? YouTube video: https://t.co/uSO7myRRPZ #cyber #hack #hacking #hacker #cybercrime… -- ADanielHill
alphamountainai: 🇪🇺We're excited to be heading to @Infosecurity Europe on June 20th! Register for free and join us at the EU's premi… https://t.co/AHSl8AUlMo -- alphamountainai
beyondmachines1: Enzo Biochem Data for 2.5M Patients Breached #cybersecurity #infosec #incident #ransomware https://t.co/qISnw5XmpR -- beyondmachines1
CryptoPulseDail: 🗂 #Security_and_Privacy 📰 Crypto-Exchange Used to Launder Ransomware Transactions Dismantled The newly founded Na… https://t.co/wgviEcTsWv -- CryptoPulseDail
cwindley: RT @sallyeaves: Why I Do #Cyber - Series Shining a Light 💡on What Careers in #CyberSecurity really look like &amp; encouraging &amp; fostering #div… -- cwindley
franktech123: Is there any Hacking attempts on your device? DM now for risk free security solutions. #hacked #icloud… https://t.co/9LuixCY3zQ -- franktech123
franktech123: Have exclusive Hacking jobs? DM and Ask for my service!! #hacked #icloud #facebookdown #imessage #ransomware… https://t.co/1HT3y96U0l -- franktech123
heladitonai: RT @hack_git: APKLeaks Scanning APK file for URIs, endpoints &amp; secrets. https://t.co/7dr8ozPMIf #pentesting #infosec #bugbounty https://… -- heladitonai
Infosecurity: RT @alphamountainai: 🇪🇺We're excited to be heading to @Infosecurity Europe on June 20th! Register for free and join us at the EU's premier… -- Infosecurity
Integrity360: Why does cyber security matter to SMEs? In this blog, discover how cyber security empowers SMEs to survive and thri… https://t.co/F33f4h5Mad -- Integrity360
IntelskyB: 🇺🇸 United States Army ✈️ EC45 ( Eurocopter UH-72A Lakota ) (07-72029, #AE1F2C) was just spotted over 🇩🇪 Bavaria,… https://t.co/mNJdXTz7Cd -- IntelskyB
JackHack47: Offering the best recovery services. All social media accounts hacking, Infiltration, and recovery.… https://t.co/iUdaQapD7U -- JackHack47
koheda_ps: RT @Cyberdost: Read the #DailyDigest for today at https://t.co/9TFyuwgZTy to stay updated with the latest National and International #Cyber… -- koheda_ps
LetsChatZambia: RT @bugbounty_memes: That Hits different :- 5 years ago, when Legend @0xReconless was on🔥🔥 on hacktivity #bugbounty https://t.co/CKaB1A2uuF -- LetsChatZambia
M3gat40n: RT @boobooHQ: https://t.co/qiTQSue6hF Very good video. Lots of important questions discussed here. Shubham bhai’s style of answering ques… -- M3gat40n
manuelbissey: 👉 Organizations of all sizes are increasingly falling victim to #ransomware attacks and inadequately protecting aga… https://t.co/wLtCasVM6s -- manuelbissey
mig30m6: RT @ThreatBookLabs: New IOC of #Sidewinder #APT we first seen on 3rd May. We will tracking more intelligence of #Sidewinder. pkgov-… -- mig30m6
newfxfs: RT @sallyeaves: Why I Do #Cyber - Series Shining a Light 💡on What Careers in #CyberSecurity really look like &amp; encouraging &amp; fostering #div… -- newfxfs
PIBChandigarh: Be cautious of promotional scams where cyber criminals can offer you unbelievable deals or lottery prizes.… https://t.co/1SZfKyZ3WA -- PIBChandigarh
Pti302: RT @Cohesity: Despite enterprises investing more in #datasecurity, cyberattacks are more frequent and increasingly have dire consequences.… -- Pti302
pwld__: RT @haneeni61853819: RTFM – Red Team Field Manual v2 You can Read and Download it for free from: https://t.co/tIJSowa9GU #Linux #Ubuntu… -- pwld__
pyxisculture: Even your employees can be cyber criminals: Read more: https://t.co/OniotVDbzk[…]GeJx8YeZLBXUPR-_4vHHOjErWELujxSZ… https://t.co/EZJ60dnJdL -- pyxisculture
RAJUGOR31023080: RT @CyberpsAdpc: On proactive initiative by Cyber Crime PS, ADPC, a sum of Rs. 5000/-was recovered on first instance upon receipt of compla… -- RAJUGOR31023080
RedPacketSec: Microsoft Details Critical Apple macOS Vulnerability Allowing SIP Protection Bypass - https://t.co/WkoY4tU2h6… https://t.co/G6Rb9ZaCrC -- RedPacketSec
RedPacketSec: Urgent WordPress Update Fixes Critical Flaw in Jetpack Plugin on Million of Sites - https://t.co/A5MTH87XDC #OSINT… https://t.co/qWRLN8U0as -- RedPacketSec
RedPacketSec: N. Korean ScarCruft Hackers Exploit LNK Files to Spread RokRAT - https://t.co/VhYLZnIuZs #OSINT #ThreatIntel #CyberSecurity -- RedPacketSec
Rumpels41187332: latest: how 3yro tankers, acquired by young shell companies after Russia invaded Ukraine, faked their locations whi… https://t.co/3sSu2fBmlI -- Rumpels41187332
SahilOj: RT @payloadartist: 🪲 Interesting Oauth vulnerability (CVE-2023-28131)) affecting multiple companies https://t.co/txXiSwBJfE Great work… -- SahilOj
sbucardo4: RT @haneeni61853819: Certified Information Systems Auditor (CISA) Cert Guide (Certification Guide) You can Read and Download it for free f… -- sbucardo4
shashib12362380: RT @CyberpsAdpc: On proactive initiative by Cyber Crime PS, ADPC, a sum of Rs. 5000/-was recovered on first instance upon receipt of compla… -- shashib12362380
TheNameIsIrfan: RT @hackinarticles: Path to Get Job in Cyber Security #infosec #cybersecurity #cybersecuritytips #pentesting #redteam #informationsecurity… -- TheNameIsIrfan
threatyeti: 🇪🇺We're excited to be heading to @Infosecurity Europe on June 20th! Register for free and join us at the EU's premi… https://t.co/QD8k73OkZd -- threatyeti
vikynh: RT @haneeni61853819: Certified Information Systems Auditor (CISA) Cert Guide (Certification Guide) You can Read and Download it for free f… -- vikynh
AddressIntel: TLP:CLEAR @AddressIntel is tracking and deep monitoring 🇮🇹 verified #phishing URL https://www[.]unipolsaimacerata[.… https://t.co/vhL6juJyzc -- AddressIntel
CERTAzerbaijan: 1 iyun Uşaqların Beynəlxalq Müdafiəsi Günüdür. Gəlin uşaqları real təhlükələrdən qoruduğumuz kimi onlayn təhlükələrdən də qoruyaq. #1İyun https://t.co/iKARqFF4DT -- CERTAzerbaijan
CyberGovAU: Privacy is vital in an ever changing technological landscape. Check out our Personal Cyber Security Guides for simple steps on how to protect yourself Personal Security Guides | https://t.co/LMCX47fgBd https://t.co/Fo6FnRU1Co -- CyberGovAU
CyberIQs_: Rheinmetall attacked by BlackBasta ransomware #infosec #infosecurity #cybersecurity #threatintel… https://t.co/h34e7nfMHd -- CyberIQs_
CyberIQs_: Cloud Computing in Healthcare Is Having Its... #infosec #infosecurity #cybersecurity #threatintel… https://t.co/WACo0K31Cn -- CyberIQs_
CyberIQs_: North Korean APT Group Kimsuky Shifting Attack Tactics #infosec #infosecurity #cybersecurity #threatintel… https://t.co/OMA647chYE -- CyberIQs_
CyberIQs_: GoldenJackal APT Targeting South Asian Government Agencies #infosec #infosecurity #cybersecurity #threatintel… https://t.co/X57wwYHS8G -- CyberIQs_
franktech123: Contact us for a confirmed transaction for all hacking services Available 24/7 #RobloxDown #discord #instsgram… https://t.co/X1ijrtLQTf -- franktech123
franktech123: Inbox now tell me how to recover trust wallet phrase and recover coinbase account #Trustwallet #cryptocurrency #Bnb… https://t.co/ZPwfibnUYt -- franktech123
franktech123: Need a professional hacker for password bypass? #professionalhacker #findinghacker #hackedaccount   #psn #hacked… https://t.co/NN5DP4oQTf -- franktech123
franktech123: am available 24 hours a day, 7 days a week send me an email #hacked #facebookdown #whatsapp #hackedinstagram… https://t.co/nciEjSOeP1 -- franktech123
franktech123: Wondering how to #Recover, #hacked, retrieve, or protect any accounts or wallets DM now #CyberSecurity #hacker… https://t.co/hqdxHY5R9C -- franktech123
Hamza_Khaled25: $king , soon to be among the first places in the list of winners @AboMost0568888 @crypto_famina @cryptoo_alice… https://t.co/ssXWZO8akE -- Hamza_Khaled25
IntelskyB: 🇫🇷 French Air Force ✈️ TBM7(103, #3B77FD) as flight #CTM1293 was just spotted over 🇫🇷 Yvelines, #France. 🔴 Live tr… https://t.co/zXNJnLBcuE -- IntelskyB
IntelskyB: 🇬🇧 Royal Air Force ✈️ A332 ( Airbus Voyager KC3 ) (ZZ333, #43C6F6) was just spotted over 🇬🇧 Oxfordshire, #United Ki… https://t.co/lVMPkHbpIU -- IntelskyB
IntelskyB: 🇫🇷 French Army ✈️ TBM7(159, #3AABF9) as flight #FMY8042 was just spotted over 🇫🇷 Var, #France at ☁️ 2700 ft. 🔴 Liv… https://t.co/crbw8MDJX8 -- IntelskyB
KDeighton: Email is the delivery mechanism for 96% of all #Phishing attacks. 🎣 @Optiv has more insights for the #Cybersecurity… https://t.co/HqoDNvo2kG -- KDeighton
ky4n63l: RT @osintbear: Mastering OSINT Email Investigation with Mosint #OSINT #Medium https://t.co/w8Q8wY1LTU -- ky4n63l
MGhauri101: RT @SamSays47: #BanditStealer, a new #malware, has gained attention from #cybersecurity researchers due to its ability to target various we… -- MGhauri101
mig30m6: RT @securityaffairs: #Microsoft found a new bug that allows bypassing #SIP root restrictions in #macOS https://t.co/LchB0bnnI7 #securityaff… -- mig30m6
Mitnich_hack45: app to get hacked ,text me now if you want to get any Snapchat account hacked #hacked #snapchat #snapchatdown… https://t.co/lovZtW9OeZ -- Mitnich_hack45
Mitnich_hack45: I retrieve all Hacked Snapchat inbox now for guide on how to recover your Account #hacking #snapchatdown #5G… https://t.co/Bo9UZbUATQ -- Mitnich_hack45
pejoneresearch: Attenti a RomCom, malware che si finge anche ChatGPT https://t.co/9SYyZFGYXn #1giugno #malware #cyberattack… https://t.co/CBUEQStxqT -- pejoneresearch
PSIRTNET: The Wonders at Your Feet Under Licence. #highend #osint #sennheiser sure. - The HTTP GET method requests a represen… https://t.co/yeBnMgBvQD -- PSIRTNET
rasangarocks: Malware Link - https://t.co/IJOkNXZRxk #malware #100DaysOfCode #WomenWhoCode #CyberSecurity #infosec #technology… https://t.co/VBpBfnksTj -- rasangarocks
VaulterVS: Dental Health Insurer Hack Affects Nearly 9 Million https://t.co/LG8kITtQxk #databrach #cybersecurity #cyberattack… https://t.co/ulKMnyVJta -- VaulterVS
amit_upcop: RT @Cyberdost: Don't be a silent victim of #cybercrime! Hacking account on #SocialMedia is actually not funny, report at https://t.co/pVyjA… -- amit_upcop
amit_upcop: RT @Cyberdost: Privacy settings must be carefully chosen before sharing any content over the internet. #Dial1930 in case of online financia… -- amit_upcop
amit_upcop: RT @Cyberdost: Your vigil is your savior! Regularly check your emails and SMS to ensure no OTP is generated without your knowledge. Report… -- amit_upcop
amit_upcop: RT @Cyberdost: Numerous #WhatsApp users are receiving unwanted international calls. Users can block and report these numbers. Report any #c… -- amit_upcop
amit_upcop: RT @Cyberdost: Be #CyberAware and keep your software updated for #CyberSafety If you are a victim of online financial fraud #Dial1930 and f… -- amit_upcop
amit_upcop: RT @Cyberdost: Your #OnlineSafety is in your hands! #BeCyberSmart and immediately #Dial1930 in case of online financial fraud. To report an… -- amit_upcop
0x11e: RT @DailyDarkWeb: De Digger A search/discovery engine that allows you to find public files on Google Drive https://t.co/JPIjcqUX0l #OSIN… -- 0x11e
1000spartans: RT @PeckShieldAlert: #PeckShieldAlert #Phishing @Orbiter_Finance has reported that their discord has been compromised. orbiter[.]pm is the… -- 1000spartans
amit_upcop: RT @Cyberdost: Share this with your friend who is getting trolled and report at https://t.co/pVyjABu4od Remember the #cybercrime Helpline… -- amit_upcop
amit_upcop: RT @Cyberdost: #CyberSafetyTip: Do not trust any unbelievable discount offers while booking hospital appointment online. #Dial1930 in case… -- amit_upcop
amit_upcop: RT @Cyberdost: #BeCyberAware | Don’t get fooled by fake bank calls telling you about expired KYC or blocked bank account/card. Report any #… -- amit_upcop
Aragorn32328247: RT @AuCyble: Cyble analyzes SharpPanda, a highly sophisticated APT group utilizing spear-phishing tactics to launch cyberattacks on G20 Nat… -- Aragorn32328247
AstraKernel: 🪲 Authentication Bypass by passing empty json or different fields Expected input: { "username": "someuser", "passw… https://t.co/UaVtZoL8QY -- AstraKernel
Aztorius: RT @hackinarticles: Digital Forensics Tools https://t.co/BSgLPZ2Bh2 #infosec #cybersecurity #cybersecuritytips #pentesting #redteam #info… -- Aztorius
CFernando_Hacks: Hacking is easy, DM to Recover or Hack accounts and missing phones. #gmailhack #gmaildown #hacked #Hacking… https://t.co/mZ23utYj4p -- CFernando_Hacks
charles_hac7: Hacking is a lot easier when you connect with the right hacker. Get All Your Hacking Services Inbox Now I'm alway… https://t.co/pQEyslyIw1 -- charles_hac7
CyberIQs_: Adversarial Machine Learning and Cybersecurity: Risks, Challenges, and Legal Implications. (arXiv:2305.14553v1 [… https://t.co/VS4m7oAQAf -- CyberIQs_
CyberIQs_: Instructions as Backdoors: Backdoor Vulnerabilities of Instruction Tuning for Large Language Models. (arXiv:2305.14… https://t.co/cFdPiAq0CB -- CyberIQs_
CyberIQs_: Confidential Truth Finding with Multi-Party Computation (Extended Version). (arXiv:2305.14727v1 [… https://t.co/XLVMgukJnY -- CyberIQs_
CyberIQs_: Understanding the Country-Level Security of Free Content Websites and their Hosting Infrastructure. (arXiv:2305.145… https://t.co/12qXspBnWq -- CyberIQs_
CyberPelion: Beware of the new phishing technique “file archiver in the browser” that exploits zip domains… https://t.co/I4Awu1s8kH -- CyberPelion
FalconFeedsio: RansomHouse #ransomware group claims to have published the data from AvidXchange, Inc. (https://t.co/i7V74EwoX3) to… https://t.co/RwGPGpVB0y -- FalconFeedsio
FredTech01: Have exclusive Hacking jobs? DM and Ask for my service. #hacked #icloud #facebookdown #imessage #ransomware… https://t.co/QYabxX4s8y -- FredTech01
FredTech01: Inbox now for all account recovery services,Lost or suspended, Inbox now let's get it done. #hacked 👨🏼‍💻… https://t.co/krouH5x0YA -- FredTech01
FredTech01: Email, Instagram and Twitter? Dm for quick recovery. Available 24/7. #gmailhack #gmaildown #hacked #Hacking… https://t.co/nASQK0NZWv -- FredTech01
FredTech01: We fix all types of account security issues and bugs,send a message to start! #bugs #hackedaccount #crackcode Send… https://t.co/R7fS4rhzzP -- FredTech01
FredTech01: Want to reactivate a hacked,locked or blocked social media account? Send a message to start! #crackcode #passcode… https://t.co/MRNG0ebZcd -- FredTech01
FredTech01: Have you been trying to crack passcode email,instagram,WhatsApp Send a message to get any hacking service #hacking… https://t.co/c5I0EkKZs3 -- FredTech01
FredTech01: want to supervise your child or partners account? We offer all types of decoding and phishing service Send a messag… https://t.co/5vaw4Vg0i8 -- FredTech01
GamebotIndie: RT @RedFox_App: This malware spread via Google Ads for ChatGPT, GIMP, more👿 Our Tools can keep you SAFE!-&gt; https://t.co/Vb0UZDvF80 . #cybe… -- GamebotIndie
Geraldine_Hughs: RT @AuCyble: Just 5 days to go till Cyble is @ the FVC Security Tech Talk being held at Rixos Gulf Hotel in Doha Qatar on June 6, 2023. Reg… -- Geraldine_Hughs
imZackov: RT @haneeni61853819: Certified Information Systems Auditor (CISA) Cert Guide (Certification Guide) You can Read and Download it for free f… -- imZackov
IntelskyB: 🇬🇧 Volare Aviation ✈️ H25B(2-NAPA, #43EE09) as flight #VLZ624B was just spotted over 🇬🇧 Oxfordshire, #United Kingdo… https://t.co/wKrj9YfoRY -- IntelskyB
IntelskyB: 🇨🇭 Swiss Air Force ✈️ CL60 ( Bombardier Challenger 604 ) (T-752, #4B7F43) as flight #SUI568 was just spotted over… https://t.co/zJ7l9eshyS -- IntelskyB
IntelskyB: 🇫🇷 French Army ✈️ TBM7(100, #3AABFF) as flight #FMY8046 was just spotted over 🇫🇷 Ille-et-Vilaine, #France at ☁️ -25… https://t.co/30MFbbgqAo -- IntelskyB
IntelskyB: 🇫🇷 French Air Force ✈️ A332 ( Airbus Phenix 243MRTT ) (042, #3B75A8) as flight #FAF4010 was just spotted over 🇫🇷 Bo… https://t.co/Usl5E5TZAp -- IntelskyB
IntelskyB: 🇴🇲 Royal Air Force of Oman ✈️ C130 ( Lockheed C-130H Hercules ) (502, #70C079) as flight #MJN238 was just spotted… https://t.co/a23RWWZF4Z -- IntelskyB
isac_kolej: RT @ThreatBookLabs: New IOC of #Sidewinder #APT we first seen on 3rd May. We will tracking more intelligence of #Sidewinder. pkgov-… -- isac_kolej
JAMESWT_MHT: RT @FBussoletti: #cybercrime, purchase order from #Spain bait for #AgentTesla. The fake pdf attached to "PURCHASE ORDER 05-30-2023" email c… -- JAMESWT_MHT
JoseMariaBlanco: RT @osintbear: Suncalc OSINT Tool: Harnessing the Power of Solar Position Analysis #OSINT #Medium https://t.co/A3vjpQzXts -- JoseMariaBlanco
KAS_stoner: #OSINT video that has osint about a content farm on YouTube. https://t.co/ztYJekkLJI -- KAS_stoner
kup2StaysStoned: RT @DailyDarkWeb: Social Media OSINT Social Media OSINT collection containing - tools, techniques &amp; tradecraft. https://t.co/7t2V1kpqSj… -- kup2StaysStoned
kup2StaysStoned: RT @hack_git: Bug Bounty scripts The scripts I write to help me on my bug bounty hunting. https://t.co/59Z4MBnans #infosec #pentesting #… -- kup2StaysStoned
luvkhum: RT @haneeni61853819: Certified Information Systems Auditor (CISA) Cert Guide (Certification Guide) You can Read and Download it for free f… -- luvkhum
M3gat40n: RT @hack_git: APKLeaks Scanning APK file for URIs, endpoints &amp; secrets. https://t.co/7dr8ozPMIf #pentesting #infosec #bugbounty https://… -- M3gat40n
MICHI_HACKS: Offering the best recovery services. And media account hacking, infiltration and recovery. #hackedinstagram… https://t.co/KFKiH0FCw9 -- MICHI_HACKS
MICHI_HACKS: Has exclusive works by Hacking? DM and ask for my service. #hacked #cloud #facebookdown #imessage #ransomware… https://t.co/NcVm1kF7gm -- MICHI_HACKS
MohsinAhmaDev1: RT @hackinarticles: Linux Commands Cheat Sheet #infosec #cybersecurity #cybersecuritytips #pentesting #redteam #informationsecurity #Cyber… -- MohsinAhmaDev1
MohsinAhmaDev1: RT @hackinarticles: Path to Get Job in Cyber Security #infosec #cybersecurity #cybersecuritytips #pentesting #redteam #informationsecurity… -- MohsinAhmaDev1
MohsinAhmaDev1: RT @hackinarticles: History of Artificial Intelligence #infosec #cybersecurity #cybersecuritytips #pentesting #redteam #informationsecurit… -- MohsinAhmaDev1
MussaRo75104502: RT @RESecurity: The 31st of May marks the opening of @GITEXAfrica , the continent's largest tech &amp; ICT event. Our company, Resecurity, is… -- MussaRo75104502
netsecu: https://t.co/Z96TM87HvK Phishing remained the top identity abuser in 2022: IDSAreport #Phishing #IdentityTheft… https://t.co/JQ7BRLD73W -- netsecu
RansomwareLeaks: The company cbelaw[.]com appears as new victim of LockBit Ransomware Group. The post has been published on their D… https://t.co/m4mpzDGluE -- RansomwareLeaks
Richard_Wis: RT @AuCyble: Just 5 days to go till Cyble is @ the FVC Security Tech Talk being held at Rixos Gulf Hotel in Doha Qatar on June 6, 2023. Reg… -- Richard_Wis
SettiDavide89: RT @intel_owl: the new major release v5 is out! 🚀🚀 Official blog post: https://t.co/Pi7rQNPog3 #opensource #threatintel #osint #dfir -- SettiDavide89
StadiumTourLife: Tanya Tucker Has ‘Breakfast In Birmingham’ With Brandi Carlile On New Single - - - BROWSE HERE:… https://t.co/MY5rnjnxYn -- StadiumTourLife
StadiumTourLife: RT @WookDeals: Sound Tribe Sector 9 – The Universe Inside- Exclusive Lunar Grey vinyl 2XLP [vinyl] STS9 +++ BROWSE HERE: https://t.co/giWDz… -- StadiumTourLife
switcherryvpn: Hit the connect button and Switcherry VPN will protect you online🛡️ The powerful combination of a #VPN, CallProtect… https://t.co/ILJJT6KRvk -- switcherryvpn
TMRansomMonitor: Actor : Ransom House Victim : Mission Community Hospital Date : 2023-06-01 00:48 UTC +3 According to the… https://t.co/E4K3EcHqsU -- TMRansomMonitor
venkatakeerthi8: RT @haritha28633474: How Hackers Can Disrupt Your Business Website #hackers #Website #cybersecurity #technology #Website #programming #malw… -- venkatakeerthi8
VORDIZ55: RT @haneeni61853819: CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide You can Read and Download it for free from:… -- VORDIZ55
webg: RT @RedFox_App: This malware spread via Google Ads for ChatGPT, GIMP, more👿 Our Tools can keep you SAFE!-&gt; https://t.co/Vb0UZDvF80 . #cybe… -- webg
WookDeals: Sound Tribe Sector 9 – The Universe Inside- Exclusive Lunar Grey vinyl 2XLP [vinyl] STS9 +++ BROWSE HERE:… https://t.co/ZsyIConjaj -- WookDeals
zhnghixi1348070: Social Email Extractor Pro v6.1.0 Full Activated – Discount 100% OFF https://t.co/XyQZYIEboD #infosec #bugcrowd… https://t.co/Rtl7X8Z4V5 -- zhnghixi1348070
amit_upcop: RT @Cyberdost: #Important | Some Security Vendors have found this Instant Loan App as #Malware. Be careful while downloading #InstantLoanAp… -- amit_upcop
MICHI_HACKS: For #Hacked #Gmail recovery Dm now #Hackedgmail #CyberSecurity #hacker #infosec @reach2ratan #security #cyber #tech… https://t.co/BfgueIVHDY -- MICHI_HACKS
MICHI_HACKS: Wondering how to #Recover, #hacked, retrieve, or protect any accounts or wallets DM nOW #CyberSecurity #hacker… https://t.co/lf95NRHXlY -- MICHI_HACKS
VaulterVS: Using Ransomware to Extort Employers by Impersonating a Gang https://t.co/gxr9WNFb7t #databrach #cybersecurity… https://t.co/NS3QYQNjuT -- VaulterVS
AnantAnushyam: RT @Uppolice: Joining hands with @amazonIN's #MissionGraHAQ campaign to spread awareness &amp; fight against online shopping scams. The joint… -- AnantAnushyam
GotstuffStoppa: #cybercrime scripted &amp; spoken on cue! by the media machine + #cyberattacks + #cyberattack by fake media #Abcnews Po… https://t.co/9411d6il8t -- GotstuffStoppa
MemematicTribe: Mugshots extortion. Mugshots website. Mugshots. Not a service to the public when posting others information strictl… https://t.co/XIzvjiZPrF -- MemematicTribe
psbachto: RT @mq_xz_: Hala: Automating Parameter Discovery by: elgllad https://t.co/JlRUnuRCWd #bugbounty #WriteUps -- psbachto
Shadab_Sidd099: RT @Uppolice: Joining hands with @amazonIN's #MissionGraHAQ campaign to spread awareness &amp; fight against online shopping scams. The joint… -- Shadab_Sidd099
sharonL33940258: Information specialists are behind a plot of revenge. Who are they? What do they want? To what lengths are they wi… https://t.co/WV3bq4lOM6 -- sharonL33940258
Surajvmedia: RT @Cyberdost: Read the #DailyDigest for today at https://t.co/9TFyuwgZTy to stay updated with the latest National and International #Cyber… -- Surajvmedia
TheCyberSecHub: #News #cybercrime #cybercriminals #data #email Phishing campaigns thrive as evasive tactics outsmart conventional d… https://t.co/Cn01EP4d5D -- TheCyberSecHub
ThreatBookLabs: New IOC of #Sidewinder #APT we first seen on 3rd May. We will tracking more intelligence of #Sidewinder. pk… https://t.co/v1utpZVq4o -- ThreatBookLabs
twelvesec: There has been a 60% spike in attempted #cyberattacks on Irish hospitals and healthcare settings. #CyberSecurity… https://t.co/qNLtUifxgC -- twelvesec
7h3h4ckv157: RT @mq_xz_: How I bypassed Two-Factor Authentication with 3 different methods on the same target by: the.bugcrowd.testerpawan https://t.… -- 7h3h4ckv157
apnateetar: RT @0xtechrock: OSINT TIP #184 🔍🔍 De Digger - A search/discovery engine that allows you to find public files on Google Drive! https://t.… -- apnateetar
AtomSpam: Detected #phishing clone at address: hxxps://doiengrt[.]com/psotale #LaBanquePostale #BanquePostale #infosec… https://t.co/ZoPLNCOD2H -- AtomSpam
AtomSpam: Detected #phishing clone at address: hxxps://driemspolytechnic[.]org/Securityquestions[.]html #ANZBank #ANZ #anzau… https://t.co/vSjMkmeDGD -- AtomSpam
AviOz7: RT @hack_git: SpiderSuite An advance cross-platform and multi-feature GUI web spider/crawler for cyber security proffesionals. Spider Suit… -- AviOz7
Brandie29287491: RT @Cohesity: 🔑 The key to how your enterprise can better protect itself from devastating cyberattacks? 🛡️ Don't forget to protect your ent… -- Brandie29287491
Brandie29287491: RT @Cohesity: Minimize the risk of data exfiltration with Cohesity Threat Defense. Discover sensitive data and detect suspicious anomalies… -- Brandie29287491
bsmuir: RT @mq_xz_: How I bypassed Two-Factor Authentication with 3 different methods on the same target by: the.bugcrowd.testerpawan https://t.… -- bsmuir
ChainskiLabs: RT @James_inthe_box: Some fresh #netsupport via #malspam: https://t.co/f7sL4LlpO3 js -&gt; drop from https://www.snappyshop[.]it/img/index.p… -- ChainskiLabs
DaveKawula: RT @Veeam: Three weeks after a #ransomware attack &amp; the City of Dallas is starting to get their services &amp; software back online server by s… -- DaveKawula
IntelskyB: 🇸🇦 Saudi Armed Forces Medical Services ✈️ GLF5 ( Gulfstream Aerospace GV ) (HZ-MS5A, #7101E0) was just spotted over… https://t.co/WGiu2qc3Bz -- IntelskyB
JeshGyawa: RT @NinadMishra5: #BugBounty Tip: When you find an SSRF vulnerability, run Responder on your server and make the vulnerable system connect… -- JeshGyawa
jgreigj: RT @BrettCallow: #Oakland hit with class-action lawsuit over #ransomware attack. Via @ShomikMukherjee 1/2 https://t.co/inR3lELoH3 -- jgreigj
kamwaro_sam: RT @hack_git: APKLeaks Scanning APK file for URIs, endpoints &amp; secrets. https://t.co/7dr8ozPMIf #pentesting #infosec #bugbounty https://… -- kamwaro_sam
manuel_sharath: RT @hackinarticles: Tor vs VPN #infosec #cybersecurity #cybersecuritytips #pentesting #redteam #informationsecurity #CyberSec #networking… -- manuel_sharath
materaj: RT @James_inthe_box: Some fresh #netsupport via #malspam: https://t.co/f7sL4LlpO3 js -&gt; drop from https://www.snappyshop[.]it/img/index.p… -- materaj
MrHacke01443999: RT @alone_breecher: Here is a repo which have all the hackerone top bugs disclosed reports in one place:- https://t.co/98MCymxhoP #BugB… -- MrHacke01443999
pingineer_jp: hxxps://tabascologistics[.]com/finished.aol.login123/aol.page/ao/index.php #Phishing #scam #AOL -- pingineer_jp
pingineer_jp: #PhishingSite: hxxps://tabascologistics[.]com/finished[.]aol[.]login123/aol.page/index.php #PhishingKit: hxxps://t… https://t.co/jfpM7uJkdE -- pingineer_jp
psbachto: RT @hack_git: Bug Bounty scripts The scripts I write to help me on my bug bounty hunting. https://t.co/59Z4MBnans #infosec #pentesting #… -- psbachto
rameshchitor: #Ransomware attackers are going after backup storage to force you to pay up https://t.co/GoMkd7BHez -- rameshchitor
RedPacketSec: Terminator antivirus killer is a vulnerable Windows driver in disguise - https://t.co/Jo9ZM1ZLnF #OSINT #ThreatIntel #CyberSecurity -- RedPacketSec
RedPacketSec: Kali Linux 2023.2 released with 13 new tools, pre-built HyperV image - https://t.co/kHZZTzXXje #OSINT #ThreatIntel #CyberSecurity -- RedPacketSec
RedPacketSec: Exploit released for RCE flaw in popular ReportLab PDF library - https://t.co/IcxAPA6aKI #OSINT #ThreatIntel #CyberSecurity -- RedPacketSec
RedPacketSec: Dark Pink hackers continue to target govt and military organizations - https://t.co/B1HC0huahu #OSINT #ThreatIntel #CyberSecurity -- RedPacketSec
RedPacketSec: 7 Stages of Application Testing: How to Automate for Continuous Security - https://t.co/ZKAqquNAb4 #OSINT #ThreatIntel #CyberSecurity -- RedPacketSec
RedPacketSec: Toyota finds more misconfigured servers leaking customer info - https://t.co/tf1NUJrm2e #OSINT #ThreatIntel #CyberSecurity -- RedPacketSec
RedPacketSec: Stealthy SeroXen RAT malware increasingly used to target gamers - https://t.co/PwegHCITce #OSINT #ThreatIntel #CyberSecurity -- RedPacketSec
RedPacketSec: Hackers exploit critical Zyxel firewall flaw in ongoing attacks - https://t.co/IYEqf2qnhU #OSINT #ThreatIntel #CyberSecurity -- RedPacketSec
saiful0x01: RT @mq_xz_: How I bypassed Two-Factor Authentication with 3 different methods on the same target by: the.bugcrowd.testerpawan https://t.… -- saiful0x01
shapsio: 5/31 #phish #TIPH: slade85, ahn90, ozomatli w/M99, T +loslobos/spearhead vegas02, ZTw/M nyc2(02), T w/santana sf2(0… https://t.co/QEtljNPyRw -- shapsio
SimplySecure_SA: RT @AlertAfrica: Did you know that phishing can take many forms? How much do you really know about phishing? #protectioninthepack #backtob… -- SimplySecure_SA
stacytklein: https://t.co/yYM3fWmQ2k 🎵 The Lizards by @phish 🎼 by @treyanastasio 🖼️ by Ori Klein &amp; @stacytklein #TheLizards… https://t.co/GHYGbUScWt -- stacytklein
Steadfast_AU: A recent report stated global DDoS attacks rose by 150% in 2022 compared to 2021, and many businesses are now turni… https://t.co/BqzeIphmH6 -- Steadfast_AU
usman_iq: As many groups are using common TTPs, #ransomware is now becoming a RaaS model. #Kaspersky's next #webinar covers… https://t.co/MhL8jBtOvO -- usman_iq
CyberIQs_: 12 vulnerabilities newly associated with ransomware #infosec #infosecurity #cybersecurity #threatintel… https://t.co/34x4UPbNEW -- CyberIQs_
CyberIQs_: Undersea Telecommunications Cables and the Seabed are Geopolitical Contested Arenas #infosec #infosecurity… https://t.co/fM1wkwmqUw -- CyberIQs_
CyberIQs_: ISC Stormcast For Thursday, May 25th, 2023 https://t.co/vDxs06O9aB, (Thu, May 25th) #infosec #infosecurity… https://t.co/UrPNHKlV2s -- CyberIQs_
CyberIQs_: Five Eyes and Microsoft accuse China of attacking US infrastructure again #infosec #infosecurity #cybersecurity… https://t.co/OgwZ4eoEGM -- CyberIQs_
CyberIQs_: Realistic simulations are transforming cybersecurity training #infosec #infosecurity #cybersecurity #threatintel… https://t.co/UsS5tZHG9E -- CyberIQs_
CyberIQs_: Uber breaches, security awareness saturation, cybercrime P&amp;L, sad acquisitions and AI - ESW #319 #infosec… https://t.co/J5grCr0bHp -- CyberIQs_
CyberIQs_: Digital Trust as a Strategic Imperative &amp; Insights from RSA Conference 2023 - Deepika Chauhan, Steve Ragan - ESW #3… https://t.co/d6hGQOaX0d -- CyberIQs_
gdprAI: RT @CyberIQs_: Five Eyes and Microsoft accuse China of attacking US infrastructure again #infosec #infosecurity #cybersecurity #threatintel… -- gdprAI
netsecu: https://t.co/KFvc4APwit RomCom RAT Using Deceptive Web of Rogue Software Sites forCovert Attacks #Cybersecurity… https://t.co/OEMX6p9nTD -- netsecu
romonlyht: https://t.co/AR3nCRlUCP No.1 Received: from 175.126.77.224; 08:40:24 +0900 hxxps://malexim[.]pl/wp-admin/network… https://t.co/BZVWdJRRW6 -- romonlyht
secretcabdriver: How many days until Summer Tour? This many. #phish #phish40 @phish https://t.co/TvQUdyGcbb -- secretcabdriver
VaulterVS: The Week in Ransomware - May 26th 2023 - Cities Under Attack https://t.co/9VDRZHbwQ7 #databrach #cybersecurity… https://t.co/y1cba0klUl -- VaulterVS
ADanielHill: RT @davidbombal: Ethical hacker jailed for doing good? YouTube video: https://t.co/uSO7myRRPZ #cyber #hack #hacking #hacker #cybercrime… -- ADanielHill
AJEM_mx: RT @ptracesecurity: The 30000$ Bounty Affair. https://t.co/Yyecal9z28 #Pentesting #BugBounty #WebSecurity #Infosec https://t.co/Ziv89HpqdW -- AJEM_mx
AJEM_mx: RT @_bettercyber_: #BlackCat (#ALPHV) #ransomware group claims to have #hacked #Casepoint (@Casepoint), a US 🇺🇸company providing cloud-base… -- AJEM_mx
AthmakurPS: RT @TSCSB_: Your #OnlineSafety is in your hands! #BeCyberSmart and immediately #Dial1930 in case of online financial fraud. To report any #… -- AthmakurPS
BombalHacks: For support and help, contact your favorite #Hacker fast and reliable. All social media #CyberSecurity #hacker… https://t.co/JD11HRwP5k -- BombalHacks
cdgurugram: RT @Cyberdost: Let your meme reflect your creativity! Participate and select any one out of the given 5 problem statements for #Cyber Meme… -- cdgurugram
danilologan: RT @hackinarticles: Digital Forensics Tools https://t.co/BSgLPZ2Bh2 #infosec #cybersecurity #cybersecuritytips #pentesting #redteam #info… -- danilologan
danilologan: RT @haneeni61853819: Learn Wireshark You can Read and Download it for free from: https://t.co/d5GHvlJJOg #Linux #Ubuntu #hacking #Cybers… -- danilologan
DPishkovsk52128: RT @amandahite: Looking for reputable, #OSINT talent, to do some deeply meaningful work. Project basis to start, but potential for a longer… -- DPishkovsk52128
Dtang0809631918: RT @IoGotem: #gotEM is the ideal platform to fight the on-going “job opportunity” scams in #Cambodia. We can assist Law Enforcement in iden… -- Dtang0809631918
FoxF3x: For support and help, contact your favorite #Hacker fast and reliable. All social media #CyberSecurity #hacker… https://t.co/ViinnJk9ay -- FoxF3x
HowtofixG: WEQP Virus is #Stop #Djvu #Ransomware; File Extension: .weqp; ver. 0720 E-mail: support@fishmail.top datarestoreh… https://t.co/ALBem4sWPa -- HowtofixG
IntelskyB: 🇺🇸 United States Air Force ✈️ Q4 ( Northrop Grumman RQ-4 Global Hawk ) (11-2046, #AE5421) as flight #FORTE10 was ju… https://t.co/S12K7IizYm -- IntelskyB
JuhisHeljaste: RT @5tuxnet: Only in #cybercrime world you can see Everything-As-A-Service A must read report for professionals by @WithSecure https://… -- JuhisHeljaste
juliusjamesking: RT @haneeni61853819: Certified Information Systems Auditor (CISA) Cert Guide (Certification Guide) You can Read and Download it for free f… -- juliusjamesking
June19894168: RT @FBIPittsburgh: #Ransomware is a form of malware that blocks access to a computer system/data &amp; holds it hostage against its user by dem… -- June19894168
KerwinTorres6: RT @haneeni61853819: Certified Information Systems Auditor (CISA) Cert Guide (Certification Guide) You can Read and Download it for free f… -- KerwinTorres6
LBCI_News_EN: #Variety: An apparent #ransomware attack on one of America’s largest dental health insurers has compromised the per… https://t.co/NHCKAgooAj -- LBCI_News_EN
Lee7Toro: RT @UKikaski: Confirmed by Ukrainian Media: "As a result of a Ruzzian missile attack on the port infrastructure of Odessa, the Ukrainian Na… -- Lee7Toro
LegallyBrunett0: RT @haneeni61853819: Certified Information Systems Auditor (CISA) Cert Guide (Certification Guide) You can Read and Download it for free f… -- LegallyBrunett0
os1_solutions: Ransomware threat actors attempt to access data in many ways. Whether attempts arise from exploited vulnerabilities… https://t.co/bmlxgE9Qhp -- os1_solutions
penyel: RT @haneeni61853819: Network Security You can Read and Download it for free from: https://t.co/EsDJAZiL8L #Linux #Ubuntu #hacking #Cyber… -- penyel
puzzithinker: RT @haneeni61853819: RTFM – Red Team Field Manual v2 You can Read and Download it for free from: https://t.co/tIJSowa9GU #Linux #Ubuntu… -- puzzithinker
RedPiranhaSec: ⚠️THREAT INTEL REPORT ⚠️ As businesses rely more on technology to increase productivity, they also face exposure to… https://t.co/pVSZMB1ywy -- RedPiranhaSec
secuguy: RT @James_inthe_box: Some fresh #netsupport via #malspam: https://t.co/f7sL4LlpO3 js -&gt; drop from https://www.snappyshop[.]it/img/index.p… -- secuguy
shotgunner101: RT @James_inthe_box: Some fresh #netsupport via #malspam: https://t.co/f7sL4LlpO3 js -&gt; drop from https://www.snappyshop[.]it/img/index.p… -- shotgunner101
take_gattcha: RT @adulau: We are developing vulnerability-lookup which is a rewrite of cve-search to support and improve various requirements which came… -- take_gattcha
tudouyavip: RT @haneeni61853819: Incident Response: Evidence Preservation and Collection (Cyber Secrets) You can Read and Download it for free from:… -- tudouyavip
UttamSahdev: RT @Uppolice: Joining hands with @amazonIN's #MissionGraHAQ campaign to spread awareness &amp; fight against online shopping scams. The joint… -- UttamSahdev
vu3scd: RT @haneeni61853819: Certified Information Systems Auditor (CISA) Cert Guide (Certification Guide) You can Read and Download it for free f… -- vu3scd
walxom: RT @DailyDarkWeb: De Digger A search/discovery engine that allows you to find public files on Google Drive https://t.co/JPIjcqUX0l #OSIN… -- walxom
walxom: RT @fofabot: #CVE-2023-33246: Apache RocketMQ Remote Code Execution🚩 FOFA Query: protocol="rocketmq" Link: https://t.co/cfjg2FLEGj #Thre… -- walxom
AJEM_mx: RT @ptracesecurity: OSINT without APIs https://t.co/BsmMoztFR7 #Pentesting #OSINT #CyberSecurity #Infosec https://t.co/6LSnjHQN3T -- AJEM_mx
andrewmorrisuk: RT @CyberIQs_: Red Hat embeds security into software dev lifecycle with latest release #infosec #infosecurity #cybersecurity #threatintel #… -- andrewmorrisuk
andrewmorrisuk: RT @VaulterVS: New Buhti ransomware uses leaked payloads and public exploits https://t.co/Mp4J4jqH21 #databrach #cybersecurity #cyberattac… -- andrewmorrisuk
andrewmorrisuk: RT @CyberIQs_: Keeper Security launches password rotation to enhance PAM #infosec #infosecurity #cybersecurity #threatintel #threatintellig… -- andrewmorrisuk
AtomSpam: Detected #phishing clone at address: hxxps://banreservas[.]tubanco-do[.]com/ #BanReservas #BanreservasRD #bank… https://t.co/zawtArfRSv -- AtomSpam
ConradoJimenez6: RT @kucoincom: Are you keeping your social media account safe from scammers? 📱🔐 Learn everything about Angler Phishing attacks🎣, and how t… -- ConradoJimenez6
CyberGovAU: The #EssentialEight is a set of measures that make it harder for organisations' systems and data to be compromised. We encourage you to implement the #EssentialEight as a priority 👉 https://t.co/oNXv6oUMhX https://t.co/BUwPlnUBRH -- CyberGovAU
CyberIQs_: The essence of OT security: A proactive guide to achieving CISA’s Cybersecurity Performance Goals #infosec… https://t.co/s1m6swTYo3 -- CyberIQs_
CyberIQs_: Red Hat embeds security into software dev lifecycle with latest release #infosec #infosecurity #cybersecurity… https://t.co/pNnZOr3ouL -- CyberIQs_
CyberIQs_: Red Hat launches Kubernetes-native security offering #infosec #infosecurity #cybersecurity #threatintel… https://t.co/9AdMevH24I -- CyberIQs_
CyberIQs_: Large $1.3 billion GDPR fine on Meta was tied to a breach of trust #infosec #infosecurity #cybersecurity… https://t.co/l6Hgu26a03 -- CyberIQs_
DasukBae: RT @kucoincom: Are you keeping your social media account safe from scammers? 📱🔐 Learn everything about Angler Phishing attacks🎣, and how t… -- DasukBae
FoxF3x: Is mandatory password expiration helping or hurting your password security? #phishing #Windows #icloud #ios… https://t.co/rdxfC02G8r -- FoxF3x
hwalkerCA: Yah, we know... #malware #cyberthreats #socialengineering https://t.co/sL3XOakwDn -- hwalkerCA
Intel_Sky: 🇸🇦 Saudi Armed Forces Medical Services ✈️ GLF5 ( Gulfstream Aerospace GV ) (HZ-MS5A, #7101E0) was just spotted over… https://t.co/srHmJuwLy8 -- Intel_Sky
netsecu: https://t.co/IAflsh8A7A Mirai\xe2\x80\x99s new variant targets IoT devices. Volt Typhooninvestigation continues. Ha… https://t.co/bG1hdAQkeC -- netsecu
phootykits: This classic summer look only needs 2 more orders to launch a 3rd edition print run! Plenty of epic YEMs out ther… https://t.co/GRvB3XBmHl -- phootykits
RDSWEB: RT @DailyDarkWeb: De Digger A search/discovery engine that allows you to find public files on Google Drive https://t.co/JPIjcqUX0l #OSIN… -- RDSWEB
RedPacketSec: Polish Credentials - 1,204,870 breached accounts - https://t.co/86HzXvyL2a #databreach… https://t.co/bsEeprnIK3 -- RedPacketSec
RedPacketSec: RaidForums - 478,604 breached accounts - https://t.co/LsPjsqa2KD #databreach #HaveIBeenPwnedLatestBreaches #HIBP… https://t.co/SAsZXkXsdP -- RedPacketSec
RH_ISAC: Microsoft Details Critical Apple macOS Vulnerability Allowing SIP Protection Bypass. Read more: https://t.co/fKXuoUBoeA -- RH_ISAC
StadiumTourLife: RT @WookDeals: Anchor Drops Redux +++ BROWSE HERE: https://t.co/4E2uUyo68x #WidespreadPanic #phish https://t.co/Z2f06z12MV -- StadiumTourLife
StadiumTourLife: Janelle Monáe Plots Extensive 2023 North American Tour - - - BROWSE HERE: https://t.co/WAyvuTlQRd #PhishGoods #b4l… https://t.co/wTIxm9PdJ3 -- StadiumTourLife
tudouyavip: RT @0xtechrock: OSINT TIP #184 🔍🔍 De Digger - A search/discovery engine that allows you to find public files on Google Drive! https://t.… -- tudouyavip
VaulterVS: New Buhti ransomware uses leaked payloads and public exploits https://t.co/Mp4J4jqH21 #databrach #cybersecurity… https://t.co/6uJ4rdwq4h -- VaulterVS
WookDeals: Anchor Drops Redux +++ BROWSE HERE: https://t.co/4E2uUyo68x #WidespreadPanic #phish https://t.co/Z2f06z12MV -- WookDeals
224_divya: RT @D3pak: Cops pose as recovery agents and busted the criminals #loan #cybercrime #hack #mobile #app #onlinemoney #onlineloan #fraud #rbi… -- 224_divya
andrewmorrisuk: RT @CyberIQs_: Iranian Agrius Hackers Targeting Israeli Organizations with Moneybird Ransomware #infosec #infosecurity #cybersecurity #thre… -- andrewmorrisuk
charles_hac7: For #Hacked #Gmail recovery Dm now #Hackedgmail #CyberSecurity #hacker #infosec @reach2ratan #security #cyber #tech… https://t.co/HKpwyv3D6V -- charles_hac7
CyberIQs_: Iranian Agrius Hackers Targeting Israeli Organizations with Moneybird Ransomware #infosec #infosecurity… https://t.co/kovbNEK4Vz -- CyberIQs_
CyberIQs_: Iran-linked Tortoiseshell APT behind watering hole attacks on shipping and logistics Israeli websites #infosec… https://t.co/JQ84vsDxex -- CyberIQs_
DR3W_HACK: For support and help, contact your favorite #Hacker fast and reliable. All social media #CyberSecurity #hacker… https://t.co/SCZoz2HEI6 -- DR3W_HACK
DR3W_HACK: If you need help recovering any account, emails, Tiktok, Snapchat, Instagram etc. I'm available 24/7 Send me an i… https://t.co/GSy7TiuinN -- DR3W_HACK
Dude04493028352: RT @myosinttrainer: New from MOT: OSINT Immersion (https://t.co/lvsi93Hg3w). 12 core #OSINT course that give students the foundational skil… -- Dude04493028352
evanricafort: RT @emgeekboy: Working on #AI capabilities has allowed us to automate what seemed impossible! Now, convert basic to complex POCs to nuclei… -- evanricafort
Ferreir49669532: RT @IoGotem: #gotEM is the ideal platform to fight the on-going “job opportunity” scams in #Cambodia. We can assist Law Enforcement in iden… -- Ferreir49669532
fletch_ai: Fletch Top Threat Alert: Android Spyware SpinOk Affects Over 420M Installations on Google Play - #SpinOk… https://t.co/YpncKieIfk -- fletch_ai
FoxF3x: If you need help recovering any hacked, mail, Tiktok, Snapchat, Instagram etc. Tam online 24/78 send me an email… https://t.co/pNMHLjwyp8 -- FoxF3x
FoxF3x: Do you have a dedicated hacking job? DM and ask for my services. #hacked #icloud #facebookdown #imessage… https://t.co/NVOIPwkdn4 -- FoxF3x
FoxF3x: Do you have a dedicated hacking job? DM and ask for my services. #hacked #icloud #facebookdown #imessage… https://t.co/j8bko7UOBg -- FoxF3x
FoxF3x: Offering the best recovery services. All social media accounts hacking, Infiltration, and recovery.… https://t.co/eT1UzAd4yg -- FoxF3x
FoxF3x: software that hacks smartphones is online. LetThe's find out what the Cellebrite leak contains #redhotcyber… https://t.co/ShQ4OwJEEn -- FoxF3x
Francis10576778: RT @auditone_team: 🥁🥁🥁 ... Presenting AuditOne’s new logo! Say hello to our sleek and dynamic new look 😎. #audit #blockchain #web3 #dapp… -- Francis10576778
juanmasktr: RT @hack_git: APKLeaks Scanning APK file for URIs, endpoints &amp; secrets. https://t.co/7dr8ozPMIf #pentesting #infosec #bugbounty https://… -- juanmasktr
Kfzz12: RT @hack_git: APKLeaks Scanning APK file for URIs, endpoints &amp; secrets. https://t.co/7dr8ozPMIf #pentesting #infosec #bugbounty https://… -- Kfzz12
Mark34575200: RT @hack_git: APKLeaks Scanning APK file for URIs, endpoints &amp; secrets. https://t.co/7dr8ozPMIf #pentesting #infosec #bugbounty https://… -- Mark34575200
mathanrvp: RT @haneeni61853819: Certified Information Systems Auditor (CISA) Cert Guide (Certification Guide) You can Read and Download it for free f… -- mathanrvp
NachinSanchez89: RT @BirminghamCyber: 🔐 New stealer logs discovered. 🇺🇾 #Uruguay: 41 users affected, with government domains BPS, MTSS, ID Uruguay, Vera, C… -- NachinSanchez89
NoHacksEz: RT @7h3h4ckv157: JWT Token Security Testing Checklist Credit: https://t.co/qDyZyCtR5q #infosec #infosecurity #Hacking #Pentesting #Bug… -- NoHacksEz
NsWpyr: RT @RESecurity: The 31st of May marks the opening of @GITEXAfrica , the continent's largest tech &amp; ICT event. Our company, Resecurity, is… -- NsWpyr
PSIRTNET: Turn off this ”paradox”. #RussianEmbassy Special offer. #osint - Better return back into home soon as possible all… https://t.co/u92Wl0BWgr -- PSIRTNET
skullslayer254: RT @RESecurity: The 31st of May marks the opening of @GITEXAfrica , the continent's largest tech &amp; ICT event. Our company, Resecurity, is… -- skullslayer254
SkyfiApp: Where do we go to get our EO questions answered? #OSINT in the SkyFi Discord. Join Discord: https://t.co/pV0aAvDMJu https://t.co/9fG9kluvJQ -- SkyfiApp
somoc71955: RT @GeoPioneerInc: Seven Chinese aircraft and three naval vessels tracked around Taiwan #Taiwan #OSINT #GEOINT https://t.co/dsHwUhpasa -- somoc71955
StefanoLaTerra1: RT @5ireChain: 🐛💰 Tired of encountering bugs in software and not getting any recognition for reporting them? Join our #bugbounty progra… -- StefanoLaTerra1
Swartz_hack: For support and help, contact your favorite #Hacker fast and reliable. All social media #CyberSecurity #hacker… https://t.co/swLgFyyC3W -- Swartz_hack
taphakb: RT @hack_git: APKLeaks Scanning APK file for URIs, endpoints &amp; secrets. https://t.co/7dr8ozPMIf #pentesting #infosec #bugbounty https://… -- taphakb
TecnoSRC: The Mid-year activity is up! Your valid reports will get an #HTB VIP card♥️ and 2x reputations! This is the coolest… https://t.co/K2FtqqWadc -- TecnoSRC
the_nethackk: Contact me for all your lost account. #gmailhack #gmaildown #hacked #Hacking #hackaccount #hacked #icloud… https://t.co/Ik0gpoLyde -- the_nethackk
ThomGriffiths: A good write up on the new Blacksuit Ransomware and it's uncanny resemblance to tools created by the Royal Ransom… https://t.co/d1nrYHC8J7 -- ThomGriffiths
ug_sig: RT @Cyberknow20: Alphv really trying to threaten the leak of FBI data 👀👀 That never seems to end great for cybercriminals.. #cybersecurit… -- ug_sig
andrewmorrisuk: RT @VaulterVS: Hot Pixels attack checks CPU temp, power changes to steal data https://t.co/aSnVvnJCqN #databrach #cybersecurity #cyberatta… -- andrewmorrisuk
brouterhacks: RT @brouterhacks: Text me now for any hacking or bypass Active 24/7 Upgrade and Account Recoveries. #cybercrime #programmer #malware #cybe… -- brouterhacks
c3rb3ru5d3d53c: Hey Everyone, another #malware office hours on #Twitch live right now. Feel free to join me and ask whatever malwar… https://t.co/YyKadb9PoY -- c3rb3ru5d3d53c
CyberGovAU: With scams becoming more common and harder to identify every day, it is important to stay safe and scam free! Think you can spot a scam? Take our quiz at Spotting scams | https://t.co/LMCX47fgBd https://t.co/utEnOAFAQJ -- CyberGovAU
CyberIQs_: Obsidian ORB Ransomware Demands Gift Cards as Payment #infosec #infosecurity #cybersecurity #threatintel… https://t.co/O9KMtCw76i -- CyberIQs_
CyberIQs_: How this senior director is helping companies improve their digital workflows #infosec #infosecurity #cybersecurity… https://t.co/nuK7mNhk9o -- CyberIQs_
DrunkBinary: RT @bambenek: Our #podcast series, DEATH Labs, continues with a new episode with me talking with @DragosInc’s @mayahustle about the increas… -- DrunkBinary
EuropAfricAsia: RT @osintbear: Mastering OSINT Email Investigation with Mosint #OSINT #Medium https://t.co/w8Q8wY1LTU -- EuropAfricAsia
gdprAI: RT @DR3W_HACK: For support and help, contact your favorite #Hacker fast and reliable. All social media #CyberSecurity #hacker #infosec #Sna… -- gdprAI
Gregsiero: RT @UKikaski: Confirmed by Ukrainian Media: "As a result of a Ruzzian missile attack on the port infrastructure of Odessa, the Ukrainian Na… -- Gregsiero
IntelskyB: 🇬🇧 Royal Navy ✈️ EH10 ( EH Industries EH.101 Merlin HM.2 ) (ZH861, #43C327) as flight #TIGER68 was just spotted ove… https://t.co/SaQe3hfOsd -- IntelskyB
JosephSLahr: RT @AuCyble: Rhadamanthys stealer spreading from Telegram Phishing site. sha256:3e0614367a4306ad0692212eb5704af5982995ca52c80f3aacef74a988… -- JosephSLahr
juanmasktr: RT @DailyDarkWeb: De Digger A search/discovery engine that allows you to find public files on Google Drive https://t.co/JPIjcqUX0l #OSIN… -- juanmasktr
juanmasktr: RT @Abjuri5t: #InfoStealers, #RATs, and even #Ransomware payloads commonly query online resources to determine public #IP address of a vict… -- juanmasktr
KesaGataMe0: #Phishing #SMBC #SMCC #三井住友カード IP:157.120.59.184 (AS 2514 / NTT PC Communications, Inc. ) hxxps://smbc-cardoop.t… https://t.co/Wv0swLbeoD -- KesaGataMe0
noladefense: New post on our blog 2023-05-31 Daily Phishing URL Summary https://t.co/ER4oAFf8h4 #phishing #scam #infosec #フィッシング詐欺 -- noladefense
noladefense: Possible #phishing Website Detected #infosec #cybersecurity #フィッシング詐欺 URL: hxxps://jytkghkff[.]youdontcare[.]com/… https://t.co/yMEfcmW8sR -- noladefense
PhishStats: new #phishing at hXXp://soimaz[.]com/ | 172[.]67[.]155[.]77 | United States | CLOUDFLARENET | ASN 13335 #infosec… https://t.co/WhHxAHwXOH -- PhishStats
PSIRTNET: It looks like brics does not exist here. © #turpo #whois I’am. #unix ”Since 1998-10-16T:00:00Z” - Thanks #nikon for… https://t.co/BLNi96CXO1 -- PSIRTNET
StadiumTourLife: Devon Allman &amp; Donavon Frankenreiter Are ‘Calling All You Riders’ To Preview Collaborative ‘Rollers’ EP - - - BROWS… https://t.co/9c3xJefK16 -- StadiumTourLife
tvin270584: RT @cijournalism: #CIJSummer Investigative Journalism Conference 🗓️ 28-29 June at @GoldsmithsUoL Skills: #Data ▪️ #OSINT ▪️ Company acc… -- tvin270584
VaulterVS: Hot Pixels attack checks CPU temp, power changes to steal data https://t.co/aSnVvnJCqN #databrach #cybersecurity… https://t.co/n1BmNvzJep -- VaulterVS
YourAnonRiots: New COSMICENERGY #malware threatens power grids! This sophisticated strain disrupts critical systems by targeting… https://t.co/BAsGUOkAW3 -- YourAnonRiots
4b3rf05th: RT @ptracesecurity: The 30000$ Bounty Affair. https://t.co/Yyecal9z28 #Pentesting #BugBounty #WebSecurity #Infosec https://t.co/Ziv89HpqdW -- 4b3rf05th
4constellation: RT @saltcontrol: Latitude says March cyber attack may result in £55.14m in mitigation costs https://t.co/hozQxuTdJS #Latitude #Enterpri… -- 4constellation
4constellation: RT @NovaBACKUP: MCNA Dental data breach impacts 8.9 million people after ransomware attack https://t.co/6PZUVYm9Qp Recover your data from… -- 4constellation
andrewmorrisuk: RT @CyberIQs_: Privacy-preserving Attestation for Virtualized Network Infrastructures #infosec #infosecurity #cybersecurity #threatintel #t… -- andrewmorrisuk
andrewmorrisuk: RT @CyberIQs_: SMAUG: Pushing Lattice-based Key Encapsulation Mechanisms to the Limits #infosec #infosecurity #cybersecurity #threatintel #… -- andrewmorrisuk
Ayush_Yadav0001: Tnqu For Helping Me @Cyberdost You Take Action Against Some Online Bullying Group TNQU SO MUCH SIR 🙏❤️ ये वो बच्चे… https://t.co/iKfDdH2oVb -- Ayush_Yadav0001
binariorazor: RT @haneeni61853819: Certified Information Systems Auditor (CISA) Cert Guide (Certification Guide) You can Read and Download it for free f… -- binariorazor
CoruzantPod: Salesforce Shield Encryption Best Practices for Secure Data Management https://t.co/kS2J0A4CSy #EmergingTech… https://t.co/8530GXH0cn -- CoruzantPod
CyberIQs_: SMAUG: Pushing Lattice-based Key Encapsulation Mechanisms to the Limits #infosec #infosecurity #cybersecurity… https://t.co/Ve4fJVJhBP -- CyberIQs_
Cyberknow20: Alphv really trying to threaten the leak of FBI data 👀👀 That never seems to end great for cybercriminals..… https://t.co/ABBnvESpq1 -- Cyberknow20
CyberSocialHub: Interested in attending the next industry event, but don't know where to look? The Library has a list of all future… https://t.co/YrdEgpUQce -- CyberSocialHub
disamirko: RT @0xtechrock: OSINT TIP #184 🔍🔍 De Digger - A search/discovery engine that allows you to find public files on Google Drive! https://t.… -- disamirko
dwood87: For the first time ever, #Singapore made the Top 10 Most #Targeted Countries list in #BlackBerry's latest quarterly… https://t.co/U1HqRqIct4 -- dwood87
escipion999: RT @hackinarticles: Linux Folder Structure #infosec #cybersecurity #cybersecuritytips #pentesting #redteam #informationsecurity #CyberSec… -- escipion999
escipion999: RT @hackinarticles: Linux Attack Cheat Sheet 📷Full HD Image: https://t.co/CwPLBuWp5c #infosec #cybersecurity #cybersecuritytips #pentesti… -- escipion999
executemalware: RT @James_inthe_box: Some fresh #netsupport via #malspam: https://t.co/f7sL4LlpO3 js -&gt; drop from https://www.snappyshop[.]it/img/index.p… -- executemalware
fletch_ai: Fletch Top Threat Alert: Microsoft discovers a major security flaw in Apple's Mac computers - #CVE-2023-32369… https://t.co/pDvkEVmfJe -- fletch_ai
graceobama88: Have a lost account you want to recover but don't know how? Inbox now for guide on how to recover your account imme… https://t.co/pzJsi21drX -- graceobama88
grumpzsux: I just published an article on how I found my first "0day", CVE-2023-31045, though I am proud of the accomplishment… https://t.co/GxSP0lfk5H -- grumpzsux
hackwithvictor0: If you need Help with recovering any Account,, Tiktok, Snapchat, Instagram etc.. I'm available 24/7 Inbox me… https://t.co/Am9n10r1Cd -- hackwithvictor0
hackwithvictor0: If you need Help with recovering any Account,, Tiktok, Snapchat, Instagram etc.. I'm available 24/7 Inbox me… https://t.co/5L3meIdAJh -- hackwithvictor0
IntelskyB: 🇬🇧 Royal Air Force ✈️ A332 ( Airbus Voyager KC3 ) (ZZ334, #43C6F7) as flight #RRR9961 was just spotted over at ☁️… https://t.co/z3hbbrAb79 -- IntelskyB
IntelskyB: 🇬🇧 Royal Air Force ✈️ C17 ( Boeing C-17A Globemaster III ) (ZZ173, #43C173) as flight #RRR6697 was just spotted ove… https://t.co/LYSpFlJ7SS -- IntelskyB
IntelskyB: 🇬🇧 Royal Air Force ✈️ PUMA ( Westland/Aerospatiale Puma SA.330 HC.2 ) (XW216, #43C291) was just spotted over 🇬🇧 Sur… https://t.co/k28KZW8QVF -- IntelskyB
IntelskyB: 🇺🇸 United States Navy ✈️ H60 ( Sikorsky MH-60R Seahawk ) (166563, #AE2BE6) as flight #FFAB123 was just spotted over… https://t.co/TBcaaP8ukK -- IntelskyB
Mitchel72543838: Have exclusive Hacking jobs? DM and Ask for my service. #hacked #icloud #facebookdown #imessage #ransomware… https://t.co/S1f8Byxmvn -- Mitchel72543838
netsecu: https://t.co/jeSAynODkS Spotlight on 2023 Dan Kaminsky Fellow: Dr. GusAndrews #HumanRights #ThreatIntelligence… https://t.co/KlBs9Wpzhk -- netsecu
NFTLATAMEVENT: RT @davidbombal: Ethical hacker jailed for doing good? YouTube video: https://t.co/uSO7myRRPZ #cyber #hack #hacking #hacker #cybercrime… -- NFTLATAMEVENT
Proud_Samia: RT @DailyOsint: Want to generate a DNS wordlist for subdomain enumeration? Gotator is a #cli #tool to generate wordlists through permutati… -- Proud_Samia
Prycehacksit: Hacking attempts on your device? DM now for risk free security solutions. #hacked #icloud #facebookdown #imessage… https://t.co/cRJ4ERfzTz -- Prycehacksit
Prycehacksit: Hacking is easy for specialists. DM for all cyber related problems! #hacked #icloud #facebookdown #imessage… https://t.co/rn0PkiW7e9 -- Prycehacksit
Prycehacksit: Offering the best recovery services. All social media accounts hacking, Infiltration, and recovery #hackedinstagram… https://t.co/SX4UKvmY9N -- Prycehacksit
Prycehacksit: Have exclusive Hacking jobs? DM and Ask for my service. #hacked #icloud #facebookdown #imessage #ransomware… https://t.co/8TJ2LhbfS9 -- Prycehacksit
ptracesecurity: The 30000$ Bounty Affair. https://t.co/Yyecal9z28 #Pentesting #BugBounty #WebSecurity #Infosec https://t.co/Ziv89HpqdW -- ptracesecurity
rahul446_: URGENT: Seeking immediate assistance from @bastipolice and @CybercrimeSp regarding a cybercrime case. Acknowledgem… https://t.co/Zu3LG3jem2 -- rahul446_
RedPacketSec: US-CERT Vulnerability Summary for the Week of May 22, 2023 - https://t.co/O60OWavXNX #USCERT #OSINT #ThreatIntel -- RedPacketSec
Romanoaireal: RT @haneeni61853819: Certified Information Systems Auditor (CISA) Cert Guide (Certification Guide) You can Read and Download it for free f… -- Romanoaireal
scragglebug: Woohoo! 🍾🎉 I have finally solved every single lab over at @WebSecAcademy (thanks a ton @PortSwigger for these labs… https://t.co/5W7eEywn6Y -- scragglebug
TheDgtalEmpress: RT @hakluke: How to hack web applications in 2023: Part 2 🚀 🪲 SSRF 🐞 Business Logic Vulns 🐛 IDORs 🪳 Authentication Issues 🐜 CSRF 🕷 Directo… -- TheDgtalEmpress
thethreatshow: Corey White, Founder, CEO, and CXO of @cyvatar, shares staggering statistics about the escalating number of… https://t.co/a0ZmDmi1da -- thethreatshow
v_avenger: RT @RealVarunJain: Some fantastic vulnerable AWS infrastructure to play around with! - AWSGoat (https://t.co/BwBkvlvt5z) - CloudGoat (http… -- v_avenger
AmChemistry: News Release: The North American Flame Retardant Alliance has issued a statement in response to the passage of the Safer Products for Washington regulation. ⬇️ https://t.co/dLhVmkPwU6 -- AmChemistry
andrewmorrisuk: RT @VaulterVS: State lawmakers find bipartisan support for stronger privacy protections https://t.co/JYkIbLhFg6 #databrach #cybersecurity… -- andrewmorrisuk
CSIRT_Telconet: Vulnerabilidades en MacOS podrían eludir las restricciones de raíz SIP. La vulnerabilidad identificada como CVE-2023-32369 se clasifica como ALTA con un puntaje base CVSS de 7.1 Más información: https://t.co/uPxE0uyUP3 https://t.co/LTbOF -- CSIRT_Telconet
CSIRT_Telconet: Vulnerabilidad de RCE en la biblioteca ReportLab de Python. Se hizo un descubrimiento intrigante en la biblioteca Python de ReportLab para la generación dinámica de archivos PDF a partir de la entrada HTMLy. Más información: https://t.co -- CSIRT_Telconet
CSIRTGOB: ¡Ojo! ⛔️ #NoHagasClick Advertimos de una nueva campaña de #phishing con #malware, difundido en un email que falsamente avisa de un supuesto pago devuelto al destinatario. Más detalles e #IoC: https://t.co/gSrEMwv6A9 #CSIRTGob #ciberseguridad @s -- CSIRTGOB
CSIRTGOB: ⚠️ ¡Atención! Informamos de la activación de un sitio falso que suplanta a #Columbia 🧥 #NoHagasClick! Los detalles aquí: https://t.co/5kJiXvIxTf #ciberseguridad #CSIRTGob https://t.co/CCFjmjI2bq -- CSIRTGOB
CSIRTGOB: ⚠️ ¡Atención! Informamos de la activación de un sitio falso que suplanta a #Lippi 👞🏕️ ¡#NoHagasClick! Los detalles aquí: https://t.co/QsU9Dlhmlv #ciberseguridad #CSIRTGob @subseinterior https://t.co/dr23yVonN4 -- CSIRTGOB
CyberIQs_: Private Eyes: Zero-Leakage Iris Searchable Encryption #infosec #infosecurity #cybersecurity #threatintel… https://t.co/iRdb5l4vmF -- CyberIQs_
DR3W_HACK: RT @DR3W_HACK: For support and help, contact your favorite #Hacker fast and reliable. All social media #CyberSecurity #hacker #infosec #Sna… -- DR3W_HACK
Foooreversally: For support and help, contact your favorite #Hacker fast and reliable. All social media #CyberSecurity #hacker… https://t.co/j1cIVoEyGr -- Foooreversally
iBoostUp: iBoostUp Spyware Doctor cloud detected macOS #malware PUP.MacBooster.CHN in VillaRica, United States. #Infection w… https://t.co/Uqw0xvegDi -- iBoostUp
IntelskyB: 🇬🇧 Royal Air Force ✈️ EUFI ( Eurofighter Typhoon FGR.4 ) (ZK426, #43C7A3) as flight #RRR9959X was just spotted over… https://t.co/NZbgJJ374F -- IntelskyB
Mitchel72543838: Now DM restore all social and personal accounts. #Gmailhack #hacked #Hacking #hackaccount #hacked #facebookdown… https://t.co/nOW5cJpmwX -- Mitchel72543838
Mitchel72543838: We offer all type of hacking bypass and brute force #russianhacker #geramanhacker #indonesiahacker #turkiyehacker… https://t.co/4fqGMaIIWw -- Mitchel72543838
Mitchel72543838: Text me now for any hacking or bypass Active 24/7 #anyomous #sadapwhatsapphack #hackinstagrammurah #facebook… https://t.co/kqgUJl293s -- Mitchel72543838
Mitchel72543838: app to get hacked ,text me now if you want to get any Snapchat account hacked #hacked #snapchat #snapchatdown… https://t.co/4UpYu7Zod7 -- Mitchel72543838
Mitchel72543838: Text me now for any hacking or bypass Active 24/7 #anyomous #sadapwhatsapphack #hackinstagrammurah #facebook… https://t.co/WE3OXROn3q -- Mitchel72543838
Mitchel72543838: Inbox now for all account recovery services,Lost or suspended, Inbox now #phishing #Phish #hacked #icloud… https://t.co/lM4L8nosEX -- Mitchel72543838
noladefense: Possible #phishing Website Detected #infosec #cybersecurity #フィッシング詐欺 URL: hxxps://captcha[.]cat/ IP: 2a06:98c1:3… https://t.co/TicqzymIKO -- noladefense
RAlexJimenez: Cyberweapon manufacturers plot to stay on the right side of US Contrasting fates of Israeli spyware-makers Paragon… https://t.co/3PbEdfA4h4 -- RAlexJimenez
RH_ISAC: Check out the latest #memberspotlight on the RH-ISAC blog featuring Rafia Noor from @CP_News Read here: https://t.co/F4RWSmMRFE https://t.co/JnddKnEilh -- RH_ISAC
RogersExperthac: You have any log in complaint? #CyberSecurity #hacker #infosec #security #cyber #opensource #cybercrime #crime… https://t.co/B5gMANi18g -- RogersExperthac
TaDowzer: I see content I like, I share it. While we were in #MSG, dude was over it. #Phish https://t.co/NsaexcEtE6 -- TaDowzer
TheDgtalEmpress: RT @osintbear: Mastering OSINT Email Investigation with Mosint #OSINT #Medium https://t.co/w8Q8wY1LTU -- TheDgtalEmpress
valkrider: RT @TheHackersNews: 🚨 New COSMICENERGY #malware threatens power grids! This sophisticated strain disrupts critical systems by targeting IE… -- valkrider
valkrider: RT @TheHackersNews: Dark Pink APT group strikes again! Five new attacks reported in Belgium, Brunei, Indonesia, Thailand, and Vietnam Lear… -- valkrider
VaulterVS: State lawmakers find bipartisan support for stronger privacy protections https://t.co/JYkIbLhFg6 #databrach… https://t.co/hpAemPmkuf -- VaulterVS
ZeroFox: A lot has been said about #phishing, but one element is hardly taken at face value: the root cause. Learn how add… https://t.co/4BUGD2Rzqm -- ZeroFox
1ZRR4H: RT @James_inthe_box: Some fresh #netsupport via #malspam: https://t.co/f7sL4LlpO3 js -&gt; drop from https://www.snappyshop[.]it/img/index.p… -- 1ZRR4H
4constellation: RT @thebinarybot: APIs is definitely an interesting field of attack. How do you approach testing for APIs? Do you have any favorite tools o… -- 4constellation
ADanielHill: RT @davidbombal: Ethical hacker jailed for doing good? YouTube video: https://t.co/uSO7myRRPZ #cyber #hack #hacking #hacker #cybercrime… -- ADanielHill
Alinea_Ideas: We are hiring an Expert in #Cybercrime and online child sexual exploitation to join our team on the Technical Assis… https://t.co/aeIbpjGAuf -- Alinea_Ideas
andrewmorrisuk: RT @CyberIQs_: Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives #infosec #infosecurity #cybersecu… -- andrewmorrisuk
ban_hacks45: For #Hacked #Gmail recovery Dm now #Hackedgmail #CyberSecurity #hacker #infosec @reach2ratan #security #cyber #tech… https://t.co/OYWXCUGlQ2 -- ban_hacks45
bunderpsmgc: RT @Cyberdost: Read the #DailyDigest for today at https://t.co/9TFyuwgZTy to stay updated with the latest National and International #Cyber… -- bunderpsmgc
CaribCryptoCat: RT @DailyOsint: Mastodon #OSINT: A Comprehensive Introduction. https://t.co/VMSRmNyc9R @DarknessGate #investigation #CTI #infosec #cyber… -- CaribCryptoCat
clexingtony: RT @haneeni61853819: Incident Response: Evidence Preservation and Collection (Cyber Secrets) You can Read and Download it for free from:… -- clexingtony
Cyber_watcher: RT @Intel_by_KELA: 💥 #RaidForums leak on the new Exposed forum just happened and our dazzling #threatintelligence experts have a lot to say… -- Cyber_watcher
CyberIQs_: Key-Range Attribute-Based Signatures for Range of Inner Product and Its Applications #infosec #infosecurity… https://t.co/XXdrQflbAG -- CyberIQs_
CyberIQs_: Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives #infosec #infosecurity… https://t.co/DzyZm3rMIc -- CyberIQs_
CybersecuritySF: Can you #hack your #hotel stay? Maybe. For the definitive word, we turn to @schneierblog. Tell us Bruce, is this a… https://t.co/QhTfvaJKmJ -- CybersecuritySF
dentalounge: RT @RecordedFuture: 📅 On June 15: Gain an understanding of your organization's operational risks and learn how #ThreatIntelligence can help… -- dentalounge
dpripro: 🌹Romance Scam: Mona Faiz Montrage, a Ghanaian social media influencer is facing multiple charges including wire f… https://t.co/9uWt9gl1yC -- dpripro
du_dv01: RT @haneeni61853819: Network Security You can Read and Download it for free from: https://t.co/EsDJAZiL8L #Linux #Ubuntu #hacking #Cyber… -- du_dv01
ex16x41: A story of mine about presenting to some Chinese delegation back in the day and why cultural nuances for OSINT is i… https://t.co/B6CjZitADt -- ex16x41
footballer_tax: RT @CroweUK: How prepared are you to respond to a #cybercrime incident? 💻💥 Join our specialists to hear about emerging threats and best pra… -- footballer_tax
graceobama88: If you need help to recover any account, Tiktok, Snapchat, Instagram etc. I'm available 24/7 Send me an inbox… https://t.co/pOFtBNSEwU -- graceobama88
graceobama88: Has exclusive works by Hacking? DM and ask for my service. #hacked #cloud #facebookdown #imessage #ransomware… https://t.co/QUqPAyK7zw -- graceobama88
graceobama88: If you need help recovering any account, emails, Tiktok, Snapchat, Instagram etc. I'm available 24/7 Send me an inb… https://t.co/M4BGeEnWlp -- graceobama88
IntelskyB: United States - US Air Force (USAF) Boeing RC-135U Combat Sent Callsign: COBRA47 Reg: 64-14847 Altitude: 6,682 ft F… https://t.co/hiht9uFdqB -- IntelskyB
IntelskyB: 🇩🇪 German Army ✈️ EC45(77+07, #3FBDFC) as flight #JOKER77 was just spotted over 🇩🇪 Baden-Württemberg, #Germany at… https://t.co/47zkSrJU6g -- IntelskyB
James_inthe_box: Some fresh #netsupport via #malspam: https://t.co/f7sL4LlpO3 js -&gt; drop from https://www.snappyshop[.]it/img/inde… https://t.co/b3ilSazliM -- James_inthe_box
JCarlosLV2014: RT @James_inthe_box: Some fresh #netsupport via #malspam: https://t.co/f7sL4LlpO3 js -&gt; drop from https://www.snappyshop[.]it/img/index.p… -- JCarlosLV2014
KeroSSen_69: RT @hack_git: APKLeaks Scanning APK file for URIs, endpoints &amp; secrets. https://t.co/7dr8ozPMIf #pentesting #infosec #bugbounty https://… -- KeroSSen_69
MankusManuel: RT @hackinarticles: Computer Networking Notes #infosec #cybersecurity #cybersecuritytips #pentesting #redteam #informationsecurity #CyberS… -- MankusManuel
Michael_hack00: Offering the best recovery services. And media accounts hacking, Infiltration, and recovery. #hackedinstagram… https://t.co/O0TpGVnZ3t -- Michael_hack00
Michael_hack00: Have exclusive Hacking jobs? and Ask for my service. #hacked #icloud #facebookdown #imessage #ransomware #snapchat… https://t.co/FmnGIwRrNu -- Michael_hack00
Michael_hack00: If you need help to recover any account, Tiktok, Snapchat, Instagram etc. I'm available 24/7 Send me an inbox… https://t.co/30j7GTKFUx -- Michael_hack00
Michael_hack00: Offering the best recovery services. And media accounts hacking, Infiltration, and recovery. #hackedinstagram… https://t.co/fxHPrFhETd -- Michael_hack00
NcibAc: RT @Cyberdost: Read the #DailyDigest for today at https://t.co/9TFyuwgZTy to stay updated with the latest National and International #Cyber… -- NcibAc
qizzbo: RT @hackinarticles: Linux Folder Structure #infosec #cybersecurity #cybersecuritytips #pentesting #redteam #informationsecurity #CyberSec… -- qizzbo
qizzbo: RT @ptracesecurity: OSINT without APIs https://t.co/BsmMoztFR7 #Pentesting #OSINT #CyberSecurity #Infosec https://t.co/6LSnjHQN3T -- qizzbo
r1cksec: RT @hack_git: APKLeaks Scanning APK file for URIs, endpoints &amp; secrets. https://t.co/7dr8ozPMIf #pentesting #infosec #bugbounty https://… -- r1cksec
renewill: RT @hackinarticles: Computer Networking Notes #infosec #cybersecurity #cybersecuritytips #pentesting #redteam #informationsecurity #CyberS… -- renewill
soy_nairobi: RT @hack_git: APKLeaks Scanning APK file for URIs, endpoints &amp; secrets. https://t.co/7dr8ozPMIf #pentesting #infosec #bugbounty https://… -- soy_nairobi
unknownbrian008: RT @0xtechrock: OSINT TIP #184 🔍🔍 De Digger - A search/discovery engine that allows you to find public files on Google Drive! https://t.… -- unknownbrian008
Vitalik97367160: RT @DailyDarkWeb: De Digger A search/discovery engine that allows you to find public files on Google Drive https://t.co/JPIjcqUX0l #OSIN… -- Vitalik97367160
vtxproject: RT @vtxproject: Stay tuned for an upcoming newsletter! 📧 Subscribe to learn more about The Vertex Project &amp; Synapse at https://t.co/VVwiIJY… -- vtxproject
xdzidefo: RT @haneeni61853819: Network Security You can Read and Download it for free from: https://t.co/EsDJAZiL8L #Linux #Ubuntu #hacking #Cyber… -- xdzidefo
xorlla: RT @WHInspector: @cqcore has created a curated list of #OSINT resources for investigating social media. Find it here! 👀 https://t.co/KTQRK6… -- xorlla
AmChemistry: ACC’s @mitchtoomey at @TheEconomist Sustainability Week US spoke to role of public/private partnerships in decarbonizing hard-to-abate sectors. #Chemical industry is a lower emissions solutions enabler &amp; crucial element in clean #energy t -- AmChemistry
AmChemistry: Marking another month of incremental gains, Global and U.S. chemical production rose in April. 📈 Read the full report: https://t.co/YxH2iUaaGU https://t.co/tnGog0XNZ1 -- AmChemistry
andrewmorrisuk: RT @charles_hac7: Is mandatory password expiration helping or hurting your password security? #DataSecurity #Privacy #100DaysOfCode #CloudS… -- andrewmorrisuk
andrewmorrisuk: RT @charles_hac7: 8 strange ways emproyees can (accidently) expose data https://t.co/zbKZd69Uej #DataSecurity #Privacy #100DaysOfCode #Clo… -- andrewmorrisuk
andrewmorrisuk: RT @VaulterVS: Hackers selling access to school IT systems, cyber security firm says https://t.co/zAFBeD2D5M #databrach #cybersecurity #cy… -- andrewmorrisuk
andrewmorrisuk: RT @CyberIQs_: Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications #infosec #infosecurity #cybersecurity #… -- andrewmorrisuk
BernieceSc6858: Researchers at @kaspersky discovered a series of clipboard injection attacks targeting #cryptocurrency users. In… https://t.co/B8CKzicp7D -- BernieceSc6858
charles_hac7: 8 strange ways emproyees can (accidently) expose data https://t.co/zbKZd69Uej #DataSecurity #Privacy… https://t.co/1T5SoAsbwx -- charles_hac7
CryptosR_Ux_: RT @kucoincom: Are you keeping your social media account safe from scammers? 📱🔐 Learn everything about Angler Phishing attacks🎣, and how t… -- CryptosR_Ux_
CSIRTGOB: ⚠️¡Atención! Informamos de la activación de un sitio falso que suplanta a #CorreosChile ¡#NoHagasClick! Los detalles aquí: https://t.co/ykXRceAVUw #ciberseguridad #CSIRTGob @subseinterior https://t.co/MQoMUQIBUB -- CSIRTGOB
cybercrustacean: RT @SocEngineerInc: A recent scam targeting #USPS workers is a stark reminder of the dangers of online fraud. Hundreds of employees fell pr… -- cybercrustacean
CyberIQs_: Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications #infosec #infosecurity… https://t.co/eWCVh3BNhr -- CyberIQs_
FSISAC: Exercises help financial firms understand how employees are going to react to an incident, which is why non-business functions like HR should be involved. Paige Johnson of @jpmorgan explains this holistic approach on our FinCyber Today podcast. ht -- FSISAC
gdprAI: RT @BernieceSc6858: Researchers at @kaspersky discovered a series of clipboard injection attacks targeting #cryptocurrency users. In thei… -- gdprAI
graceobama88: Wondering how to #Recover, #hacked, retrieve, or protect any accounts or wallets DM nOW #CyberSecurity #hacker… https://t.co/wp1FiwJxtd -- graceobama88
IntelskyB: 🇮🇹 Italian Air Force ✈️ B762 ( Boeing KC-767A ) (MM62228, #33FE77) as flight #IAM1439 was just spotted over 🇰🇼 Al F… https://t.co/3aPOYdTMwJ -- IntelskyB
IntelskyB: 🇫🇷 Securite Civile ✈️ EC45 ( Eurocopter MBB-BK 117 C-2 (EC145) ) (F-ZBPM, #3B7B9E) as flight #DRAG13 was just spott… https://t.co/DUBRgryaVF -- IntelskyB
ITISAC: We appreciate Congressman @RepPfluger and his staff for the work they are doing for the industry and the support they have put behind the Food and Ag-ISAC! 🙌 Check out more about Food and Ag-ISAC here → https://t.co/P83zQScnNd #foodandag #foodan -- ITISAC
K_Sibanda616: RT @RedFox_App: Beware! Phishing attackers becoming more &amp; more sophisticated🐟⚠️ More about Phishing -&gt; https://t.co/ggyeLxPmr1 . #cyberse… -- K_Sibanda616
maxfreenews: RT @DailyOsint: Mastodon #OSINT: A Comprehensive Introduction. https://t.co/VMSRmNyc9R @DarknessGate #investigation #CTI #infosec #cyber… -- maxfreenews
Michael_hack00: Wondering how to #Recover, #hacked, retrieve, or protect any accounts or wallets DM now #CyberSecurity #hacker… https://t.co/bULd34Tx7K -- Michael_hack00
NEI: .@McKinsey with the nuclear tea ☕: “Not only does it have an important role to play in the energy transition, but its potential is achievable” https://t.co/MmIZwy6p0T -- NEI
PhishStats: https://t.co/MAuIXRvYiq detected 250 new websites hosting #phishing | new today: 1762 | #infosec #cybersecurity… https://t.co/BFBhWDWlAf -- PhishStats
SpaceISAC: Visit https://t.co/tRk25RVSiV for more information! https://t.co/lepSduFNWL -- SpaceISAC
SpaceISAC: 🚀 Exciting news! We've secured a sponsorship for #ValueOfSpaceSummit! Don't miss your chance to join us at #VOSS2023. Explore our exclusive sponsorship options before they're gone. Visit https://t.co/s8AjUd7te5 for details. #SpaceISAC #Valueof -- SpaceISAC
StadiumTourLife: Fruition Expands 2023 Summer Tour With Mountain States Swing - - - BROWSE HERE: https://t.co/rPVMcQ4dxr… https://t.co/60T3VjSoos -- StadiumTourLife
thefoss_m: RT @FilipiPires: GodPotato - Local Privilege Escalation Tool From A Windows Service Accounts To NT AUTHORITY\SYSTEM https://t.co/9HzzQJtVJN… -- thefoss_m
VaulterVS: Hackers selling access to school IT systems, cyber security firm says https://t.co/zAFBeD2D5M #databrach… https://t.co/eLBLHxhVqp -- VaulterVS
gdprAI: RT @billy_hack03: For support and help, contact your favorite #Hacker fast and reliable. All social media #CyberSecurity #hacker #infosec #… -- gdprAI
ManishTecHindi1: RT @Cyberdost: Let your meme reflect your creativity! Participate and select any one out of the given 5 problem statements for #Cyber Meme… -- ManishTecHindi1
ManishTecHindi1: RT @Cyberdost: Read the #DailyDigest for today at https://t.co/9TFyuwgZTy to stay updated with the latest National and International #Cyber… -- ManishTecHindi1
Mitchel72543838: For #Hacked #Gmail recovery Dm now #Hackedgmail #CyberSecurity #hacker #infosec @reach2ratan #security #cyber #tech… https://t.co/5CKIsUvEwe -- Mitchel72543838
penny_hampson: RT @gjscobie: Nation State Adversaries. Advanced Persistent Threats. Jacob Anderson is on the watch list. Will you be next? The Kill Chain… -- penny_hampson
secure_blink: 🚨 Massive #databreach alert! 🚨 #RaidForums database leaked compromising details of over 500,000 users. Find out the… https://t.co/OhPcquTOsb -- secure_blink
Shannon5jxjw: RT @RiskChannel: A recent study from Windows Report, which analyzed data from the FBI's 2022 Internet Crime Report, found that Nevada is th… -- Shannon5jxjw
Shubham41076241: #cybercrime @MahaCyber1 @cybercrimesind When We Report #cybercrime In #maharashtra online it takes time and suspec… https://t.co/Z4YfjzLhPS -- Shubham41076241
_pr3nk_: RT @fofabot: #CVE-2023-33246: Apache RocketMQ Remote Code Execution🚩 FOFA Query: protocol="rocketmq" Link: https://t.co/cfjg2FLEGj #Thre… -- _pr3nk_
0xtechrock: OSINT TIP #184 🔍🔍 De Digger - A search/discovery engine that allows you to find public files on Google Drive!… https://t.co/QgOkyLXY8o -- 0xtechrock
0xtechrock: RT @DailyDarkWeb: De Digger A search/discovery engine that allows you to find public files on Google Drive https://t.co/JPIjcqUX0l #OSIN… -- 0xtechrock
4L13NH4CK3R: Want to know how to be a pro at Recon work? Here are a few neat tools to get you started! https://t.co/DDswoKOLhT… https://t.co/kZafwd8SAS -- 4L13NH4CK3R
acfcsonline: In this complimentary session presented by @ProveIdentity, #fraud and #cybercrime experts share three critical mist… https://t.co/iyWP4XurXw -- acfcsonline
aimanalgahm5: RT @3XS0: #FREE 2ಠ22 ♥ LetsExtract Email Studio Ultimate Business v6.0.0.42011 Full Activated - Discount 100% OFF https://t.co/Joixus9aMb… -- aimanalgahm5
arnavroykul1149: RT @hackinarticles: Computer Networking Notes #infosec #cybersecurity #cybersecuritytips #pentesting #redteam #informationsecurity #CyberS… -- arnavroykul1149
ATexanIsAFriend: RT @ATexanIsAFriend: @PKurzin @Dpol_un I find some in the #OSINT community are the most hysterically naive. As if an oligarch's son working… -- ATexanIsAFriend
Avertium: This month, #Cubaransomware garnered attention when they took responsibility for a #cyberattack on the Philadelphia… https://t.co/SdC8aABVZS -- Avertium
bambenek: Our #podcast series, DEATH Labs, continues with a new episode with me talking with @DragosInc’s @mayahustle about t… https://t.co/M96pqLvf37 -- bambenek
bambenek: Our #podcast series, DEATH Labs, continues with a new episode with me talking with @DragosInc’s @mayahustle about t… https://t.co/WpF7NjM15y -- bambenek
CnSight_io: CnSight and @KnowBe4 Collaborate To Enhance Cyber Performance Management, Risk and Compliance Capabilities. Read m… https://t.co/RdKBXQm0C1 -- CnSight_io
Cyber_O51NT: RT @Intel_by_KELA: 💥 #RaidForums leak on the new Exposed forum just happened and our dazzling #threatintelligence experts have a lot to say… -- Cyber_O51NT
CyberIQs_: ABB Hack – Attackers Dropped Ransomware on IT Systems #infosec #infosecurity #cybersecurity #threatintel… https://t.co/wyxH1G1j9q -- CyberIQs_
CyberIQs_: Meta loses court case over EU antitrust documents request #infosec #infosecurity #cybersecurity #threatintel… https://t.co/UX8V02M99U -- CyberIQs_
CyberIQs_: Apria Healthcare Hacked – Over 2M Users Data Exposed #infosec #infosecurity #cybersecurity #threatintel… https://t.co/rTxJuLkzzB -- CyberIQs_
CyberNews: A #ransomware attack on #MCNA exposes millions of their past and current clients⤵️ #cybersecurity #infosec… https://t.co/gaR5Zi8EjS -- CyberNews
dvdcarmiel: RT @Intel_by_KELA: 💥 #RaidForums leak on the new Exposed forum just happened and our dazzling #threatintelligence experts have a lot to say… -- dvdcarmiel
Empirecode217: l'm always available 24/7 #hacked #icloud #imessage #facebookdown #ransomware #snapchat #discord #havking… https://t.co/hrKnv5ltOx -- Empirecode217
Foooreversally: Have exclusive Hacking jobs? and Ask for my service. #hacked #icloud #facebookdown #imessage #ransomware #snapchat… https://t.co/87WOYQbPRg -- Foooreversally
go09141: RT @HackenProof: ✅[New bug bounty] Earn up to $1,000,000 with @KCCOfficialTW 💸You will be rewarded based on these tiers: Critical: $50,00… -- go09141
GothamTG: What Is a Computer Worm? via @CheckPointSW #Malware #Wannacry https://t.co/Sd9lkq5wkC -- GothamTG
greyhathackr: RT @DailyDarkWeb: De Digger A search/discovery engine that allows you to find public files on Google Drive https://t.co/JPIjcqUX0l #OSIN… -- greyhathackr
grumpzsux: Preparing for the eWPTX exam? Take a look at my article I just posted on the free resources I used to pass on my fi… https://t.co/8z1QmMEIoW -- grumpzsux
GWallington: RT @SteffenFriis: And..... https://t.co/GE1KNOT1Bs (@Casepoint) has also been hacked and breached by #ALPHV, and they have showcased sample… -- GWallington
IEthics: "On Tuesday, Barracuda notified customers that CVE-2023-2868 has been under active exploitation since October in at… https://t.co/pshToVH192 -- IEthics
IntelskyB: 🇺🇸 United States Air Force ✈️ C30J ( Lockheed MC-130J Hercules ) (12-5759, #AE54CC) was just spotted over 🇬🇧 Suffol… https://t.co/PwjH3SGuL0 -- IntelskyB
IntelskyB: United States - US Air Force (USAF) Lockheed C-5M Super Galaxy Callsign: No call sign Reg: 86-0017 Altitude: 1,300… https://t.co/WSccr7vZvY -- IntelskyB
IntelskyB: 🇮🇱 Israeli Air Force ✈️ B703(272, #738A01) as flight #IAF088 was just spotted over 🇵🇸 West Bank, #Palestine at ☁️… https://t.co/tyMfn3M99m -- IntelskyB
johnmlhll: RT @lnxsec: We demonstrate how you can conduct your own email phishing training using open-source tools on Kali Linux to improve your organ… -- johnmlhll
KbpopX: RT @0xtechrock: OSINT TIP #184 🔍🔍 De Digger - A search/discovery engine that allows you to find public files on Google Drive! https://t.… -- KbpopX
KessCommCyber: .@CloudRangeCyber CEO @debbiegordon joins @JeffReinkeMFG for an episode of the Security Breach podcast to discuss… https://t.co/MBcQWbUxtP -- KessCommCyber
lcheylus: RT @adulau: We are developing vulnerability-lookup which is a rewrite of cve-search to support and improve various requirements which came… -- lcheylus
lupodibrughiera: RT @_kuball_: That's how actual #OSInt works. First @WarMonitors tweet, in the pic. The cited correction tweet below, after a kind of #OSIn… -- lupodibrughiera
M3gat40n: RT @gonzxph: Permanently DOS any Users Account I can invite existing users to my organization, there's only 3 roles 1 - Admin 2 - Edit On… -- M3gat40n
MercartoP: RT @hack_git: APKLeaks Scanning APK file for URIs, endpoints &amp; secrets. https://t.co/7dr8ozPMIf #pentesting #infosec #bugbounty https://… -- MercartoP
MicroAge_Regina: We've been talking about phishing, but what about #smishing and #vishing? We dive back into the blog archive for so… https://t.co/FPThIhttbS -- MicroAge_Regina
moon_osint: Found the tool, that helps you, with Telegram OSINT. Probably, some information comes from the bot users themselves… https://t.co/aEaWdY8nG7 -- moon_osint
PavanRe58365604: RT @mcipekci: Few days ago while testing a target, I come up with interesting endpoint during recon. It was showing empty page but I was w… -- PavanRe58365604
PavanRe58365604: RT @mcipekci: One of the fundamentals you need to exploiting issues you find is trying to understand what you ha