#BHUSA: The Cyber Safety Review Board Outlines Log4j Lessons
Cisco Confirms Network Breach Via Hacked Employee Google Account
Network access broker listings in Q2 '22 stable, but sales down
#BHUSA: Chris Krebs Explains How Cybersecurity Can Improve
#BHUSA: New Open Source Group Set to Streamline Threat Detection
Ransomware Data Theft Epidemic Fuelling BEC Attacks
#BHUSA: Russia's Wiper Attacks Against Ukraine Detailed
Suspected $3m Romance Scammer Extradited to Japan
Why it’s impossible to have autonomous security without humans
GitHub's new privacy policy sparks backlash over tracking cookies
AES 256 Encryption/Decryption with OpenSSL using Bash Script | by Nikhil Vinod | Aug, 2022 | Better Programming
Siber Güvenlikte Yapay Zeka-AI in Cyber Security | by Gözde Sarmısak | Aug, 2022 | Medium
Hunting webshell with NeoPI | InfoSec Write-ups
RoadMap to Become a Ethical Hacker -Beginner Guide | by Nerd Dev | Aug, 2022 | Medium
US sanction virtual currency mixer tornado cash for doing this | by Ronnie Rodrigues | Aug, 2022 | Medium
LetsDefend SOC165 — Possible SQL Injection Payload Detected Walkthrough | by brian j | Aug, 2022 | Medium
Failure and Success — IT Certifications! | by Casey F. Bond | Aug, 2022 | Medium
Cisco fixed a flaw in ASA, FTD devices that can give access to RSA private key
Ex Twitter employee found guilty of spying for Saudi Arabia
Ransomware tracker: the latest figures [August 2022]
Podcast: Inside the Hackers’ Toolkit
7-Eleven Denmark confirms ransomware attack behind store closures
New dark web markets claim association with criminal cartels
Multiple Vulnerabilities Discovered in Device42 Asset Management Appliance
Cisco confirms May attack by Yanluowang ransomware group
Automotive supplier breached by 3 ransomware gangs in 2 weeks
Cisco hacked by Yanluowang ransomware gang, 2.8GB allegedly stolen
Conti extortion gangs behind surge of BazarCall phishing attacks
Looking Back at 25 Years of Black Hat
Many ZTNA, MFA Tools Offer Little Protection Against Cookie Session Hijacking Attacks
Compliance Certifications: Worth the Effort?
Cisco was hacked by the Yanluowang ransomware gang
CISA should split from DHS or made part of broader 'Digital Agency': Fmr Director Chris Krebs
Small-time cybercrime is about to explode — We aren't ready
Sierra Leone internet cut amid anti-government protests
Hacker uses new RAT malware in Cuba Ransomware attacks
Novel attack may compromise AMD processors
CrowdStrike Jointly Debuts Open Cybersecurity Schema Framework
Hacker101 CTF — Travial CTF Flag 0 - InfoSec Write-ups
Ubuntu Security Notice USN-5560-1
Red Hat Security Advisory 2022-5997-01
Ubuntu Security Notice USN-5560-2
Gentoo Linux Security Advisory 202208-09
Red Hat Security Advisory 2022-5069-01
Gentoo Linux Security Advisory 202208-13
Ubuntu Security Notice USN-5561-1
Gentoo Linux Security Advisory 202208-08
Ubuntu Security Notice USN-5559-1
Gentoo Linux Security Advisory 202208-07
Ubuntu Security Notice USN-5562-1
Gentoo Linux Security Advisory 202208-10
Sophos XG115w Firewall 17.0.10 MR-10 Authentication Bypass
Gentoo Linux Security Advisory 202208-14
AirSpot 5410 0.3.4.1-4 Remote Command Injection
Gentoo Linux Security Advisory 202208-12
Zimbra zmslapd Privilege Escalation
Ukrainian Website Threat Landscape Throughout 2022
Gentoo Linux Security Advisory 202208-06
Webmin Package Updates Command Injection
Gentoo Linux Security Advisory 202208-11
Ubuntu Security Notice USN-5558-1
Red Hat Security Advisory 2022-5070-01
Red Hat Security Advisory 2022-6037-01
Red Hat Security Advisory 2022-5068-01
Red Hat Security Advisory 2022-6038-01
Dark Utilities C2 service gains traction among threat actors
Risky Business: Enterprises Can’t Shake Log4j flaw
CISA releases toolkit to improve cyberdefenses ahead of elections
Cisco fixes bug allowing RSA private key theft on ASA, FTD devices
Phishing attack abuses Microsoft Azure, Google Sites to steal crypto
Google now blocks Workspace account hijacking attempts automatically
Cyber-criminals Shift From Macros to Shortcut Files to Hack Business PCs, HP Report
DeathStalker's VileRAT Continues to Target Foreign and Crypto Exchanges
APIC/EPIC! Intel chips leak secrets even the kernel shouldn’t see…
Default macro blocking prompts ransomware attack changes
Ransomware attack prevalence, preparedness examined
Microsoft Patches ‘Dogwalk’ Zero-Day and 17 Critical Flaws
Cloudflare: Attacker tried Twilio phishing tactic on us • The Register
APIC fail: Intel 'Sunny Cove' chips with SGX spill secrets • The Register
Former Twitter Employee Convicted as Saudi Spy
10 malicious packages on PyPI used to steal developers' data
Microsoft confirms ‘DogWalk’ zero-day vulnerability has been exploited
Emotet Tops List of July's Most Widely Used Malware
Write-up: Pickle Rick @ TryHackMe | by Frank Leitner | Aug, 2022 | InfoSec Write-ups
ZTNA vs Remote Access VPN
Microsoft squares away 121-CVE Patch Tuesday for August
Hackers behind Twilio breach also targeted Cloudflare employees
Microsoft Patches ‘Dogwalk’ Zero-Day and 17 Critical Flaws
Introducing AI-powered IOAs
Exploit Activity Surges 150% in Q2
Predator Pleads Guilty After Targeting Thousands of Young Girls Online
An Inside Look at Hive’s RaaS Tactics
Surge in CVEs as Microsoft Fixes Exploited Zero Day Bugs
Hunting webshell with NeoPI | InfoSec Write-ups
RazorBlack: Active Directory Room From TryHackMe By Hashar Mujahid | by Hashar Mujahid | Aug, 2022 | InfoSec Write-ups
Where do big ideas lead?. Making Cypherdog’s long story short | by Cypherdog Security Inc. | Aug, 2022 | Medium
IW Weekly #15: Admin account takeover, IDOR broken authentication, CyberChef alternatives, Dark web access, etc. | by InfoSec Write-ups | Aug, 2022 | InfoSec Write-ups
Daemon Cloud Community Debrief — August 2022 | by Rohan Gaetani | daemon-engineering | Aug, 2022 | Medium
1Password Gets a HUGE iOS Update. Several killer features and a… | by Mark Ellis | Mac O’Clock | Aug, 2022 | Medium
Process Injection — MITRE ATT&CK Spotlight | Picus | Picus Security
Uppsala Security offers free Terra Classic (LUNC) Transaction Tracking Solutions to worldwide Regulatory & Law Enforcement agencies | by Sentinel Protocol Team | Sentinel Protocol | Aug, 2022 | Medium
Cybersecurity and Blockchain (1) - Seohyun Kim
The Proper Way To Hash A Password, Or Derive a Key From a Password: Meet PBKDF2 | by Prof Bill Buchanan OBE | ASecuritySite: When Bob Met Alice | Aug, 2022 | Medium
Lockbit, Hive, and BlackCat attack automotive supplier in triple ransomware attack
The State of Ransomware in Financial Services 2022
CISA adds UnRAR and Windows flaws to Known Exploited Vulnerabilities Catalog
IIot, Operational Technology Cybersecurity Challenges | by InfoSec Write-ups | Aug, 2022 | InfoSec Write-ups
North Korean threat actors imitate Coinbase with fake job offer for crypto pros
VMware warns of public PoC code for critical auth bypass bug CVE-2022-31656
Cyberwarfare to result in lethal consequences, Killnet founder says
US sanctions crypto mixer Tornado Cash
Proofpoint Recognized in 2022 Gartner® Market Guide for Insider Risk Management Solutions
Malicious code exploiting recent VMware bug publicly available, company warns
CISA warns of Windows and UnRAR flaws exploited in the wild
Patch Tuesday for August 2022 fixed actively exploited zero-day
How hackers are stealing credit cards from classifieds sites
Kali Linux 2022.3 adds 5 new tools, updates Linux kernel, and more
Microsoft Patches Zero-Day Actively Exploited in the Wild
Threat Roundup for July 29 to August 5
Dragos: 125 ransomware attacks on industrial systems in Q2 after Conti shutdown
Why experts have hope in the federal privacy bill – even if it doesn't pass
Kali Linux 2022.3 adds 5 new tools, updates Linux kernel, more
China-linked group targeted government agencies, defense firms in Eastern Europe
Adversary Quest 2022: 4 Tabloid Jackal Challenges
About the discovery of another security vulnerability in NASA | by 7h3h4ckv157 | Aug, 2022 | InfoSec Write-ups
Creating a basic backdoor on an android mobile | by Ravindu Thomas | Aug, 2022 | InfoSec Write-ups
PortSwigger Web Security Academy Lab: SQL injection vulnerability allowing login bypass | by Anil Yelken | Aug, 2022 | InfoSec Write-ups
Stored XSS to Account Takeover : Going beyond document.cookie (IndexedDB)| Stealing Session from IndexedDB | by SMHTahsin33 | Aug, 2022 | Medium | InfoSec Write-ups
Ubuntu Security Notice USN-5555-1
Twilio customer data exposed after its staffers got phished • The Register
Chinese scammers target kids with promise of extra gaming • The Register
Prestashop Blockwishlist 2.1.0 SQL Injection
Red Hat Security Advisory 2022-5923-01
Red Hat Security Advisory 2022-5928-01
Backdoor.Win32.Guptachar.20 MVID-2022-0631 Insecure Credential Storage
Red Hat Security Advisory 2022-5875-01
PAN-OS 10.0 Remote Code Execution
Red Hat Security Advisory 2022-5934-01
Matrimonial PHP Script 1.0 SQL Injection
Red Hat Security Advisory 2022-5924-01
Feehi CMS 2.1.1 Cross Site Scripting
Red Hat Security Advisory 2022-5942-01
Falco 0.32.2
Chinese actors behind attacks on industrial enterprises and public institutions
Experts linked Maui ransomware to North Korean Andariel APT
10 malicious PyPI packages found stealing developer's credentials
Maui ransomware operation linked to North Korean 'Andariel' hackers
Cloudflare employees also hit by hackers behind Twilio breach
VMware warns of public exploit for critical auth bypass vulnerability
Abusing Kerberos for Local Privilege Escalation
Researchers Debut Fresh RCE Vector for Common Google API Tool
Russia-Ukraine Conflict Holds Cyberwar Lessons
US Treasury Sanctions Virtual Currency Mixer For Connections With Lazarus Group
New Malicious Python Libraries Found on PyPI Repository
China-linked spies used six backdoors to steal defense info • The Register
Crypto and the US government are headed for a decisive showdown
Small businesses count cost of Apple’s privacy changes
Virtual Currency Platform ‘Tornado Cash’ Accused of Aiding APTs
Hackers install Dracarys Android malware using modified Signal app
Report Provides Updates on July's Maui Ransomware Incident
Exclusive: North Korea’s monster fake out
Health Adviser Fined After Illegally Accessing Medical Records
IW Weekly #15: Admin account takeover, IDOR broken authentication, CyberChef alternatives, Dark web access, etc. | by InfoSec Write-ups | Aug, 2022 | InfoSec Write-ups
Multiple attackers increase pressure on victims, complicate incident response
US sanctioned crypto mixer Tornado Cash used by North Korea-linked APT
Number of Firms Unable to Access Cyber-Insurance Set to Double
Smishing Attack Led to Major Twilio Breach
Malicious file analysis - Example 01
Request For Comments 101 — Cybersecurity | by Vicente Aceituno Canal | The CISO Den | Aug, 2022 | Medium
Memory forensics Challenge (Letsdefend) | by CyberJunnkie | Aug, 2022 | Medium
Update 17. 2022 Russia-Ukraine War Cyber Group Tracker. August 08. | by Cyberknow | Medium | Medium
Cyber Scams Artists Should Watch Out For | by Sara Robinson | Aug, 2022 | Medium
Stored XSS using SVG file. Hey guys, hope you all are doing well… | by Bharatsingh | Aug, 2022 | Medium
deBridge Finance crypto platform targeted by Lazarus hackers
Orchard botnet uses Bitcoin Transaction info to generate DGA domains
Improving Detection Content with the Gap Analysis Team
Twilio discloses data breach that impacted customers & employees
Email marketing firm hacked to steal crypto-focused mailing lists
10 Malicious Code Packages Slither into PyPI Registry
We Have the Tech to Scale Up Open Source Vulnerability Fixes — Now It's Time to Leverage It
Deepfakes Grow in Sophistication, Cyberattacks Rise Following Ukraine War
Snapchat, Amex sites abused in Microsoft 365 phishing attacks
Ubuntu Security Notice USN-5554-1
Ubuntu Security Notice USN-5553-1
Phishers Swim Around 2FA in Coinbase Account Heists
U.S. imposes sanctions on virtual currency mixer Tornado Cash | Reuters
Dark Utilities C2 service draws thousands of cyber criminals • The Register
Slack exposed hashed passwords for years • The Register
San Diego Citizens Wrest Control of Surveillance Tech Away From Police
Nortek Linear eMerge E3-Series Credential Disclosure
Nortek Linear eMerge E3-Series Command Injection
Nortek Linear eMerge E3-Series Account Takeover
Red Hat Security Advisory 2022-5914-01
WordPress Duplicator 1.4.7.1 Backup Disclosure
Red Hat Security Advisory 2022-5915-01
Ubuntu Security Notice USN-5552-1
ManageEngine ADAudit Plus Path Traversal / XML Injection
Red Hat Security Advisory 2022-5913-01
Thingsboard 3.3.1 Cross Site Scripting
American Fuzzy Lop plus plus 4.02c
7-Eleven stores in Denmark closed due to a cyberattack
Chinese hackers use new Windows malware to backdoor govt, defense orgs
North Korean hackers target crypto experts with fake Coinbase job offers
Twilio discloses data breach after SMS phishing attack on employees
US sanctions crypto mixer Tornado Cash used by North Korean hackers
El yapımı WIFI Pinaple ve kullanım senaryoları | by Efe SÖĞÜT | Aug, 2022 | Medium
ES File Explorer Open Port Vulnerability exploitation | by Ravindu Thomas | Aug, 2022 | InfoSec Write-ups
Cybersecurity: Why do I need an anti-virus? | by Ibukunoluwa Morountonu | Aug, 2022 | Medium
Deeper look into North Korean hackers | by Mohamed Hosney | Aug, 2022 | Medium
Linux Commands Cheat sheet for Web Application Hacking | by Subham Dhungana | Aug, 2022 | Medium
Web Application Reconnaissance Guide, Cybersec | Shubham Dhungana | by Subham Dhungana | Aug, 2022 | Medium
Paranoid Cryptography: Fermat’s Theorem For Cracking RSA | by Prof Bill Buchanan OBE | ASecuritySite: When Bob Met Alice | Aug, 2022 | Medium
RSA: Continued Fractions — The Wiener Attack | by Prof Bill Buchanan OBE | ASecuritySite: When Bob Met Alice | Aug, 2022 | Medium
LogoKit - The phishing kit leveraging Open Redirect Vulnerabilities
U.S. sanctions Tornado Cash cryptocurrency mixer
Chinese Hackers May Be Behind Attacks Targeting Eastern Europe and Afghanistan
Meta Takes Action Against Cyber Espionage Operations Targeting Facebook in South Asia
Another day, Another IDOR vulnerability— $5000 Reddit Bug Bounty | by Roberto | Aug, 2022 | InfoSec Write-ups
How I got a $10,000 Penetration Testing Project/Job with Bug Bounty | by JunoonBro | Aug, 2022 | Medium
Slack admits to leaking hashed passwords for five years
Phishers Swim Around 2FA in Coinbase Account Heists
OFRAK: unpack, modify, and repack binaries
Concealed code execution: Techniques and detection
what if instead of "responsible disclosure" as the infosec standard it was "responsible resolution"?
Open Cybersecurity Schema Framework · GitHub
Enhancing Subdomain Enumeration - ENTs and NOERROR
SmokeLoader Actively Spreads by Exploiting Old Vulnerabilities | Cyware Alerts - Hacker News
Researcher Hacks Starlink Terminal to Warn SpaceX of Flaws
SGX, Intel’s supposedly impregnable data fortress, has been breached yet again | Ars Technica
Project Zero: The quantum state of Linux kernel garbage collection CVE-2021-0920 (Part I)
Cisco Talos Intelligence Group - Comprehensive Threat Intelligence: Cisco Talos shares insights related to recent cyber attack on Cisco
Clavis T-20 picked and gutted - YouTube
GitHub - ine-labs/AWSGoat: AWSGoat : A Damn Vulnerable AWS Infrastructure
iOS Privacy: Instagram and Facebook can track anything you do on any website in their in-app browser · Felix Krause
Browser-Powered Desync Attacks: A New Frontier in HTTP Request Smuggling | PortSwigger Research
Former Twitter Employee Found Guilty of Spying for Saudi Arabia
Lips Octro pick (15 pins) - YouTube
Phishers who breached Twilio and fooled Cloudflare could easily get you, too | Ars Technica
Cryptominer detection: a Machine Learning approach – Sysdig
VileRAT: DeathStalker’s continuous strike at foreign and cryptocurrency exchanges | Securelist
Challenge Lock Highways Picked - YouTube
How to Counter MITRE ATT&CK with MITRE D3FEND - YouTube
GitHub - Sc00bz/bscrypt: A cache hard password hash/KDF
575. Halfords padlock picked - Is this an eBay bargain or have I had the wool pulled over my eyes ???? - YouTube
ML Security Operations at One of the Largest Brewing Companies • Maurits van der Goes • GOTO 2022 - YouTube
Passive v. Active Reconnaissance | Sam’s Bish-Bytes
Crwe World | July 2022’s Most Wanted Malware: Emotet Takes Summer Vacation but Definitely Not ‘Out-of-Office’
GitHub - zeronetworks/BlueHound
The CISO Den – Medium
Tech, Cyber Companies Launch Security Standard to Monitor Hacking Attempts
How to Attack and Remediate Excessive Network Share Permissions in Active Directory Environments
ÆPIC Leak
SD-PWN Part 4 — VMware VeloCloud — The Last Takeover | by Ariel Tempelhof | Realmode Labs | Medium
Everything In Its Right Place. Part 2 | by Kevin Massey | Aug, 2022 | Medium
A Novel SIP Based Distributed Reflection Denial-of-Service Attack and an Effective Defense Mechanism | IEEE Journals & Magazine | IEEE Xplore
From Shared Dash to Root Bash :: Pre-Authenticated RCE in VMWare vRealize Operations Manager
Vulnerability Summary for the Week of August 1, 2022 | CISA
Kwikset SmartKey Padlock - Picked - YouTube
Experts linked Maui ransomware to North Korean Andariel APTSecurity Affairs
Cloudflare Foils SMS Phishing Attack With Security Keys | PCMag
Password Requirements Suck – How To Fix Them | Password Bits
Implementing a Zero Trust Architecture | NCCoE
US data transfer unlawful according to German procurement authority
Discovering Domains via a Timing Attack on Certificate Transparency – PT SWARM
The sound of Brainfuck running the ChaCha20 cipher - mid's site
Microsoft Office to publish symbols starting August 2022 – Microsoft Security Response Center
Andariel deploys DTrack and Maui ransomware | Securelist
Pegasus spyware: Just 'tip of the iceberg' seen so far • The Register
[1512.08546] When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries
An attack on SIDH with arbitrary starting curve
DeGuard High Security Cylinder - Pick and Gut Video - Purple Belt Submission 2 - YouTube
Mul-t-lock Jr. - Purple Belt Submission - Pick and Gut - YouTube
Security Best Practices in PHP – Sweetcode.io
Advisory: Cisco Small Business RV Series Routers Web Filter Database Update Command Injection Vulnerability - ONEKEY
Google outage: tech giant apologises after software update causes search engine to go down | Google | The Guardian
Humble Book Bundle: Cybersecurity & Data Science by Mercury Learning (pay what you want and help charity)
Dark Utilities C2 service draws thousands of cyber criminals • The Register
More than 3200 Apps Found Exposing Twitter API Keys | Cyware Alerts - Hacker News
Pivoting on a SharpExt to profile Kimusky panels for great good | by Jason Reaves | Walmart Global Tech Blog | Aug, 2022 | Medium
Twilio discloses data breach that impacted customers & employeesSecurity Affairs
Twitter Confirms Data Breach as 5.4M Accounts Sold on Hacker Forum
Auditing Crypto Wallets
AMD Prefetch Attacks through Power and Time | USENIX
Australian Cyber News Summary #07 - July 2022 - Australian Information Security Awareness and Advisory
simplex-chat/20220808-simplex-chat-v3.1-chat-groups.md at stable · simplex-chat/simplex-chat · GitHub
[L80] Sargent Keso Pick and Gut - YouTube
Why Complexity is Synonymous With the Cloud and How to Deal With It Featuring Allison Miller - Cloud Security Reinvented | Podcast on Spotify
The Secret Service’s missing text messages: Lessons for IT security | CSO Online
Security Guide for Startups: How to think about security while moving quickly | LunaSec
Targeted attack on industrial enterprises and public institutions | Kaspersky ICS CERT
Cloud DNS Security - How to protect DNS in the Cloud – Sysdig
Incident Report: Employee and Customer Account Compromise - August 4, 2022
Web-Security-Scanner
Một kho riêng để viết về cuộc đời tôi về hack và một số thứ khác
desenvolver um conjunto de API’s utilizando Spring Boot para controlar um estacionamento de veículos. Serão controlados a entrada, saída e valor a ser cobrado do cliente. Iremos aplicar todas as boas práticas de desenvolvimento de API’s incluindo seguranç
This bot allows owners of discord guilds to create a backup of their server. In case of an hack/ termination, the users can easily be added again!
report-security-report-security-check-globals
hardhat-security
spring security入门应用
security
security_issues
spring-security_for-lecture
SnapSecurity
When it comes to manufacturers you trust, taking benefit of trade-in packages is so beneficial. Trade-in affords no longer solely promote desirable recycling practices, however additionally permit you to retailer big—whether it’s time for an improve on a
Hack The Box Challenge Solving
Website to teach hacking in a straightforward and holistic manner
just for fun and hacking
???? INSTAGRAM ???? HACKING TOOLS ???? THIS TOOLS IS ???? FREE FOR EVERYONE ????
i need help to lern about ethical hacking
Hack Cameras FREE CCTV PUBLIC
Curly Hack Festa
Na
Apex external hack, Includes lightEsp and aimbot
security-on-github
SecurityView-main
aws-vehicle-security-solution
PP_3_1_2_Boot_Security
AWS-Certified-Security-Specialty-Exam-Dumps-To-attain-Success-In-Exam
Writeup for the National Security Agency Codebreaker Challenge 2022
Implementamos seguridad con JWT en Spring Boot y Angular, integrar seguridad con JWT y Spring Security a la gestiòn de cuestionario.
Projeto desenvolvido durante a NLW - Next Level Week oferecida pela Rocketseat. O NLW é uma experiência online com muito conteúdo prático, desafios e hacks onde o conteúdo fica disponível durante uma semana.
spring boot mvc security
A handful set of encryption tools useful for some basic security stuff. This include table-replace-based, random-by-seed, RSA 32 bit and a combined RSA + random algorithm, all aiming for performance first.
spring-security-sdc
Can a hacker hack his childhood trauma?
Public repo for ML Ops FTA Hack
keycloak 与 spring security 整合示例
WordPress boilerplate with Composer package and dependency management support, security improvements and simplified folder structure. Inspired by Roots Bedrock and other Composer based setups.
hacks
A collection of (mostly) computer security research papers on cryptocurrencies
Mini project to test about Spring Security
Hack of instagram
现任明教教主CCNP Security VPN 2014 最新视频教程(价值199元)
spring_security_with_jwt
Network-Security-Bootcamp
스프링부트로 시작하는 스프링 시큐리티 인증, 권한 체크 완료 (JPA, mustache 적용)
git-security-sample
security-system
Notes and resources for the Active Directory security testing.
Scripts de segurança e pentesting
securitySpring1
Angular_SpringSecurity
hack of pitboss navigator bbq smoker with ESP32 controlling remotely
Basics of System Security Fundamentals
Apk Hacking For Android
Create minimum amount of security groups for a list of IP addresses
CustorSecurity
This R code generates an .xlsx file containing the Section 13(f) Securities as listed by the SEC in a PDF document.
A Dropbox For Various Technical (Mostly Notably Turtle) Related Hacks / Scripts For Minetest.
web-security-audit
Security audit reports for Smart Contract
Websecurity-Ethichal-Hacking-
The official NEAR ecosystem bounty board for the recurring traveling hackathon / hacker houses called "NEAR Hacks"
git-security-exercise
copyright wjin
react-component-security
This is a list of Bug Bounty, and paid hacking work sites that I found which may prove useful to anyone looking to start making money on the side of their learning.
Proof of concept usign Playwright testing capabilities
Proof of concept for my website design for assignment 1.
A simple React application for users to search for hacker news posts and view detail.
practice-security
???? | A simple ASP.NET 6.0 MVC web application, demonstrating a login system Proof of Concept.
Hacker News Clone https://youtu.be/VNfOqpD0GIM
100 days of Swift, Hacking with swift projects
security_test
aws-security-assessment-solution
Proof of concept software to see if it is possible to come up with a minimal hardware solution to ambient lighting.
A project dedicated to help hackathon participants hack more productively with their team and manage their time.
container_security
My entry on Hack It! RISC-V Design Challenge.
A small proof-of-concept app using Tauri and PLDS
This Tools Is a Security in All python Script ???? to sys in Marshal , Base64,base36,base16, lembor,zile ✅ Enjoy ????????????
register_login_spring_security
2021-2 빅데이터보안 수업 최종 프로젝트
Embedded-Security-Systems
Open Source Intelligence A.K.A OSINT is an especially important field in cyber security, the ability to uncover details about a person through open source resources is extremely underappreciated in the hacking world, "But anyone can find that information"
AWS Hacking Lab
Network-Security-Bootcamp-Bitirme-Projesi
It's a network security project on Machine Learning.
This is a proof of concept of laravel sanctum
This tool Will Give your Terminal a Hacker Look.
Paper through FTAG on technical debt/security
Dark theme for Hacker News
Matrix rain effect in your term like a true hacker
hack test
This project is written with Spring MVC,Security and other frameworks.
Cyber-Security-Notes
Hacker tried to hide information inside this binary file. He is not good in remembering passwords (usually his passwords consists of 4 characters)
LLVM Optimizer Passes for Offensive Security
CYBER SECURITY
A website to set off all the security warnings in your browser.
Facebook hack
Network_Security
Spring Security – Roles and Privileges (permissions)
Discord Tools Hack
A proof of concept for the Vibe Biotech monorepo using Nx
SecurityLab1
My personal repository for my ethical hacking learning
spring-security
The Apiary Framework aims to provide a structured approach to the deployment and management of honeypots on a network to achieve the overall goal of increasing the likelihood of detecting a threat. A structured approach is important as it provides organiz
SpringSecurity
Patches a security vulnerability in the game ULTRAKILL
07-26_python_and_Security_example
Security engineer and programmer dedicated to finding vulnerabilities in applications and websites.
LogIn By Two Factor Authentication
A Node.js library targeting of the gopluslabs.io api, open DeFi security service platform.
A basic Spring with JPA + Security
two-factor authentication (2FA) is is a specific type of multi-factor authentication (MFA) that strengthens access security by requiring two methods (also referred to as authentication factors) to verify your identity
Exemplo projeto utilizando spring security in memory
Proof of concept of Fargate nextjs site for Selfridges
Resource Hacker v5.1.8.360
full-stack-security
Code Meteor is the new generation hacked client for Minecraft.
spring-security-lab-2
lukewarm-security-info
This javascript used to automate the hacker rank algorithms question using solution.
Proof of concepts with Qt framework
HomeSecurity
This webpage in store data in hacking lab . This web Page will update soon.......
I made this to pracitce security features for my training website. Including password hashing, cookies, and OAuth
In this Course project, I have implemented a VM translator using a high level language which converts VM code into hack assembly code. It also implements arithmetic and memory access commands. Commands like Add, Sub, Neg, And, Not, Nor, Greater Than,
Website and information about the Hack the Road hackathon
HackingWithSwiftUI
Proof of Concept of Audius Protocol Exploit on 2022-07-23
test winter hack 2
Hacker
Checklist-type tool to keep track of cleared rooms in FNAF:SB
A fake ghost client. I dosen't do anything. Used to troll your freinds and tell them you are HaCkInG
Actually this is a reverse shell what I created for one of my client in fiverr
Hacker News clone using Bud framework for Go
Simple-Hacking-Metaploitable-1-Vulnhub
Springboot-Security-Basic
Hacked
Solutions to Facebook Hacker Cup
Hack&slash game in unity
My solved challenge of Hacker Rank - https://codeavila.notion.site/Challenges-solved-of-Hacker-Rank-8dec2dff9fa045a69c1abb5278041200
Hack-Assembly program to write letters on the screen.
My hacker news app
Cyber-Security-and-Blockchain
Test implementacion de security-spring para autenticacion de usuarios
A project for comp3334 computer system security
jwt-security
Simple proof of concept to test Singularity SIF container image with Snyk
3_1_3_Spring_Security-Bootstrap
Simple chat app with security features built with React and Firebase
Spring-Security-Lab-2
proof of concept
gRPC_Project_SmartSurveillanceSecurityServices
HuaBaoSecurity
proof of concept for creating docs as markdown files and organize and integrate them in to a website for end user
Mini-app realizada en un taller de la Boost Academy de Hack a Boss
A proof-of-concept for creating deterministic endpoint tests that still validate real database interactions
a store with different codes dedicated to hacking
Follow along as we take the DEF CON Hacker Homecoming theme to the next level with a DFIR Report Homecoming Parade. The panel will provide additional context to various DFIR Reports released in the past year. Pick up some tips and tricks to up your game!
Writeups for CTFs and other security related challenges
Spring-Security-Lab-1
Sexiest Block Game Hack
Hack and Slash Fighting game
hacking
Hacker
PP_3_1_2_Boot_Security
Hack Reactor Project to create full stack application in 48 hours
esports-proofOfConcept
Simple nodejs chat application with a terminal or "hacker" type feel.
Working in conjunction with Rapid 7, an IT security company, I built a NEMA machine UI using HTML, CSS and JavaScript
Proof-of-concept for d3.js for the new Ray dashboard design
ethical-hacking
companion to woc-hack/kjd
ethto_security
Proof of Concept using playwright
Hacking at a way to spin up a dev env for Python Flask in 15 min or less for multiple teams following roughly the same patterns.
Automatic Prodigy hacks for Windows!
Security
My WRITEUP OF Arab Security Cyber Wargames CTF
SpringSecurity
springSecurity的使用
SpringSecurity
e-devlet_Hacking
hackingcockey.github.io
Secure Cipher Suites allowed, ordering for TLS 1.2, 1.3 with general Schannel security guidance for Windows 1x, Server 2022
Proof of concept counting application for Project Purple cow
Working in conjunction with Rapid 7, an It Security company, I created a NEMA Machine UI -
TechCareer Network Security Bitirme Projesi
Security library for Spring Webflux: OAuth, CAS, SAML, OpenID Connect, LDAP, JWT...
My WRITEUPS OF Arab Security Cyber Wargames CTF
Cyber Security Challenge tutorial 1 and 2
security-circle-front-end
Public database of Elixir security advisories pulled from GitHub Advisory Database
Сertified kubernetes security specialist course materials
Automatic Number Plate Detection for the security of lives and properties using Computer Vision.
bank_security_console
Spring-AOP / Spring-Security / Exception / Bean / Logger Custom Setting
Proof of concept and integration repo for: theme manager, component library and theme modules
spring-security
Repo collecting code for the profiling environments proof of concept
jamapp.org - A simple landing page for Jam
spring_security_hands_on
Ethical hacking books
A simple proof-of-concept on exploiting the follina vulnerability
Deployment templates, scripts, KQL queries, Sentinel Integration, Vulnerability Assessment and Exploitation techniques related to Web apps - extracted from the Azure Network Security Ninja master repo
My solutions for 'Problem Solving' questions on Hacker Rank platform
A proof of concept on creating & logging in with a passkey in ReactJS + Typescript.
IsUsbSafe A Tool dev by GalionSec [W3_ARE_G4L10N]
List of resources that I bookmark
a qemu tutorial that introduce how to hack
Garbage Django proof of concept project
Security conscious smart contract development starter template
Basic hacking tools
A collection of projects from 100 Days of Hacking with SwiftUI
Spamurai is Email Anti-spammer system as my graduation project in cyber security field
go-security
Landing_Page_Security
Nexus-Security.github.io
Notas de contenido de Ciber seguridad proyecto Aleph | Innovaccion Virtual
This is my repository for my CYBR-410 Data/Database Security class at Bellevue University.
Proof of concept app to test new audio/mic implementations that avoid the audioto get low after mic turns on on iOS devices
Security Challenge. 42 Project
Proof-of-concept Nephio
springSecurity
NodeJS Project exploring different authentication methods
Hacking
This is a proof of concept JavaScript project that uses the Accuweather CitySearch and CurrentConditions API's to create a responsive app that will display the current weather conditions of any city that is input.
Terraform-GCP-Security
PP_3_1_3_Booot_Security
proof of concept for Polygon zkDAO
sla to so testando uns hacks
Proof of concept for an Application Registry.
A terrible hack of the original pi-power for my own simple needs
py-security-cam
Software-Security
owsp juicy shop for web hacking
A proof of concept counting application.
Ferramentas para segurança de dados em python.
study springboot-security
tool for generating wordlists or extending an existing one using mutations.
text-security
The CXClient Minecraft Hacked Client. (O++ S++ I+ C E- M V? !PS D+)
Hack fb
Terraform-GCP-Security-Network
This is a simple Cheat / Hack / Trainer for the game FTL
GitHub Action for container image scans with NeuVector
Hacking with iOS (UIKit) project 1 remake
Android security notes, debloat guides, scripts. Rolling.
A proof of concept voice chat theme-component for Discourse.
Global Hack Week INIT 2022: Connecting two APIs together workshop.
FIM-Proof-Of-Concept
Installs several git clones at one (hacker tools)
Security
C++ keylogger with raw input, bundled with a Python log decoder
A useful tool used in Ethical Hacking - Mac Changer for all Linux
PhantomSecurity
Low-Code/No-Code Security Reviews
COLOR PREDICTION HACK APK FOR FIEWIN, WCLUB, COOE, RXCE...ETC
an AIO 3DS hack pack with cool things to mess around with and CFW
Hack Club Workshop 1
Boot_Security_3_1_4
对JPA的简单学习
Hacker News clone with Dioxus
Files for IA 642 Defensive Security
Writeups for various places
Challenge(Day 19) of Hacking With Swift
Hacker-earth Problems and Challenges
camera hack for personal game
Skill and Magic System For Project Rebirth Hack and Slash. Grid based system based on Megaman Battle network games
rsa-algorithm-implementation-information-security-project
You can hack social media like Instagram Facebook Twitter Gmail this SOCIAL HUNTER5 tool helps you (phishing and brute force attack)
Simple computer Hack's emulator from Nand2Tetris project
This software is designed to keep infomation about every tool used at ERA Home Security. In addition, an automated email funtionality will be implemented to the software therefore allowing the admin to keep track of equipments that need calibration immed
Java Vulnerability Examples
spring_security_demo
Yet Another Testing & Auditing Solution - Check AWS for misconfiguration and security issues
SpringSecurityLesson-ezybyte-
Sistema de Loja Virtual para a empresa 3d Lab, com produtos destinados a impressão 3d , Projeto construído a partir do framework java chamado SpringBoot , nele são realizadas as validações necessárias para adição de produtos , além do sistema de login c
Demonstration of role based authentication and authorization using spring security and jwt
The tool can build various automated process about infra, security, systems.
Scheduling site used during Hack Club: Assemble. Forked from https://github.com/maxwofford/flagship-schedule
Proof of concept to study about Module Federation.
Clean UI to display the latest (new) stories from Hacker News, via their API.
My hacking machine backup
Popular securities on r/wallstreetbets
Learn Architecting Software Systems with High Performance, Scalability, Availability, Security using Modern Technologies in Udemy.
E-Irrigation-System-and-Security
Proof of Concept of a Python Monorepo
Implementing server security features
WebSecurity
Demonstrator UI for Digital Security by Design
spring-security-practice
Security perception and analysis utilizing disclosure in the wild
Security-plus
DNS rebinder for security testing
ArmySecurity
cap-software-and-systems-security
Exercises for "Dangerous attack paths: Development Environment Security - Devices and CI/CD pipelines"
Anty-cheat security software to Minecraft game.
About: A consensus client with a heavy focus on speed and security. Built by Sigma Prime, an information security and software engineering firm who have funded Lighthouse along with the Ethereum Foundation, Consensys, and private individuals.
SecuritySummerCamp2022
A user-friendly password manager that stores your credentials in a locally stored text file to ensure security.
AWS serverless IAM policy restriction response in Pulumi
A Simple and Hackable Realtime Video Streaming Engine for Prototypes and Projects Alike!
CVE-2022-36946 linux kernel panic in netfilter_queue
dm-security
TryHackMe | tools, writeups, notes, solutions
A P2P network security monitoring system for the Ethereum blockchain.
Guides, tutorials, and resources for hacking the Nintendo DS Pokémon games.
This repository contains hacker earth practice coding solutions in cpp
코틀린으로 만들어 보는 숙박 예약 API
My Hacker Rank Solutions
An AI enabled security camera built in Python using OpenCV
Simple and secure token handling for Discord bots written in Python.
A repository in which I store KQL querries I've developed or contributed to for Microsoft Sentinel & Microsoft Security Center.
An awesome list for the SpiceDB ecosystem.
JIT security
Instagram Hacking in Termux by HackerSM9
Aizu-Hack LINEBot チーム開発
Angular application with hacker news api integration
Oracle Ask Tom Database Security Office Hours
A collection of my ROM hacks and assets
Security Test Automation using Snyk
Capture The Flag (CTF) challenges.
A broken-by-design Azure environment to practice and train security skills in the cloud domain.
???? SMS/CALL Bomber нового поколения!
A complete API with Login, Registration, Poll Creation, Poll List, Respond to a Poll and Poll Result, in NodeJs using Typescript, MongoDb, Git, Docker, Jest, CI/CD, Swagger and following the best methodologies of Design Patterns, Clean Architecture, SOLID
kind of a hack to get a path to an in memory fd on linux
Spring securing with jwt
Development of a full-featured Spring/JPA Enterprise application with role-based authorization and access rights. Technologies: Maven, Spring MVC, Security, JPA(Hibernate), REST(Jackson), Bootstrap (css,js), datatables, jQuery + plugins, Java 8 Stream and
Cracked hack client Vape Lite for Minecraft Java Edtion
Cracked hack client Vape v4 for Minecraft Java Edtion
100DaysHackingWithSwift
This project is based on protecting the farmland using smart techniques like CNN (Convolutional Neural Network) and Raspberry Pi.
HacKingPro - Hack Like A Pro !
Code-signing for npm packages
some hacks for studentpad for example bzt-w09 ags2-w09 x1pro
CyberSecurityProject
This POC(Proof of Concept) that tracks messages through Sleuth(Zipkin).
Builds a custom SearXNG image, a privacy-respecting, hackable metasearch engine.
???? This is a collection of hacking and pentesting ???? scripts to help with enumeration, OSINT, exploitation and post exploitation automated scripts to make work easier. Have fun!????
sourcecode-revealer
Zero Trust MYSQL Database Network Security Proxy
Set of ctf writeups and tricks for futures Pentests
Testing repository for GitHub features such as Actions and Advanced Security.
Multiple useful tools in one program.
T Wiki 云安全知识文库,可能是国内首个云安全知识文库?
awesome cloud security || 收集一些国内外不错的云安全资源,该项目主要面向国内的安全人员
Simulation study to test the performance of SSE (BiSSE, QuaSSE, HiSSE) with fossil data. Includes simpler, proof of concept first step for the EEOB 565 final project.
Build a proof of concept e-commerce store using Angular, .Net Core and Stripe for payment processing
Proof of Concept showing how you can use AWS Lambda URLs to accept form input from a website
Dump WhatsApp Web session data to file, and inject it on multiple computers, without scanning QR again!
This toolbox is used for designing overlay menus in Unity Games. Typically used for creating a custom menu for use with existing projects. Includes loader module.
PHP security scanner
Tools I use for consultant work.
An ebpf based agent for monitoring security relevant events on Linux systems.
Proof of concept for a action/inverse and step/command based installer and inferred uninstaller
Proof of concept for Insecure Direct Object Reference
:gem: RapidFort hardened secure images
Cyber Security Projects
Yet Another Educational Resource
Helpers, extensions and utilities to work with security
A collection of proof of concepts, minimally viable concepts, and other assets that support Microsoft's Power Platform.
AES is implemented in software and hardware throughout the world to encrypt sensitive data. It is essential for computer security, cybersecurity and electronic data protection.
Proof of concept script to harvest FromThePage transcription projects
Memory hacking library for windows.
Um Hack para o AssaultCube, por enquanto é só um aimbot, mas espero melhorar ele.
Search for known vulnerabilities in software using software titles or a CPE 2.3 string
????️ OSINT Tools for gathering information and actions forensic ????️
Learning Path Completion Certificates & Write ups for successfully completed Try Hack Me rooms and tutuorials
Browser extension for generating HOTP passcodes for Duo Security Multi-Factor Authentication
Dual languaged (rus+eng) tool for packing and unpacking .arc archives of AI5WIN./Двуязычное средство (рус+англ) для распаковки и запаковки архивов .arc AI5WIN.
Matos is an open-source cloud security tool for analyzing multi-cloud infrastructure security.
A Kubewarden Pod Security Policy that controls usage of Seccomp profiles
spring-security authorization example
About Hive Burp Suite Extension
facebook bruteforce tool
OSINT cheat sheet, list OSINT tools, dataset, article, book and OSINT tips
Codebase for Wi-Wait, a proof of concept occupancy tracking tool created for my 4th year capstone project at Queen's University, 2020.
Hacking GitHub bio.
HomeSecuritySource
Strong hack
Team PAGA's official submission for Hack GT 8 2021
A web hacking toolkit (docker image).
HomeSecurity
E-Commerce shopping-cart Project using Spring boot. Technical : Hibernate/Spring Data JPA. Authentication and authorization using Spring security combined with spring Oauth2 to login with Facebook, Google.
一个简易的对拍器,可用于构造数据debug和hack!
Our Submission for Hack The North
This Kubewarden Policy is a replacement for the Kubernetes Pod Security Policy that controls containers user and groups
OpenSecurityTraining2 – Lectures
Notes about networking , linux , windows and cyber security.
InterFi provides blockchain security and assessment services. In this repository, we'll upload audited smart contracts, and projects. To request a smart contract audit, contact https://t.me/interfiaudits or hello@interfi.network
Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.
Easy Legit CS:GO Hack
Shell backdoor free bypass
 Permanent TouchID support ???? for `sudo`.
Proof of concept to create a throttled consumer
E-way Electric Scooter Speed Hack
Configuration items for full Microsoft integration with online services from a hybrid domain system.
OPA Istio External Authorization proof of concept
Hack (https://www.nand2tetris.org/project06) Assembler implemented in C
Security is down main page
Website content for India Cloud Security Summit
security-and-authentication
A fully responsive website which allows users to post easy hacks, tips & tricks and ask questions and also allows them to answer questions. It also incorporates features like user feed, like/dislike posts, comment on the posts, follow/unfollow other users
A Pod Security Policy that controls Container Capabilities
A Kubewarden Pod Security Policy that controls usage of AppArmor profiles
A Kubewarden Pod Security Policy that controls usage of allowPrivilegeEscalation
Proof of concept for the Hydra Head protocol :construction_worker:
???? Uptime monitor and status page for Beagle Security, powered by @upptime
Interactively find and recover deleted or :point_right: overwritten :point_left: files from your terminal
A Terminal UI to browse Hacker News
Mitwelten IoT Hardware Proof of Concept
[READ ONLY] Security, performance, marketing, and design tools — Jetpack is made by WordPress experts to make WP sites safer and faster, and help you grow your traffic. This repository is a mirror, for issue tracking and development head to: https://gith
Boomi Security Data Processor for Signing, Signature validation, Encryption and Decryption for X.509 and JavaScript Object Signing and Encryption, JWS and JWE and can be applied on JWT.
A Minecraft PVP+Hack Client
Smart Contract security audit reports
A proof of concept to see if Angular can work with WebComponents.
???? A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
Proof of concept to track clouds via visual colour space
Discover least permissive security posture based on visibility/observability data and auto-generate corresponding policies.
????????️ Security Bear provides easy integration with the device like making it connect to home WiFi through an app and getting secure and unique user credentials of the device in order to troubleshoot. If you have ever wondered "Is there an open-source
draft for Japanese translation of OWASP Application Security Verification Standard
Advance phishing tool with custom URL tunneling hosted by LocalTunnel, Ngrok, Cloudflare
Resume of engineer, security nerd, Rust evangelist, event organizer, and public speaker Nicholas Young.
Dragon Quest 4 (PSX) Hacking Code
A showcase of our development and proof of concept research work at the Arizona Institutes for Resilience
These are the notes i have been taking since i started learning about ethical hacking and cybersecurity
Hack Day Project Voting!
FedML - The federated learning and distributed training library enabling machine learning anywhere at any scale. It's backed by FedML, Inc (https://FedML.ai). Supporting large-scale geo-distributed training, cross-device federated learning on smartphones/
A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a supporting tool for my DEF CON 28 talk on key space hacking - updated with interactive / moving elements to support my DEF CO
A proof of concept to manage redirects for GitHub Pages sites
Ethical hacking handy commands for aircrack
Samples and Scriptlets for DevSecOps, Jenkins and security-automation
Projects for security students
???? Deno library for hashing passwords using scrypt
Angular application using hacker news api. Demo: https://the-hacker-news-app.netlify.app/
Playbooks are used by cybersecurity professionals to store or encapsulate knowledge on cybersecurity topics and tactics. I will use these again and again in the field to deal with situations as they arise. The idea is that I don’t want to wait until a cha
Hacker UPC 04/04/2020
Community curated list of templates for the nuclei engine to find security vulnerabilities.
OSINT
Git Anti-Virus Scan Action - Detect trojans, viruses, malware & other malicious threats.
This is my little technology blog post.
A PowerModels Extension for Security Constrained Optimization Problems
A free mixin-based injection hacked client for Minecraft using the Fabric API
hacking tool
The entire code in this repository is in charge of feeding the Telegram channel. Every hour check for a new story with more than 600 points in Hacker News.
Virtual-Schema-based row-level security for Exasol
Keep your email safe from hackers and trackers. Make an email alias with 1 click, and keep your address to yourself.
Auto setup is a bash script compatible with Debian based distributions to install and setup necessary programs.
A Virtual Machine Monitor for modern Cloud workloads. Features include CPU, memory and device hotplug, support for running Windows and Linux guests, device offload with vhost-user and a minimal compact footprint. Written in Rust with a strong focus on sec
蘑菇博客(MoguBlog),一个基于微服务架构的前后端分离博客系统。Web端使用Vue + Element , 移动端使用uniapp和ColorUI。后端使用Spring cloud + Spring boot + mybatis-plus进行开发,使用 Jwt + Spring Security做登录验证和权限校验,使用ElasticSearch和Solr作为全文检索服务,使用Github Actions完成博客的持续集成,使用ELK收集博客日志,文件支持上传七牛云和Minio,支持Docker C
Unikraft is an automated system for building specialized OSes known as unikernels. Unikraft can be configured to be POSIX-compliant. (Core repository)
Virtual keyboard, mouse, and touchpad by leveraging uinput; the focus will be utilizing virtual keyboard for both providing `portal-gun` with low-level access to virtual machines for better ability to automate but also to prototype Multiverse OS open-sour
this is a python module that contains functions and classes which are used to test the security of web/network applications. it's coded on pure python and it's very intelligent tool ! It can easily detect: XSS (relected/stored), RCE (Remote Code/Command E
Sysdig agent Operator configure Sysdig platform in your Kubernetes cluster
Fortify Jenkins plugin
user interface for Information Security Event Management System (ISEMS)
Strong, Simple, and Precise, (and now async!) security for Sanic APIs
Proof of concept av felles api for kontaktinformasjon til folkevalgte
A naive forwarding protocol. This is a proof of concept (PoC).
CodeQL: the libraries and queries that power security researchers around the world, as well as code scanning in GitHub Advanced Security (code scanning), LGTM.com, and LGTM Enterprise
offensive security scripts and documentation
A proof of concept for an Electron.NET app that performs some ERP like processes.
Sandfly Security Agentless Compromise and Intrusion Detection System For Linux
Test of https://github.com/mitchellkrogza/Suspicious.Snooping.Sniffing.Hacking.IP.Addresses/blob/master/ips.list
A code-less, multi-dev-hack-purpose HTTP server, setup in seconds, running in CLI, Node, Docker or Kubernetes out of the box
Test of https://github.com/mitchellkrogza/The-Big-List-of-Hacked-Malware-Web-Sites/blob/master/hacked-domains.list
Secure WordPress login with two factor authentication
security-filter
Scripts for administration of AWS security labs
Security related programs written in Python
Proof-of-concept pilot implementation of the SysML v2 textual notation and visualization
Mina is a new cryptocurrency with a constant size blockchain, improving scaling while maintaining decentralization and security.
2D Platformer Educational Game for Teaching Game Hacking - C++/cocos2d-x
Code snippets, scripts, hacks, algorithms in Kotlin
Proof of concept of managing the EUSART module of the picmicro 18F25K50
Java Stacked Crypto
Secure, human-friendly, cross-platform secrets and config.
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering,
XML Factory to address security issues
encrypt / decrypt function for NSData / NSString
Hack language & HHVM debugger support for Visual Studio Code
Core basic components: log (file / network), configuration (XML / JSON / HTTP), cache (memory / redis), network (TCP / UDP / HTTP), RPC framework, serialization (binary / XML / JSON), APM performance tracking. Data middleware supports MySql, SQLite, SqlSe
Datadog Python APM Client
Universal Radio Hacker: Investigate Wireless Protocols Like A Boss
Development tools and security support for developers
just a quick hack to provision my laptop
Gentoo overlay for security tools as well as the heart of the Pentoo Livecd
Go HTTP Strict Transport Security library
The overlay contains new or updated security tools.
Official SUSE Linux Enterprise Documentation [Everyone, please use feature/ branches, create PRs and ensure CI runs successfully rather than just pushing to main!]
A light-weight process isolation tool, making use of Linux namespaces and seccomp-bpf syscall filters (with help of the kafel bpf language)
The easiest, most secure way to access infrastructure.
Proof of concept to demonstrate the possibilities of MassTransit and RabbitMQ
Security automation content in SCAP, Bash, Ansible, and other formats
wolfSSL JSSE provider and JNI wrapper for SSL/TLS, supporting up to TLS 1.3!
Just Announced - "Learn Spring Security OAuth":
Low code web framework for real world applications, in Python and Javascript
CVE-2022-2736 -- A vulnerability was found in SourceCodester Company Website CMS. It has been classified as critical. This affects an unknown part of the file /dashboard/updatelogo.php of the component Background Upload Logo Icon. The manipulation of the argument xfile/uf
CVE-2022-2740 -- A vulnerability was found in SourceCodester Company Website CMS. It has been declared as critical. This vulnerability affects unknown code of the file /dashboard/add-blog.php of the component Add Blog. The manipulation of the argument ufile leads to unres
CVE-2022-2744 -- A vulnerability, which was classified as critical, has been found in SourceCodester Gym Management System. Affected by this issue is some unknown functionality of the file /admin/add_exercises.php of the component Background Management. The manipulation o
CVE-2022-2745 -- A vulnerability, which was classified as critical, was found in SourceCodester Gym Management System. This affects an unknown part of the file /admin/add_trainers.php of the component Add New Trainer. The manipulation of the argument trainer_name leads to
CVE-2022-2746 -- A vulnerability has been found in SourceCodester Simple Online Book Store System and classified as critical. This vulnerability affects unknown code of the file Admin_ add.php. The manipulation leads to unrestricted upload. The attack can be initiated rem
CVE-2022-2747 -- A vulnerability was found in SourceCodester Simple Online Book Store and classified as critical. This issue affects some unknown processing of the file book.php. The manipulation of the argument book_isbn leads to sql injection. The attack may be initiate
CVE-2022-2748 -- A vulnerability was found in SourceCodester Simple Online Book Store System. It has been classified as problematic. Affected is an unknown function of the file /admin/edit.php. The manipulation of the argument eid leads to cross site scripting. It is poss
CVE-2022-2749 -- A vulnerability was found in SourceCodester Gym Management System. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /mygym/admin/index.php?view_exercises. The manipulation leads to unrestricted uploa
CVE-2022-2750 -- A vulnerability, which was classified as critical, was found in SourceCodester Company Website CMS. Affected is an unknown function of the file /dashboard/add-service.php of the component Add Service Handler. The manipulation leads to unrestricted upload.
CVE-2022-2751 -- A vulnerability was found in SourceCodester Company Website CMS and classified as critical. Affected by this issue is some unknown functionality of the file /dashboard/add-portfolio.php. The manipulation of the argument ufile leads to unrestricted upload.
CVE-2022-2765 -- A vulnerability was found in SourceCodester Company Website CMS 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /dashboard/settings. The manipulation leads to improper authentication. The attac
CVE-2022-2766 -- A vulnerability was found in SourceCodester Loan Management System. It has been rated as critical. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument password leads to sql injection. The attack ma
CVE-2022-2767 -- A vulnerability classified as problematic has been found in SourceCodester Online Admission System. This affects an unknown part of the file /index.php. The manipulation of the argument student_add leads to cross site scripting. It is possible to initiate
CVE-2022-2768 -- A vulnerability classified as problematic was found in SourceCodester Library Management System. This vulnerability affects unknown code of the file /qr/I/. The manipulation of the argument error leads to cross site scripting. The attack can be initiated
CVE-2022-2769 -- A vulnerability, which was classified as problematic, has been found in SourceCodester Company Website CMS. This issue affects some unknown processing of the file /dashboard/contact. The manipulation of the argument phone leads to cross site scripting. Th
CVE-2022-2770 -- A vulnerability, which was classified as critical, was found in SourceCodester Simple Online Book Store System. Affected is an unknown function of the file /obs/book.php. The manipulation of the argument bookisbn leads to sql injection. It is possible to
CVE-2022-2771 -- A vulnerability has been found in SourceCodester Simple Online Book Store System and classified as critical. Affected by this vulnerability is an unknown functionality of the file /obs/bookPerPub.php. The manipulation of the argument bookisbn leads to sql
CVE-2022-2772 -- A vulnerability was found in SourceCodester Apartment Visitor Management System and classified as critical. Affected by this issue is some unknown functionality of the file action-visitor.php. The manipulation of the argument editid/remark leads to sql in
CVE-2022-2773 -- A vulnerability was found in SourceCodester Apartment Visitor Management System. It has been classified as problematic. This affects an unknown part of the file profile.php. The manipulation leads to cross site scripting. It is possible to initiate the at
CVE-2022-2774 -- A vulnerability was found in SourceCodester Library Management System. It has been declared as critical. This vulnerability affects unknown code of the file librarian/student.php. The manipulation of the argument title leads to sql injection. The attack c
CVE-2022-2776 -- A vulnerability classified as problematic has been found in SourceCodester Gym Management System. Affected is an unknown function of the file delete_user.php. The manipulation of the argument delete_user leads to denial of service. It is possible to launc
CVE-2022-2777 -- Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.3.1.
CVE-2022-38150 -- In Varnish Cache 7.0.0, 7.0.1, 7.0.2, and 7.1.0, it is possible to cause the Varnish Server to assert and automatically restart through forged HTTP/1 backend responses. An attack uses a crafted reason phrase of the backend response status line. This is fi
CVE-2022-38155 -- TEE_Malloc in Samsung mTower through 0.3.0 allows a trusted application to achieve Excessive Memory Allocation via a large len value, as demonstrated by a Numaker-PFM-M2351 TEE kernel crash.
CVE-2022-38161 -- The Gumstix Overo SBC on the VSKS board through 2022-08-09, as used on the Orlan-10 and other platforms, allows unrestricted remapping of the NOR flash memory containing the bitstream for the FPGA.
CVE-2021-33643 -- An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink, causing an out-of-bounds read.
CVE-2021-33644 -- An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read.
CVE-2021-33645 -- The th_read() function doesn’t free a variable t->th_buf.gnu_longlink after allocating memory, which may cause a memory leak.
CVE-2021-33646 -- The th_read() function doesn’t free a variable t->th_buf.gnu_longname after allocating memory, which may cause a memory leak.
CVE-2021-37150 -- Improper Input Validation vulnerability in header parsing of Apache Traffic Server allows an attacker to request secure resources. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.
CVE-2021-37150 -- Improper Input Validation vulnerability in header parsing of Apache Traffic Server allows an attacker to request secure resources. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.
CVE-2021-39696 -- In Task.java, there is a possible escalation of privilege due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Andr
CVE-2021-40030 -- The My HUAWEI app has a defect in the design. Successful exploitation of this vulnerability may affect data confidentiality.
CVE-2021-40034 -- The video framework has the memory overwriting vulnerability caused by addition overflow. Successful exploitation of this vulnerability may affect the availability.
CVE-2021-40040 -- Vulnerability of writing data to an arbitrary address in the HW_KEYMASTER module. Successful exploitation of this vulnerability may affect confidentiality.
CVE-2021-46304 -- A vulnerability has been identified in CP-8000 MASTER MODULE WITH I/O -25/+70°C (All versions), CP-8000 MASTER MODULE WITH I/O -40/+70°C (All versions), CP-8021 MASTER MODULE (All versions), CP-8022 MASTER MODULE WITH GPRS (All versions). The component al
CVE-2021-46778 -- Execution unit scheduler contention may lead to a side channel vulnerability found on AMD CPU microarchitectures codenamed “Zen 1”, “Zen 2” and “Zen 3” that use simultaneous multithreading (SMT). By measuring the contention level on scheduler queues an at
CVE-2022-0028 -- A PAN-OS URL filtering policy misconfiguration could allow a network-based attacker to conduct reflected and amplified TCP denial-of-service (RDoS) attacks. The DoS attack would appear to originate from a Palo Alto Networks PA-Series (hardware), VM-Series
CVE-2022-1705 -- Acceptance of some invalid Transfer-Encoding headers in the HTTP/1 client in net/http before Go 1.17.12 and Go 1.18.4 allows HTTP request smuggling if combined with an intermediate server that also improperly fails to reject the header as invalid.
CVE-2022-1962 -- Uncontrolled recursion in the Parse functions in go/parser before Go 1.17.12 and Go 1.18.4 allow an attacker to cause a panic due to stack exhaustion via deeply nested types or declarations.
CVE-2022-20344 -- In stealReceiveChannel of EventThread.cpp, there is a possible way to interfere with process communication due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not ne
CVE-2022-20345 -- In l2cble_process_sig_cmd of l2c_ble.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for expl
CVE-2022-20346 -- In updateAudioTrackInfoFromESDS_MPEG4Audio of MPEG4Extractor.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is
CVE-2022-20347 -- In onAttach of ConnectedDeviceDashboardFragment.java, there is a possible permission bypass due to a confused deputy. This could lead to remote escalation of privilege in Bluetooth settings with no additional execution privileges needed. User interaction
CVE-2022-20348 -- In updateState of LocationServicesWifiScanningPreferenceController.java, there is a possible admin restriction bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User
CVE-2022-20349 -- In WifiScanningPreferenceController and BluetoothScanningPreferenceController, there is a possible admin restriction bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed.
CVE-2022-20350 -- In onCreate of NotificationAccessConfirmationActivity.java, there is a possible way to trick the victim to grant notification access to the wrong app due to improper input validation. This could lead to local information disclosure with User execution pri
CVE-2022-20352 -- In addProviderRequestListener of LocationManagerService.java, there is a possible way to learn which packages request location information due to a missing permission check. This could lead to local information disclosure with no additional execution priv
CVE-2022-20353 -- In onSaveRingtone of DefaultRingtonePreference.java, there is a possible inappropriate file read due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not need
CVE-2022-20354 -- In onDefaultNetworkChanged of Vpn.java, there is a possible way to disable VPN due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitati
CVE-2022-20355 -- In get of PacProxyService.java, there is a possible system service crash due to improper input validation. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVe
CVE-2022-20356 -- In shouldAllowFgsWhileInUsePermissionLocked of ActiveServices.java, there is a possible way to start foreground service from background due to improper input validation. This could lead to local escalation of privilege with no additional execution privile
CVE-2022-20357 -- In writeToParcel of SurfaceControl.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.P
CVE-2022-20358 -- In startSync of AbstractThreadedSyncAdapter.java, there is a possible way to access protected content of content providers due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User inter
CVE-2022-20359 -- In various methods of NotificationManagerService.java, there is a possible way to view notifications while lockdown is enabled due to a permissions bypass. This could lead to local escalation of privilege with User execution privileges needed. User intera
CVE-2022-20360 -- In setChecked of SecureNfcPreferenceController.java, there is a missing permission check. This could lead to local escalation of privilege from the guest user with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2022-20361 -- In btif_dm_auth_cmpl_evt of btif_dm.cc, there is a possible vulnerability in Cross-Transport Key Derivation due to Weakness in Bluetooth Standard. This could lead to remote escalation of privilege with no additional execution privileges needed. User inter
CVE-2022-20713 -- A vulnerability in the Clientless SSL VPN (WebVPN) component of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to conduct browser-based attacks. This vulnerability is due to improper validation of input th
CVE-2022-20792 -- A vulnerability in the regex module used by the signature database load module of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an authenticated, local attacker to crash ClamAV at database
CVE-2022-20816 -- A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to delete arbitra
CVE-2022-20842 -- Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device. For more informati
CVE-2022-20852 -- Multiple vulnerabilities in the web interface of Cisco Webex Meetings could allow a remote attacker to conduct a cross-site scripting (XSS) attack or a frame hijacking attack against a user of the web interface.
CVE-2022-20852 -- Multiple vulnerabilities in the web interface of Cisco Webex Meetings could allow a remote attacker to conduct a cross-site scripting (XSS) attack or a frame hijacking attack against a user of the web interface. For more information about these vulnerabil
CVE-2022-20866 -- A vulnerability in the handling of RSA keys on devices running Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to retrieve an RSA private key. This vulnerab
CVE-2022-20869 -- A vulnerability in the web-based management interface of Cisco BroadWorks Application Delivery Platform Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting attack against a user of the interface. This vulnerability e
CVE-2022-20914 --
CVE-2022-20914 -- A vulnerability in the External RESTful Services (ERS) API of Cisco Identity Services Engine (ISE) Software could allow an authenticated, remote attacker to obtain sensitive information. This vulnerability is due to excessive verbosity in a specific REST
CVE-2022-22369 -- IBM Workload Scheduler 9.4 and 9.5 could allow a local user to overwrite key system files which would cause the system to crash. IBM X-Force ID: 221187.
CVE-2022-22369 -- IBM Workload Scheduler 9.4 and 9.5 could allow a local user to overwrite key system files which would cause the system to crash. IBM X-Force ID: 221187.
CVE-2022-22411 -- IBM Spectrum Scale Data Access Services (DAS) 5.1.3.1 could allow an authenticated user to insert code which could allow the attacker to manipulate cluster resources due to excessive permissions. IBM X-Force ID: 223016.
CVE-2022-22411 -- IBM Spectrum Scale Data Access Services (DAS) 5.1.3.1 could allow an authenticated user to insert code which could allow the attacker to manipulate cluster resources due to excessive permissions. IBM X-Force ID: 223016.
CVE-2022-2242 -- The KUKA SystemSoftware V/KSS in versions prior to 8.6.5 is prone to improper access control as an unauthorized attacker can directly read and write robot configurations when access control is not available or not enabled (default).
CVE-2022-22490 -- IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 could allow a privileged user to obtain sensitive Azure bot credential information. IBM X-Force ID: 226342.
CVE-2022-22490 -- IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 could allow a privileged user to obtain sensitive Azure bot credential information. IBM X-Force ID: 226342.
CVE-2022-22983 -- VMware Workstation (16.x prior to 16.2.4) contains an unprotected storage of credentials vulnerability. A malicious actor with local user privileges to the victim machine may exploit this vulnerability leading to the disclosure of user passwords of the re
CVE-2022-23238 -- Linux deployments of StorageGRID (formerly StorageGRID Webscale) versions 11.6.0 through 11.6.0.2 deployed with a Linux kernel version less than 4.7.0 are susceptible to a vulnerability which could allow a remote unauthenticated attacker to view limited m
CVE-2022-2457 -- A flaw was found in Red Hat Process Automation Manager 7 where an attacker can benefit from a brute force attack against Administration Console as the application does not limit the number of unsuccessful login attempts.
CVE-2022-2458 -- XML external entity injection(XXE) is a vulnerability that allows an attacker to interfere with an application's processing of XML data. This attack occurs when XML input containing a reference to an external entity is processed by a weakly configured XML
CVE-2022-25763 -- Improper Input Validation vulnerability in HTTP/2 request validation of Apache Traffic Server allows an attacker to create smuggle or cache poison attacks. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.
CVE-2022-25763 -- Improper Input Validation vulnerability in HTTP/2 request validation of Apache Traffic Server allows an attacker to create smuggle or cache poison attacks. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.
CVE-2022-25793 -- A Stack-based Buffer Overflow Vulnerability in Autodesk 3ds Max 2022, 2021, and 2020 may lead to code execution through the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer when parsing
CVE-2022-25973 -- All versions of package mc-kill-port are vulnerable to Arbitrary Command Execution via the kill function, due to missing sanitization of the port argument.
CVE-2022-25973 -- All versions of package mc-kill-port are vulnerable to Arbitrary Command Execution via the kill function, due to missing sanitization of the port argument.
CVE-2022-2634 -- An attacker may be able to execute malicious actions due to the lack of device access protections and device permissions when using the web application. This could lead to uploading python files which can be later executed.
CVE-2022-2719 -- In ImageMagick, a crafted file could trigger an assertion failure when a call to WriteImages was made in MagickWand/operation.c, due to a NULL image list. This could potentially cause a denial of service. This was fixed in upstream ImageMagick version 7.1
CVE-2022-2756 -- Server-Side Request Forgery (SSRF) in GitHub repository kareadita/kavita prior to 0.5.4.1.
CVE-2022-28129 -- Improper Input Validation vulnerability in HTTP/1.1 header parsing of Apache Traffic Server allows an attacker to send invalid headers. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.
CVE-2022-28129 -- Improper Input Validation vulnerability in HTTP/1.1 header parsing of Apache Traffic Server allows an attacker to send invalid headers. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.
CVE-2022-28131 -- Uncontrolled recursion in Decoder.Skip in encoding/xml before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a deeply nested XML document.
CVE-2022-28881 -- A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant whereby the aerdl.dll component used in certain WithSecure products unpacker function crashes which leads to scanning engine crash. The exploit can be triggered remotely by an attac
CVE-2022-29090 -- Dell Wyse Management Suite 3.6.1 and below contains a Sensitive Data Exposure vulnerability. A low privileged malicious user could potentially exploit this vulnerability in order to obtain credentials. The attacker may be able to use the exposed credentia
CVE-2022-29804 -- Incorrect conversion of certain invalid paths to valid, absolute paths in Clean in path/filepath before Go 1.17.11 and Go 1.18.3 on Windows allows potential directory traversal attack.
CVE-2022-30580 -- Code injection in Cmd.Start in os/exec before Go 1.17.11 and Go 1.18.3 allows execution of any binaries in the working directory named either "..com" or "..exe" by calling Cmd.Run, Cmd.Start, Cmd.Output, or Cmd.CombinedOutput when Cmd.Path is unset.
CVE-2022-30629 -- Non-random values for ticket_age_add in session tickets in crypto/tls before Go 1.17.11 and Go 1.18.3 allow an attacker that can observe TLS handshakes to correlate successive connections by comparing ticket ages during session resumption.
CVE-2022-30630 -- Uncontrolled recursion in Glob in io/fs before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a path which contains a large number of path separators.
CVE-2022-30631 -- Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via an archive containing a large number of concatenated 0-length compressed files.
CVE-2022-30632 -- Uncontrolled recursion in Glob in path/filepath before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a path containing a large number of path separators.
CVE-2022-30633 -- Uncontrolled recursion in Unmarshal in encoding/xml before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via unmarshalling an XML document into a Go struct which has a nested field that uses the 'any' field tag.
CVE-2022-30635 -- Uncontrolled recursion in Decoder.Decode in encoding/gob before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a message which contains deeply nested structures.
CVE-2022-31672 -- VMware vRealize Operations contains a privilege escalation vulnerability. A malicious actor with administrative network access can escalate privileges to root.
CVE-2022-31673 -- VMware vRealize Operations contains an information disclosure vulnerability. A low-privileged malicious actor with network access can create and leak hex dumps, leading to information disclosure. Successful exploitation can lead to a remote code execution
CVE-2022-31674 -- VMware vRealize Operations contains an information disclosure vulnerability. A low-privileged malicious actor with network access can access log files that lead to information disclosure.
CVE-2022-31675 -- VMware vRealize Operations contains an authentication bypass vulnerability. An unauthenticated malicious actor with network access may be able to create a user with administrative privileges.
CVE-2022-31778 -- Improper Input Validation vulnerability in handling the Transfer-Encoding header of Apache Traffic Server allows an attacker to poison the cache. This issue affects Apache Traffic Server 8.0.0 to 9.0.2.
CVE-2022-31778 -- Improper Input Validation vulnerability in handling the Transfer-Encoding header of Apache Traffic Server allows an attacker to poison the cache. This issue affects Apache Traffic Server 8.0.0 to 9.0.2.
CVE-2022-31779 -- Improper Input Validation vulnerability in HTTP/2 header parsing of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.
CVE-2022-31779 -- Improper Input Validation vulnerability in HTTP/2 header parsing of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.
CVE-2022-31780 -- Improper Input Validation vulnerability in HTTP/2 frame handling of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.
CVE-2022-31780 -- Improper Input Validation vulnerability in HTTP/2 frame handling of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.
CVE-2022-32148 -- Improper exposure of client IP addresses in net/http before Go 1.17.12 and Go 1.18.4 can be triggered by calling httputil.ReverseProxy.ServeHTTP with a Request.Header map containing a nil value for the X-Forwarded-For header, which causes ReverseProxy to
CVE-2022-32189 -- A too-short encoded message can cause a panic in Float.GobDecode and Rat GobDecode in math/big in Go before 1.17.13 and 1.18.5, potentially allowing a denial of service.
CVE-2022-32245 -- SAP BusinessObjects Business Intelligence Platform (Open Document) - versions 430, 430, allows an unauthenticated attacker to retrieve sensitive information plain text over the network. On successful exploitation, the attacker can view any data available
CVE-2022-32429 -- An authentication-bypass issue in the component http://MYDEVICEIP/cgi-bin-sdb/ExportSettings.sh of Mega System Technologies Inc MSNSwitch MNT.2408 allows unauthenticated attackers to arbitrarily configure settings within the application, leading to remote
CVE-2022-33924 -- Dell Wyse Management Suite 3.6.1 and below contains an Improper Access control vulnerability with which an attacker with no access to create rules could potentially exploit this vulnerability and create rules.
CVE-2022-33925 -- Dell Wyse Management Suite 3.6.1 and below contains an Improper Access control vulnerability in UI. An remote authenticated attacker could potentially exploit this vulnerability by bypassing access controls in order to download reports containing sensitiv
CVE-2022-33926 -- Dell Wyse Management Suite 3.6.1 and below contains an improper access control vulnerability. A remote malicious user could exploit this vulnerability in order to retain access to a file repository after it has been revoked.
CVE-2022-33927 -- Dell Wyse Management Suite 3.6.1 and below contains a Session Fixation vulnerability. A unauthenticated attacker could exploit this by taking advantage of a user with multiple active sessions in order to hijack a user's session.
CVE-2022-33928 -- Dell Wyse Management Suite 3.6.1 and below contains an Plain-text Password Storage Vulnerability in UI. An attacker with low privileges could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may b
CVE-2022-33929 -- Dell Wyse Management Suite 3.6.1 and below contains a Reflected Cross-Site Scripting Vulnerability in EndUserSummary page. An authenticated attacker could potentially exploit this vulnerability, leading to the execution of malicious HTML or JavaScript cod
CVE-2022-33930 -- Dell Wyse Management Suite 3.6.1 and below contains Information Disclosure in Devices error pages. An attacker could potentially exploit this vulnerability, leading to the disclosure of certain sensitive information. The attacker may be able to use the ex
CVE-2022-33931 -- Dell Wyse Management Suite 3.6.1 and below contains an Improper Access control vulnerability in UI. An attacker with no access to Alert Classification page could potentially exploit this vulnerability, leading to the change the alert categories.
CVE-2022-34365 -- WMS 3.7 contains a Path Traversal Vulnerability in Device API. An attacker could potentially exploit this vulnerability, to gain unauthorized read access to the files stored on the server filesystem, with the privileges of the running web application.
CVE-2022-34659 -- A vulnerability has been identified in Simcenter STAR-CCM+ (All versions only if the Power-on-Demand public license server is used). Affected applications expose user, host and display name of users, when the public license server is used. This could allo
CVE-2022-34661 -- A vulnerability has been identified in Teamcenter V12.4 (All versions < V12.4.0.15), Teamcenter V13.0 (All versions < V13.0.0.10), Teamcenter V13.1 (All versions < V13.1.0.10), Teamcenter V13.2 (All versions < V13.2.0.9), Teamcenter V13.3 (All versions <
CVE-2022-35280 -- IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 230634.
CVE-2022-35280 -- IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 230634.
CVE-2022-35290 -- Under certain conditions SAP Authenticator for Android allows an attacker to access information which would otherwise be restricted.
CVE-2022-35293 -- Due to insecure session management, SAP Enable Now allows an unauthenticated attacker to gain access to user's account. On successful exploitation, an attacker can view or modify user data causing limited impact on confidentiality and integrity of the app
CVE-2022-35426 -- UCMS 1.6 is vulnerable to arbitrary file upload via ucms/sadmin/file PHP file.
CVE-2022-35491 -- TOTOLINK A3002RU V3.0.0-B20220304.1804 has a hardcoded password for root in /etc/shadow.sample.
CVE-2022-35509 -- An issue was discovered in EyouCMS 1.5.8. There is a Storage XSS vulnerability that can allows an attacker to execute arbitrary Web scripts or HTML by injecting a special payload via the title parameter in the foreground contribution, allowing the attacke
CVE-2022-35517 -- WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameters: web_pskValue, wl_Method, wlan_ssid, EncrypType, rwan_ip, rwan_mask, rwan_gateway, ppp_username, ppp_passwd and ppp_setver, which leads to command injection in pag
CVE-2022-35518 -- WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 nas.cgi has no filtering on parameters: User1Passwd and User1, which leads to command injection in page /nas_disk.shtml.
CVE-2022-35519 -- WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 firewall.cgi has no filtering on parameter add_mac, which leads to command injection in page /cli_black_list.shtml.
CVE-2022-35520 -- WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 api.cgi has no filtering on parameter ufconf, and this is a hidden parameter which doesn't appear in POST body, but exist in cgi binary. This leads to command injection in page /ledonoff.shtml.
CVE-2022-35521 -- WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 firewall.cgi has no filtering on parameters: remoteManagementEnabled, blockPortScanEnabled, pingFrmWANFilterEnabled and blockSynFloodEnabled, which leads to command injection in page /man_security.shtml
CVE-2022-35522 -- WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameters: ppp_username, ppp_passwd, rwan_gateway, rwan_mask and rwan_ip, which leads to command injection in page /wan.shtml.
CVE-2022-35523 -- WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 firewall.cgi has no filtering on parameter del_mac and parameter flag, which leads to command injection in page /cli_black_list.shtml.
CVE-2022-35524 -- WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameters: wlan_signal, web_pskValue, sel_EncrypTyp, sel_Automode, wlan_bssid, wlan_ssid and wlan_channel, which leads to command injection in page /wizard_rep.shtml.
CVE-2022-35525 -- WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameter led_switch, which leads to command injection in page /ledonoff.shtml.
CVE-2022-35526 -- WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 login.cgi has no filtering on parameter key, which leads to command injection in page /login.shtml.
CVE-2022-35533 -- WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 qos.cgi has no filtering on parameters: cli_list and cli_num, which leads to command injection in page /qos.shtml.
CVE-2022-35534 -- WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 wireless.cgi has no filtering on parameter hiddenSSID32g and SSID2G2, which leads to command injection in page /wifi_multi_ssid.shtml.
CVE-2022-35535 -- WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 wireless.cgi has no filtering on parameter macAddr, which leads to command injection in page /wifi_mesh.shtml.
CVE-2022-35536 -- WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 qos.cgi has no filtering on parameters: qos_bandwith and qos_dat, which leads to command injection in page /qos.shtml.
CVE-2022-35537 -- WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 wireless.cgi has no filtering on parameters: mac_5g and Newname, which leads to command injection in page /wifi_mesh.shtml.
CVE-2022-35538 -- WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 wireless.cgi has no filtering on parameters: delete_list, delete_al_mac, b_delete_list and b_delete_al_mac, which leads to command injection in page /wifi_mesh.shtml.
CVE-2022-35697 -- Adobe Experience Manager Core Components version 2.20.6 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript conte
CVE-2022-35715 -- IBM InfoSphere Information Server 11.7 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in a stack trace. This information could be used in further attacks against the system. IBM X-Force
CVE-2022-35715 -- IBM InfoSphere Information Server 11.7 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in a stack trace. This information could be used in further attacks against the system. IBM X-Force ID
CVE-2022-36270 -- Clinic's Patient Management System v1.0 has arbitrary code execution via url: ip/pms/users.php.
CVE-2022-36324 -- A vulnerability has been identified in SCALANCE M-800 / S615 (All versions), SCALANCE W-1700 IEEE 802.11ac family (All versions), SCALANCE W-700 IEEE 802.11ax family (All versions), SCALANCE W-700 IEEE 802.11n family (All versions), SCALANCE XB-200 switch
CVE-2022-36325 -- A vulnerability has been identified in SCALANCE M-800 / S615 (All versions), SCALANCE SC-600 family (All versions < V2.3.1), SCALANCE W-1700 IEEE 802.11ac family (All versions), SCALANCE W-700 IEEE 802.11ax family (All versions), SCALANCE W-700 IEEE 802.1
CVE-2022-36750 -- Clinic's Patient Management System v1.0 is vulnerable to SQL injection via /pms/update_user.php?id=.
CVE-2022-36801 -- Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to inject arbitrary HTML or JavaScript via a Reflected Cross-Site Scripting (RXSS) vulnerability in the TeamManagement.jspa endpoint. The affected versions are bef
CVE-2022-36923 -- Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, Firewall Analyzer, and OpUtils before 2022-07-27 through 2022-07-28 (125657, 126002, 126104, and 126118) allow unauthenticated attackers to obtain
CVE-2022-37001 -- The diag-router module has a vulnerability in intercepting excessive long and short instructions. Successful exploitation of this vulnerability will cause the diag-router module to crash.
CVE-2022-37002 -- The SystemUI module has a privilege escalation vulnerability. Successful exploitation of this vulnerability can cause malicious applications to pop up windows or run in the background.
CVE-2022-37003 -- The AOD module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may cause permission escalation and unauthorized access to files.
CVE-2022-37004 -- The Settings application has a vulnerability of bypassing the out-of-box experience (OOBE). Successful exploitation of this vulnerability may affect the availability.
CVE-2022-37005 -- The Settings application has an argument injection vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.
CVE-2022-37006 -- Permission control vulnerability in the network module. Successful exploitation of this vulnerability may affect service availability.
CVE-2022-37007 -- The chinadrm module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect the availability.
CVE-2022-37008 -- The recovery module has a vulnerability of bypassing the verification of an update package before use. Successful exploitation of this vulnerability may affect system stability.
CVE-2022-37024 -- Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, and OpUtils before 2022-07-29 through 2022-07-30 ( 125658, 126003, 126105, and 126120) allow authenticated users to make database changes that lea
CVE-2022-38129 -- A path traversal vulnerability exists in the com.keysight.tentacle.licensing.LicenseManager.addLicenseFile() method in the Keysight Sensor Management Server (SMS). This allows an unauthenticated remote attacker to upload arbitrary files to the SMS host.
CVE-2022-38130 -- The com.keysight.tentacle.config.ResourceManager.smsRestoreDatabaseZip() method is used to restore the HSQLDB database used in SMS. It takes the path of the zipped database file as the single parameter. An unauthenticated, remote attacker can specify an U
CVE-2022-38133 -- In JetBrains TeamCity before 2022.04.3 the private SSH key could be written to the server log in some cases
CVE-2022-21979 -- Microsoft Exchange Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-30134, CVE-2022-34692.
CVE-2022-21980 -- Microsoft Exchange Server Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-24477, CVE-2022-24516.
CVE-2022-24477 -- Microsoft Exchange Server Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21980, CVE-2022-24516.
CVE-2022-24516 -- Microsoft Exchange Server Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21980, CVE-2022-24477.
CVE-2022-25907 -- The package ts-deepmerge before 2.0.2 are vulnerable to Prototype Pollution due to missing sanitization of the merge function.
CVE-2022-2715 -- A vulnerability has been found in SourceCodester Employee Management System and classified as critical. This vulnerability affects unknown code of the file eloginwel.php. The manipulation of the argument id leads to sql injection. The attack can be initia
CVE-2022-2722 -- A vulnerability was found in SourceCodester Simple Student Information System and classified as critical. This issue affects some unknown processing of the file manage_course.php. The manipulation of the argument id leads to sql injection. The attack may
CVE-2022-2723 -- A vulnerability was found in SourceCodester Employee Management System. It has been classified as critical. Affected is an unknown function of the file /process/eprocess.php. The manipulation of the argument mailuid/pwd leads to sql injection. It is possi
CVE-2022-2724 -- A vulnerability was found in SourceCodester Employee Management System. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /process/aprocess.php. The manipulation of the argument mailuid leads to sql i
CVE-2022-2725 -- A vulnerability was found in SourceCodester Company Website CMS. It has been rated as problematic. Affected by this issue is some unknown functionality of the file add-blog.php. The manipulation leads to cross site scripting. The attack may be launched re
CVE-2022-2726 -- A vulnerability classified as critical has been found in SEMCMS. This affects an unknown part of the file Ant_Check.php. The manipulation of the argument DID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disc
CVE-2022-2727 -- A vulnerability was found in SourceCodester Gym Management System. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /mygym/admin/login.php. The manipulation of the argument admin_email/admin_pass lea
CVE-2022-2728 -- A vulnerability was found in SourceCodester Gym Management System. It has been rated as critical. Affected by this issue is some unknown functionality of the file /mygym/admin/index.php. The manipulation of the argument edit_tran leads to sql injection. T
CVE-2022-2729 -- Cross-site Scripting (XSS) - DOM in GitHub repository openemr/openemr prior to 7.0.0.1.
CVE-2022-2730 -- Authorization Bypass Through User-Controlled Key in GitHub repository openemr/openemr prior to 7.0.0.1.
CVE-2022-2732 -- Improper Privilege Management in GitHub repository openemr/openemr prior to 7.0.0.1.
CVE-2022-2733 -- Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.0.1.
CVE-2022-2734 -- Improper Restriction of Rendered UI Layers or Frames in GitHub repository openemr/openemr prior to 7.0.0.1.
CVE-2022-29083 -- Prior Dell BIOS versions contain an Improper Authentication vulnerability. An unauthenticated attacker with physical access to the system could potentially exploit this vulnerability by bypassing drive security mechanisms in order to gain access to the sy
CVE-2022-30133 -- Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-35744.
CVE-2022-30134 -- Microsoft Exchange Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-21979, CVE-2022-34692.
CVE-2022-30144 -- Windows Bluetooth Service Remote Code Execution Vulnerability.
CVE-2022-30175 -- Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30176, CVE-2022-34687, CVE-2022-35773, CVE-2022-35779, CVE-2022-35806.
CVE-2022-30176 -- Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30175, CVE-2022-34687, CVE-2022-35773, CVE-2022-35779, CVE-2022-35806.
CVE-2022-30194 -- Windows WebBrowser Control Remote Code Execution Vulnerability.
CVE-2022-30197 -- Windows Kernel Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-34708.
CVE-2022-30573 -- The ftlserver component of TIBCO Software Inc.'s TIBCO FTL - Community Edition, TIBCO FTL - Developer Edition, TIBCO FTL - Enterprise Edition, and TIBCO FTL - Enterprise Edition contains an easily exploitable vulnerability that allows a low privileged att
CVE-2022-30574 -- The ftlserver component of TIBCO Software Inc.'s TIBCO FTL - Community Edition, TIBCO FTL - Developer Edition, TIBCO FTL - Enterprise Edition, TIBCO FTL - Enterprise Edition, TIBCO eFTL - Community Edition, TIBCO eFTL - Developer Edition, TIBCO eFTL - Ent
CVE-2022-33631 -- Microsoft Excel Security Feature Bypass Vulnerability.
CVE-2022-33640 -- System Center Operations Manager: Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability.
CVE-2022-33646 -- Azure Batch Node Agent Elevation of Privilege Vulnerability.
CVE-2022-33649 -- Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability.
CVE-2022-33670 -- Windows Partition Management Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-34703.
CVE-2022-34685 -- Azure RTOS GUIX Studio Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-34686.
CVE-2022-34686 -- Azure RTOS GUIX Studio Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-34685.
CVE-2022-34687 -- Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30175, CVE-2022-30176, CVE-2022-35773, CVE-2022-35779, CVE-2022-35806.
CVE-2022-34691 -- Active Directory Domain Services Elevation of Privilege Vulnerability.
CVE-2022-34692 -- Microsoft Exchange Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-21979, CVE-2022-30134.
CVE-2022-34699 -- Windows Win32k Elevation of Privilege Vulnerability.
CVE-2022-34701 -- Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability.
CVE-2022-34702 -- Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34714, CVE-2022-35745, CVE-2022-35752, CVE-2022-35753, CVE-2022-35766, CVE-2022-35767, CVE-2022-35794.
CVE-2022-34703 -- Windows Partition Management Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-33670.
CVE-2022-34704 -- Windows Defender Credential Guard Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-34710, CVE-2022-34712.
CVE-2022-34705 -- Windows Defender Credential Guard Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35771.
CVE-2022-34706 -- Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability.
CVE-2022-34707 -- Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35761, CVE-2022-35768.
CVE-2022-34708 -- Windows Kernel Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-30197.
CVE-2022-34709 -- Windows Defender Credential Guard Security Feature Bypass Vulnerability.
CVE-2022-34710 -- Windows Defender Credential Guard Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-34704, CVE-2022-34712.
CVE-2022-34712 -- Windows Defender Credential Guard Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-34704, CVE-2022-34710.
CVE-2022-34713 -- Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-35743.
CVE-2022-34714 -- Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34702, CVE-2022-35745, CVE-2022-35752, CVE-2022-35753, CVE-2022-35766, CVE-2022-35767, CVE-2022-35794.
CVE-2022-34715 -- Windows Network File System Remote Code Execution Vulnerability.
CVE-2022-34716 -- .NET Spoofing Vulnerability.
CVE-2022-35724 -- It is possible to provide data to be read that leads the reader to loop in cycles endlessly, consuming CPU. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro v
CVE-2022-35760 -- Microsoft ATA Port Driver Elevation of Privilege Vulnerability.
CVE-2022-35761 -- Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-34707, CVE-2022-35768.
CVE-2022-35762 -- Storage Spaces Direct Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35763, CVE-2022-35764, CVE-2022-35765, CVE-2022-35792.
CVE-2022-35763 -- Storage Spaces Direct Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35762, CVE-2022-35764, CVE-2022-35765, CVE-2022-35792.
CVE-2022-35764 -- Storage Spaces Direct Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35762, CVE-2022-35763, CVE-2022-35765, CVE-2022-35792.
CVE-2022-35765 -- Storage Spaces Direct Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35762, CVE-2022-35763, CVE-2022-35764, CVE-2022-35792.
CVE-2022-35766 -- Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34702, CVE-2022-34714, CVE-2022-35745, CVE-2022-35752, CVE-2022-35753, CVE-2022-35767, CVE-2022-35794.
CVE-2022-35767 -- Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34702, CVE-2022-34714, CVE-2022-35745, CVE-2022-35752, CVE-2022-35753, CVE-2022-35766, CVE-2022-35794.
CVE-2022-35768 -- Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-34707, CVE-2022-35761.
CVE-2022-35769 -- Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-35747.
CVE-2022-35771 -- Windows Defender Credential Guard Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-34705.
CVE-2022-35772 -- Azure Site Recovery Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-35824.
CVE-2022-35773 -- Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30175, CVE-2022-30176, CVE-2022-34687, CVE-2022-35779, CVE-2022-35806.
CVE-2022-35774 -- Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-3
CVE-2022-35775 -- Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-3
CVE-2022-35776 -- Azure Site Recovery Denial of Service Vulnerability.
CVE-2022-35777 -- Visual Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-35825, CVE-2022-35826, CVE-2022-35827.
CVE-2022-35779 -- Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30175, CVE-2022-30176, CVE-2022-34687, CVE-2022-35773, CVE-2022-35806.
CVE-2022-35780 -- Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-3
CVE-2022-35781 -- Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-3
CVE-2022-35782 -- Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-3
CVE-2022-35783 -- Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-3
CVE-2022-35784 -- Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-3
CVE-2022-35785 -- Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-3
CVE-2022-35786 -- Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35787, CVE-2022-35788, CVE-2022-3
CVE-2022-35787 -- Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35788, CVE-2022-3
CVE-2022-35792 -- Storage Spaces Direct Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35762, CVE-2022-35763, CVE-2022-35764, CVE-2022-35765.
CVE-2022-35793 -- Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35755.
CVE-2022-35794 -- Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34702, CVE-2022-34714, CVE-2022-35745, CVE-2022-35752, CVE-2022-35753, CVE-2022-35766, CVE-2022-35767.
CVE-2022-35795 -- Windows Error Reporting Service Elevation of Privilege Vulnerability.
CVE-2022-35796 -- Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability.
CVE-2022-35797 -- Windows Hello Security Feature Bypass Vulnerability.
CVE-2022-35804 -- SMB Client and Server Remote Code Execution Vulnerability.
CVE-2022-35806 -- Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30175, CVE-2022-30176, CVE-2022-34687, CVE-2022-35773, CVE-2022-35779.
CVE-2022-35819 -- Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-3
CVE-2022-35820 -- Windows Bluetooth Driver Elevation of Privilege Vulnerability.
CVE-2022-35821 -- Azure Sphere Information Disclosure Vulnerability.
CVE-2022-35824 -- Azure Site Recovery Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-35772.
CVE-2022-35825 -- Visual Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-35777, CVE-2022-35826, CVE-2022-35827.
CVE-2022-35826 -- Visual Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-35777, CVE-2022-35825, CVE-2022-35827.
CVE-2022-35827 -- Visual Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-35777, CVE-2022-35825, CVE-2022-35826.
CVE-2022-36124 -- It is possible for a Reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update t
CVE-2022-36125 -- It is possible to crash (panic) an application by providing a corrupted data to be read. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which
cyb3rops: A malicious sample related to Daxin (CN actor) has been uploaded to Virustotal (unavailable so far) One of my rules alerted me, which means that I wrote it generic enough ????‍???? Sample https://t.co/5paRngs5pA Report https://t.co/MtaOxDoQJ -- cyb3rops
cyb3rops: Zircolite is a standalone SIGMA-based detection tool for EVTX, Auditd, Sysmon for linux or JSONL/NDJSON Logs and this mini-GUI is a really nice interface to visualize Sigma rule matches on these logs https://t.co/OMizUwg7Yu -- cyb3rops
cyb3rops: @BushidoToken @TalosSecurity I looked at the samples and can at least confirm that the following ones seem to exploit the CLFS vulnerability: 2c1e8f7e87f83250aeb78e63bf578a52e49a04cba839953b1a626d9a4617004e 8dc79c12fe1e8aefb870049c16fd1d620512 -- cyb3rops
cyb3rops: @MichaelFazely Unpopular opinion: I don't believe in the long term effect of employee training. I've seen so many cases in which the awareness raised by simulated phishing and awareness trainings were completely gone after a few months and clic -- cyb3rops
GossiTheDog: We need to reboot The Fast Show and redo the weather bit, but with energy bill forecasts. Scorchio! https://t.co/hSWhsdTuC7 -- GossiTheDog
GossiTheDog: @Antoncl14 Hoorah! -- GossiTheDog
GossiTheDog: One thing of note is UK gov suppliers are required to detail their high level security and resilience posture in public. In this case they tick the boxes you would expect.. but unfortunately ransomware groups run rings around compliance. h -- GossiTheDog
GossiTheDog: Aunty Beeb has picked this up. https://t.co/BNMje3dneq -- GossiTheDog
hackerfantastic: @Firefly1776 @GeorgeProfonde3 Strong enough to slow down a Russian bear but relaxed enough that our gentleman boffins can still crack in old bean. ???? ????️‍♂️ -- hackerfantastic
hackerfantastic: @UK_Daniel_Card @GCHQ @NCSC @cybergibbons ????????... ???? -- hackerfantastic
hackerfantastic: @UK_Daniel_Card @GCHQ @NCSC @cybergibbons https://t.co/rNdgBVO6ky -- hackerfantastic
IntezerLabs: See how Intezer functions as your virtual Tier 1 SOC and integrates with SentinelOne and CrowdStrike in this 5 minute example video: https://t.co/oAvjidisH8 -- IntezerLabs
JAMESWT_MHT: @Hostinger https://t.co/P2m2Ti6TAV -- JAMESWT_MHT
malwrhunterteam: @ShadowChasing1 @h2jazi Also "Щодо порушення кримінального провадження (ЄРДР 2201605000000123 від 09.08.2022 ч.1 ст.111).lnk": a9916af0476243e6e0dbef9c45b955959772c4d18b7d1df583623e06414e53b7 http://a0705880.xsph[.]ru/selection/seedling.t -- malwrhunterteam
malwrhunterteam: "Інформація щодо злочинів, пов’язаних зі збройним конфліктом, вчинених стосовно дітей та у сфері охорони дитинства станом на 10.08.2022.lnk": 1cb2d299508739ae85d655efd6470c7402327d799eb4b69974e2efdb9226e447 http://a0706248.xsph[.]ru/rejec -- malwrhunterteam
malwrhunterteam: @SirlinJohn Canon be like? cc @Becca_Furnish https://t.co/IHsCo1wsVC -- malwrhunterteam
reecdeep: #Lokibot #Malware from #maspam #Loader ➡️hxxps://onedrive.live.com/download?cid=CE2459A928B06CFD&amp;resid=CE2459A928B06CFD%21150&amp;authkey=AAQ3YPHBuJW3kuY ????c2: hxxps://tixfilmz.ga/PWS/fre.php #infosec #security #cybersecurity #infosecur -- reecdeep
TalosSecurity: Day 2 of #BHUSA! Another set of talks today, including never-before-seen data on business email compromise at our talk at 1:50 p.m. PT https://t.co/NpKQYwHoWi https://t.co/JHQAx5HlHK -- TalosSecurity
virusbtn: Palo Alto's Muhammad Umer Khan, Lee Wei, Yang Ji &amp; Wenjun Hu analyse BlueSky. This ransomware is capable of encrypting files on victim hosts at rapid speeds with multi-threaded computation. In addition it uses obfuscation techniques to slow -- virusbtn
vxunderground: NHS (National Health Service), the publicly funded healthcare system of the United Kingdom, digital service provider Advanced has been hit by ransomware. GCHQ is working with Advanced to restore services. They state they will not pay a ran -- vxunderground
vxunderground: Thank you to all of our donors! We don't want to brag, but sincerely, thank you everyone. We went from flat-broke, living paycheck to paycheck, to successfully having enough donor money to purchase a cool SSD to save this picture. Thank y -- vxunderground
luc4m: @b3ard3dav3ng3r ???? https://t.co/hwEDuuLUuy -- luc4m
58_158_177_102: 散策スナップ https://t.co/K8C0ljDeys -- 58_158_177_102
58_158_177_102: おまけ https://t.co/hVUlsDAQhL -- 58_158_177_102
58_158_177_102: 市民の森公園 でかい https://t.co/L8ra64B9Tp -- 58_158_177_102
58_158_177_102: 小学校前 愛犬説のみ 顔ちょっとかわいい https://t.co/9yWMOM24dS -- 58_158_177_102
58_158_177_102: 山ノ井交差点 躍動感ある https://t.co/7g0Ukcs27O -- 58_158_177_102
cyb3rops: @michaldivar We at Nextron get emails whenever the IP from which our VPN login originated has changed Sure, you can do that only in ITsec orgs with aware employees But maybe an IP change could trigger an additional check -- cyb3rops
cyb3rops: @DebugPrivilege I wrote YARA rules for the JSON output to detect the compromise even if the actor properly removed the binaries ???? -- cyb3rops
cyb3rops: @le54bes Okay, I have to read the full report asap. You mean synchronized cookies of sessions that were not yet expired. I thought that they were really talking about the passwords, cause they also mention the MFA, which wouldn’t be necessary i -- cyb3rops
cyb3rops: … I’ve never been a big fan of push MFA. It’s not the first case in which attackers were able to get push MFA messages accepted because employees got annoyed or tricked into believing that it was caused by some legitimate activity. -- cyb3rops
GossiTheDog: @zsk It was teaching me about the Kurdish people earlier! https://t.co/fRkGgJvgAo -- GossiTheDog
GossiTheDog: @zsk That’s gonna be cheap in January! -- GossiTheDog
GossiTheDog: @igorippolitov So they’re hitting orgs where they already know username and password from infostealer malware, you can buy creds at almost every company due to people installing Keygens and such. Then they do low and slow MFA pushes until t -- GossiTheDog
GossiTheDog: They’ve hired @MicrosoftDART and @Mandiant and estimate NHS service recovery in the coming weeks, up to about a month. https://t.co/rGq6Xb9Jyg -- GossiTheDog
malwrhunterteam: https://t.co/sciTOuBHZ2 https://t.co/A7IfHmF23T -- malwrhunterteam
GossiTheDog: @smelly__vx Best place to be -- GossiTheDog
JAMESWT_MHT: @TheDFIRReport @IcsNick #Elephant Samples https://t.co/IsGG6M16mQ cc @IcsNick https://t.co/OE1qzkZoUC -- JAMESWT_MHT
JAMESWT_MHT: "La tua spedizione @DHL è in attesa 08/11/2022 10:04:47 am" #phishing spam email via #QRcode vrq.]mx/EJEBG https://yvhees-com.]preview-domain.]com/vm/ @Hostinger https://t.co/mn8Ibsn4ty -- JAMESWT_MHT
TheDFIRReport: Additional IOCs cmd /Q /C powershell reg query HKCU\Software\SimonTatham\Putty\Sessions Persistence: \HKEY_USERS\REDACTED\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java-SDK data %USERPROFILE%\.java-sdk\java-sdk.exe.-a.0CyCcrhI/6B5wKE -- TheDFIRReport
TheDFIRReport: Additional IOCs oracle-java.exe 99a2b79a4231806d4979aa017ff7e8b804d32bfe9dcc0958d403dfe06bdd0532 microsoft-cortana.exe 60bdfecd1de9cc674f4cd5dd42d8cb3ac478df058e1962f0f43885c14d69e816 java-sdk.exe 8ffe7f2eeb0cbfbe158b77bbff3e0055d2ef7138 -- TheDFIRReport
TheDFIRReport: @IcsNick took a look at an Elephant sample back in April of this year. ???? Shout out to @JAMESWT_MHT for the sample! sample: c1afb561cd5363ac5826ce7a72f0055b400b86bd7524da43474c94bc480d7eff EventID 13021 https://t.co/OKU1vqTvbm https:// -- TheDFIRReport
virusbtn: Avast releases its Q2 2022 Threat Report: farewell to Conti, Zloader and Maldocs; hello resurrection of Raccoon Stealer and more ransomware attacks. https://t.co/htg1U9GTw8 https://t.co/EnM2aJ8epb -- virusbtn
58_158_177_102: 夜らー 昔よく通った梅田にあったお店を思い出す味でした https://t.co/IG3TMANj62 -- 58_158_177_102
DissectMalware: @node5 Really sorry for your loss William : ( -- DissectMalware
JCyberSec_: @FrantechCA Can you DM as a matter of urgency. Thanks -- JCyberSec_
JAMESWT_MHT: Buongiorno purtroppo da un controllo mattutino sui vari server mi duole informare che FUNZIONA TUTTO. Stiamo già programmando intervento per schedulare il blocco dei sistemi tra 60 secondi???? In modo possiate tornare a cazzeggiare???? -- JAMESWT_MHT
JAMESWT_MHT: @malwrhunterteam Mentioned #apk #android #spy Samples ???????????? https://t.co/t23Is8ruOY https://t.co/yixXZdR1xQ -- JAMESWT_MHT
malwrhunterteam: https://enl3m.weebly[.]com/ "Passw0rd" ???? https://t.co/kTGIM5bi3N -- malwrhunterteam
malwrhunterteam: ????‍♂️ https://t.co/H1zhFJhs3e -- malwrhunterteam
virusbtn: Sophos’s Linda Smith, Rajat Wason &amp; Syed Zaidi look into three separate ransomware attacks against the same automotive supplier. After gaining access via RDP, all three threat actors (Lockbit, Hive &amp; BlackCat) encrypted files. https://t. -- virusbtn
GossiTheDog: Chances Donald Trump will run on a platform of withdrawing support for Ukraine? -- GossiTheDog
GossiTheDog: @da_667 https://t.co/KzGPdaTV2y -- GossiTheDog
GossiTheDog: @SaphireLattice I agree. The InfoSec industry managed to gaslight everybody into believing SMS attacks are easy (they aren’t) and instead replaced them with default terrible MFA solutions badged as zero trust, so you too can flatten your netw -- GossiTheDog
JAMESWT_MHT: Today's #Memes: "Hi, we inform you that our twitter account exists only for social / marketing purposes, for any need please send an email to the competent department. What you reported, via tweet, will be promptly ignored and trashed. Have a -- JAMESWT_MHT
JAMESWT_MHT: Il #Memes di oggi: "Salve, la informiamo che il nostro account twitter esiste solo per fini di social/marketing, per qualsiasi esigenza mandi una email al reparto competente. Quanto da lei segnalato, tramite tweet, verrà prontamento ignorat -- JAMESWT_MHT
58_158_177_102: 昼ぜいたく 大人だから白シャツにハネないものを選択 https://t.co/OaQHSzX2ND -- 58_158_177_102
58_158_177_102: @hasegawayosuke (優しい私) 早めに濡らして裏から叩いて染み出せば助かる -- 58_158_177_102
58_158_177_102: @hasegawayosuke は? https://t.co/RFspaSDxkI -- 58_158_177_102
blackorbird: #Conti Group attack Exchange -&gt; Anydesk -&gt; CobatStrike -&gt; rclone -&gt; mega othdripinid1979@protonmail.com 37.252.11[.]18 https://t.co/b98GZ5aSEa -- blackorbird
GossiTheDog: @SaphireLattice Yep -- GossiTheDog
GossiTheDog: @cyberghduck Yep I can’t see anything going wrong ???? https://t.co/zUvpfCj9wz -- GossiTheDog
GossiTheDog: @BillDemirkapi GossiAirways! -- GossiTheDog
GossiTheDog: AI’s gonna end up on a watchlist. https://t.co/pgaMIFQ9Dl -- GossiTheDog
GossiTheDog: AI has solved the war https://t.co/VV7AzMzng8 -- GossiTheDog
nullcookies: ???????????? https://t.co/RGzLe80Riy -- nullcookies
424f424f: @HackingDave @Flangvik @Ben0xA @BlackHatEvents @defcon https://t.co/NgcgspVIqa -- 424f424f
vxunderground: .@landers_eddie ???? -- vxunderground
vxunderground: vx-underground staff members are not present at Defcon. However, if you see these two vx-underground members at Defcon please ask them for the password. It will irritate them. Thank you. https://t.co/G94omlM7Zi -- vxunderground
vxunderground: .@MalwareTechBlog is a very funny person. Zoom and enhance. https://t.co/rvvBgqrx9W -- vxunderground
GossiTheDog: I might have COVID and have temporarily lost hearing in one ear, but I’ll forever have this twitter thread. -- GossiTheDog
GossiTheDog: @deepthoughts10 Unsure on that one, but flash back to the LAPSUS stuff - there’s groups of people who are using the industries’ obsession with zero trust against itself. Having a flat network protected by push button MFA is a bad idea, see a -- GossiTheDog
GossiTheDog: @notshenetworks @hugoslabbert So the theory is there’s some AI stuff to prevent MFA bombing. The threat actors in this case go low and slow though, eg one prompt every few days. With number matching you have to enter a number only the perso -- GossiTheDog
GossiTheDog: @hugoslabbert @notshenetworks Guess what Cisco Duo doesn’t support ???? -- GossiTheDog
TalosSecurity: That’s a wrap on our first day at #BHUSA come see us tomorrow starting at 10am for stickers, snorties &amp; more https://t.co/67YsMnWeGt -- TalosSecurity
424f424f: @Mudit__Gupta @CurveFinance "Should" -- 424f424f
424f424f: @HackingLZ I laughed when I saw *INSERTNAME*-XDR.exe running in my process listing yesterday. :) -- 424f424f
malware_traffic: I will be running a #pcap analysis workshop for @BSides_NoVA on Friday 2022-09-09! Registration for the conference will open soon. Until then, more info on my workshop and a link to the rest of the #BSidesNoVA schedule is available at: -- malware_traffic
424f424f: @gpuhot lol -- 424f424f
cyb3rops: I promised to keep you posted on the fundraiser for Richard, the young developer from Zambia, who had nothing more than an Android phone &amp; often saved money to buy Internet data volume. With your donations, he was now able to buy a PC &amp; -- cyb3rops
GossiTheDog: @selenalarson @HowellONeill https://t.co/PyAckjzo1p -- GossiTheDog
GossiTheDog: If it’s announced spiders now have COVID next week, I’m going into hiding, or renaming my account Spider Man. -- GossiTheDog
GossiTheDog: Great thread. One call out from me - one of my friends orgs got hit with multiple ransomware groups simultaneously recently. It didn’t appear overly coordinated, just once they smell blood it’s a bit of a feast as to who can do most damag -- GossiTheDog
GossiTheDog: @HowellONeill I was? -- GossiTheDog
GossiTheDog: @doubleshiny I’ll voice right bollock, it’s my rider -- GossiTheDog
pmelson: Today, thanks to some great work by @muzisec, I pushed a module for #Remcos RAT 3.x to @ScumBots after finding a pretty steady wave of in stages on paste[.]io. https://t.co/j9zptxxpm6 -- pmelson
424f424f: @DeanOfCyber @kha1ifuzz @Voulnet Congrats -- 424f424f
ankit_anubhav: @Gi7w0rm @vxunderground https://t.co/At8adqVSnb @serghei has gotten it confirmed with Cisco as per this report from him. https://t.co/FfvZMZp9hD -- ankit_anubhav
vxunderground: @Gi7w0rm Update: per @BleepinComputer and @Cisco representatives, this is a real breach. More info here: https://t.co/DzBsouymnX -- vxunderground
424f424f: @gpuhot Where were the coins purchased from? -- 424f424f
aboutsecurity: @HackingButLegal @BlackBerry @dimitribest Are you around Jackie? Would love to say hi ???????? -- aboutsecurity
Arkbird_SOLG: Yara: https://t.co/42cNtfN9fb -- Arkbird_SOLG
Arkbird_SOLG: I share some Yara rules for the tools used by #Knotweed and #FIN13 group, #WoodyRAT, SafeSound ransomware and the loader from #Actor210426. Thanks to @souiten @h2jazi @JAMESWT_MHT @c3rb3ru5d3d53c @vxunderground for the samples (added additi -- Arkbird_SOLG
GossiTheDog: @doubleshiny I feel like Marvel should buy the rights off me tbh -- GossiTheDog
GossiTheDog: Went to close a window, a spider was there and I snagged their web. I tried to shake the spider off. It webbed onto my bollocks. (Naked because have COVID and haven’t been arsed to get dressed). Had to run around house shaking a spider of -- GossiTheDog
hackerfantastic: MFA fatigue.... ???? "we permitted this because the user got fed up with clicking no" https://t.co/H6vlKJguv6 -- hackerfantastic
inj3ct0r: #0day #Sophos #XG115w #Firewall 17.0.10 MR-10 Authentication #Bypass #Vulnerability https://t.co/Fkaz2qP3F9 -- inj3ct0r
inj3ct0r: #0day #PANOS 10.0 - Remote Code Execution (Authenticated) #Exploit #RCE https://t.co/4czDjHQvD9 -- inj3ct0r
inj3ct0r: #0day #Matrimonial #PHPScript 1.0 #SQLi #Injection #Vulnerability https://t.co/ir7aWs1ELd -- inj3ct0r
inj3ct0r: #0day #AirSpot 5410 0.3.4.1-4 Remote Command #Injection #Exploit #RCE https://t.co/xtR679PljF -- inj3ct0r
inj3ct0r: #0day #Zimbra zmslapd Privilege Escalation #Exploit #LPE https://t.co/FIwIYrKI0I -- inj3ct0r
James_inthe_box: @da_667 #nemesis by the look of it....seems based off of #pennywise...right up to the PID in the high range and AppLaunch. https://t.co/6U0TjIKusv -- James_inthe_box
James_inthe_box: @ankit_anubhav @Gi7w0rm @vxunderground @serghei https://t.co/8seOG6mv4b -- James_inthe_box
JAMESWT_MHT: @de_cachuelo pls remove the #scam announcement, claiming to be from @Domofinance, which has been up since Sep 2021 /decachuelo.com/cachuelo/1612/directrice-generale-deleguee-de-domofinance/ @Arcotel_ec @EcuCERT_EC the related morgaucemaelle -- JAMESWT_MHT
JAMESWT_MHT: ???? https://t.co/Kz7l0K5Aot -- JAMESWT_MHT
JAMESWT_MHT: @illegalFawn @BancaMediolanum @infomaniak @malwrhunterteam @guelfoweb @FBussoletti @dubstard @PhishStats ???? https://t.co/uurfzlZFsZ -- JAMESWT_MHT
KorbenD_Intel: Two opportunities to stop this: MFA registration and endpoint privilege escalation https://t.co/ulNXpbc0Ax -- KorbenD_Intel
malware_traffic: @Unit42_Intel #pcap of the #IcedID/#CobaltStrike infection traffic and the associated malware/artifacts are available at: https://t.co/7vzlskFHO1 https://t.co/lTZKOUYWmd -- malware_traffic
MBThreatIntel: ℹ️ Traffic redirection ➡️ Google Search: www.googleadservices[.]com ➡️ Click on ad: clickserve[.]dartsearch[.]net ➡️ Cloaking domain: newpop[.]org ➡️ Browser locker: 142.93.113[.]230/windowsecurity https://t.co/Jgj7FNlVl5 -- MBThreatIntel
MBThreatIntel: This threat actor (#techsupportscams) is using Google Ads for #malvertising via their newpop[.]org domain. We observed them making changes in real time via an exposed #opendir ???? https://t.co/RzWy0IHGKi -- MBThreatIntel
MBThreatIntel: @Namecheap could you please review and take action on: newpop[.]org -- MBThreatIntel
VK_Intel: ⚡️Published "#BazarCall Advisory: Essential Guide to Attack Vector that Revolutionized Data Breaches" ????Post-#Conti targeted phishing tactics derived from the call back phishing method for #ransomware &amp; exfil 1⃣Silent Ransom 2⃣Quantum 3⃣ -- VK_Intel
TalosSecurity: Talos Booth Talk on Modern Attacks, swing by our booth at #BHUSA2022 to listen in now https://t.co/IVRLURQw2j -- TalosSecurity
aboutsecurity: Come to say hi and get your own copy of ‘Finding Beacons in the Dark’ from our awesome @BlackBerry Threat Research &amp; Intelligence team, with @dimitribest and @sinebx #BHUSA #BHUSA2022 #CobaltStrike #FindingBeacons https://t.co/kYMWrHNOI -- aboutsecurity
aboutsecurity: Our own @rj_chap showing how #ransomware threat actors behave, their weapons and TTPs, and how to combine prevention, visibility, detection and response to stop them in their tracks &amp; make them cry #BHUSA #BHUSA2022 https://t.co/iOfcCX7 -- aboutsecurity
ankit_anubhav: @Gi7w0rm @SOSIntel @heiseonline @malwrhunterteam @S0ufi4n3 @campuscodi @zackwhittaker I had a look today at the filenames by doing some basic correlation from the people names vs their career in LinkedIn etc. The data doesn't look made up -- ankit_anubhav
James_inthe_box: @da_667 @Unit42_Intel cc @malware_traffic -- James_inthe_box
KorbenD_Intel: The cloud/virtualization peeps are feeling somewhat smug. https://t.co/nYaXuaaVRi -- KorbenD_Intel
malware_traffic: @Unit42_Intel I'll say it before anyone else does: Three Cobalt Strikes, and you're out! -- malware_traffic
malware_traffic: @Unit42_Intel #CobaltStrike on 2022-08-10 from #IcedID: hxxp://lobazedeke[.]com/jjj.dll C2: 213.227.154[.]169:443 junudorij[.]com hxxp://172.93.98[.]170/download/a2.dll C2: 23.106.215[.]64:443 jahojahi[.]com hxxp://104.243.42[.]63/dow -- malware_traffic
malware_traffic: @James_inthe_box @da_667 @Unit42_Intel Unfortunately, I wasn't involved in that report, and I don't have any pcaps of the infection traffic. I'll see if I can find any current samples and try to generate some traffic. -- malware_traffic
malware_traffic: @utsuk_ladki @Unit42_Intel @Cryptolaemus1 I'll do that, but it's also available at: https://t.co/DmSklyZT1M -- malware_traffic
malwrhunterteam: "anotherqr.apk": 214a576b46241bdf76bb4dbeacc7a456905eacd345fc515e0b38d6976c271168 From (opendir): http://repo.had0k3n[.]tech/anotherqr.apk MasterFred? ???? https://t.co/bWWOyqUqtX -- malwrhunterteam
malwrhunterteam: ????, but poor cat... https://t.co/fhIZKk0EnS -- malwrhunterteam
malwrhunterteam: @JosepAlbors @0xDanielLopez "We are one of the most popular malware developers in the world." "ThreadFabric" ???? @ThreatFabric https://t.co/hpsyLGAxz9 -- malwrhunterteam
malwrhunterteam: @JosepAlbors @0xDanielLopez https://t.co/rH7rLwYZnh -- malwrhunterteam
MBThreatIntel: ⚠️ Fake Google Chrome update site that pushes an extension. ➡️ chrome-update[.]com https://t.co/eUKL798cyH -- MBThreatIntel
RansomwareNews: Group: lockbit3 Approx. Time: 2022-08-10 18:53:29.061338 Title: https://t.co/NlG4Aqu70F -- RansomwareNews
RansomwareNews: Group: lockbit3 Approx. Time: 2022-08-10 18:53:26.946043 Title: https://t.co/X3bSuP4R4G -- RansomwareNews
TalosSecurity: @EvanMintzer ???? what a collection! We’ll have to see if we can make something HAM-en… -- TalosSecurity
TalosSecurity: Missed David’s talk? Don’t be sad like David, come talk to us at the Talos booth #BHUSA2022 https://t.co/mH7GFbYAsg -- TalosSecurity
TalosSecurity: Are you in the booth? David is… Talos Booth Talks happening now https://t.co/GCNWD7xWxj -- TalosSecurity
vxunderground: @Gi7w0rm vx-underground invented the typographical error. Yanluowang ransomware group claims to have RANSOMED* Cisco. -- vxunderground
vxunderground: Yanluowang ransomware group claims to have breached Cisco. Intel and images provided via @Gi7w0rm https://t.co/HeW6k1VrR3 -- vxunderground
424f424f: @realytcracker @defcon @defconparties @mcohmi @ZoukGroupLV @deadmau5 Damn, missing out. Good luck and have fun! -- 424f424f
aboutsecurity: Reason 3: Business leaders don’t properly understand threat modeling or risk management. We need leaders to look beyond short term. “How can a Chinese invasion of Taiwan affect my business, my operations overseas?” Plan where you want to be -- aboutsecurity
aboutsecurity: Reason 2: Threat Actors understand the nature of our business. That’s why they’re targeting the supply chain. “If you’re shipping products, you’re shipping targets.” @C_C_Krebs #BHUSA https://t.co/J34hrg7jKq -- aboutsecurity
aboutsecurity: “Why is this so bad? Reason 1. Technology: Software remains vulnerable because the benefits outweighs the risk. Market pressures and economic headwinds will not help to prioritize security vs other biz priorities (ie. being 1st to market).” -- aboutsecurity
RansomwareNews: Group: yanluowang Approx. Time: 2022-08-10 16:48:46.051826 Title: Hot news straight from Cisco -- RansomwareNews
vxunderground: @ParanoidChip https://t.co/hsl6lUxQGC -- vxunderground
vxunderground: Earlier today "Топор Live" reported pro-Russian hacker groups Killnet, Anonymous Russia, and CarbonSec had successfully breached Lockheed Martin, exfiltrated data, and disabled their security badges. Their evidence of this breach is a Clou -- vxunderground
GossiTheDog: “Hotbit announced the suspension on Twitter with a GIF of a crying Anya from the anime series Spy × Family” https://t.co/fDctRfP006 -- GossiTheDog
James_inthe_box: @Namecheap @malwrhunterteam @IRSnews Should be #mars #stealer, additional host: 195.201.251.131 https://t.co/RiP78J1rsK -- James_inthe_box
James_inthe_box: @Myrtus0x0 #smokeloader leaps to mind. -- James_inthe_box
KorbenD_Intel: @jessfraz When the equation editor bug/vulnerability/exploit occurred, it was suggested that even Microsoft no longer had the source code. -- KorbenD_Intel
malwrhunterteam: Another bug, or another "bug"? https://t.co/GHFI3HgQY6 -- malwrhunterteam
MBThreatIntel: @ex_raritas Fine, update your other browsers then ???? https://t.co/fUlr0ptprq -- MBThreatIntel
SpecterOps: At #BHUSA today? So are we! Stop by Booth 2940 to say hi and catch a BloodHound Enterprise demo! -- SpecterOps
TalosSecurity: We’re live here at #BHUSA and Ashlee is opening booth talks now! Swing by booth #1932 to learn bow you can “break” into #InfoSec https://t.co/zdeCfHm9NU -- TalosSecurity
TalosSecurity: Come by the Cisco Secure booth today at #BHUSA for one of our lightning talks to pick up this new #Snort3 Snorty and round out your malware mascot sticker collection https://t.co/o4VYl4YKrm -- TalosSecurity
424f424f: Be sure to join us for another great episode Friday 1PM est! We'll have some guests streaming live from #defccon https://t.co/c8vHDFhSgD -- 424f424f
58_158_177_102: @_sumisaka 生麺パック買って帰ったら麺パーティする? with @kinyuka さん -- 58_158_177_102
58_158_177_102: @tuchiryuu https://t.co/4PRHS2ZRXr -- 58_158_177_102
58_158_177_102: 禁断の。。。夜食らー https://t.co/YUJzCeVT6E -- 58_158_177_102
aboutsecurity: And it’s happening! @thedarktangent kicking off #BHUSA 25th edition. Ping me if you’re around, or look for me at the @BlackBerry booth in the exhibition hall. https://t.co/2Xs1D5H4QX -- aboutsecurity
ankit_anubhav: @TinyInfoSec Dm -- ankit_anubhav
ankit_anubhav: @pr0xylife @Max_Mal_ @0xToxin @1ZRR4H @malwarelabnet The XOR will not always be so simple. For example cmd /c set /a "0x467DC3EF^2085060765" in this one https://t.co/g89waqttQX However , these activities basically burst the amount of conh -- ankit_anubhav
ankit_anubhav: #Guloader creating strings one char at a time, from a result of XOR operations cmd /c sET /A "0x49^2" = 0x4b = K cmd /c sET /A "0x47^2" = 0x45 = E cmd /c sET /A "0x50^2" = 0x52 = R makes KER for KERNEL32::CreateFileA and so on.. https:// -- ankit_anubhav
ankit_anubhav: @0xToxin @1ZRR4H @malwrhunterteam @JAMESWT_MHT @kienbigmummy @pr0xylife @Gi7w0rm Ok lets prepare for /br[0-9]{2}/ in advance :) -- ankit_anubhav
ankit_anubhav: @0xToxin @1ZRR4H @malwrhunterteam @JAMESWT_MHT @kienbigmummy @pr0xylife @Gi7w0rm I have seen /br01/ /br02/ and now /br06/ !! Worth checking for such URL patterns .. -- ankit_anubhav
James_inthe_box: @Namecheap @malwrhunterteam @IRSnews This is a neat find... https://t.co/mJUTWSaMSq https://t.co/hN3O91VMc4 -- James_inthe_box
lazyactivist192: @ComradeOhio Did you do the Comanche version? Was very enjoyable, although sad they decided to dub Comanche, would've been awesome if it all matched up -- lazyactivist192
malwrhunterteam: Some Salesforce phishing: https://verify-email-e8a07.web[.]app/ https://t.co/9OkJFX2Hwh -- malwrhunterteam
malwrhunterteam: ???? https://t.co/B6NlgzPUVb -- malwrhunterteam
MBThreatIntel: #FakeUpdates/#SocGholish ➡️ Theme: sonic[.]myr2b[.]me ➡️ C2: telegram[.]godsmightywhispers[.]com 77.91.127[.]52 https://t.co/Gs3jWd04BD -- MBThreatIntel
pmelson: ???? https://t.co/mQt3e1e6vX https://t.co/0xIYWE8SxZ -- pmelson
reecdeep: #GuLoader #CloudEye hxxps://drive.google.com/uc?export=download&amp;id=1LTeiNL9BF85fK-Oe9ttcf1ajKepHKwKR second stage is a fresh #FormBook #malware ➡️https://t.co/duStQW6i8g ????real C2: hxxp://gilalspence.com campaign: niku #infosec #securit -- reecdeep
58_158_177_102: Japanese Bon Dance festival https://t.co/c9mxGjgLTE -- 58_158_177_102
58_158_177_102: @_sumisaka 最初のボトルキープ予約!(そしてその場でキープせず最初に空けそう) -- 58_158_177_102
Arkbird_SOLG: @abuse_ch @JAMESWT_MHT @adrian__luca The source code of the JAR file is pretty obfuscated with lot math ops, in addition to recognition actions as anti-debug, this loads a Java bytecode in the JVM, this looks like the malware banload but not -- Arkbird_SOLG
hackerfantastic: @compu_85 @patogrosopy @RetroTechDreams I would've totally loved to rock this one in it's day! -- hackerfantastic
hackerfantastic: @compu_85 @patogrosopy @RetroTechDreams Thanks for sharing more details, there should be a computer encyclopedia due to all the many variations of interesting things - seems every hacker I ever met (from a certain era) can tell you of at -- hackerfantastic
hackerfantastic: @Jennifer_Arcuri @KernowMaiden ❤️❤️ You're superstars, congratulations ???? -- hackerfantastic
hackerfantastic: @patogrosopy @RetroTechDreams It's a beautiful machine, love the aesthetics on these. If it runs linux kernel and bash, I approve! ;) -- hackerfantastic
IntezerLabs: Threat Hunting Tip: You can proactively extract rules from Intezer to hunt for infected machines in your organization. We recently rolled this feature out - see how it works in this 1 minute example video extracting a rule to hunt for Agent -- IntezerLabs
pmelson: @mojoesec https://pastebin[.]com/5G9NiNWD -- pmelson
pmelson: @mojoesec Hey, look who it is! https://t.co/AEsMKcIdOO -- pmelson
James_inthe_box: @Glacius_ @malwrhunterteam cc @ViriBack on the panel -- James_inthe_box
JAMESWT_MHT: #Phishing spam email #bank @BancaMediolanum " Account bloccato per motivi di sicurezza.!" ⚠️https://www.caitsa[.ch/wp-admin/mediolanum/bancaMediolanum/auth/login @infomaniak https://t.co/EgnjRxLQJw -- JAMESWT_MHT
JAMESWT_MHT: @Marco_Ramilli @James_inthe_box @malwaremustd1e @0xrb Un #tag al giorno leva il medico di torno???? https://t.co/GPQQudJdul https://t.co/Ly7mJ5000n -- JAMESWT_MHT
snovvcrash: @_RastaMouse Not asking in Twitter how to stop reading Twitter ???? -- snovvcrash
TalosSecurity: Swing by the Career Zone at #BHUSA to talk to us about our current openings AND grab one of these unique Snortys https://t.co/toeL8a4ZPh -- TalosSecurity
TalosSecurity: Happy #BlackHat everyone! We're kicking things off with three sessions today, including an overview of our work in #Ukraine. Check out the site here https://t.co/TZyrGNpWOE for details https://t.co/15hCM1dJPR -- TalosSecurity
virusbtn: A reminder that the #VB2022 call for last-minute papers - presenting 'hot' research and material that is truly up-to-the-minute - is open until 1 Sept. To share your research with an international audience of security experts submit your proposa -- virusbtn
58_158_177_102: 夜機内食 金曜休みにしました JALの機内日本酒のセレクトをされている方は、(僭越ですが)多分、私と好みの系統が同じで今回もいい銘柄を教えて貰いました (山口 長州酒造さん 天美 純米大吟醸) https://t.co/63kUATsB1s -- 58_158_177_102
luc4m: https://t.co/MY5MdL2jEe -- luc4m
luc4m: tracking.. #urnisf #isfb version:2.50 build:240 group:3000 [Jul 26 2022][/images/][Jv1GYc8A8hCBIeVD] MB:62cdd734fdd2d50b1f36f16dac017061 C2:79.110.52, leonxmdeok,at 5.42.199,57 deohomexm,at modules: 5.42.199,72 [stilak64|cook64] Overlapping C2 o -- luc4m
Cyb3rWard0g: @_xpn_ ???? hope you can get some rest and relax a little bit when you get there ???? -- Cyb3rWard0g
Cyb3rWard0g: @_xpn_ https://t.co/GGY8p1gGTn -- Cyb3rWard0g
hackerfantastic: This is a great thread to catch-up and shows @Jennifer_Arcuri Telegram group at it's best, #WellnessWednesday is a chance to affirm your manifestations. I have taken to writing daily affirmations in Morse code ~ today: .-. --- --- - ..... -- hackerfantastic
hackerfantastic: @Jennifer_Arcuri @ShibaNFTXRPL Looking radiant in these photo's gorgeous ???????? you glow girl ????⛱️ ???? -- hackerfantastic
hackerfantastic: @ShibaNFT1Army @Jennifer_Arcuri @ShibaNFTXRPL She certainly is stunning, amazing ~ all that and more, why I married her ???????? knows her stuff in the Blockchain space too so @shibanftxrpl are lucky to have her promote them!???? -- hackerfantastic
JAMESWT_MHT: #phishing #bank spam email "Misure di sicurezza" @BancaSella https://www.banca-sella.gbi-beton.]info @STRATO_AG @Cronon_DE from #compromised gbi-beton[.info @STRATO_AG @Cronon_DE https://t.co/BNZOkT52hy -- JAMESWT_MHT
malwrhunterteam: About this PLAY ransomware junk: https://t.co/UXyf3eVWb8 I have seen like 5-10 samples of it, from the last ~2 months. Oldest seen: 7d14b98cdc1b898bd0d9be80398fc59ab560e8c44e0a9dedac8ad4ece3d450b0 Recent example: 006ae41910887f0811a3ba286 -- malwrhunterteam
virusbtn: The Cybereason Blue Team describe how Microsoft's rundll32.exe tool, which allows code to be loaded and executed, is often used by adversaries during their offensive operations. https://t.co/VaBZF9Sb33 https://t.co/SFruKV1jdm -- virusbtn
Hexacorn: @NathanMcNulty @UK_Daniel_Card @Kostastsale your younger self sounds like my younger self ???? -- Hexacorn
Hexacorn: @UK_Daniel_Card @Kostastsale It's only when we get older we realize why pure 'techies' that can do the job are not the bestprogram builders. Technical bit tends to be a very small part of the success, long-term. -- Hexacorn
Hexacorn: @Kostastsale @UK_Daniel_Card Not disagreeing, but want to point out that it sometimes takes years to fix problems many inexperienced hires bring to long-term programs. I worked with a few people like this where they completely ignored the experi -- Hexacorn
reecdeep: @egdutra work in progress man -- reecdeep
58_158_177_102: 昼汁ビーフン 外に出るか中にとどまるか、かなり逡巡したけれど、社食メニューがちょっと魅力なく決意の外出をした結果汗だくに。。。 https://t.co/dNflOMII9H -- 58_158_177_102
GossiTheDog: @UK_Daniel_Card https://t.co/M57Djat1ix -- GossiTheDog
JAMESWT_MHT: @0xrb @3xp0rtblog @Cryptolaemus1 mentioned samples + extra dropped https://t.co/OIcxL1mAdb Run https://t.co/ewsSOfVYmp https://t.co/o8snNGWaur -- JAMESWT_MHT
JAMESWT_MHT: @ShadowChasing1 Mentioned #Oceanlotus (#APT32) Samples + extra???? https://t.co/IgEV0RdOPj https://t.co/bYFF81O2Cp -- JAMESWT_MHT
ShadowChasing1: ITW:e357641129c554d0ef82cc1e725a996e filename:link. zip it include an pdf file named (1. Description &amp; Responsibilities.pdf) and see it ↓ https://t.co/Y7Qh6sZPfH https://t.co/6N82KltOCa -- ShadowChasing1
ShadowChasing1: ITW:1e8d4fbebbad2fe99857949146cf72de filename:MSVCR100.dll -- ShadowChasing1
ShadowChasing1: Today our researchers have found sample which belongs to #Oceanlotus(#APT32) Group ITW:8128a63bab1a0e5802d9db94eb2ce551 filename:Screenshot.rar ITW:7c22121f33af2bad8656ac09300416ee filename:Screenshot 2022-08-10 102463453453123213132534535 -- ShadowChasing1
virusbtn: Red Canary's @PartyD0lphin looks at how to protect against adversaries manipulating application bundles to subvert security controls, elevate privileges &amp; install malware on macOS devices. https://t.co/vgxBiQmCzj https://t.co/0tdKoze3Ia -- virusbtn
malwrhunterteam: ???? https://t.co/WT9YNBllQX -- malwrhunterteam
JAMESWT_MHT: "Sollecito! prima della disattivazione" #phishing @Apple @iTunes redirect https://jagaranmf.suravical.[com/rtx.html phishing page https://fatturazioneitunes.serveirc.[com/supporto/ @NoIPcom https://t.co/kYh9gFDhev -- JAMESWT_MHT
malwrhunterteam: ???? https://t.co/gOjW3SPP7m -- malwrhunterteam
campuscodi: Okta: Last year we found AitM capabilities in more than half of all detected phishing infrastructure https://t.co/k6GLkFGJqW -- campuscodi
vxunderground: An individual on breached (the successor to the infamous RaidForums) is selling data from cyber security companies in Mexico. They claim to have internal data from Deloitte, BishopFox, KPMG, and Scitum Enjoy BlackHat and/or Defcon while yo -- vxunderground
424f424f: @_xpn_ Perfect time to get coding done -- 424f424f
424f424f: @cantcomputer So fun to drive. -- 424f424f
424f424f: @outsideratilla @Drift0r Tagging this thread so I can laugh at it 5 years later. -- 424f424f
424f424f: "It's ok, our domain controller auto patches from the internet" -anon admin https://t.co/Q2ZHvnA0c3 -- 424f424f
424f424f: @grumpyvadercat @strandjs Ha, my coffee is sweetened with Admin tears. Especially when they think they've caught you. Like an iceberg you may only see a small percentage of what's happening. -- 424f424f
vxunderground: We've updated the vx-underground malware source code collection on GitHub - Merged proof-of-concept collection with malware source code collection - Added Win32.PryntStealer.g - Added Win32.Rust.RedLizard - All submissions reviewed! ???? -- vxunderground
424f424f: @_wald0 https://t.co/bGBrpqGZOH -- 424f424f
424f424f: Over here getting shells while the kids play at #DEFCON summer camp. https://t.co/c0eozy5aA4 -- 424f424f
424f424f: @Ben0xA @curi0usJack @Flangvik @TrustedSec I see a hackers reference.. https://t.co/NbV0XvwXnn -- 424f424f
VK_Intel: @LikelyMalware @Gi7w0rm The interviews with the cybercriminals is another story. Not a fan how companies provide the platform for crooks to spread their crime marketing messages. I do not trust a single word they say especially after the Mandia -- VK_Intel
424f424f: @justinforbes @Snubs @defcon So you're the guy with one shirt for the week ???? -- 424f424f
nullcookies: @CryptoprenuerUK https://t.co/I4t5cV5ur7 -- nullcookies
nullcookies: DMs open if you want to meet up during DEF CON. ???? -- nullcookies
vxunderground: @6D7373 https://t.co/IpFzhoBLpM -- vxunderground
hackerfantastic: The future made in America people will all be microchipped... https://t.co/HZzsKUpsYZ -- hackerfantastic
hackerfantastic: @sourceincite "pop thy shell" -- hackerfantastic
58_158_177_102: 昼らー 夜の会食の店、最近はやりのQRを読んでスマホ注文の仕組み立ったけど、電話番号登録からの会員登録を強制する仕組みで、さすがにこういう注文形式の店は事前告知すべきだと思う(使いたくないから) https://t.co/j9pz2RKGFn -- 58_158_177_102
KorbenD_Intel: #CobaltStrike windows-audio[.]com / ssl[.]windows-audio[.]com / 91.206.93[.]139 -- KorbenD_Intel
RansomwareNews: Group: ransomhouse Approx. Time: 2022-08-09 21:04:50.311476 Title: 8 Italy Districts -- RansomwareNews
vxunderground: @NewPlatinumm https://t.co/i3GCwS7K7N -- vxunderground
vxunderground: Hahahahahaha https://t.co/rElMnxQgXr -- vxunderground
vxunderground: To the individual who asked for the password: you're a wonderful person and the people's champion. -- vxunderground
James_inthe_box: @thinkpoison .....stringcheese.....sorry... -- James_inthe_box
snovvcrash: Recently I’ve had to check a pretty big list of AD CS hosts for #ESC8, so I’ve come up with the following one-liner (on multiple lines for readability ????). I was surprised though that tools like httpx or ffuf do not support NTLM authenticat -- snovvcrash
TalosSecurity: Microsoft disclosed more than 120 vulnerabilities today as part of #PatchTuesday, including an issue in #MSDT that's being exploited in the wild. We have a breakdown of the most relevant vulns here along with our detection coverage https:// -- TalosSecurity
abuse_ch: Anyone knows whats this is? Malspam targeting turkish ???????? internet users, using a weaponized office documents ???? Caught by @adrian__luca ???? DOC: ???? https://t.co/Dna8cwSjam JAR: ⚙️ https://t.co/2Y7vCGUgmj Funny fact: It won't run -- abuse_ch
campuscodi: ????: Federal workers are advertising their security clearances on LinkedIn. Agencies say those are ‘top secret’ for a reason https://t.co/WGP1hySNLU -- campuscodi
Cyb3rWard0g: @elegantgent12 @msherman1970 @ForensicITGuy @THE_HELK @FuzzySec Hello @elegantgent12 ! It has been a while and I currently do not have much time tbh. However, I will add it to my backlog to put something similar together in the future ???? Ha -- Cyb3rWard0g
James_inthe_box: @binaryz0ne LoL -- James_inthe_box
James_inthe_box: @binaryz0ne #tweetdeck FTW https://t.co/OwDk1hBBoT -- James_inthe_box
malwrhunterteam: This. Some "experts" keeps counting the "fails" to show how "successful" they are... https://t.co/jkdo1ghIJP -- malwrhunterteam
malwrhunterteam: "Document.pdf.exe": c2e380a024c00eb87cee5ebc6d85b2653825beb0e53f174f300e5fd3507a0e43 ???? -- malwrhunterteam
malwrhunterteam: "RUHSAT-HAKAN-KAYA-30.07.2022.pdf.exe": bad0f0fdfd23f4a4f2df7d32989659223d23d058c013b6255b8be6c07a2a7861 -- malwrhunterteam
malwrhunterteam: "сайт читов.lnk.rar": 2b7cd44ff7dc7f66efc2157b99cfe1b8c6d254f0ed313fd930c68e5bbc94c9bc The .lnk: 6e5f47227b58df264a4741ddd31ef5c87ebd645c6a8aa313651c8f2ce030fcb7 Probably some junk... https://t.co/tLAN58RfXk -- malwrhunterteam
malwrhunterteam: "f_20662f28ad3409bf.rar": 4894e0faf774c5d77d7826a6ed2840905982cbbcf100398265020d7fdc1477c2 The .lnk: 445760e5661e345112d0d2081169c58021bfc999d079d74554cf50d2a9e44c3d Next stage / payload: https://gitlab[.]com/phesmtmm/1/-/raw/main/bbb.exe -- malwrhunterteam
snovvcrash: A pretty neat tool, check this out ???? https://t.co/g6fIoxPJO6 -- snovvcrash
snovvcrash: @icyguider That’s ultra cool man, keep going ???? -- snovvcrash
ankit_anubhav: @anyrun_app @pr0xylife @1ZRR4H @Max_Mal_ The "Support HTML" , shady stuff happening in item1 https://t.co/3CrYYyLW9b -- ankit_anubhav
ankit_anubhav: #IcedID flow https://t.co/v3Zddowea1 https://t.co/eEmZ1XVDYo -- ankit_anubhav
ankit_anubhav: @anyrun_app @pr0xylife @1ZRR4H @Max_Mal_ And if you want to see the code where IcedID dll is popped, just go to the very end of the chm file ! https://t.co/LCqlS9HIk9 -- ankit_anubhav
RansomwareNews: Group: lockbit3 Approx. Time: 2022-08-09 16:46:22.989375 Title: https://t.co/VrGOSYbG4x -- RansomwareNews
ankit_anubhav: @Myrtus0x0 @edelahozuah @abuse_ch @elisalem9 @crudd_re @felixw3000 @executemalware @James_inthe_box @JAMESWT_MHT @Max_Mal_ @pr0xylife It had lots of interesting things as well. Same c2 https://t.co/unmKVCievb -- ankit_anubhav
campuscodi: @poppinfresh421 @JustTeddii I concur ???? -- campuscodi
KorbenD_Intel: @joevest https://t.co/e0KPTbocgV -- KorbenD_Intel
malwrhunterteam: https://t.co/XqdbUMMFP8 https://t.co/XqEWhI0euQ -- malwrhunterteam
malwrhunterteam: @Jan0fficial @DanielGallagher @JayTHL ???? -- malwrhunterteam
malwrhunterteam: ????‍♂️ https://t.co/rICdclWZX3 -- malwrhunterteam
malwrhunterteam: @DanielGallagher ???? -- malwrhunterteam
TalosSecurity: @benmontour Hey there! We recently switched up our tagging system (it's still far from perfect) as part of a behind-the-scenes project. Your best bet is the "Threats" RSS feed https://t.co/Px2cKvXKbI -- TalosSecurity
ankit_anubhav: #IcedID is abusing good old CHM help files. Stolen chain leads to password protected zip which has an ISO. ISO contains CHM + malicious DLL. Victim clicks on CHM and the magic starts ! Good scope of adding some parent process rules. C2 /ab -- ankit_anubhav
GossiTheDog: @DataMinion Yeah I am monitoring that, my blood oxygen is 98% -- GossiTheDog
IntezerLabs: Coming soon ???????? https://t.co/3ShiSolo8k -- IntezerLabs
JCyberSec_: @benmontour Check out @SpamResponse - It is one such reporting system. But Google and Apple won't allow a third party app to scan incoming SMS so there is very little anyone can do -- JCyberSec_
JCyberSec_: @benmontour It is tricky. Rolling out better reporting to all mobile devices. Blocking URLs on the firewall for the wifi. Other than that you don't have control of mobile devices hence why they are being abused. -- JCyberSec_
JCyberSec_: @benmontour All SMS are already scanned but telcos are not keeping this system up to date All reported SMS should then be fed back into the telcos who should then action them to stop any further SMS from being sent Better reporting functions -- JCyberSec_
malware_traffic: @Unit42_Intel sanitized/carved #pcap from the infection, along with the associated #IcedID/#CobaltStrike malware and artifacts are available at https://t.co/DmSklyZT1M https://t.co/3MMzyt7ns7 -- malware_traffic
malwrhunterteam: 5748e91faed45e11172f91d5725c816fa447dff5e96d37ea352a097907d31812 ???? https://t.co/PXP130rAcc -- malwrhunterteam
QuoIntelligence: If you feel your organization needs more proactivity with #Cybersecurity, get ahead of the #ThreatActors and make the right decisions for your situation. Our strategic, bespoke #ThreatIntelligence allows better-informed decisions and fas -- QuoIntelligence
SBousseaden: may hit on ServiceDLL detection :D https://t.co/4GUadXpMSI -- SBousseaden
SBousseaden: https://t.co/odv7sya3kA https://t.co/w6klW590x7 https://t.co/Iok1tOZxD1 -- SBousseaden
ShadowChasing1: hxxps://doc.documentshare.info/iagodK3zBQqUKXJDg/wjJkRpsx7Q4+/VKnDzfXYTQWo= -- ShadowChasing1
ShadowChasing1: Today our researchers have found sample which belongs to #Dangerouspassword(#Lazarus) APT group ITW:e14091ec731b04cbcec888da68cfa0dc filename:Annual Employee Bonus Plans. zip ITW:4cadefa553cf8775c2d879c7c0c44b98 filename:Password.txt.lnk C -- ShadowChasing1
VK_Intel: @paul_eubanks @campuscodi Which RaaS are you referring to? Conti was never a RaaS group / rather a criminal enterprise with the select few crime team leaders having access to the builder. -- VK_Intel
VK_Intel: @LikelyMalware @Gi7w0rm One misconception is that tracking ransomware blog sites tells us any actual "success" rate/story of the groups. Remember: If you see high leak numbers on blogs, it means the LockBit or other groups have made 0 dollars o -- VK_Intel
VK_Intel: @Gi7w0rm @LikelyMalware LockBit is a totally unrelated operation with the new post-Conti members joining them. It is not central to Conti. Professionalism is a trait of my operations of Conti and non-Conti. The distinction is that Conti is a c -- VK_Intel
VK_Intel: @AltShiftPrtScn Yes sir. Let's sync via DM. -- VK_Intel
VK_Intel: @LikelyMalware Yes, they did and many other groups. The LockBit transition is, by and large, not central or essential for Conti members. -- VK_Intel
MITREattack: With macOS &amp; Linux CTI, no news might not always be good news... Check out the latest episode of @SANSDefense #BlueprintPodcast where our very own Mac/Linux Lead @coolestcatiknow joins @SecHubb to discuss tools, lessons, &amp; trends def -- MITREattack
virusbtn: We're thrilled that @hatr will be giving the opening keynote at #VB2022 - presenting a journalist's point of view of investigating threat actors. https://t.co/qgqPlgL09J https://t.co/FNr6YXlY9N -- virusbtn
58_158_177_102: @taku888infinity 電柱と仲良く☆ね -- 58_158_177_102
cyber__sloth: @BushidoToken The IP is still active and serving payload!!!???? -- cyber__sloth
cyber__sloth: @BushidoToken Related script. https://t.co/l976YJpGjD -- cyber__sloth
JCyberSec_: @AlvieriD @GossiTheDog @TheRegister @SOSIntel @UK_Daniel_Card https://t.co/H5iPg7nHB6 -- JCyberSec_
JCyberSec_: @AlvieriD @GossiTheDog @TheRegister @SOSIntel @UK_Daniel_Card The Russian text says "Glory to Ukraine!" ???????? -- JCyberSec_
RansomwareNews: Group: daixin Approx. Time: 2022-08-09 10:44:27.550608 Title: ISTA International GmbH -- RansomwareNews
RansomwareNews: Group: lockbit3 Approx. Time: 2022-08-09 10:44:24.631990 Title: https://t.co/sh39rp8lZ6 -- RansomwareNews
RansomwareNews: Group: lv Approx. Time: 2022-08-09 12:52:15.009640 Title: https://t.co/Jok4e1xQaE -- RansomwareNews
hackerfantastic: Breaking news, Billionaire proves that he has no idea how to have fun with his money. Web3.0. https://t.co/qkj0OCQbRc -- hackerfantastic
JAMESWT_MHT: "Misure di sicurezza #" spam email spread #phishing @BancaSella https://www.banca-sella.[co/ &gt; @Porkbun https://t.co/F0zpJYaA0o -- JAMESWT_MHT
JAMESWT_MHT: #phishing #scam #fraud @Arubait "RIFIUTО DI RINNОVО #" spam email First Submission 2022-07-16 10:21:25 UTC https://www.servizi-problema.[com/ https://t.co/iXFift0VLg -- JAMESWT_MHT
JAMESWT_MHT: "dettagli della spedizione" spam email spread #FormBook (installUtil &gt; chkdsk &gt; cmd) Zip https://t.co/v88HrOvcEu Exe https://t.co/BACiYUTU5m cc @rsaccani https://t.co/s2vIWWtZ9w -- JAMESWT_MHT
JAMESWT_MHT: @Cronon_DE please suspend / revoke #phishing #scam #fraud domain https://www.servizi-problema.[com/ https://t.co/sr2Ip6AQ1e -- JAMESWT_MHT
malwrhunterteam: ???? cc @mduv_security https://t.co/pPejiIRIjD -- malwrhunterteam
malwrhunterteam: https://t.co/0YYFO2i4Hx -- malwrhunterteam
malwrhunterteam: ???? https://t.co/gAU3pEz4nQ -- malwrhunterteam
malwrhunterteam: Some junk, "Document-3099.pdf.lnk": e04e65ddad749789f4f05bb88e2c8bde8df9263950eb120ad1191f217ca0c742 Next stage: http://lindesbergparkeringsanmarkning.netlify[.]app/systemupdate.exe https://t.co/1u9fHPQUh7 -- malwrhunterteam
TalosSecurity: We're so excited to be back at #BHUSA this year in person that we pulled out all the stops and even wrote a jingle for the Career Zone....it's probably been too long since we've been around other humans.... https://t.co/GOmZ7T03Be -- TalosSecurity
virusbtn: Fortinet's James Slaughter examines a recent instance of SmokeLoader, a malware variant that exploits CVEs that are almost more than five years old in its deployment chain. https://t.co/xXyuzORato https://t.co/sXX7eGId2Z -- virusbtn
virusbtn: Check Point researchers look into 10 malicious packages on PyPI. The malicious packages install info-stealers that enable attackers to steal developers' private data and personal credentials. https://t.co/IBWU6KXTA8 https://t.co/ujlbBFz93n -- virusbtn
VK_Intel: ????Gift for the community: Post-#Conti #ransomware operation mindmap world. Enjoy! https://t.co/yw3CU4Qikc -- VK_Intel
58_158_177_102: @tkmru @_sumisaka 早くヴァーチャル化 -- 58_158_177_102
58_158_177_102: @aaqeel87 @BushidoToken @SyscallE @stoerchl @ffforward @abuse_ch @bry_campbell @dms1899 @Cryptolaemus1 @cocaman -- 58_158_177_102
58_158_177_102: @VirITeXplorer @JAMESWT_MHT @cybersaiyanIT @merlos1977 @luc4m @reecdeep @gigafio @killamjr @JRoosen @fr0s7_ @w3ndige @JR0driguezB @James_inthe_box @sugimu_sec @bomccss @AIR3_ytakeda @wato_dn @AES256bit @gorimpthon @hamasho_sec @fumik0_ @_p -- 58_158_177_102
IntezerLabs: Happening TODAY at 10:30am EDT! Join this SANS webinar for a discussion with @MalwareJake and Intezer's Shaul Holtzman about saving resources by leveraging more automation for: ???? Alert triage ???? Incident response ???? Threat hunting -- IntezerLabs
reecdeep: #Gozi #Ursnif #ISFB #malware targets #Italy ???????? thanks to @58_158_177_102 ➡️hxxps://zopxor.com/ 79.110,52.8 79.110,52.80 193.106,191.163 79.110,52.82 79.110,52.94 havefuntxmm,at 5.42,199.57 xerkdeoleone,at PLUGINs: 5.42,199.72 #infosec -- reecdeep
ShadowChasing1: Today our researchers have found sample which used load-side hijacking to load backdoor ITW:657b2327ee788271e1e7b3e3932b38a7 filename: State of play in EU trade policy. zip C2:64.34.205.178 https://t.co/Q0E4naOqzw -- ShadowChasing1
GossiTheDog: @malwrhunterteam @JAMESWT_MHT Your tweets are important though, vendors need you ???? -- GossiTheDog
GossiTheDog: @theAcidRoach They are so far, thanks! -- GossiTheDog
JAMESWT_MHT: @0xToxin @1ZRR4H @ankit_anubhav @Max_Mal_ @pr0xylife @Gi7w0rm @vinopaljiri i like everytime #netsupport malware config32.ini usefull for detection " GatewayAddress=telemetry-cdn-ny.[com:443 SecondaryGateway=sasdi9efasdb3jao9393[.cn:443 " http -- JAMESWT_MHT
JAMESWT_MHT: @ShadowChasing1 https://t.co/I6mcDGjtJp https://t.co/oYrbZSilbY -- JAMESWT_MHT
JAMESWT_MHT: @ShadowChasing1 mentioned sample is online at https://www.dropbox.]com/s/ez52az617s7krum/State%20of%20play%20in%20EU%20trade%20policy [.zip?dl=1 Zip https://t.co/lJqxIZl7Ec Dll https://t.co/GZ4n7E6DG2 https://t.co/EDS8s0GaA9 -- JAMESWT_MHT
JAMESWT_MHT: @0xToxin @1ZRR4H @ankit_anubhav @Max_Mal_ @pr0xylife @Gi7w0rm @vinopaljiri Relations https://t.co/1c2VrpRcDt https://t.co/0GWH9ixy69 -- JAMESWT_MHT
malwrhunterteam: Even more unpopular opinion?: fuck this whole joke TLP shit. https://t.co/ARNNzwS7yc -- malwrhunterteam
malwrhunterteam: Just saw this tweet from 2017. 5 years ago. That was the time when... when I still was full of idiotic thoughts like providing intel is "something good/useful/etc", that it's something you can be proud of, that "this malware stuff" is any -- malwrhunterteam
58_158_177_102: 不定期連載 田町アンモナイト 喫煙所前 https://t.co/YUgWGFAmwq -- 58_158_177_102
anyrun_app: 66% of education organizations were hit by #ransomware Online education has become a regular thing in our lives. Staying safe during training is a #No1 priority for both students and educators. Check how to avoid cyberattacks in online ed -- anyrun_app
cyb3rops: @joshbressers @wdormann I would’ve recommended the same. The preventing sleep column should be in the defaults. -- cyb3rops
GossiTheDog: @butlersimon Thanks -- GossiTheDog
GossiTheDog: For anybody who has had COVID, have you had high pulse rate? Mine was over 100 overnight, trying to figure out if that is normal. -- GossiTheDog
JCyberSec_: These are still going... https://t.co/yMiNs8Kijm -- JCyberSec_
JCyberSec_: The site has a CAPTCHA to block scanners The kit is a puppeteer live kit which reaches out to ????hxxps://panelapihaytch.herokuapp.com/revCustomers/85148/m1! -- JCyberSec_
JCyberSec_: This is a @RevolutApp SMS #phishing campaign still live????⚠️ ????The malicious SMS is injected into the real Revolut thread as the Sender ID has been spoofed. ????hxxps://authorise-login.web.app #KITIntel???? https://t.co/a4JAweddPv -- JCyberSec_
3xp0rtblog: @Gi7w0rm @hasherezade @S0ufi4n3 @0xToxin @ankit_anubhav @malwrhunterteam A battle of piss and shit. When the school vacations are over, pryntstealer will be unavailable ????. -- 3xp0rtblog
cyb3rops: @TomLawrenceTech Ehm, no -- cyb3rops
JAMESWT_MHT: @StopMalvertisin @1ZRR4H @luigi_martire94 Mentioned samples addet to #spy #mekotio collection ???????????? https://t.co/yP2oXDmV7A https://t.co/FhzyX1vcCJ -- JAMESWT_MHT
malwrhunterteam: https://emirateweb.square[.]site/ ???? https://t.co/w96nzLcEc1 -- malwrhunterteam
malwrhunterteam: I stopped tweeting about these usury &amp; spyware 2-in-1 apps in Play, because it is ~useless/pointless. The criminal gang Google supports these shits, they aren't in need of help from ESET (which I also talked about how it is basically -- malwrhunterteam
424f424f: @ImposterKeanu Ok, now do Hunter's laptop password .. -- 424f424f
GossiTheDog: @MalwareTechBlog Least surprising news. https://t.co/GOVqiU46wj -- GossiTheDog
GossiTheDog: Finally the cyber incident we deserve https://t.co/hLrNszQQp9 -- GossiTheDog
malwrhunterteam: @MaelSecurity No idea, it was not enough interesting for me to download, so just tweeted it in case anyone gaf to look... -- malwrhunterteam
58_158_177_102: @encry1024 @ytsuboi0322 ユーザサイドだと、スキルに比例して仕事の幅が広げられる and 仕事によってスキルの幅が広げられる/深められる という感じなので、ベースがあれば、という感覚です 知識よりも実務能力が評価される感じ (そろそろ、今の波が落ち着いたら、前に開催したユーザサイド説明会を企画したい) -- 58_158_177_102
58_158_177_102: 日本語マルウェアメールの接到を確認しています。 #malspam in Japanese #remcos subject : 見積のリクエスト:RFQ-2022080902401220JP sample : https://t.co/nHGunXcFEr (8/59) https://t.co/UPgGbNSa6I https://t.co/b3NCQXOAOK -- 58_158_177_102
RansomwareNews: Group: cheers Approx. Time: 2022-08-09 03:34:50.557865 Title: An Insurance Company -Paid -- RansomwareNews
RansomwareNews: Group: cheers Approx. Time: 2022-08-09 03:34:47.958234 Title: An Turkey Certified Public Accountancy Firms -Unpay -- RansomwareNews
424f424f: New paint job. Now for some stickers to make it go faster. https://t.co/x23L2yb98d -- 424f424f
424f424f: https://t.co/YRFDzBQCjb https://t.co/7AaqKbrU5W -- 424f424f
hackerfantastic: https://t.co/NwRUjivI4A -- hackerfantastic
hackerfantastic: https://t.co/eVjLXLBzei -- hackerfantastic
ItsReallyNick: This but kusto / KQL and I’m in https://t.co/wKMTDSW9nc -- ItsReallyNick
vxunderground: @pentestit https://t.co/CWEmXLGHaK -- vxunderground
vxunderground: @vicpro1 https://t.co/cK9807CH77 -- vxunderground
vxunderground: 1 in 10 Americans believe HTML is a sexually transmitted disease -- vxunderground
vxunderground: @JustAnotherNEET It is more likely Threat Actors will use it to flex their breaches and/or "products". -- vxunderground
malware_traffic: @Ledtech3 https://t.co/Yzbv1oI7ph or https://t.co/WtBlL4PvDl -- malware_traffic
malware_traffic: 2022-08-08 (Monday) - The criminals distributing #SVCready malware can't seem to get their act together today. All the Word documents from today's run error out after enabling macros. #malwareblunders https://t.co/fFUICWTrTC -- malware_traffic
nullcookies: @Israel_Torres https://t.co/PN35BMWxb8 -- nullcookies
nullcookies: When the Bureau executes a search warrant that includes your safe’s contents… there is reason to be concerned. -- nullcookies
VK_Intel: ????Team, I will be in Las Vegas this year. Excited to meet *you* in person. Ping me via DM during Aug 8-13 -- VK_Intel
vxunderground: @n3g4t1v3d4y It watches the things listed. If their is an update, it notifies you. -- vxunderground
GossiTheDog: Also on season 4 of CSI: Don’t Call It Ransomware https://t.co/7kPF1X3cIP -- GossiTheDog
GossiTheDog: A prior recent one, although they didn’t reach PoS network, just the backend infrastructure. https://t.co/Yh6Pcok36v -- GossiTheDog
GossiTheDog: Previously on point of sale devices and outsourcing. https://t.co/RiEf61oejT -- GossiTheDog
GossiTheDog: Point of sale devices at 7-Eleven supermarket in Denmark are down due to a “cyber attack”. I’m told it’s ransomware at an MSP. https://t.co/G4ba5zmbel -- GossiTheDog
GossiTheDog: @JohnLaTwC Great work by all involved. cc @secbughunter -- GossiTheDog
424f424f: Could this #malware beeeee any louder? https://t.co/TagfdqOrr0 -- 424f424f
424f424f: @subtee @gpuhot I see rookie mistakes were made.... -- 424f424f
hackerfantastic: @lowqualityintel @bantg Yeah its in the arctic vault of Github's ???? -- hackerfantastic
hackerfantastic: ... ???? https://t.co/GglwyxjPGR -- hackerfantastic
KorbenD_Intel: #CobaltStrike childhealthresources[.]com / 3.12.164[.]219 -- KorbenD_Intel
malwrhunterteam: "信息技术管理部一线职工疗休养活动对接详情.xls.exe": 743f3874737bbdcf56ea3862bd56244ac4f6cf2009102cc35919d959c612be63 "登录异常情况反应.docx.exe": 9f58bdf55959744d85cd1c78dc37d50a52a055ce2fdc6ba136d8db2df7dd4fdc login.amazonhub[.]xyz @matthewgall https://t.co/iHV6haM -- malwrhunterteam
malwrhunterteam: "test.xlsx.exe": 79244d7234ea7cf4bfd263560e5839c7aa38225739d8bd4a252a3416fba40df4 "D:\WORK\dropper2\Debug\DROPPER2.pdb" ???? -- malwrhunterteam
malwrhunterteam: "Счет за электричество.doc.exe": f326f6cb31d7cbd455b670c893e83af4275fb78d57aad07f7394a82f5e20e549 "C:\Users\grzeg\source\repos\NoWar Ransowmare\Счет за электричество.doc\obj\Debug\Счет за электричество.doc.pdb" -- malwrhunterteam
malwrhunterteam: 0533c2899b66e022f99947715380de652ef58709a906dfd8c09d9af455b57160 https://t.co/p2izb0Gr3d -- malwrhunterteam
GossiTheDog: More data and time needed but I think Treasury may have played a blinder here, we’ll see how it shakes out. -- GossiTheDog
GossiTheDog: GitHub have removed TornadoCash. https://t.co/kCByLoU2wd -- GossiTheDog
424f424f: @urban66ru IKR -- 424f424f
campuscodi: They found out... ???? https://t.co/5MrVtR8Q0m -- campuscodi
Cyb3rWard0g: @DrAzureAD @msftsecresponse Congratulations Nestor! ???????? keep up the great work! ???????? salud! ???? -- Cyb3rWard0g
inj3ct0r: #0day #ManageEngine #ADAudit Plus Path Traversal / XML #Injection #Exploit https://t.co/eyZApuSYut -- inj3ct0r
inj3ct0r: #0day #Nortek Linear #eMerge E3-Series #AccountTakeover #XSS #Vulnerability https://t.co/KL042r4cAi -- inj3ct0r
inj3ct0r: #0day #Nortek Linear #eMerge E3-Series Command #Injection #Vulnerability https://t.co/Idilav1YQs -- inj3ct0r
inj3ct0r: #0day #Nortek Linear #eMerge E3-Series Credential Disclosure #Vulnerability https://t.co/j5S1ScH2yW -- inj3ct0r
inj3ct0r: #0day #WordPress Duplicator 1.4.7.1 Plugin - Unauthenticated Backup Download #Vulnerability https://t.co/eUoF4p54tB -- inj3ct0r
JCyberSec_: @HackingDave This is why telcos need to proactively scan and block malicious traffic on their networks as opposed to delivering these malicious SMS to users. -- JCyberSec_
KorbenD_Intel: @Ledtech3 https://t.co/MiExzB6gny -- KorbenD_Intel
KorbenD_Intel: Cobalt Foul -- KorbenD_Intel
malwrhunterteam: ???? https://t.co/7u1eNrjirP -- malwrhunterteam
malwrhunterteam: Poor Leclerc... https://t.co/4jPApKBrUp -- malwrhunterteam
MITREattack: Headed to Hacker Summer Camp? ATT&amp;CK Lead @_whatshisface, Enterprise Lead @jamieantisocial, Defensive Lead @LexOnTheHunt, &amp; Mac/Linux Lead @coolestcatiknow will all be in town. Drop us a DM, say hi, grab stickers, or catch one of the -- MITREattack
TalosSecurity: Meet the people who truly make the Talos difference. Our Researcher Spotlight series highlights our team members who are in the trenches every day helping to #FightTheGoodFight https://t.co/jodNp5K77n https://t.co/LSqcCauPO6 -- TalosSecurity
vxunderground: Soon we will be open sourcing our Discord-based Threat Intelligence bot. - Written in Python - Easily deployable - Easily add or remove content feeds - Requires Discord API key - Requires Telegram API key List of content it monitors is l -- vxunderground
cyber__sloth: @manyfacedllama @GossiTheDog @cyb3rops Also, namecheap. Yup, Porkbun is a favorite registrar for a lot of actors. Nice analysis :) -- cyber__sloth
cyber__sloth: The actors have been active since at least 2021. They targeted Microsoft, Amazon, etc CC @urlscanio https://t.co/W4j1Jh9kDV -- cyber__sloth
cyber__sloth: I believe the actors just went to Okta webpage and scraped their customer list and created these phishing domains. --just my theory :P -- cyber__sloth
James_inthe_box: @arstechnica @jbrodkin Curious what this would accomplish....sabotage a potential jury pool? -- James_inthe_box
James_inthe_box: @Ledtech3 @GossiTheDog Kevin's measure of time is TV series :) Kinda like some people use food places as landmarks ("Hey did you go to &lt;some place&gt;?" "Oh...you mean by the Burger King?") -- James_inthe_box
JCyberSec_: @andywallace66 @ericlaw It wouldn't. It isn't legitimate. BUT the button points to https://t.co/XGAmzFprKF as Eric said in the thread so there is no weaponisation of the template ... yet... -- JCyberSec_
JCyberSec_: @ericlaw If the link points to https://t.co/XGAmzFprKF as stated it isn't a phish. This must just be a template they are testing to see if it works and how it looks etc. Playing around before adding their malicious URL to the email. We do -- JCyberSec_
nullcookies: @ArmyOfMeat Just wait until you have an amplified rig and experience the demonic shrieking of an incorrect patch. ???? (Worth it.) -- nullcookies
pmelson: @r3dbU7z https://t.co/bDlqlCnCYo https://t.co/7Knf7wJ7C1 -- pmelson
pmelson: @r3dbU7z Extracted files are on VT. First one looks maybe like Remcos 3.x (I did not try and decrypt settings) packed with Enigma Protector. -- pmelson
pmelson: @joeammond @DethVeggie If you listen to 'Epic' with an ice cream cookie sandwich in mind, it takes on a whole new meaning, but the lyrics still work, don't they? -- pmelson
pmelson: @r3dbU7z Looks like two separate encoded PE files in appicon.ico: https://t.co/t4h6nUgBH1 -- pmelson
GossiTheDog: Meet the team responsible for hacking Google https://t.co/KcNcSruoTp -- GossiTheDog
James_inthe_box: @tosscoinwitcher @pr0xylife Or a derivative of same. -- James_inthe_box
James_inthe_box: @tosscoinwitcher @JRoosen @500mk500 @pr0xylife New one to me. -- James_inthe_box
malwrhunterteam: "ankarabelediyepanel.txt.rar": 08a67f41220ab3bf45bf7c53c1a133ef7e90bd91fe7031c899c5ad73ef477a78 The .lnk: b182e34290c7093f1e46b673d764bda6a3eec934bb69d57fc4431a0bc66195ce Next stage / payload: https://cdn.discordapp[.]com/attachments/3351 -- malwrhunterteam
malwrhunterteam: "yahoo.txt.lnk": 437407b43ca5d81a61d750ed5dedc39f226345cd9aa36a6998722f99272b9a23 Next stage: https://raw.githubusercontent[.]com/crisco321/log/main/office.hta https://t.co/9DvSscNv7o -- malwrhunterteam
malwrhunterteam: "08.08.2022.rar": 2d45ab729a94bba8be297561efe2d4705421a78140a85a856d9a985086b2cccf The .lnk: ff7e8580ce6df5d5f5a2448b4646690a6f6d66b1db37f887b451665f4115d1a2 http://a0705076.xsph[.]ru/regiment.txt ???? @ShadowChasing1 @h2jazi https://t.co -- malwrhunterteam
MBThreatIntel: @Namecheap please review sublimetext[.]me -- MBThreatIntel
MBThreatIntel: ⚠️ Fake Sublime Text website at sublimetext[.]me ➡️ Payload: #DCRat c90bd7b3e642eba0ab5a1153dde46a1c01131a773956f54801c7380ba037e6b6 ➡️ C2: h925402f[.]beget[.]tech 185.50.25[.]13 https://t.co/oF46GympL9 -- MBThreatIntel
TalosSecurity: #DarkUtilities is a new command and control-as-a-service platform attackers are already taking advantage of. Read our latest research to see how adversaries are using this in campaigns and how to stay protected https://t.co/LYAydmAcqJ https -- TalosSecurity
TalosSecurity: @Nick_Kelly https://t.co/izj2VAxICg -- TalosSecurity
ankit_anubhav: @Cyb3rMonk A good exe thinking it loaded a good dll but in reality its a bad one. -- ankit_anubhav
cyber__sloth: Twilio breach actors targeted a bunch of other orgs too. That potentially includes Okta as well. Some targeted brands, okta-okta[.]com coinbase-okta[.]com snap-okta[.]com binance-okta[.]com CC @GossiTheDog @cyb3rops https://t.co/1sCvOlVK4n -- cyber__sloth
hackerfantastic: ???? https://t.co/hiwqlQOLc9 -- hackerfantastic
IntezerLabs: @ankit_anubhav @royhalevi ???? This is actually njRAT that shared most code with an njRAT sample that was used by APT-C-23 (https://t.co/bfW41X1d6q). It's now fixed, here's the updated analysis https://t.co/W9sifU5r3L -- IntezerLabs
JCyberSec_: ⚠️Think companies might take SMS phishing seriously now? ????Maybe we should start the communication up with telcos who handle this traffic and block it before it lands on someones mobile... Work at a Telco and ready to take this threat ser -- JCyberSec_
JCyberSec_: A PayPal SMS phishing campaign ???????? ⚠️Using a Linkdin shortner to hide the URL in the SMS 1⃣????hxxps://lnkd.in/gfZsDCdu 2⃣????hxxps://paypal.c-ompayments-detail.review/sign https://t.co/h0gta4iXsr -- JCyberSec_
nullcookies: @ArmyOfMeat They are everywhere. https://t.co/8cI8lLq5k9 -- nullcookies
SBousseaden: Example of maldoc abusing same trick to avoid suspicious office child processes https://t.co/YQBEIO8oWF -- SBousseaden
vxunderground: We've updated the vx-underground Windows Malware paper collection - Backdooring Office Structures Part 1: The Oldschool - API Resolving Obfuscation via Veh - Tampering With Windows Syscalls Have a nice day. You can check it out here: htt -- vxunderground
GossiTheDog: MS publishing Office symbols finally, enabling better external security research. Great move. https://t.co/AIKcDpdmO5 -- GossiTheDog
GossiTheDog: Over a billion to North Korea alone. https://t.co/2MnkV3OxY1 -- GossiTheDog
GossiTheDog: It means that Microsoft are hosting a sanctioned entity now, which is awkward. https://t.co/1fJUXotXAP -- GossiTheDog
GossiTheDog: Donald misunderstood shitposting https://t.co/3gaMqBPDOZ -- GossiTheDog
GossiTheDog: @SteveSyfuhs No, @mrbiffo named me and then locked me in a cupboard. -- GossiTheDog
James_inthe_box: @r3dbU7z That's a neat find. -- James_inthe_box
malwrhunterteam: a08b89a1097898f65d7e5b220c459c36692f185e179485898320172c071f265f "C:\Users\Nicolas\source\repos\FirstMalware\x64\Release\FirstMalware.pdb" ???? https://t.co/69FPvQZM4K -- malwrhunterteam
malwrhunterteam: https://khadmat-zajil-expres.netlify[.]app/ https://t.co/Q0CWA4gjEN -- malwrhunterteam
malwrhunterteam: Another way to use these photos: On the left: how AV vendors / threat intel companies / any company who got pwned, it became public, so they want to save face / etc describe actors. On the right: actors in reality. https://t.co/3pQit3Xlex -- malwrhunterteam
TalosSecurity: Catch up on the vulnerabilities Talos researchers discovered and helped fix recently with our Vulnerability Spotlight blogs. TCL LinkHub mesh Wi-Fi system: https://t.co/xjwpqu0g2W Alyac antivirus: https://t.co/Vxe2mgHABG https://t.co/QCNp -- TalosSecurity
TalosSecurity: The internet is full of threats like malware, ransomware, and APTs. The world is also full of people who work around the clock to keep us safe from those threats https://t.co/4Kdni9tTAl https://t.co/yw4DxeSy65 -- TalosSecurity
archergr: That doesn't sound good. #cybercrime #cybersecurity #infosec #supplychain #uk #nhs #cyberattack #ransomware https://t.co/z3W4gVV2rA -- archergr
s4msecurity: RT @immuniweb: #Ransomware Data Theft Epidemic Fuelling BEC Attacks: https://t.co/2oWyDzsp1t #cybercrime -- s4msecurity
s4msecurity: RT @archergr: That doesn't sound good. #cybercrime #cybersecurity #infosec #supplychain #uk #nhs #cyberattack #ransomware https://t.co/z3… -- s4msecurity
stratandbiz: RT @PwC: ???? BEWARE: Across organisations of all sizes, #cybercrime poses the biggest threat, followed by customer #fraud and asset misapprop… -- stratandbiz
WaltManning1: Cyberattacks are raising health care costs #technocrime #cybercrime https://t.co/RJwjdLkjhE https://t.co/P0Rl9WLx9p -- WaltManning1
0x00000000005: RT @SaraBadran18: Bypassed Cloudflare’s Web Application Firewall (WAF) ❤???????? By @anshvaid4 https://t.co/6lwUubZxWp #hackerone #BugBounty #… -- 0x00000000005
1o4shit: RT @Marco_Ramilli: ????:p://91.151 .89 .220 ????: #MIRAI #opendir with #malware on it. Interesting modules for #gitlab 81 and 911, plenty #prox… -- 1o4shit
A10Networks: Non-reporting of #ransomware incidents leads to a lack of reliable data when it comes to painting an accurate pictu… https://t.co/xyFM9Rppds -- A10Networks
AghiathChbib: What the Zola Hack Can Teach Us About Password Security https://t.co/yCOpYi1k6l #Cybercrime #Cybersecurity -- AghiathChbib
bsidesbangalore: RT @nullcon: ????Live Bug Hunting ????‍???? Enroute ???? Are you ready to contribute in keeping???? @airtelindia India's Largest Telecom secured? ????30 #B… -- bsidesbangalore
constantctech: Hackers broke into Cisco’s network by cracking into an employee’s personal Google account, which synchronized their… https://t.co/0Y2L6Xua7s -- constantctech
CyberIQs_: #BHUSA: The Cyber Safety Review Board Outlines Log4j #infosec #infosecurity #cybersecurity #threatintel… https://t.co/COSIwBNkr3 -- CyberIQs_
CyberIQs_: In a hybrid workforce world, what happens to all #infosec #infosecurity #cybersecurity #threatintel… https://t.co/YX4l8s2fEJ -- CyberIQs_
CyberSecurityN8: RT @I_vishnu_nair: #Cisco says it was breached by hacker linked to notorious #cybercrime groups: #cybersecurity #CyberSec #databreach http… -- CyberSecurityN8
d_2patel: RT @SaraBadran18: Bypassed Cloudflare’s Web Application Firewall (WAF) ❤???????? By @anshvaid4 https://t.co/6lwUubZxWp #hackerone #BugBounty #… -- d_2patel
datasciencebot_: RT @programmerjoke9: Hmm#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #reactjs #bugbounty #Dat… -- datasciencebot_
enricofrasca3g3: RT @programmerjoke9: Hmm#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #reactjs #bugbounty #Dat… -- enricofrasca3g3
FWWMagazine: FWW moderates a discussion on data privacy &amp; cyber security issues facing the automotive sector between Miriam Ball… https://t.co/wuoLzHFAje -- FWWMagazine
GizmoReload: RT @freeprogrammers: Good Search Engines for Pentesters #Pentesting #CyberSec #cyberawarness #cybersecuritytips #informationsecurity #info… -- GizmoReload
Glyptho: RT @haneeni61853819: Bug Bounty Tips #Linux #KaliLinux #Ubuntu #hacking #Cybersecurity #infosec #cyber #BugBounty #web #cyberattacks #pro… -- Glyptho
GoaiDev: RT @programmerjoke9: Hmm#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #reactjs #bugbounty #Dat… -- GoaiDev
gordiestirling: Shocking news that the 111 (NHS) service is having to deal with a #Ransomware attack. I don't think the @BBC callin… https://t.co/w2VX483dKw -- gordiestirling
hicham_zac: If your business was hit by ransomware, how fast could you recover? How quickly could your business return to norma… https://t.co/Vpyx4NjcIS -- hicham_zac
implacableMRA: RT @Sharma025: DCW is openly supporting #honeytrap rackets &amp; #cybercrime ! Full support for the correct advice given by #ShaktiMaan -- implacableMRA
Lago72: NHS IT services held hostage by #ransomware hackers. A #cyberattack on a major IT provider of the NHS has been con… https://t.co/ylrqbKI9zU -- Lago72
MCowartRubrik: I am SO excited for these upcoming #SaveTheData workshops coming up! ???? We're prepping businesses and government age… https://t.co/Y2h15oseZx -- MCowartRubrik
NorthernLearner: Hacking is way Easier when you contact the right hacker. Inbox me now for all your hacking services I'm always ava… https://t.co/B3cTDoItAu -- NorthernLearner
omi_rasta: RT @I_vishnu_nair: #Cisco says it was breached by hacker linked to notorious #cybercrime groups: #cybersecurity #CyberSec #databreach http… -- omi_rasta
programmerjoke9: Hmm#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #reactjs #bugbounty… https://t.co/uEL7efcts2 -- programmerjoke9
PythonBot_By_PM: RT @programmerjoke9: Hmm#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #reactjs #bugbounty #Dat… -- PythonBot_By_PM
rahul05ranjan: RT @programmerjoke9: Hmm#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #reactjs #bugbounty #Dat… -- rahul05ranjan
rwang0: RT @AudreyDesisto: Cisco hacked by Yanluowang ransomware gang, 2.8GB allegedly stolen https://t.co/gClhngG7uT via @BleepinComputer MT @Cisc… -- rwang0
s4msecurity: RT @I_vishnu_nair: #Cisco says it was breached by hacker linked to notorious #cybercrime groups: #cybersecurity #CyberSec #databreach http… -- s4msecurity
sectest9: RT @I_vishnu_nair: #Cisco says it was breached by hacker linked to notorious #cybercrime groups: #cybersecurity #CyberSec #databreach http… -- sectest9
SeKuRiGo: RT @MAlsuwaie: How does #Metasploit tool help digital investigator to gather evidence from a remote system? Metasploit Basics, Part 23: R… -- SeKuRiGo
Selisia: RT @receiptkeepers: Week 65 - 11/08/2022: Fears for patient data after ransomware attack on NHS software supplier. @allthecitizens #Keepin… -- Selisia
SESuter1: RT @EvanKirstel: Fears for patient data after #ransomware attack on #NHS software supplier https://t.co/gpSccOGqNO #cybersecurity #Cyberse… -- SESuter1
Shay_1337: RT @0xKaran: Learn about AWS vulnerabilities by going through multiple levels of challenges. ???? https://t.co/eKYXRWmNhL #bugbounty #bugbou… -- Shay_1337
SiouxCityCrypto: Since the start of the year, #Hackers have #stolen $1.97 billion through 175 #attacks of #Crypto projects… https://t.co/NM3Amq4lYJ -- SiouxCityCrypto
terry_larch: RT @programmerjoke9: Hmm#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #reactjs #bugbounty #Dat… -- terry_larch
warriorgarde: RT @MBThreatIntel: This threat actor (#techsupportscams) is using Google Ads for #malvertising via their newpop[.]org domain. We observed… -- warriorgarde
XeronBot: RT @programmerjoke9: Hmm#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #reactjs #bugbounty #Dat… -- XeronBot
ancreatures: RT @GeoPioneerInc: Shelling targets Sumy region #Ukraine #OSINT https://t.co/pypqEtr1E2 -- ancreatures
arvinaviles: RT @cyb_detective: Goverment data in #OSINT 8 types of government open databases that many countries have and that will be useful to inves… -- arvinaviles
beefyspace: RT @MrsYisWhy: SCMagazine: .@Cloudflare avoided breach despite employees falling for same scam that snared .@twilio https://t.co/g6l6XMI1H4… -- beefyspace
beefyspace: RT @reecdeep: #Lokibot #Malware from #maspam #Loader ➡️hxxps://onedrive.live.com/download?cid=CE2459A928B06CFD&amp;resid=CE2459A928B06CFD%2115… -- beefyspace
beefyspace: RT @CyberIQs_: Achieve XDR Outcomes with MDR #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hacking #cybernews #cy… -- beefyspace
Chris_M_CSH: Explain private access. https://t.co/5QQzdsM9Yq #cybersecurity #fintech #legaltech #medicaltech #malware… https://t.co/ySIiGGt3Fj -- Chris_M_CSH
CyberIQs_: Episode 1248 – DuckDuckGo Responds To Web Backlash, B #infosec #infosecurity #cybersecurity #threatintel… https://t.co/h10T0RHHMY -- CyberIQs_
CyberIQs_: Cisco admits hack on IT network, links attacker to #infosec #infosecurity #cybersecurity #threatintel… https://t.co/rxInwX8dqP -- CyberIQs_
CyberIQs_: Cisco Was Hacked by Yanluowang Ransomware Operators #infosec #infosecurity #cybersecurity #threatintel… https://t.co/8ITBrP424m -- CyberIQs_
CyberIQs_: #BHUSA: Russia's Wiper Attacks Against Ukraine #infosec #infosecurity #cybersecurity #threatintel… https://t.co/RrBxOdEKVy -- CyberIQs_
CyberIQs_: I’m a former nation-state exploiter — here’s why I kn #infosec #infosecurity #cybersecurity #threatintel… https://t.co/jhxDzc9e9o -- CyberIQs_
CyberIQs_: Achieve XDR Outcomes with MDR #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hacking… https://t.co/c6PddJsgJ9 -- CyberIQs_
CyberIQs_: Photos: Black Hat USA 2022 Arsenal #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hacking… https://t.co/cqwxvYKyeZ -- CyberIQs_
CyberSecDN: Slack resets passwords after bug exposes hashes https://t.co/YbniTGp0Nf #threatintel -- CyberSecDN
CyberSecurityN8: RT @SCMagazine: .@Cloudflare avoided breach despite employees falling for same scam that snared .@twilio https://t.co/KmEC0Fw3JW #cybersecu… -- CyberSecurityN8
CyberSecurityN8: RT @CyberIQs_: Episode 1248 – DuckDuckGo Responds To Web Backlash, B #infosec #infosecurity #cybersecurity #threatintel #threatintelligence… -- CyberSecurityN8
d4rksystem: RT @fr0gger_: New technique added into #UnprotectProject by Alex Shwarz including code snippet: "Tamper DLL Export Names &amp; GetProcAddress S… -- d4rksystem
ecarlesi: Possible threat on hxxp://amznvrvyjualansabu[.]com #phishing #enom -- ecarlesi
ecarlesi: Possible threat on hxxp://sozz[.]shop #phishing #paypal -- ecarlesi
ecarlesi: Possible threat on hxxp://soog[.]shop #phishing #paypal -- ecarlesi
evandrix: RT @TheHackersNews: Hackers behind the Cuba #ransomware attacks are using a new remote access trojan called ROMCOM RAT on compromised syste… -- evandrix
fe_tsoc: #picus-security #attackpattern #osint https://t.co/LAmdK00LhE -- fe_tsoc
fe_tsoc: #picus-security #attackpattern #osint https://t.co/oaUdqwQZwA -- fe_tsoc
FrankBleker: RT @dutch_osintguy: Reminder: ABC #OSINT A = Assume Nothing B = Believe Nothing / No one C = Challenge / Check everything #disinformatio… -- FrankBleker
GDPR25thMay18: RT @Chris_M_CSH: Explain private access. https://t.co/5QQzdsM9Yq #cybersecurity #fintech #legaltech #medicaltech #malware #ransomware #phi… -- GDPR25thMay18
GeoPioneerInc: South Sudan Murle Militia Kill Two People, Kidnap Two Children #Ethiopia #OSINT https://t.co/yjWM72cTu7 -- GeoPioneerInc
GeoPioneerInc: Counter-terrorism forces arrest JMB member in Narsingdi #Bangladesh #OSINT https://t.co/hdGtPCrbVy -- GeoPioneerInc
gordiestirling: RT @harshad_hacker: What is #Phishing? Learn from just one image.… -- gordiestirling
iamesdc26: RT @cyb_detective: For 6 months, I've been procrastinating my weekly update to my #osint tool collection. But today I finally collected lin… -- iamesdc26
Intel_sky: Sloane Helicopters AgustaWestland AW109SP Callsign: RRR1303 Reg: G-MAOL Altitude: 1,500 ft Fir: LONDON Tracking li… https://t.co/uL290cOGJr -- Intel_sky
Intel_sky: United States - US Air Force (USAF) Boeing E-3B Sentry Callsign: No callsign Reg: 77-0351 Altitude: 19,998 ft Fir:… https://t.co/OhhmWjADDj -- Intel_sky
J_M_Maverick: RT @USCERT_gov: ???? @CISAgov, through #JCDC, released a free #cybersecurity toolkit to protect #elections. These resources aim to help state… -- J_M_Maverick
jodavaho: Man, if only I had time #osint https://t.co/MJcNGsO3HB -- jodavaho
KelvinJimenezM: RT @SCMagazine: Malware is increasingly bypassing at least one email gateway at organizations https://t.co/oTVFTiTmFi #cybersecurity #infos… -- KelvinJimenezM
MrsYisWhy: SCMagazine: .@Cloudflare avoided breach despite employees falling for same scam that snared .@twilio… https://t.co/I97ivrF9XH -- MrsYisWhy
omi_rasta: RT @SCMagazine: .@Cloudflare avoided breach despite employees falling for same scam that snared .@twilio https://t.co/KmEC0Fw3JW #cybersecu… -- omi_rasta
omi_rasta: RT @CyberIQs_: Episode 1248 – DuckDuckGo Responds To Web Backlash, B #infosec #infosecurity #cybersecurity #threatintel #threatintelligence… -- omi_rasta
peteraCMO: Fact: #emotet has been the most prevalent #malware globally for H1 2022. Check Point’s Mid-Year Cyber Attack Trends… https://t.co/ZEbAB9cf8Z -- peteraCMO
Rafael0Rafa: RT @three_cube: Open Source Intelligence (OSINT): Finding Email Passwords in Dumps with h8mail #osint #h8mail #infosec #cybersecurity #cybe… -- Rafael0Rafa
RDSWEB: RT @UKikaski: 10-08-2022: "At the RUS Navy Base in Sevastopol, the frigate "Admiral Grigorovich" was rearmed with Kalibr cruise missiles. W… -- RDSWEB
RDSWEB: RT @GeoPioneerInc: South Sudan Murle Militia Kill Two People, Kidnap Two Children #Ethiopia #OSINT https://t.co/yjWM72cTu7 -- RDSWEB
reecdeep: #Lokibot #Malware from #maspam #Loader ➡️hxxps://onedrive.live.com/download?cid=CE2459A928B06CFD&amp;resid=CE2459A928B… https://t.co/JrnfMXTwz5 -- reecdeep
SCMagazine: .@Cloudflare avoided breach despite employees falling for same scam that snared .@twilio https://t.co/KmEC0Fw3JW… https://t.co/rFP6y44fUZ -- SCMagazine
sectest9: RT @SCMagazine: .@Cloudflare avoided breach despite employees falling for same scam that snared .@twilio https://t.co/KmEC0Fw3JW #cybersecu… -- sectest9
sectest9: RT @CyberIQs_: Episode 1248 – DuckDuckGo Responds To Web Backlash, B #infosec #infosecurity #cybersecurity #threatintel #threatintelligence… -- sectest9
TheDailyStaffer: RT @UKikaski: 10-08-2022: "At the RUS Navy Base in Sevastopol, the frigate "Admiral Grigorovich" was rearmed with Kalibr cruise missiles. W… -- TheDailyStaffer
Treadstone71LLC: Private Classes on Request CYBERSPACE LIFECYCLE AND OPERATIONS Private Classes on Requestissa #issaintel #blackhat… https://t.co/4RSYNcfKGC -- Treadstone71LLC
AmChemistry: #Diversity provides the potential for greater innovation &amp; creativity in the #chemical industry. @AmChemistry member companies are committed to driving change. Learn how: https://t.co/Ll6AQYTDJ1 #Sustainability https://t.co/BCnNRqh41Z -- AmChemistry
AviationISAC: Registration for the upcoming Aviation Cybersecurity Summit in Orlando, Florida is filling up fast! Topics will range from big-picture strategic thought leadership and operational best practices to industry standards and much more! Register: -- AviationISAC
certbund: Der #G7Gipfel ist schon ein paar Wochen her und verlief aus Sicht der IT-Sicherheit reibungslos. Daran war auch #CERTBund beteiligt. Wir fühlen uns geehrt, dass sich @Bundeskanzler Olaf Scholz heute u.a. bei uns dafür persönlich bedankt hat!???? -- certbund
csirt_it: ‼ #Zimbra: rilevato lo sfruttamento attivo in rete della vulnerabilità CVE-2022-27925 – già sanata dal vendor – presente nel prodotto Zimbra Collaboration ???? https://t.co/EiCX1Qsldr ⚠ Importante aggiornare i prodotti https://t.co/38WXl0k -- csirt_it
CSIRTGOB: #CSIRTGob alerta campaña de #phishing con #malware en falso documento de pago. Más información aquí: https://t.co/oG7raU3y4Z Para más alertas y vulnerabilidades ingresa a https://t.co/y5f2vdSvPE #ciberseguridad https://t.co/pNFEazDTtd -- CSIRTGOB
CSIRTGOB: #CSIRTGob advierte #phishing con #malware con falsa factura. Más información aquí: https://t.co/CFFXaLdY93 Para más alertas y vulnerabilidades ingresa a https://t.co/y5f2vdRY06 #ciberseguridad https://t.co/pQUw34ikMg -- CSIRTGOB
FSISAC: We're offering a new cyber-range exercise called Full-Stack Cyber Competency. Intended to expand your skills outside your core expertise, it will deliver a broad set of topics from #websecurity to #incidentresponse. Learn more here: https://t.co/X -- FSISAC
HC_Ready: Floodwater is not safe to drink, cook or clean with during hurricane emergencies. Read more about protecting your health with our Hurricanes and Tropical Storms Disaster Tip Sheet: https://t.co/2bq8KeJQEd -- HC_Ready
ITISAC: #ICYMI: Our Food &amp; Agriculture SIG is the only #cyber threat information sharing forum dedicated to the #food and #ag industry. Hear what Steve Stellmacher, @Bunge, and Andrew Young, @CocaColaCo, have to say about their experience as SIG membe -- ITISAC
Khabarhub_Eng: Malware has been detected in various links circulating on social media that claim to distribute various gifts on th… https://t.co/35xfHB8FVB -- Khabarhub_Eng
NJCybersecurity: Zscaler @Threatlabz discovered a new strain of a large-scale phishing campaign using adversary-in-the-middle (AiTM) tactics. ThreatLabz reported the AiTM techniques were “capable of bypassing multi-factor authentication (#MFA).” Details -- NJCybersecurity
RH_ISAC: Thank you to everyone who joined us last night at our networking event at Black Hat! ???? We had a great turnout and a great time! #infosec #blackhat #networking #cybersecurity #lasvegas https://t.co/P6yiT5Fdtu -- RH_ISAC
CyberSecurityN8: RT @joeclark947: @CIOonline @avast_antivirus @kaspersky @AVGFree @symantec @ESET @NortonOnline @TheHackersNews @Cisco @Microsoft @IBM @int… -- CyberSecurityN8
joeclark947: RT @joeclark947: @CIOonline @avast_antivirus @kaspersky @AVGFree @symantec @ESET @NortonOnline @TheHackersNews @Cisco @Microsoft @IBM @int… -- joeclark947
joeclark947: RT @joeclark947: @CIOonline @avast_antivirus @kaspersky @AVGFree @symantec @ESET @TheHackersNews @hackernoon @Cisco @Microsoft @IBM @intel… -- joeclark947
sectest9: RT @joeclark947: @CIOonline @avast_antivirus @kaspersky @AVGFree @symantec @ESET @NortonOnline @TheHackersNews @Cisco @Microsoft @IBM @int… -- sectest9
symposit: The TCL LinkHub Mesh Wi-Fi system contains 17 vulnerabilities. Learn More: https://t.co/bhk09RgbeG… https://t.co/1UX6xzw6CT -- symposit
threat_404: RT @CyberSmaht: As Black Hat kicks off, the US government is getting the message on hiring security talent https://t.co/AZ99kHzron #malware… -- threat_404
GoaiDev: RT @IncruxTech: All the data in transit should be through SSL protocol. Apart from the data, all the security best practices should be fo… -- GoaiDev
GurugramNehru: RT @Nyksindia: For security reasons. Your password is something only you should know. You wouldn't give out your banking info, passwords ar… -- GurugramNehru
IncruxTech: All the data in transit should be through SSL protocol. Apart from the data, all the security best practices shou… https://t.co/qr56HDVWwn -- IncruxTech
kakmidah: Home Ministry @KDNPUTRAJAYA : Malaysia recorded RM560 Million in losses from #cybercrime in 2021. #infosec #hackers… https://t.co/ZEKUnK2dpL -- kakmidah
twelvesec: #Klaviyo was #hacked to steal #crypto-focused mailing lists. #CyberSecurity #infosec #cybercrime… https://t.co/3B9J58X0qf -- twelvesec
0xFDoX: RT @zapstiko: This script grab public report from hacker one and make some folders with poc videos #bugbounty #bugbountytips #poc #bug htt… -- 0xFDoX
0xrdnzx: RT @SaraBadran18: Stored XSS to Account Takeover : Going beyond document.cookie | Stealing Session Data from IndexedDB By @AdmiralSec0x01… -- 0xrdnzx
ak_bruster: RT @ReconOne_: Log4j vulnerability was declared "Endemic Vulnerability" by U.S. Cyber Safety Review Board Here is how you can discover it… -- ak_bruster
ak_bruster: RT @gonzxph: Sharing my writeup on how I got my dutch swag, hope you like it. https://t.co/oT2lx53TJB #bugbountytips #bugbounty -- ak_bruster
hackyprince007: RT @0xKaran: Collection of #bugbounty poc Consists almost every vulnerability (100+) HackerOne reports (1000+) ???????????????????? https://t.co/mX3Kfb… -- hackyprince007
Mah3Sec_: RT @0xKaran: Learn about AWS vulnerabilities by going through multiple levels of challenges. ???? https://t.co/eKYXRWmNhL #bugbounty #bugbou… -- Mah3Sec_
RTaphankaew: RT @0xKaran: Learn about AWS vulnerabilities by going through multiple levels of challenges. ???? https://t.co/eKYXRWmNhL #bugbounty #bugbou… -- RTaphankaew
_st0m_: RT @ReconOne_: Log4j vulnerability was declared "Endemic Vulnerability" by U.S. Cyber Safety Review Board Here is how you can discover it… -- _st0m_
benMn10: RT @HackenProof: ✅ [New Bug Bounty] @Ternoa_ has launched 3 bug bounty programs with up to $100,000 reward per critical vulnerability! ▶️ … -- benMn10
d4rk_c0r3: RT @zapstiko: This script grab public report from hacker one and make some folders with poc videos #bugbounty #bugbountytips #poc #bug htt… -- d4rk_c0r3
Mich_ael45: RT @haneeni61853819: Bug Bounty Tips #Linux #KaliLinux #Ubuntu #hacking #Cybersecurity #infosec #cyber #BugBounty #web #cyberattacks #pro… -- Mich_ael45
solarpox: RT @hackinarticles: Bruteforce Your Password #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity… -- solarpox
waseyuddin: RT @timooon107: This is my write-up for achieving Account Takeover via RXSS when there is a HttpOnly flag on the cookies https://t.co/QA9VN… -- waseyuddin
beefyspace: RT @ecarlesi: Threat on hxxp://prodbl[.]com/Infographies/FRANFINANCE/MARIAGE/ #phishing #opendir #gandibar -- beefyspace
ecarlesi: Possible threat on hxxp://wana[.]support/-%20Archive/opensupports_v4[.]11[.]0[.]zip #phishing #opendir #key_systems -- ecarlesi
ecarlesi: Possible threat on hxxp://wana[.]support/-%20Archive/opensupports-master[.]zip #phishing #opendir #key_systems -- ecarlesi
ecarlesi: Possible threat on hxxp://wana[.]support/osTicket-v1[.]16[.]3[.]zip #phishing #opendir #key_systems https://t.co/Rg5rlz7YXD -- ecarlesi
ecarlesi: Possible threat on hxxps://schoolofentry[.]com/wordpress-6[.]0[.]1[.]zip #phishing #opendir #nc -- ecarlesi
ecarlesi: Threat on hxxp://prodbl[.]com/Infographies/FLUKS/REGIONS/Midi/ #phishing #opendir #gandibar -- ecarlesi
ecarlesi: Threat on hxxp://prodbl[.]com/Infographies/FRANFINANCE/MARIAGE/ #phishing #opendir #gandibar -- ecarlesi
_Lord_Heathen: In this post ⚡ I use TOR &amp; into the darkweb to ????show you ????black markets, FULLZ (peoples full creds 4 identity theft… https://t.co/4opqZmUzgq -- _Lord_Heathen
CloudF0475: RT @CyberNews: A #software provider to #Britain’s vast state-run #healthcare sector has confirmed that a recently disclosed breach of its s… -- CloudF0475
CyberIQs_: Customer Success Manager #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hacking #cybernews… https://t.co/bNkAIc70dS -- CyberIQs_
garanews1: RT @fr0gger_: There is a new feature on @virustotal, you can now browse IOCs by threat actors and also get TTPs, pretty cool???? #ThreatIntell… -- garanews1
maldatabase: #Dridex malware indicators. #Malware #ThreatIntelligence #threatintel #IOC https://t.co/kxBLcVSgE5 -- maldatabase
maldatabase: #AZORult malware indicators. #Malware #ThreatIntelligence #threatintel #IOC https://t.co/aPkB29Jf7e -- maldatabase
najihel: RT @DailyDarkWeb: Cisco #hacked by Yanluowang #Ransomware #Cisco confirmed today that the Yanluowang ransomware group #breached its corpor… -- najihel
onveq: What is your favorite resource to find an experienced &amp; qualified #mentor in #cybersecurity? #hacking #security… https://t.co/yYJ4UsMRXo -- onveq
WithSecure: Our latest article delves into the trade secrets of one of the world's most dangerous ransomware groups – and reaff… https://t.co/wxaXJC6Wxn -- WithSecure
509Tiernan: RT @CovertShores: Of great interest #OSINT #Russia #UkraineWar -- 509Tiernan
adekleine: RT @CovertShores: #OSINT China Navy submarines, new article Apologies if you already saw it @RupprechtDeino @AlexLuck9 @TheBaseLeg @Collin… -- adekleine
adekleine: RT @CovertShores: The #Chinese Navy's newest submarine, the one with the angled sail, is already been commissioned into service. It is st… -- adekleine
bigtoes44: RT @post_fact: Terrific combination of trad journalism informed by #OSINT to reconstruct events around the shooting of a journalist in the… -- bigtoes44
Brandefense: It was a tough week, huh? If you want to know this week what happened in cyberspace in just a few minutes, here is… https://t.co/tJUQsxcU0a -- Brandefense
CyberSecDN: Thousands of GitHub repositories cloned and malicious code added https://t.co/0wqjZlZKeR #threatintel -- CyberSecDN
CyberSecurityN8: RT @joeclark947: @CIOonline @avast_antivirus @kaspersky @AVGFree @symantec @ESET @NortonOnline @TheHackersNews @hackernoon @Cisco @Microsof… -- CyberSecurityN8
Elsie72712024: RT @exfil0: Where do you belong? #OSINT #SIGINT #HUMINT #TECHINT -- Elsie72712024
fe_tsoc: RT @KesaGataMe0: #Phishing #偽サイト #偽EC #ニトリ @NitoriOfficial @kubotaa3 hxxps://www.outtic.top (AS13335 - CLOUDFLARENET) https://t.co/TvMh7t… -- fe_tsoc
Gate_15_Analyst: RT @andyjabbour: Take a deep-dive into #BazarCall w. the team at @AdvIntel. The complete white paper is now available. “BazarCall” Advisory… -- Gate_15_Analyst
GeoPioneerInc: Attacks hit Bakhmut #Ukraine #OSINT https://t.co/Lhog5SBOoJ -- GeoPioneerInc
ghm67: RT @CovertShores: Of great interest #OSINT #Russia #UkraineWar -- ghm67
Intel_sky: Royal Air Force (RAF) Boeing C-17A Globemaster III Callsign: RRR818 Reg: ZZ175 Altitude: 0 ft Fir: LONDON Tracking… https://t.co/IOy6Q7vnPh -- Intel_sky
jimmy_jarkarta: RT @CovertShores: Of great interest #OSINT #Russia #UkraineWar -- jimmy_jarkarta
joeclark947: RT @joeclark947: @CIOonline @avast_antivirus @kaspersky @AVGFree @symantec @ESET @NortonOnline @TheHackersNews @hackernoon @Cisco @Microsof… -- joeclark947
joeclark947: RT @joeclark947: @kaspersky @avast_antivirus @AVGFree @ESET @Bitdefender @Malwarebytes @Sophos @CIOonline @TheHackersNews @symantec @cyber… -- joeclark947
Jominee: RT @CovertShores: Of great interest #OSINT #Russia #UkraineWar -- Jominee
KurtBW_News: RT @CovertShores: Of great interest #OSINT #Russia #UkraineWar -- KurtBW_News
MaryamBugaje: RT @AtlanticCouncil: Interested in #OSINT research? Want to learn how to #geolocate around the world? What even is an #API? Apply today t… -- MaryamBugaje
RRTanoli: RT @cyb_detective: For 6 months, I've been procrastinating my weekly update to my #osint tool collection. But today I finally collected lin… -- RRTanoli
RuOilTracker: ???????? -&gt; ? NS ASIA Departed Primorsk with 110,000 tons of crude oil. Bound for Suez Canal #russianoil #osint… https://t.co/nmybc20o0K -- RuOilTracker
UnleashedOsint: #backlinks #marketingtools #OSINT #Russia Can SEO Backlink queries sometimes show a GOV URL Backlink to Telegram Us… https://t.co/jxQn3kBAYK -- UnleashedOsint
w3ndige: RT @Volexity: .@Volexity uncovers mass exploitation of #Zimbra Collaboration Servers (ZCS) via CVE-2022-27925 using authentication bypass.… -- w3ndige
beefyspace: RT @CyberIQs_: Customer Success Manager #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hacking #cybernews #cyberat… -- beefyspace
CyberIQs_: 5 Tips for Managing Shadow IT #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hacking… https://t.co/uX3KyIauxS -- CyberIQs_
CyberIQs_: Cellebrite Announces Second Quarter 2022 Results #infosec #infosecurity #cybersecurity #threatintel… https://t.co/wA2VJMUETA -- CyberIQs_
CyberSecurityN8: RT @CyberIQs_: Customer Success Manager #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hacking #cybernews #cyberat… -- CyberSecurityN8
CyberSecurityN8: RT @maldatabase: #Dridex malware indicators. #Malware #ThreatIntelligence #threatintel #IOC https://t.co/kxBLcVSgE5 -- CyberSecurityN8
GustavoPalazolo: RT @ray_canzanese: Malicious PDFs continue to be a challenge, with DocPlayer now cracking the top 10 and joining Weebly as one of the many… -- GustavoPalazolo
JEMPradio: Phish - You Enjoy Myself (6-18-19) #Phish #JEMPRadio #CommunityRadio #NowPlaying https://t.co/Bz9yNRAZtE -- JEMPradio
joeclark947: RT @joeclark947: @CIOonline @avast_antivirus @kaspersky @AVGFree @symantec @ESET @NortonOnline @TheHackersNews @hackernoon @Cisco @Microsof… -- joeclark947
LanceSchukies: Palo Alto Networks Releases Security Update for PAN-OS | CISA #cybersecurity #infosec #hacker #cyberattack… https://t.co/vTQuY52ZRP -- LanceSchukies
LanceSchukies: Three ransomware attacks hit single company over two weeks | IT PRO #cybersecurity #infosec #hacker #cyberattack… https://t.co/Ps4GB6rg7K -- LanceSchukies
LanceSchukies: Many ZTNA, MFA Tools Offer Little Protection Against Cookie Session Hijacking Attacks #cybersecurity #infosec… https://t.co/3A3Jiobf1O -- LanceSchukies
olbabrn: Sitting in the same office floor space as the company #CISO. They are gasping about the #phishing #test run results… https://t.co/H71a07IDUE -- olbabrn
Pranation05: RT @cloudthat: What is the biggest threat to Cloud Security? Share your quick thoughts... #CloudSecurity #Cybersecurity #Cloud #AWS #Azure… -- Pranation05
QAValley: Hackers install Dracarys Android malware using modified Signal app https://t.co/P3CSgxGHuc #hackers #android… https://t.co/S82jtlgHJc -- QAValley
redteamacademy: Social Engineering is one among the common cyber threats occurring due to human vulnerability which occurs by the m… https://t.co/l7w5gKQ4cD -- redteamacademy
sectest9: RT @joeclark947: @CIOonline @avast_antivirus @kaspersky @AVGFree @symantec @ESET @NortonOnline @TheHackersNews @hackernoon @Cisco @Microsof… -- sectest9
sectest9: RT @CyberIQs_: Customer Success Manager #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hacking #cybernews #cyberat… -- sectest9
TechUnityInc: Hackers install Dracarys Android malware using modified Signal app https://t.co/EkZDFVpmJr #hackers #android… https://t.co/dsKOZPWTSj -- TechUnityInc
Amigo_A_: @pcrisk @LawrenceAbrams @demonslay335 @struppigel @JakubKroustek Chaos-based -- Amigo_A_
QAValley: 8 Ways to Spot a Logic Bomb Attack https://t.co/ZQ918qemUS #cybersecurity #cyberattacks #Cybercrime #Ransomware… https://t.co/j3XzwiGaxs -- QAValley
SecurityXTV: RT @CyberIQs_: Cellebrite Announces Second Quarter 2022 Results #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hac… -- SecurityXTV
TechUnityInc: 8 Ways to Spot a Logic Bomb Attack https://t.co/kgQlyCe039 #cybersecurity #cyberattacks #Cybercrime #Ransomware… https://t.co/1YKMwjq7rD -- TechUnityInc
certlv: Saeima pieņēmusi paziņojumu, kurā Krievija atzīta par terorismu atbalstošu valsti. Pret Saeimas resursiem norit apjomīgs DDoS uzbrukums no RU agresiju atbalstošu aktīvistu puses. Pateicoties @mans_tet un iepriekš sagatavotiem aizsardzības risināju -- certlv
BalajiZunje1: RT @Watchdogrk: Beware of Magecart Cybercrimes! #cyber #cybersecurity #cyberpunk #hacking #security #hacker #technology #cybercrime #tech… -- BalajiZunje1
devansh3008: RT @timooon107: This is my write-up for achieving Account Takeover via RXSS when there is a HttpOnly flag on the cookies https://t.co/QA9VN… -- devansh3008
dmsechat: RT @hackinarticles: Bruteforce Your Password #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity… -- dmsechat
fipman: RT @maryCyPsy: Thx @EC3Europol for sharing our 2022 @CcdriverH2020 Human &amp; Technical Drivers of #Cybercrime research Excited to build on ou… -- fipman
huntrHacktivity: Cross-site Scripting (XSS) - Stored in https://t.co/ETeSul7VX4 (CVE-2022-2777) reported by ahkecha - Patch:… https://t.co/iPjKhEWpmF -- huntrHacktivity
itsdeepceh: RT @timooon107: This is my write-up for achieving Account Takeover via RXSS when there is a HttpOnly flag on the cookies https://t.co/QA9VN… -- itsdeepceh
Juanjo347: RT @hackinarticles: Windows Commands Cheat Sheet #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecur… -- Juanjo347
mahmoud34929789: RT @SaraBadran18: Bypassed Cloudflare’s Web Application Firewall (WAF) ❤???????? By @anshvaid4 https://t.co/6lwUubZxWp #hackerone #BugBounty #… -- mahmoud34929789
maliksaurabh84: RT @Sharma025: DCW is openly supporting #honeytrap rackets &amp; #cybercrime ! Full support for the correct advice given by #ShaktiMaan -- maliksaurabh84
NehruYuvaKendr5: RT @Nyksindia: Cybercrime affects both a virtual and a real body, but the effects upon each are different. #CyberCrime #CyberSecurity #Vi… -- NehruYuvaKendr5
nyk_budgam: RT @Nyksindia: Lock your system and remove any sensitive notes from your workstation every time you leave. #cybercrime #cybersecurity #Cyb… -- nyk_budgam
Steve12238317: RT @Nyksindia: Lock your system and remove any sensitive notes from your workstation every time you leave. #cybercrime #cybersecurity #Cyb… -- Steve12238317
threatshub: ThreatsHub Cybersecurity News | Cisco admits corporate network compromised by gang with links to Lapsus$ -… https://t.co/o6A8ZWTvzo -- threatshub
c4ir0__: RT @SaraBadran18: Bypassed Cloudflare’s Web Application Firewall (WAF) ❤???????? By @anshvaid4 https://t.co/6lwUubZxWp #hackerone #BugBounty #… -- c4ir0__
crpd_guy: RT @NSA_Slovakia: #Emotet - the most widely used #malware - seems to be on vacation with a 50% reduction in its global impact this July. Ho… -- crpd_guy
CyberSecurityN8: RT @timooon107: This is my write-up for achieving Account Takeover via RXSS when there is a HttpOnly flag on the cookies https://t.co/QA9VN… -- CyberSecurityN8
CyberSecurityN8: RT @NSA_Slovakia: #Emotet - the most widely used #malware - seems to be on vacation with a 50% reduction in its global impact this July. Ho… -- CyberSecurityN8
dvcanhack: RT @0xKaran: Collection of #bugbounty poc Consists almost every vulnerability (100+) HackerOne reports (1000+) ???????????????????? https://t.co/mX3Kfb… -- dvcanhack
ecarlesi: Threat on hxxp://boa-3dsecure[.]com/boa2022[.]zip #phishing #opendir -- ecarlesi
ecarlesi: Possible threat on hxxps://handyapk[.]com/wordpress-6[.]0[.]1[.]zip #phishing #opendir #namesilo -- ecarlesi
Hx_0p: RT @th3cyb3rk1tt3n: I’m just arriving to #dianainitiative with lots of @Bugcrowd swag to give out (hats, shirts, stickers, and more). Come… -- Hx_0p
m3sm4r: RT @busk3r: Browser-Powered Desync Attacks: A New Frontier in HTTP Request Smuggling https://t.co/aOwb5hDSjl #Security #Pentesting #Secur… -- m3sm4r
Mohamed87Khayat: RT @timooon107: This is my write-up for achieving Account Takeover via RXSS when there is a HttpOnly flag on the cookies https://t.co/QA9VN… -- Mohamed87Khayat
Mufalani: RT @programmerjoke9: Where is the lie?#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #reactjs #… -- Mufalani
NSA_Slovakia: #Emotet - the most widely used #malware - seems to be on vacation with a 50% reduction in its global impact this Ju… https://t.co/5JHi3tsgbj -- NSA_Slovakia
s4msecurity: RT @StanleyEpstein: Facts about ransomware attack #CyberAttack #cybersecurity #ransomware via https://t.co/eBW8Lmmpx7 https://t.co/fgQHM8Ad… -- s4msecurity
sectest9: RT @NSA_Slovakia: #Emotet - the most widely used #malware - seems to be on vacation with a 50% reduction in its global impact this July. Ho… -- sectest9
sectest9: RT @timooon107: This is my write-up for achieving Account Takeover via RXSS when there is a HttpOnly flag on the cookies https://t.co/QA9VN… -- sectest9
TEISS: #Emotet, a #malware strain primarily spread through #phishing email attachments and links, became the most widely u… https://t.co/L5HJlS5Atq -- TEISS
wilson_hack_: Is there any Hacking attempts on your device? DM now for risk free security solutions. #hacked #icloud… https://t.co/LiBDlcmSja -- wilson_hack_
wilson_hack_: Ethically Hacking is easy for specialists. DM for all cyber related problems. #hacked #icloud #facebookdown… https://t.co/zYrkCaBtRJ -- wilson_hack_
xcoder074: RT @timooon107: This is my write-up for achieving Account Takeover via RXSS when there is a HttpOnly flag on the cookies https://t.co/QA9VN… -- xcoder074
araltasher1: Hacking attempts on your device? DM now for risk free security solutions. #hacked #icloud #facebookdown #imessage… https://t.co/AHHcmvo0TI -- araltasher1
cm_alliance: What is a ransomware attack? What does ransomware do? What is ransomware protection &amp; is ransomware prevention poss… https://t.co/ubYVpaalob -- cm_alliance
CyberIQs_: 3 Reasons Why the Future ofsiness Will be Composable #infosec #infosecurity #cybersecurity #threatintel… https://t.co/jEWZlUSoj3 -- CyberIQs_
CyberSecurityN8: RT @threatshub: ThreatsHub Cybersecurity News | Cisco admits corporate network compromised by gang with links to Lapsus$ - https://t.co/8Jj… -- CyberSecurityN8
CyberSecurityN8: RT @CyberIQs_: 3 Reasons Why the Future ofsiness Will be Composable #infosec #infosecurity #cybersecurity #threatintel #threatintelligence… -- CyberSecurityN8
DataAugmented: RT @threatshub: ThreatsHub Cybersecurity News | Cisco admits corporate network compromised by gang with links to Lapsus$ - https://t.co/8Jj… -- DataAugmented
HighlandCouncil: RT @SBRC_Scotland: ???? Amber Cyber Threat Alert ???? Microsoft’s August 2022 #security update includes #patches for two zero-day vulnerabilitie… -- HighlandCouncil
JinibaBD: RT @JinibaBD: ????Pentera #Credential Exposure reveals compromised #identity threats to internal and external attack surface‼️ #ThreatIntel #P… -- JinibaBD
peterpobjecky: RT @CovertShores: The #Chinese Navy's newest submarine, the one with the angled sail, is already been commissioned into service. It is st… -- peterpobjecky
SBRC_Scotland: ???? Amber Cyber Threat Alert ???? Microsoft’s August 2022 #security update includes #patches for two zero-day vulnerabi… https://t.co/DqpimcXqLy -- SBRC_Scotland
sectest9: RT @threatshub: ThreatsHub Cybersecurity News | Cisco admits corporate network compromised by gang with links to Lapsus$ - https://t.co/8Jj… -- sectest9
sectest9: RT @CyberIQs_: 3 Reasons Why the Future ofsiness Will be Composable #infosec #infosecurity #cybersecurity #threatintel #threatintelligence… -- sectest9
Steve12238317: RT @threatshub: ThreatsHub Cybersecurity News | Cisco admits corporate network compromised by gang with links to Lapsus$ - https://t.co/8Jj… -- Steve12238317
Steve12238317: RT @CyberIQs_: 3 Reasons Why the Future ofsiness Will be Composable #infosec #infosecurity #cybersecurity #threatintel #threatintelligence… -- Steve12238317
Tospa: RT @CovertShores: The #Chinese Navy's newest submarine, the one with the angled sail, is already been commissioned into service. It is st… -- Tospa
wilson_hack_: Hacking is easy, DM to Recover or Hack accounts and missing phones. #gmailhack #gmaildown #hacked #Hacking… https://t.co/Le2P11x0nR -- wilson_hack_
wilson_hack_: Recover locked/lost accounts with ease, DM for all account retrievals. #gmailhack #gmaildown #hacked #Hacking… https://t.co/JXlF3p3Q7z -- wilson_hack_
actisoft_tech: #FortiGuardLabs examines #SmokeLoader, a #malware variant that exploits CVE CVE-2017-0199 and CVE-2017-11882 in its… https://t.co/yC0zNk6rV7 -- actisoft_tech
CyberIQs_: Google Begs Apple to Replace iMessage with RCS – I #infosec #infosecurity #cybersecurity #threatintel… https://t.co/Q0RYyF6SjT -- CyberIQs_
CyberIQs_: Black Hat USA 2022 video walkthrough #infosec #infosecurity #cybersecurity #threatintel #threatintelligence… https://t.co/JVIYjr2OSc -- CyberIQs_
CyberIQs_: Which malware delivery techniques are currently #infosec #infosecurity #cybersecurity #threatintel… https://t.co/OH3FrSQlW0 -- CyberIQs_
CyberIQs_: Concentric releases AI-based solution to protect #infosec #infosecurity #cybersecurity #threatintel… https://t.co/axpQvWCaXP -- CyberIQs_
CyberSecurityN8: RT @meotec: #Cyberattacks in 2⃣0⃣2⃣2⃣: Beware These 5⃣ Attack Types - via @splunk #SupplyChain #Ransomware #DDoS #phishing #wearemeotec h… -- CyberSecurityN8
DanJack45260569: RT @CovertShores: The #Chinese Navy's newest submarine, the one with the angled sail, is already been commissioned into service. It is st… -- DanJack45260569
ecarlesi: Threat on hxxps://personassingresa[.]com/personas/ #phishing #bancolombia #nc -- ecarlesi
ecarlesi: Threat on hxxps://twtdesktop[.]com/ #phishing #trustwallet -- ecarlesi
ecarlesi: Threat on hxxps://twtdesktop[.]com/assets[.]html #phishing #trustwallet #regru https://t.co/9jVobIIGO2 -- ecarlesi
ecarlesi: Threat on hxxps://twtdesktop[.]com/index[.]html #phishing #trustwallet #regru -- ecarlesi
Fandango831: RT @CovertShores: The #Chinese Navy's newest submarine, the one with the angled sail, is already been commissioned into service. It is st… -- Fandango831
freedomAU21C: RT @CovertShores: The #Chinese Navy's newest submarine, the one with the angled sail, is already been commissioned into service. It is st… -- freedomAU21C
IntelScott: There was considerable @MITREattack #TTP overlap for the 11 #malware in @CISAgov &amp; @CyberGovAU's new "top malware"… https://t.co/qFnDy0DLbe -- IntelScott
intelSkunk: RT @CovertShores: The #Chinese Navy's newest submarine, the one with the angled sail, is already been commissioned into service. It is st… -- intelSkunk
JEMPradio: Widespread Panic f/Trey &amp; Page - The Low Spark of High Heeled Boys (11-11-93) #Phish #JEMPRadio #CommunityRadio… https://t.co/PHx49dSBtW -- JEMPradio
JMuellerToewe: RT @cyb_detective: Goverment data in #OSINT 8 types of government open databases that many countries have and that will be useful to inves… -- JMuellerToewe
kw4bq: alpine valley bound ✈️???? #makeanescapewhenitarrives #555 #phish https://t.co/vvjMAEDcR7 -- kw4bq
LealBennett_dlb: RT @NLwartracker: 1/10 #Kherson western front update ????is finally here.Been working on checking info from local,#OSINT,sat &amp; other sources… -- LealBennett_dlb
logik_labs: A #Blockchain security firm has alerted users to a fresh phishing campaign. A cybersecurity company has issued a wa… https://t.co/QW2y4I14PZ -- logik_labs
meotec: #Cyberattacks in 2⃣0⃣2⃣2⃣: Beware These 5⃣ Attack Types - via @splunk #SupplyChain #Ransomware #DDoS #phishing… https://t.co/AWpxeiHqbE -- meotec
noob_kiddiez: RT @cyb_detective: For 6 months, I've been procrastinating my weekly update to my #osint tool collection. But today I finally collected lin… -- noob_kiddiez
OSINT_Research: RT @cyb_detective: Goverment data in #OSINT 8 types of government open databases that many countries have and that will be useful to inves… -- OSINT_Research
sectest9: RT @meotec: #Cyberattacks in 2⃣0⃣2⃣2⃣: Beware These 5⃣ Attack Types - via @splunk #SupplyChain #Ransomware #DDoS #phishing #wearemeotec h… -- sectest9
UKikaski: Video of RUS forces firing a TOS-1 220mm heavy flamethrower MLRS reportedly at #APU units near Pisky in the Donestk… https://t.co/9li24BLyz8 -- UKikaski
Video_Forensics: RT @Video_Forensics: #Phishing fraudsters used a #SIM box to send hundreds of thousands of #automated text messages containing links to fak… -- Video_Forensics
wilson_hack_: for possible social media account resolve DM NOW...!! #australianhacker #londonhacker #londonhackers… https://t.co/wOFxSlF2iY -- wilson_hack_
WilsonTarbox: Does an account that compiles funny responses to #phishing emails and texts? If so I’d like to contribute. I have s… https://t.co/4B0Kq8fcu1 -- WilsonTarbox
_GMTSystems: Let the team at GMT Systems help you to protect your business. #online #tech #data #iot #finance #technology… https://t.co/IKY2HX6U2t -- _GMTSystems
beefyspace: RT @CyberIQs_: How to reduce your exposure &amp; secure your data in #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #ha… -- beefyspace
CyberIQs_: How to reduce your exposure &amp; secure your data in #infosec #infosecurity #cybersecurity #threatintel… https://t.co/Jc7tkFW2la -- CyberIQs_
CyberSecurityN8: RT @_GMTSystems: Let the team at GMT Systems help you to protect your business. #online #tech #data #iot #finance #technology #software #c… -- CyberSecurityN8
CyberSecurityN8: RT @CyberIQs_: How to reduce your exposure &amp; secure your data in #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #ha… -- CyberSecurityN8
dmsechat: RT @YourAnonRiots: Mantis #botnet was behind the largest HTTPS distributed denial-of-service (#DDoS) attack in June 2022, targeting thousan… -- dmsechat
sectest9: RT @CyberIQs_: How to reduce your exposure &amp; secure your data in #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #ha… -- sectest9
sectest9: RT @_GMTSystems: Let the team at GMT Systems help you to protect your business. #online #tech #data #iot #finance #technology #software #c… -- sectest9
csirt_it: #Cisco: sanata una vulnerabilità con gravità “alta” nei prodotti Adaptive Security Appliance (ASA) e Firepower Threat Defense Rischio: ???? Tipologia: Information Disclosure ???? https://t.co/SFg9QQgfAk ???? Aggiornamenti disponibili ???? h -- csirt_it
csirt_it: #PaloAltoNetworks: risolta una vulnerabilità con gravità “alta” in PAN-OS Rischio: ???? Tipologia: Denial of Service ???? https://t.co/zuQ5VVppka ⚠ Aggiornamenti e mitigazioni disponibili https://t.co/ra78zG6UwV -- csirt_it
csirt_it: Sanate nuove vulnerabilità in alcuni dispositivi - anche SCADA - di #Schneider Electric, #Mitsubishi Electric e #Emerson Rischio: ???? Tipologia: Denial of Service, Remote Code Execution, Information Disclosure ???? https://t.co/3xUAJWb -- csirt_it
NationalCsirtCy: Προσοχή ! ⚠️ Χάκερς κλέβουν πιστωτικές κάρτες από ιστοσελίδες αγγελιών ???? https://t.co/2df78FlYsW #csirtcy #ΑΨΑ #phishing #cybersecurity #cyprus https://t.co/wGvW64fke6 -- NationalCsirtCy
_BJPforIndia_: RT @INCyberCrime: Data sent through public Wi-Fi can be easily intercepted. Fraudsters can access users’ financial and personal information… -- _BJPforIndia_
25sivaganesh: RT @0xKaran: Collection of #bugbounty poc Consists almost every vulnerability (100+) HackerOne reports (1000+) ???????????????????? https://t.co/mX3Kfb… -- 25sivaganesh
A_Shurresh: RT @rootxyash: Happy to secure Apple :D #bugbounty #apple #infosec https://t.co/jHP2mB1psu -- A_Shurresh
allindiatweet: RT @INCyberCrime: Data sent through public Wi-Fi can be easily intercepted. Fraudsters can access users’ financial and personal information… -- allindiatweet
CyberDFIR: RT @ECURONinc: Virtual Currency Platform ‘Tornado Cash’ Accused of Aiding APTs https://t.co/aZIeDJUCuQ #cybersecurity #cybercrime #nation… -- CyberDFIR
CyberDFIR: RT @AlecSocial: RT @ECURONinc: Virtual Currency Platform ‘Tornado Cash’ Accused of Aiding APTs https://t.co/kImTXlSKmx #cybersecurity #cy… -- CyberDFIR
CyberDFIR: RT @AlecSocial: RT @ECURONinc: Researchers uncover sophisticated global Chinese hacking operation https://t.co/9ywnEl4XMt #cybersecurity… -- CyberDFIR
CyberSecurityN8: RT @zapstiko: This script grab public report from hacker one and make some folders with poc videos #bugbounty #bugbountytips #poc #bug htt… -- CyberSecurityN8
CyberSecurityN8: RT @INCyberCrime: Data sent through public Wi-Fi can be easily intercepted. Fraudsters can access users’ financial and personal information… -- CyberSecurityN8
CyberSecurityN8: RT @cyborgwits: Coolest Careers in Cybersecurity ???? #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #informationsecurity #ci… -- CyberSecurityN8
diskumboom: RT @bugraeskici: Google Bug Bounty - Cloud Shell Command Injection I hope you like it! :) #bugbounty https://t.co/B6mwlohxzi -- diskumboom
gdprAI: RT @gjscobie: In a zero-trust world, you have to trust someone. The Kill Chain, a cybercrime thriller by GJ Scobie, from @darkstrokedark o… -- gdprAI
gjscobie: In a zero-trust world, you have to trust someone. The Kill Chain, a cybercrime thriller by GJ Scobie, from… https://t.co/uOH1cJfAAU -- gjscobie
GoaiDev: RT @programmerjoke9: Github copilot is incredible#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python… -- GoaiDev
INCyberCrime: Data sent through public Wi-Fi can be easily intercepted. Fraudsters can access users’ financial and personal infor… https://t.co/u95V5BlZAW -- INCyberCrime
KruseGowerWrite: RT @gjscobie: In a zero-trust world, you have to trust someone. The Kill Chain, a cybercrime thriller by GJ Scobie, from @darkstrokedark o… -- KruseGowerWrite
looEyes: CISA Releases Cybersecurity Toolkit to Protect U.S. Elections #infosec #hacker #security #cyber #tech #cybercrime… https://t.co/MAWXJb1Pve -- looEyes
programmerjoke9: Github copilot is incredible#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie… https://t.co/pDGSLVKgjV -- programmerjoke9
rahul05ranjan: RT @programmerjoke9: Github copilot is incredible#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python… -- rahul05ranjan
rst263: RT @Sharma025: DCW is openly supporting #honeytrap rackets &amp; #cybercrime ! Full support for the correct advice given by #ShaktiMaan -- rst263
SahalVerifai: Facial recognition also helps improve safety and security in non-retail spaces, like airports and banks. It’s been… https://t.co/jlhkegO7Qv -- SahalVerifai
salihiwnl: This is made my day:) #bugbounty https://t.co/vE1hl1Y1fI -- salihiwnl
sectest9: RT @zapstiko: This script grab public report from hacker one and make some folders with poc videos #bugbounty #bugbountytips #poc #bug htt… -- sectest9
sectest9: RT @INCyberCrime: Data sent through public Wi-Fi can be easily intercepted. Fraudsters can access users’ financial and personal information… -- sectest9
sectest9: RT @cyborgwits: Coolest Careers in Cybersecurity ???? #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #informationsecurity #ci… -- sectest9
SGulbhamwar: RT @0xKaran: Collection of #bugbounty poc Consists almost every vulnerability (100+) HackerOne reports (1000+) ???????????????????? https://t.co/mX3Kfb… -- SGulbhamwar
TheBugBot: RT @lemsec_security: What is SSL or TCL Handshake?? To learn more visit: https://t.co/q1LNw1Nckm . #cybersecurity #cybersecuritytips #bugbo… -- TheBugBot
threat_404: RT @cyborgwits: Coolest Careers in Cybersecurity ???? #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #informationsecurity #ci… -- threat_404
Video_Forensics: #Phishing fraudsters used a #SIM box to send hundreds of thousands of #automated text messages containing links to… https://t.co/AKxpximM7Z -- Video_Forensics
zapstiko: This script grab public report from hacker one and make some folders with poc videos #bugbounty #bugbountytips #poc… https://t.co/4TcJXp2K0Y -- zapstiko
0x485342c4b0: RT @OsintJobs: Happy Thursday #OSINT community! Are you interested in monitoring #fishing efforts or tracking illegal fishing around the gl… -- 0x485342c4b0
beefyspace: RT @JinibaBD: ????????????Application Security Report 2022: Key Trends and Challenges #ThreatIntel #Phishing #ransomware #cyberattacks #privacy #cyb… -- beefyspace
clabourdette: RT @JAMESWT_MHT: 109.206.241[.81/htdocs/ #opendir 465 samples #AsyncRAT #njRAT #Formbook #RemcosRAT #AgentTesla #RecordBreaker #NetWire #o… -- clabourdette
cocchola: RT @ragnararyavarta: Intel Update: The current position of vessel Yuan Wang 5 is lat=0.7289129448085928 lon=90.30031240740009 Updated: 2022… -- cocchola
crispSV: Airborn from #Sochi again the mysterious #RuAF plane with #US registration N742MT. Russians trolling #NATO #Ukraine… https://t.co/7oELwXt8sY -- crispSV
CyberDFIR: RT @JinibaBD: ????????????‍♂️???? #Cisco Hit by #Cyberattack From Hacker Linked to #Lapsus$ Gang ⛔️ #ThreatIntel #Phishing #ransomware #cyberattacks #… -- CyberDFIR
CyberDFIR: RT @JinibaBD: ????Pentera #Credential Exposure reveals compromised #identity threats to internal and external attack surface‼️ #ThreatIntel #P… -- CyberDFIR
CyberDFIR: RT @javier_carriazo: Android warning for all users – 4 apps to watch out for as hackers aim to steal your data... #ThreatIntel #Phishing #… -- CyberDFIR
CyberDFIR: RT @JinibaBD: ⛔️????⛔️Targeted attack on industrial enterprises and public institutions #ThreatIntel #Phishing #ransomware #cyberattacks #priv… -- CyberDFIR
CyberDFIR: RT @JinibaBD: ????????‍♂️????#Irish firm working on major State projects attacked by suspected #Russian hackers ‼️#Ireland #ThreatIntel #Phishing #r… -- CyberDFIR
CyberDFIR: RT @JinibaBD: #Chinese scammers target kids with promise of extra #gaming hours #ThreatIntel #Phishing #ransomware #cyberattacks #privacy #… -- CyberDFIR
CyberDFIR: RT @JinibaBD: ????????????Application Security Report 2022: Key Trends and Challenges #ThreatIntel #Phishing #ransomware #cyberattacks #privacy #cyb… -- CyberDFIR
CyberDFIR: RT @javier_carriazo: Orchard botnet uses Bitcoin Transaction info to generate DGA domains #ThreatIntel #Phishing #ransomware #cyberattacks… -- CyberDFIR
CyberDFIR: RT @javier_carriazo: 10 Malicious Code Packages Slither into PyPI Registry #ThreatIntel #Phishing #ransomware #cyberattacks #privacy #cyber… -- CyberDFIR
CyberPanel: If you own a WordPress website, you must ensure that it is well-protected and you remove WordPress malware.… https://t.co/3D4JX2L73k -- CyberPanel
CyberSecurityN8: RT @JinibaBD: ????????????Application Security Report 2022: Key Trends and Challenges #ThreatIntel #Phishing #ransomware #cyberattacks #privacy #cyb… -- CyberSecurityN8
CyberSecurityN8: RT @javier_carriazo: Orchard botnet uses Bitcoin Transaction info to generate DGA domains #ThreatIntel #Phishing #ransomware #cyberattacks… -- CyberSecurityN8
ecarlesi: Possible threat on hxxp://wells-smsgroup[.]com #phishing #AWSSupport -- ecarlesi
ecarlesi: Possible threat on hxxp://leparloirdeletudiant[.]com/well-known%20(1)[.]zip #phishing #opendir #planethoster -- ecarlesi
ecarlesi: Possible threat on hxxps://accueil-amazon[.]com #phishing #google -- ecarlesi
HTInvestigation: Google Search will stop telling you when Snoopy assassinated Abe Lincoln https://t.co/1K2UrWJsU1 #Google #Web #OSINT Sent via @updayUK -- HTInvestigation
Intel_sky: NATO Boeing E-3A Sentry Callsign: NATO40 Reg: LX-N90451 Altitude: 2,126 ft Fir: LANGEN FIR Tracking links: ●… https://t.co/59RK1STjuP -- Intel_sky
Intel_sky: NATO Boeing E-3A Sentry Callsign: NATO02 Reg: LX-N90456 Altitude: 27,125 ft Fir: HANNOVER-UIR Tracking links: ●… https://t.co/gmDrBocOx1 -- Intel_sky
JanHof5: TTP Ep.193—John Shier (@john_shier), Senior Security Advisor at @Sophos, joins the podcast this week for a deep div… https://t.co/lq0WhK8ZLW -- JanHof5
JEMPradio: Phish - Driver (9-29-99) #Phish #JEMPRadio #CommunityRadio #NowPlaying https://t.co/Bz9yNRAZtE -- JEMPradio
JEMPradio: Trey Anastasio and Tom Marshall - Sleep #Phish #JEMPRadio #CommunityRadio #NowPlaying https://t.co/Bz9yNRAZtE -- JEMPradio
JjKiuru: RT @NLwartracker: 1/10 #Kherson western front update ????is finally here.Been working on checking info from local,#OSINT,sat &amp; other sources… -- JjKiuru
jtw888000: RT @Volodymyr_D_: Balance of power in war... #UkraineRussiaWar #RussiaInvadedUkraine #MLRS #TANK #OSINT #WarInUkraine @FeWoessner @McFaul… -- jtw888000
mathewjschwartz: RT @Raj_Samani: Following the #ransomware attack against Cisco - the team @TalosSecurity release IoCs related to the attack: https://t.co/Q… -- mathewjschwartz
MawunyegaKojo: RT @crispSV: Airborn from #Sochi again the mysterious #RuAF plane with #US registration N742MT. Russians trolling #NATO #Ukraine #OSINT htt… -- MawunyegaKojo
MawunyegaKojo: RT @crispSV: #RuAF morning deliveries. #Ukraine #Russia #NATO #OSINT https://t.co/iM67ZMNiHK -- MawunyegaKojo
Mbahal1: RT @Marco_Ramilli: ????:p://91.151 .89 .220 ????: #MIRAI #opendir with #malware on it. Interesting modules for #gitlab 81 and 911, plenty #prox… -- Mbahal1
OrangeCyberUK: In season 14, the doctors of Grey’s Anatomy face a ransomware attack. A situation not so far from reality…… https://t.co/jlMn7LRAa5 -- OrangeCyberUK
Riisteri: RT @Robert4787: Russian military planners now have access to a treasure trove of European data which can be used to circumvent Western defe… -- Riisteri
sectest9: RT @Paula_Piccard: Is MFA the Vegetable of Cybersecurity? https://t.co/ablwvXXROW #DataSecurity #Privacy #100DaysOfCode #Cloud #Security… -- sectest9
sectest9: RT @JinibaBD: ????????????Application Security Report 2022: Key Trends and Challenges #ThreatIntel #Phishing #ransomware #cyberattacks #privacy #cyb… -- sectest9
sectest9: RT @javier_carriazo: Orchard botnet uses Bitcoin Transaction info to generate DGA domains #ThreatIntel #Phishing #ransomware #cyberattacks… -- sectest9
securityjuju: RT @cyb_detective: For 6 months, I've been procrastinating my weekly update to my #osint tool collection. But today I finally collected lin… -- securityjuju
sturmtruPP3n: RT @DailyOsint: If you need to search SSL certificates issued to a domain, You can use the https://t.co/4DM3pEIq2M search engine, which al… -- sturmtruPP3n
topfishingpics1: RT @OsintJobs: Happy Thursday #OSINT community! Are you interested in monitoring #fishing efforts or tracking illegal fishing around the gl… -- topfishingpics1
Vanessa59367032: ⛔️ PHISHING ALERT ???? ???? https://www[.]sushiswag[.]com/ ???? https://t.co/n4P4anMCBP #malware #phishing #cybersec #scam… https://t.co/dJY23h1Ckd -- Vanessa59367032
wpretweetbot: RT @CyberPanel: If you own a WordPress website, you must ensure that it is well-protected and you remove WordPress malware. https://t.co/… -- wpretweetbot
yfbegjkdy: RT @cyb_detective: For 6 months, I've been procrastinating my weekly update to my #osint tool collection. But today I finally collected lin… -- yfbegjkdy
BlowfishTech: A new strain of malware is targeting Facebook business accounts. It uses LinkedIn to find its targets – watch out f… https://t.co/VGdOOsrhmy -- BlowfishTech
csirt_it: #SAP: il Security Patch Day di agosto sana molteplici vulnerabilità in diversi prodotti Rischio: ???? Tipologia: Information Disclosure ???? https://t.co/1iQkQNj7Pk ???? Aggiornamenti disponibili ???? https://t.co/FSDKY0DViZ -- csirt_it
CSIRTCV: ⚠️ Las tiendas #7Eleven en #Dinamarca cierran después de que un ataque #cibernético interrumpiera los sistemas de pago de las tiendas en todo el país. Más información: https://t.co/9khSJ2ItDt https://t.co/14hDqN376V -- CSIRTCV
CyberIQs_: InfoStealer Script Based on Curl and NSudo, (Thu, #infosec #infosecurity #cybersecurity #threatintel… https://t.co/bRR7d6CeF8 -- CyberIQs_
darktracer_int: DarkTracer Webinar On the Way: Profiling cybercriminals committing data leaks and breaches Welcome! Your webinar will begin shortly. https://t.co/2H3BRRx7y2 -- darktracer_int
datacentreplus: Just because something is in the app store it doesn't mean it's safe. ⛔ Staying informed is one of the best ways t… https://t.co/IP5UtGEHrQ -- datacentreplus
digitrackspl: #FortiGuardLabs examines #SmokeLoader, a #malware variant that exploits CVE CVE-2017-0199 and CVE-2017-11882 in its… https://t.co/lhArz80fkc -- digitrackspl
EastMidlandsCRC: Your company must protect itself from #malware attacks (including #ransomware). Check out tips and guidance from t… https://t.co/nyik3Wz8Fi -- EastMidlandsCRC
FIRSTdotOrg: FIRST Board Member @sergedroz talks to @siliconrepublic about the "tremendous value" and "multitude of risks" associated with AI for Law Enforcement - https://t.co/fwHpuTtquk #cybersecurity #incidentresponse #securityteams -- FIRSTdotOrg
IranCyberNews: RT @datacentreplus: Just because something is in the app store it doesn't mean it's safe. ⛔ Staying informed is one of the best ways to he… -- IranCyberNews
LtdNamaste: #FortiGuardLabs examines #SmokeLoader, a #malware variant that exploits CVE CVE-2017-0199 and CVE-2017-11882 in its… https://t.co/QmRKKxfP78 -- LtdNamaste
m3g9tr0n: RT @accidentalrebel: New blog post: I talk about a malware sandbox evasion technique that checks the computer's RAM size. Also shared code… -- m3g9tr0n
PhishStats: https://t.co/MAuIXRvYiq detected 13 new websites hosting #phishing | new today: 47 | #infosec #cybersecurity… https://t.co/nzACqVjdlF -- PhishStats
wordpressvee: RT @CyberPanel: If you own a WordPress website, you must ensure that it is well-protected and you remove WordPress malware. https://t.co/… -- wordpressvee
ABFilipczak: RT @_Vault_Security: Cyberattacks on healthcare organizations negatively impact patient care. https://t.co/WOzEpKGeyM #infosec #cybersec #… -- ABFilipczak
ABFilipczak: RT @_Vault_Security: NBI launches probe into attack on Finnish Parliament site https://t.co/nmT3ZRIKx4 #infosec #cyberattack #russia #fina… -- ABFilipczak
ABFilipczak: RT @_Vault_Security: Most U.S. Oil And Gas Firms At Risk Of Cyberattack: Study. https://t.co/4CNeN7CRpc #infosec #cybersec #cybersecurity… -- ABFilipczak
bornunique911: RT @krrohit210302: I found a Reflected xss in microsoft.. ???????? #bugbountytips #bugbounty https://t.co/9D3wxqO4KW -- bornunique911
CBesian: RT @HackenProof: ✅ [New Bug Bounty] @Ternoa_ has launched 3 bug bounty programs with up to $100,000 reward per critical vulnerability! ▶️ … -- CBesian
CyberSecurityN8: RT @FaIyaZz007: Hi everyone! Learn how to start hacking/penetration testing/bug bounty using your mobile phone by installing Kali Linux. A… -- CyberSecurityN8
CyberSecurityN8: RT @LaddooNSunny: @Terikashish1 @itsmetejasswi this person is continuously harassing actress #TejasswiPrakash in abusive tweets nd its a #c… -- CyberSecurityN8
DrBrighton4: RT @hackinarticles: Bruteforce Your Password #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity… -- DrBrighton4
DrBrighton4: RT @bamitav: #Cybersecurity: The Last Crusade! https://t.co/O8kHQV2smP #forbes #cyberwar #cybercrime #cyber #hacker #privacy #APT #bot #C… -- DrBrighton4
DrBrighton4: RT @IsecureMart: According to #FBI 2020 IC3 Report, 791,793 #internet #Crimes were reported, which was a staggering 69% #increase than t… -- DrBrighton4
Fabriciosx: RT @bamitav: #Cybersecurity: The Last Crusade! https://t.co/O8kHQV2smP #forbes #cyberwar #cybercrime #cyber #hacker #privacy #APT #bot #C… -- Fabriciosx
FaIyaZz007: Hi everyone! Learn how to start hacking/penetration testing/bug bounty using your mobile phone by installing Kali L… https://t.co/KrEl8H5tDK -- FaIyaZz007
gcp_jcopsouth: Be cautious when you receive an SMS from an unknown source claiming your account is not operational, needs to be up… https://t.co/eg2MAjiII5 -- gcp_jcopsouth
gulf_news: #Cybercrime alerts now on #cinema screens in #Sharjah Sharjah Police campaign targets youngsters and families https://t.co/INxNokgKf7 -- gulf_news
KanezaDiane: RT @KanezaDiane: Just like that #100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #reactjs #bugbou… -- KanezaDiane
LaurentSouchet: RT @HackenProof: ✅ [New Bug Bounty] @Ternoa_ has launched 3 bug bounty programs with up to $100,000 reward per critical vulnerability! ▶️ … -- LaurentSouchet
LofiRamli: RT @hackinarticles: Windows Commands Cheat Sheet #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecur… -- LofiRamli
Medoingmestuff: RT @hackinarticles: Bruteforce Your Password #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity… -- Medoingmestuff
onveq: 1 out of every 20 open jobs in America today is a job that requires cybersecurity skills. https://t.co/zid7KHqu6R… https://t.co/7JBJKGTtIE -- onveq
PythonBot_By_PM: RT @KanezaDiane: Just like that #100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #reactjs #bugbou… -- PythonBot_By_PM
QwojoJnr: RT @hackinarticles: Encryption vs Cryptography #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurit… -- QwojoJnr
rahul05ranjan: RT @onveq: 1 out of every 20 open jobs in America today is a job that requires cybersecurity skills. https://t.co/zid7KHqu6R #cybersecur… -- rahul05ranjan
sectest9: RT @hackinarticles: Encryption vs Cryptography #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurit… -- sectest9
sectest9: RT @FaIyaZz007: Hi everyone! Learn how to start hacking/penetration testing/bug bounty using your mobile phone by installing Kali Linux. A… -- sectest9
sectest9: RT @LaddooNSunny: @Terikashish1 @itsmetejasswi this person is continuously harassing actress #TejasswiPrakash in abusive tweets nd its a #c… -- sectest9
SpeedyTerry: RT @hackinarticles: Windows Commands Cheat Sheet #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecur… -- SpeedyTerry
Steve12238317: RT @gcp_jcopsouth: Be cautious when you receive an SMS from an unknown source claiming your account is not operational, needs to be updated… -- Steve12238317
0xrb: RT @Marco_Ramilli: ????:p://91.151 .89 .220 ????: #MIRAI #opendir with #malware on it. Interesting modules for #gitlab 81 and 911, plenty #prox… -- 0xrb
ActorExpose: RT @1ZRR4H: 2/ The artifacts were available until today on a server with #opendir (80.209.241.3:8888) that was active for at least 15 days.… -- ActorExpose
ActorExpose: RT @InQuest: Here's a couple of recent #opendir's with live malware for folks to harvest and play with: hxxp://192.3.152[.]171/document h… -- ActorExpose
ActorExpose: RT @Marco_Ramilli: ????:p://91.151 .89 .220 ????: #MIRAI #opendir with #malware on it. Interesting modules for #gitlab 81 and 911, plenty #prox… -- ActorExpose
ActorExpose: RT @MBThreatIntel: This threat actor (#techsupportscams) is using Google Ads for #malvertising via their newpop[.]org domain. We observed… -- ActorExpose
ActorExpose: RT @JAMESWT_MHT: 109.206.241[.81/htdocs/ #opendir 465 samples #AsyncRAT #njRAT #Formbook #RemcosRAT #AgentTesla #RecordBreaker #NetWire #o… -- ActorExpose
ANeilan: RT @Marco_Ramilli: ????:p://91.151 .89 .220 ????: #MIRAI #opendir with #malware on it. Interesting modules for #gitlab 81 and 911, plenty #prox… -- ANeilan
brechtcastel: #Geolocation is the art of finding where a video or picture is situated. It's an amazing force for investigations.… https://t.co/t72wor8jUR -- brechtcastel
chopaganda: You like #Phish Dicks? https://t.co/4qRtamV7nW -- chopaganda
CT_philipoyamo: RT @javier_carriazo: Android warning for all users – 4 apps to watch out for as hackers aim to steal your data... #ThreatIntel #Phishing #… -- CT_philipoyamo
Cyb3rMik3: New @eltacourier1 #phishing campaign luring for ???? ✉️dmnoreply[@]newsletter.immobiliare[.]it ????hxxps://s.free.fr/66Ew… https://t.co/DC2vvOSylA -- Cyb3rMik3
CyberSecurityN8: RT @Marco_Ramilli: ????:p://91.151 .89 .220 ????: #MIRAI #opendir with #malware on it. Interesting modules for #gitlab 81 and 911, plenty #prox… -- CyberSecurityN8
cybsecbot: RT @Marco_Ramilli: ????:p://91.151 .89 .220 ????: #MIRAI #opendir with #malware on it. Interesting modules for #gitlab 81 and 911, plenty #prox… -- cybsecbot
D00m3dR4v3n: RT @brechtcastel: #Geolocation is the art of finding where a video or picture is situated. It's an amazing force for investigations. You c… -- D00m3dR4v3n
Eightfold14: RT @cyb_detective: All of the links above are just examples, that will help you find your personal additional sources of information. More… -- Eightfold14
Eightfold14: Holy shit batman #OSINT ???? https://t.co/1YDSvQYh0X -- Eightfold14
Eightfold14: RT @cyb_detective: CCTV cameras in #OSINT - how to search for cameras (including vulnerable cameras) - how to save streams from cameras -… -- Eightfold14
Eightfold14: RT @Eightfold14: @InfoSecSherpa is one of my favorite writers on Medium.. Her weekly newsletter kicks butt. @wondersmith_rae speaks with co… -- Eightfold14
GoaTranceNET: RT @billyb2009: If PlanetLabs developed their own #OSINT team, they would take over the industry. I hope they don't, but they have the most… -- GoaTranceNET
Intel_sky: Italy - Air Force Piaggio P.180 Avanti Callsign: IAM2855 Reg: MM62207 Altitude: 8,316 ft Fir: ROMA Tracking links:… https://t.co/vXMew6xvr9 -- Intel_sky
Intel_sky: Polish Government Gulfstream G550 Callsign: PLF106 Reg: 0002 Altitude: 0 ft Fir: WARSZAWA Tracking links: ●… https://t.co/eNIM3DJi8u -- Intel_sky
IreadAssembler: RT @ido_cohen2: ???? Yanluowang #Ransomware team add CISCO to the victim's list ???? The group shares a TXT file with all the stolen files, a To… -- IreadAssembler
IT_TurkishSAI: List of Data Breaches and Cyber Attacks in July 2022 #databreach #CyberAttack #Ransomware #cybersecuritynews… https://t.co/7m3RbEibOd -- IT_TurkishSAI
jayeshmthakur: RT @AtlanticCouncil: Interested in #OSINT research? Want to learn how to #geolocate around the world? What even is an #API? Apply today t… -- jayeshmthakur
JEMPradio: Bob Marley - Johnny Was (Abbey Road Half Speed Master) #Phish #JEMPRadio #CommunityRadio #NowPlaying https://t.co/Bz9yNRAZtE -- JEMPradio
JinibaBD: ????Pentera #Credential Exposure reveals compromised #identity threats to internal and external attack surface‼️… https://t.co/ZVhGERxYv8 -- JinibaBD
KamFuretoZ: RT @harshad_hacker: What is #Phishing? Learn from just one image.… -- KamFuretoZ
LahavAlon: RT @JAMESWT_MHT: 109.206.241[.81/htdocs/ #opendir 465 samples #AsyncRAT #njRAT #Formbook #RemcosRAT #AgentTesla #RecordBreaker #NetWire #o… -- LahavAlon
LahavAlon: RT @Marco_Ramilli: ????:p://91.151 .89 .220 ????: #MIRAI #opendir with #malware on it. Interesting modules for #gitlab 81 and 911, plenty #prox… -- LahavAlon
LahavAlon: RT @MBThreatIntel: This threat actor (#techsupportscams) is using Google Ads for #malvertising via their newpop[.]org domain. We observed… -- LahavAlon
lekx007: RT @SophosXOps: 3 attackers, 2 weeks – 1 entry point... Lockbit, Hive, and BlackCat attack an automotive supplier in this triple #ransomwa… -- lekx007
minna_christa: RT @Robert4787: America's top spy says the U.S. intelligence community has replaced #terrorism with Communist #China as the biggest #Nation… -- minna_christa
pk_sharma2019: #Lockbit, #Hive, and #BlackCat attack automotive supplier in triple #ransomware attack. Source:… https://t.co/Z1EN2Ig9Gt -- pk_sharma2019
PythonBot_By_PM: RT @Paula_Piccard: 12 Ways To Protect Your Business From A Cyber Attack • Security awareness • Passwords • Backup #DataSecurity #Privacy… -- PythonBot_By_PM
Sam98722473: RT @SEACOM: A staggering 80% of South African organisations reported a ransomware attack in the last two years. https://t.co/XtBuqZS4ki… -- Sam98722473
SamuraiXDR: In 2021, we saw a 50% increase in malware led by trojans and botnets. Read more about this and other insights from… https://t.co/gyP9b12ByD -- SamuraiXDR
sectest9: RT @Marco_Ramilli: ????:p://91.151 .89 .220 ????: #MIRAI #opendir with #malware on it. Interesting modules for #gitlab 81 and 911, plenty #prox… -- sectest9
SNFLaboratory: RT @Paula_Piccard: 12 Ways To Protect Your Business From A Cyber Attack • Security awareness • Passwords • Backup #DataSecurity #Privacy… -- SNFLaboratory
Steve12238317: RT @CyberIQs_: SquarePhish: Advanced phishing tool combines QR #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hack… -- Steve12238317
Steve12238317: RT @CyberIQs_: Implementing zero trust for a secure hybrid working #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #… -- Steve12238317
t1t0wap0: RT @AtlanticCouncil: Interested in #OSINT research? Want to learn how to #geolocate around the world? What even is an #API? Apply today t… -- t1t0wap0
TwutterSupport: RT @cyb_detective: For 6 months, I've been procrastinating my weekly update to my #osint tool collection. But today I finally collected lin… -- TwutterSupport
UK_Daniel_Card: RT @Eightfold14: Holy shit batman #OSINT ???? -- UK_Daniel_Card
wien_zehn: RT @NLwartracker: 1/10 #Kherson western front update ????is finally here.Been working on checking info from local,#OSINT,sat &amp; other sources… -- wien_zehn
wltrrr: RT @brechtcastel: #Geolocation is the art of finding where a video or picture is situated. It's an amazing force for investigations. You c… -- wltrrr
AlecSocial: RT @infosec_jobsCOM: HIRING: Information Security Analyst / Linthicum, MD https://t.co/BlsCBM4e2R #InfoSec… https://t.co/Gs2SIBAaFT -- AlecSocial
beefyspace: RT @CyberIQs_: Implementing zero trust for a secure hybrid working #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #… -- beefyspace
beefyspace: RT @infosec_jobsCOM: HIRING: Information Security Analyst / Linthicum, MD https://t.co/Ca3NHsxC1e #InfoSec #InfoSecJobs #Cybersecurity #job… -- beefyspace
CyberIQs_: Cracking the Hackers: How to Build a 100% Engaged #infosec #infosecurity #cybersecurity #threatintel… https://t.co/CEEfp61vb1 -- CyberIQs_
CyberIQs_: Cybersecurity: Power to the People #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hacking… https://t.co/hLHUjzVwcO -- CyberIQs_
CyberIQs_: Cyber Security in the Workplace Guide #infosec #infosecurity #cybersecurity #threatintel #threatintelligence… https://t.co/YwdbDDt9aI -- CyberIQs_
CyberIQs_: Cisco fixed a flaw in ASA, FTD devices that can give #infosec #infosecurity #cybersecurity #threatintel… https://t.co/ZzUhKCqBmi -- CyberIQs_
CyberIQs_: Ex Twitter employee found guilty of spying for Saudi #infosec #infosecurity #cybersecurity #threatintel… https://t.co/E5TBMtgj6X -- CyberIQs_
CyberSecurityN8: RT @Orixcom: We may not be famous poets, but we can surely help keep your data secure wherever you work from. Get in touch today! #DataProt… -- CyberSecurityN8
CyberSecurityN8: RT @CyberIQs_: Implementing zero trust for a secure hybrid working #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #… -- CyberSecurityN8
CyberSecurityN8: RT @infosec_jobsCOM: HIRING: Information Security Analyst / Linthicum, MD https://t.co/Ca3NHsxC1e #InfoSec #InfoSecJobs #Cybersecurity #job… -- CyberSecurityN8
Ernestmaas55: RT @Orixcom: We may not be famous poets, but we can surely help keep your data secure wherever you work from. Get in touch today! #DataProt… -- Ernestmaas55
hiringnowintech: RT @infosec_jobsCOM: HIRING: Information Security Analyst / Linthicum, MD https://t.co/Ca3NHsxC1e #InfoSec #InfoSecJobs #Cybersecurity #job… -- hiringnowintech
javier_carriazo: Hackers find new ways to access your secret accounts #ThreatIntel #Phishing #ransomware #cyberattacks #privacy… https://t.co/ymB2O9JSGJ -- javier_carriazo
JEMPradio: Butthole Surfers - Pepper #Phish #JEMPRadio #CommunityRadio #NowPlaying https://t.co/Bz9yNRAZtE -- JEMPradio
JEMPradio: Phish - Sea and Sand (12-31-95) #Phish #JEMPRadio #CommunityRadio #NowPlaying https://t.co/Bz9yNRAZtE -- JEMPradio
Orixcom: We may not be famous poets, but we can surely help keep your data secure wherever you work from. Get in touch today… https://t.co/fQQ8evJntf -- Orixcom
overloopcrm: RT @Hakin9: Lnkbomb - Malicious shortcut generator for collecting NTLM hashes from insecure file shares https://t.co/g8luBhdHKk #infosec #… -- overloopcrm
sectest9: RT @Orixcom: We may not be famous poets, but we can surely help keep your data secure wherever you work from. Get in touch today! #DataProt… -- sectest9
sectest9: RT @CyberIQs_: Implementing zero trust for a secure hybrid working #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #… -- sectest9
sectest9: RT @infosec_jobsCOM: HIRING: Information Security Analyst / Linthicum, MD https://t.co/Ca3NHsxC1e #InfoSec #InfoSecJobs #Cybersecurity #job… -- sectest9
SecurityXTV: RT @CyberIQs_: Cisco fixed a flaw in ASA, FTD devices that can give #infosec #infosecurity #cybersecurity #threatintel #threatintelligence… -- SecurityXTV
_i_v_a_n___k__: RT @hackinarticles: Windows Commands Cheat Sheet #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecur… -- _i_v_a_n___k__
0xRiy4d: RT @0xElkot: Hacking with the boys @0xRyies @0xmahmoudJo0 Tip : always check POST requests and try to find more Parameters #sqli #BugBou… -- 0xRiy4d
100daysofcodeM: RT @Nickieyey: Cisco hacked by Yanluowang ransomware gang, 2.8GB allegedly ???? Link : https://t.co/bKNiffnunP #Pentesting #cyberattacks #cy… -- 100daysofcodeM
Bhuwan61474776: RT @disclosedh1: Hyperledger disclosed a bug submitted by cet2000: https://t.co/Pn9u1ugnkP - Bounty: $500 #hackerone #bugbounty https://t.c… -- Bhuwan61474776
CanuMickael: RT @HackenProof: ✅ [New Bug Bounty] @Ternoa_ has launched 3 bug bounty programs with up to $100,000 reward per critical vulnerability! ▶️ … -- CanuMickael
codeandtrade: RT @hackinarticles: Windows Commands Cheat Sheet #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecur… -- codeandtrade
CyberlawConf: International Conference on #Cyberlaw, #Cybercrime &amp; #Cybersecurity from 23rd to 25th November, 2022 For more info,… https://t.co/ThGEU3T8PE -- CyberlawConf
cyberpeacecorps: How can #Aadhaar related frauds be minimised? Drop your suggestions in the comment below. #BeCyberSure #CyberPeace… https://t.co/5PnVm7VdPc -- cyberpeacecorps
CyberSecurityN8: RT @CyberlawConf: International Conference on #Cyberlaw, #Cybercrime &amp; #Cybersecurity from 23rd to 25th November, 2022 For more info, pleas… -- CyberSecurityN8
CyberSecurityN8: RT @0xmahmoudJo0: #bugbountytips If you found a GitLab instance, try to login as root/admin with those credentials:- Username: root &amp; pa… -- CyberSecurityN8
DcLegacy5: RT @hackinarticles: Windows Commands Cheat Sheet #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecur… -- DcLegacy5
flocrypto90: RT @HackenProof: ✅ [New Bug Bounty] @Ternoa_ has launched 3 bug bounty programs with up to $100,000 reward per critical vulnerability! ▶️ … -- flocrypto90
Hyperio44159824: RT @hackinarticles: Windows Commands Cheat Sheet #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecur… -- Hyperio44159824
hypernominal: RT @hackinarticles: Windows Commands Cheat Sheet #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecur… -- hypernominal
KapurthalaNyk: RT @Nyksindia: To create a layered defense that makes it more difficult for an #unauthorized person to access a target, such as a physical… -- KapurthalaNyk
KapurthalaNyk: RT @Nyksindia: It's essential to understand internet safety rules which protect you and your family from threats that may harm your data an… -- KapurthalaNyk
looEyes: Palo Alto Networks Releases Security Update for PAN-OS #infosec #hacker #security #cyber #tech #cybercrime… https://t.co/UevVud8gNQ -- looEyes
MCLeo_KZ: RT @hackinarticles: Windows Commands Cheat Sheet #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecur… -- MCLeo_KZ
michael_gazzano: RT @peteraCMO: Despite a 50% reduction in its global impact compared to the previous month, #Emotet still took the top spot on Check Point… -- michael_gazzano
paulwiggins: RT @claudinecassar: #blogpost @ https://t.co/zPe3IDdA0y The FBI has issued a warning to businesses and consumers about the dangers of malic… -- paulwiggins
sectest9: RT @CyberlawConf: International Conference on #Cyberlaw, #Cybercrime &amp; #Cybersecurity from 23rd to 25th November, 2022 For more info, pleas… -- sectest9
sectest9: RT @0xmahmoudJo0: #bugbountytips If you found a GitLab instance, try to login as root/admin with those credentials:- Username: root &amp; pa… -- sectest9
steiner254: RT @0xmahmoudJo0: #bugbountytips If you found a GitLab instance, try to login as root/admin with those credentials:- Username: root &amp; pa… -- steiner254
steiner254: RT @a_lneylan: Grafana v8.2.6 unauthorized read of arbitrary files shodan: shodan search --color 'app="Grafana"' --fields ip_str #cyberse… -- steiner254
_yuhsuan: RT @henkvaness: Reverse image search tip: Google Lens now supports "find image source". How does it work on a desktop? 1. Type in https://t… -- _yuhsuan
1stKn1gh7: RT @Hakin9: Blackbird - An OSINT tool to search for accounts by username in social networks https://t.co/q912bkfjXI #infosec #cybersecuri… -- 1stKn1gh7
Aragorn32328247: RT @Volexity: .@Volexity uncovers mass exploitation of #Zimbra Collaboration Servers (ZCS) via CVE-2022-27925 using authentication bypass.… -- Aragorn32328247
beefyspace: RT @Hakin9: Blackbird - An OSINT tool to search for accounts by username in social networks https://t.co/q912bkfjXI #infosec #cybersecuri… -- beefyspace
charlgauthier: RT @MBThreatIntel: This threat actor (#techsupportscams) is using Google Ads for #malvertising via their newpop[.]org domain. We observed… -- charlgauthier
Cryptolaemus1: RT @JAMESWT_MHT: 109.206.241[.81/htdocs/ #opendir 465 samples #AsyncRAT #njRAT #Formbook #RemcosRAT #AgentTesla #RecordBreaker #NetWire #o… -- Cryptolaemus1
Cryptolaemus1: RT @JAMESWT_MHT: "NEW ORDER PURCHASE ORDER " Doc https://t.co/x9pb4fytUg drop doc #opendir 107.172.75.[169/httpsww/https_a/www.doc https:/… -- Cryptolaemus1
CyberIQs_: As the cost of cyber insurance rises, the number of #infosec #infosecurity #cybersecurity #threatintel… https://t.co/j66Eeu9dC5 -- CyberIQs_
CyberIQs_: Pentera Credential Exposure reveals compromised #infosec #infosecurity #cybersecurity #threatintel… https://t.co/u6hI4UYdz6 -- CyberIQs_
CyberSecurityN8: RT @CyberIQs_: Pentera Credential Exposure reveals compromised #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hack… -- CyberSecurityN8
DatawareW: RT @cyb_detective: For 6 months, I've been procrastinating my weekly update to my #osint tool collection. But today I finally collected lin… -- DatawareW
EWeyhrauch_MF: #ArcSight Nation – Stay connected to get the most out of #CyberRes #ArcSight. ????See how in @MicroFocusSec's new… https://t.co/JmeVYFAVKq -- EWeyhrauch_MF
Intel_Owl_lOvOl: RT @cyb_detective: For 6 months, I've been procrastinating my weekly update to my #osint tool collection. But today I finally collected lin… -- Intel_Owl_lOvOl
Intel_sky: United States - US Air Force (USAF) Boeing E-3B Sentry Callsign: No callsign Reg: 78-0578 Altitude: 2,163 ft Fir: A… https://t.co/sIwFEFpyL1 -- Intel_sky
Intel_sky: France - Air Force Airbus A330-243MRTT Callsign: FAF4061 Reg: F-UJCH Altitude: 3,278 ft Fir: CHENNAI Tracking link… https://t.co/fVImk1jJIZ -- Intel_sky
Intel_sky: France - Air Force Airbus A330-243MRTT Callsign: FAF4060 Reg: F-UJCK Altitude: 3,296 ft Fir: CHENNAI Tracking link… https://t.co/29N1sqraQh -- Intel_sky
Intel_sky: United States - US Air Force (USAF) Northrop Grumman RQ-4B Global Hawk Callsign: No callsign Reg: 11-2046 Altitude:… https://t.co/ikuVX42Z1H -- Intel_sky
Manuel_Bx: RT @sloppy_bear: Yanluowang #ransomware group has made the bold claim of an attack on @Cisco and given a long list of file names as their c… -- Manuel_Bx
missy1275: RT @CovertShores: #OSINT The #Russian Navy Sukhoi Su-24 FENCER strike aircraft seen destroyed at Saki air base in Crimea, is likely the l… -- missy1275
purpleXsec: RT @ido_cohen2: ???? Yanluowang #Ransomware team add CISCO to the victim's list ???? The group shares a TXT file with all the stolen files, a To… -- purpleXsec
PythonRoboto: RT @Hakin9: Blackbird - An OSINT tool to search for accounts by username in social networks https://t.co/q912bkfjXI #infosec #cybersecuri… -- PythonRoboto
RabihTajeddine: RT @sloppy_bear: Yanluowang #ransomware group has made the bold claim of an attack on @Cisco and given a long list of file names as their c… -- RabihTajeddine
RuOilTracker: ????????-&gt;???????? YUAN HE WAN 110,000 tons of crude oil From: Kozmino To: #Qingdao #China #russianoil #osint #sanctions… https://t.co/9GoitlXcSi -- RuOilTracker
sectest9: RT @CyberIQs_: Pentera Credential Exposure reveals compromised #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hack… -- sectest9
Tavo_B_F: RT @sloppy_bear: Yanluowang #ransomware group has made the bold claim of an attack on @Cisco and given a long list of file names as their c… -- Tavo_B_F
threatshub: ThreatsHub Cybersecurity News | Well-Architected Framework: Sustainability - https://t.co/d3UEUXlDlF #CyberSecurity… https://t.co/g0deTM0Ar9 -- threatshub
truthpeeker: RT @dutch_osintguy: Reminder: ABC #OSINT A = Assume Nothing B = Believe Nothing / No one C = Challenge / Check everything #disinformatio… -- truthpeeker
ashishbijlani: RT @FilipiPires: Packj - Large-Scale Security Analysis Platform To Detect Malicious/Risky Open-Source Packages https://t.co/oWA5kySJFa #sec… -- ashishbijlani
beefyspace: RT @CyberIQs_: Why SAP systems need to be brought into the #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hacking… -- beefyspace
beefyspace: RT @CyberIQs_: ISC Stormcast For Thursday, August 11th, 2022 #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hackin… -- beefyspace
beefyspace: RT @ValueMentor: How can financial institutions build resilience against #ransomware attacks? https://t.co/8WGtckbsqP #ITsecurity #cyberse… -- beefyspace
CyberIQs_: ISC Stormcast For Thursday, August 11th, 2022 #infosec #infosecurity #cybersecurity #threatintel… https://t.co/VdIrkGtnc4 -- CyberIQs_
CyberIQs_: Why SAP systems need to be brought into the #infosec #infosecurity #cybersecurity #threatintel #threatintelligence… https://t.co/cwfiKNNPNl -- CyberIQs_
CyberIQs_: Convergence and adoption of AI and ML countering the #infosec #infosecurity #cybersecurity #threatintel… https://t.co/kfg8j2MfDZ -- CyberIQs_
CyberSecurityN8: RT @CyberIQs_: Why SAP systems need to be brought into the #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hacking… -- CyberSecurityN8
CyberSecurityN8: RT @alandylan010: Were you hacked or scammed all you need is an ethical hacker. HMU now!#ethicalhacking #hack #kalilinux #linux #ethicalhac… -- CyberSecurityN8
CyberSecurityN8: RT @ValueMentor: How can financial institutions build resilience against #ransomware attacks? https://t.co/8WGtckbsqP #ITsecurity #cyberse… -- CyberSecurityN8
cybsecbot: RT @PhishStats: new #phishing at hXXp://wellsfaigot[.]herokuapp[.]com/ | 54[.]224[.]34[.]30 | United States | AMAZON-AES | ASN 14618 #infos… -- cybsecbot
di993r: RT @rtehrani: 7-Eleven Denmark confirms ransomware attack behind store closures https://t.co/AkT8U7Wya7 #security #crypto #cybersecurity #… -- di993r
di993r: RT @CyberIQs_: Rik Ferguson joins to Forescout as VP of Security #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #ha… -- di993r
FBuzzati: RT @cyb_detective: For 6 months, I've been procrastinating my weekly update to my #osint tool collection. But today I finally collected lin… -- FBuzzati
fe_tsoc: RT @romonlyht: https://t.co/PCWqnAy3iS No.1 Received: from 117.50.186.249; 06:13:26 +0900 hxxps://www[.]mobilesuica[.]tier04[.]top/ 103… -- fe_tsoc
fe_tsoc: RT @romonlyht: https://t.co/QRxZDkP125 No.1 Received: from 121.50.43.96; 02:04:06 +0900 hxxps://netstation2[.]aplus[.]ghuaozfwra[.]com/… -- fe_tsoc
LesJS1031: I’m an International Man of Phishtery now. #phish #toronto #budweiserstage https://t.co/hyWDR6927o -- LesJS1031
mbirdfoundation: RT @drewphish: Hey if you're on FB I'm having a birthday fundraiser to benefit @mbirdfoundation's Back to School Campaign. And an anonymou… -- mbirdfoundation
Miguelbetico7: RT @bamitav: Hacker uses new RAT malware in #Cuba #Ransomware attacks https://t.co/nZAmvE3VTW #cyberwar #cybercrime #cyber #hacker #priva… -- Miguelbetico7
romonlyht: https://t.co/PCWqnAy3iS No.1 Received: from 117.50.186.249; 06:13:26 +0900 hxxps://www[.]mobilesuica[.]tier04[.]… https://t.co/ze7dcQRJtN -- romonlyht
RWW: Ransomware Infections Top List of the Most Common Results of Phishing Attacks https://t.co/4exGDKDwCB -… https://t.co/MJnlLVh4UH -- RWW
sectest9: RT @CyberIQs_: Why SAP systems need to be brought into the #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hacking… -- sectest9
sectest9: RT @alandylan010: Were you hacked or scammed all you need is an ethical hacker. HMU now!#ethicalhacking #hack #kalilinux #linux #ethicalhac… -- sectest9
sectest9: RT @ValueMentor: How can financial institutions build resilience against #ransomware attacks? https://t.co/8WGtckbsqP #ITsecurity #cyberse… -- sectest9
sectest9: RT @CriminalIP_US: Case study: a DDoS attack analysis, Criminal IP successfully detects 99% of source IP address used for DDoS attack. http… -- sectest9
Steve12238317: RT @CyberIQs_: Pentera Credential Exposure reveals compromised #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hack… -- Steve12238317
tuantmb: RT @c9lab_soc: Phishing Domain Found: office365-onlines[.]com #phishing #malware #CyberSecurityAwareness #Office365 #Microsoft #security @… -- tuantmb
Ultrascan419: Deputy U.S. marshal accused in romance scams that bilked $2M from seniors - The Washington Post: A special deputy U… https://t.co/hGAWU3Vhnm -- Ultrascan419
ValueMentor: How can financial institutions build resilience against #ransomware attacks? https://t.co/8WGtckbsqP #ITsecurity… https://t.co/072FK4FMvN -- ValueMentor
beefyspace: RT @haneeni61853819: Bug Bounty Tips #Linux #KaliLinux #Ubuntu #hacking #Cybersecurity #infosec #cyber #BugBounty #web #cyberattacks #pro… -- beefyspace
codedailybot: RT @_Qflexi: Privacy Matters #100DaysOfCode #CodeNewbie #Developers #bugbounty #CyberAttack #cybersecurity #securityawareness #security @… -- codedailybot
codedailybot: RT @_Qflexi: Privacy Matters #100DaysOfCode #CodeNewbie #Developers #bugbounty #CyberAttack #cybersecurity #securityawareness #security @… -- codedailybot
codedailybot: RT @_Qflexi: Privacy Matters #100DaysOfCode #CodeNewbie #Developers #bugbounty #CyberAttack #cybersecurity #securityawareness #security @… -- codedailybot
codedailybot: RT @_Qflexi: Privacy Matters #100DaysOfCode #CodeNewbie #Developers #bugbounty #CyberAttack #cybersecurity #securityawareness #security @… -- codedailybot
codedailybot: RT @_Qflexi: Privacy Matters #100DaysOfCode #CodeNewbie #Developers #bugbounty #CyberAttack #cybersecurity #securityawareness #security @… -- codedailybot
CodeWithTwitchi: RT @_Qflexi: Privacy Matters #100DaysOfCode #CodeNewbie #Developers #bugbounty #CyberAttack #cybersecurity #securityawareness #security @… -- CodeWithTwitchi
CyberSecurityN8: RT @VipulYash2: 98% of #cybercrime cases against children still pending in courts. These crimes, which are mostly sexual in nature, have ri… -- CyberSecurityN8
CyberSecurityN8: RT @weinhouser: just found this on #amazon, Citygirl!!! Can't wait!! #THESINSOFCYBER. This will be a #blockbuster @citygirl https://t… -- CyberSecurityN8
DrBrighton4: RT @ChiNetworks: Dark Utilities C2 as a service tool leverages IPFS, targets several operating systems https://t.co/v2dXm2b413 via @techrep… -- DrBrighton4
gdprAI: RT @ChiNetworks: Cisco discloses a security breach, the Yanluowang ransomware group breached its corporate network in late May and stole in… -- gdprAI
Geisterkriege: RT @bamitav: Investigating Future #Security #threats with AI, ML and #Data Fusion https://t.co/XjtP72zty4 #cyberwar #cybercrime #cyber #… -- Geisterkriege
GoaiDev: RT @programmerjoke9: Solitaire Bot#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #reactjs #bugb… -- GoaiDev
GostKiller2: RT @BountyOverflow: I have found multiple auth bypass issues using below Headers #bugbountytips #bugbounty https://t.co/R82TXWiyDX -- GostKiller2
nod3bot: RT @_Qflexi: Privacy Matters #100DaysOfCode #CodeNewbie #Developers #bugbounty #CyberAttack #cybersecurity #securityawareness #security @… -- nod3bot
nod3bot: RT @programmerjoke9: Solitaire Bot#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #reactjs #bugb… -- nod3bot
nod3bot: RT @_Qflexi: Privacy Matters #100DaysOfCode #CodeNewbie #Developers #bugbounty #CyberAttack #cybersecurity #securityawareness #security @… -- nod3bot
rahul05ranjan: RT @programmerjoke9: Solitaire Bot#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #reactjs #bugb… -- rahul05ranjan
sectest9: RT @VipulYash2: 98% of #cybercrime cases against children still pending in courts. These crimes, which are mostly sexual in nature, have ri… -- sectest9
Steve12238317: RT @bamitav: Investigating Future #Security #threats with AI, ML and #Data Fusion https://t.co/XjtP72zty4 #cyberwar #cybercrime #cyber #… -- Steve12238317
VipulYash2: 98% of #cybercrime cases against children still pending in courts. These crimes, which are mostly sexual in nature,… https://t.co/zyVhtqb2go -- VipulYash2
XeronBot: RT @bamitav: Investigating Future #Security #threats with AI, ML and #Data Fusion https://t.co/XjtP72zty4 #cyberwar #cybercrime #cyber #… -- XeronBot
0xtechrock: RT @cyb_detective: For 6 months, I've been procrastinating my weekly update to my #osint tool collection. But today I finally collected lin… -- 0xtechrock
apidlusky: RT @NLwartracker: 1/10 #Kherson western front update ????is finally here.Been working on checking info from local,#OSINT,sat &amp; other sources… -- apidlusky
ArielFornari: RT @crispSV: First sat images of #Saky #Crimea explosions indicate that it is clearly a sabotage action by mining 4 ammo storages. #FSB is… -- ArielFornari
ArielFornari: RT @hacktoria: ???? Twint is an advanced Twitter scraping tool written in Python that allows for scraping Tweets from Twitter profiles without… -- ArielFornari
ArielFornari: RT @SlickRockWeb: Here is one of the phishing emails we captured. It was sent from an internal @twilio IP address mentioned above and posin… -- ArielFornari
beefyspace: RT @nevaluoto: ???? vn-security[.]vip ???? https://t.co/ZuQx343CD7 #cybersecurity #infosec #threats #phishing https://t.co/A3ugn49s9h -- beefyspace
beefyspace: RT @SlickRockWeb: Here is one of the phishing emails we captured. It was sent from an internal @twilio IP address mentioned above and posin… -- beefyspace
blu3cloak: This company didn't spot the flaw in their network. But three #ransomware gangs did | ZDNet https://t.co/ZFQZQpt3Ta -- blu3cloak
captain_kuro: RT @dutch_osintguy: Reminder: ABC #OSINT A = Assume Nothing B = Believe Nothing / No one C = Challenge / Check everything #disinformatio… -- captain_kuro
CodeWithTwitchi: RT @programmerjoke9: Solitaire Bot#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #reactjs #bugb… -- CodeWithTwitchi
CyberIQs_: Google is absolutely terrified of iMessage on the #infosec #infosecurity #cybersecurity #threatintel… https://t.co/NpxTgXzdQr -- CyberIQs_
CyberIQs_: Boffins rate npm and PyPI package security and it’s n #infosec #infosecurity #cybersecurity #threatintel… https://t.co/13gocvXoVR -- CyberIQs_
CyberIQs_: Meta privacy red team lead: Does your business know #infosec #infosecurity #cybersecurity #threatintel… https://t.co/sDIjKkLDsz -- CyberIQs_
CyberIQs_: China could be reviewing security bugs before tech #infosec #infosecurity #cybersecurity #threatintel… https://t.co/EsY8dRkSFF -- CyberIQs_
CyberSecurityN8: RT @BrianHonan: Cisco confirming they were victim of a #Ransomware attack back in May. Nice transparency and details on their blog "Cisco… -- CyberSecurityN8
CyberSecurityN8: RT @CyberIQs_: China could be reviewing security bugs before tech #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #h… -- CyberSecurityN8
cybsecbot: RT @CyberIQs_: Meta privacy red team lead: Does your business know #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #… -- cybsecbot
dawnslight2: RT @NLwartracker: 1/10 #Kherson western front update ????is finally here.Been working on checking info from local,#OSINT,sat &amp; other sources… -- dawnslight2
dawnslight2: RT @NLwartracker: 11/11 Overall we can see ???????? small gaines &amp; some counter attacks by ????????.However the ???????? forces seem to wait till the ???????? re-s… -- dawnslight2
EricWilderOK: RT @dutch_osintguy: Reminder: ABC #OSINT A = Assume Nothing B = Believe Nothing / No one C = Challenge / Check everything #disinformatio… -- EricWilderOK
GuyForgetGhost: Set II: Sample, DWD&gt;DDHVL, 20 Yrs Later, Light (9:27pm-XX) #Phish -- GuyForgetGhost
hacks4pancakes: RT @BrianHonan: Cisco confirming they were victim of a #Ransomware attack back in May. Nice transparency and details on their blog "Cisco… -- hacks4pancakes
IsrewyMohand: RT @0x0SojalSec: Reflected value check by extracting hidden params.… -- IsrewyMohand
jimgeisler413: RT @NLwartracker: 11/11 Overall we can see ???????? small gaines &amp; some counter attacks by ????????.However the ???????? forces seem to wait till the ???????? re-s… -- jimgeisler413
lantip: RT @BrianHonan: Cisco confirming they were victim of a #Ransomware attack back in May. Nice transparency and details on their blog "Cisco… -- lantip
P3t3rP4rk4r: RT @cyb_detective: For 6 months, I've been procrastinating my weekly update to my #osint tool collection. But today I finally collected lin… -- P3t3rP4rk4r
PhishCompanion: 111th Light Last played: 2022-07-29 at Coastal Credit Union Music Park At Walnut Creek Gap: 8 First played: 2009-0… https://t.co/N0oAYfb3Fw -- PhishCompanion
PythonRoboto: RT @cyb_detective: For 6 months, I've been procrastinating my weekly update to my #osint tool collection. But today I finally collected lin… -- PythonRoboto
RDSWEB: RT @cyb_detective: For 6 months, I've been procrastinating my weekly update to my #osint tool collection. But today I finally collected lin… -- RDSWEB
realrubberduck1: RT @CyberIQs_: China could be reviewing security bugs before tech #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #h… -- realrubberduck1
releaseteam: RT @CyberIQs_: QinetiQ US to purchase Avantus Federal for $590 #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hack… -- releaseteam
rvp: RT @CyberIQs_: Ransomware Gangs Attack the Same Network #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hacking #cy… -- rvp
secretcabdriver: Down With Disease was about 18 minutes. #phish -- secretcabdriver
sectest9: RT @BrianHonan: Cisco confirming they were victim of a #Ransomware attack back in May. Nice transparency and details on their blog "Cisco… -- sectest9
sectest9: RT @CyberIQs_: China could be reviewing security bugs before tech #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #h… -- sectest9
SecuRees: RT @BrianHonan: Cisco confirming they were victim of a #Ransomware attack back in May. Nice transparency and details on their blog "Cisco… -- SecuRees
snowdarkz: RT @MBThreatIntel: This threat actor (#techsupportscams) is using Google Ads for #malvertising via their newpop[.]org domain. We observed… -- snowdarkz
Travis__Garland: One of the easiest things you can do to better secure your data can be explained in just three letters: MFA. Multi-… https://t.co/mksRuLpwUy -- Travis__Garland
vpuedro: RT @cyb_detective: For 6 months, I've been procrastinating my weekly update to my #osint tool collection. But today I finally collected lin… -- vpuedro
5ynax: RT @0xrb: #systemBC #malware Targeting various #Mexico corp/enterprise network #Mexico Victim List (1145) : https://t.co/bGBvmSxhYO cc: @vx… -- 5ynax
AAronL1968: &gt; Light #PHiSH -- AAronL1968
beefyspace: RT @CyberIQs_: ActZero Ransomware Readiness Assessment strenghtens #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #… -- beefyspace
CyberIQs_: ActZero Ransomware Readiness Assessment strenghtens #infosec #infosecurity #cybersecurity #threatintel… https://t.co/2GcRK7UYb1 -- CyberIQs_
CyberIQs_: IRONSCALES Security Awareness Training educates #infosec #infosecurity #cybersecurity #threatintel… https://t.co/rYlBQlnvGK -- CyberIQs_
CyberSecurityN8: RT @ChiNetworks: Cisco discloses a security breach, the Yanluowang ransomware group breached its corporate network in late May and stole in… -- CyberSecurityN8
CyberSecurityN8: RT @CyberIQs_: IRONSCALES Security Awareness Training educates #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hack… -- CyberSecurityN8
CyberSecurityN8: RT @RcHacker12: My new YouTube video (link in bio) #cybersecurity #hacking #linux #ethicalhacking #technology #programing #python #tech #… -- CyberSecurityN8
fe_tsoc: RT @romonlyht: https://t.co/IJWKkdpKdq No.4 Received: from 222.77.212.172; 09:54:12 +0900 hxxps://www[.]broadwayfleet[.]com/ 173.254.23… -- fe_tsoc
fe_tsoc: RT @romonlyht: https://t.co/rDz92XHd0C No.3 Received: from 123.188.3.142; 06:04:57 +0900 hxxps://www[.]danbialozyt[.]com/jp 104.223.16.… -- fe_tsoc
fe_tsoc: RT @romonlyht: hxxps://www[.]danbialozyt[.]com/_ap/signin?_encoding=UTF8&amp;openid.assoc_handle=jpflex&amp;openid.claimed_id=&amp;action=sign-in&amp;path=… -- fe_tsoc
gcarranza1977: RT @CheckPointSW: Despite a 50% reduction in its global impact compared to the previous month, #Emotet still took the top spot on Check Poi… -- gcarranza1977
gcarranza1977: RT @CheckPointSW: Did you know that #emotet has been the most prevalent #malware globally in H1 2022? Check Point’s Mid-Year Cyber Attack T… -- gcarranza1977
GuyForgetGhost: Set II: Sample(12), DWD(18)&gt; DDHVL(3), 20 Yrs Later(9), Light(X) (9:27pm-XX) #Phish -- GuyForgetGhost
organic___music: Anyone have a stream link for #phish tonight??? They got my mama posternutbagg*d!!!!! -- organic___music
PAVoice413: Anyone ever think about turning Gamehenge into a sick indie kids movie? I’d watch that. #Phish -- PAVoice413
PhishStats: https://t.co/MAuIXRvYiq detected 254 new websites hosting #phishing | new today: 1874 | #infosec #cybersecurity… https://t.co/2ccnbNEMHt -- PhishStats
RcHacker12: My new YouTube video (link in bio) #cybersecurity #hacking #linux #ethicalhacking #technology #programing #python… https://t.co/r5DhLdPaYk -- RcHacker12
secretcabdriver: Light #phish https://t.co/TiVWDjDU7Y -- secretcabdriver
secretcabdriver: The longest Twenty Years Later is 21:14 when it was played 6-30-19 Camden. #phish https://t.co/aWfxmY5g0x -- secretcabdriver
sectest9: RT @ChiNetworks: Cisco discloses a security breach, the Yanluowang ransomware group breached its corporate network in late May and stole in… -- sectest9
sectest9: RT @CyberIQs_: IRONSCALES Security Awareness Training educates #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hack… -- sectest9
sectest9: RT @RcHacker12: My new YouTube video (link in bio) #cybersecurity #hacking #linux #ethicalhacking #technology #programing #python #tech #… -- sectest9
Stub_Me_Down: RT @GuyForgetGhost: Set II: Sample, DWD&gt;DDHVL, 20 Yrs Later, Light (9:27pm-XX) #Phish -- Stub_Me_Down
XeronBot: RT @RcHacker12: My new YouTube video (link in bio) #cybersecurity #hacking #linux #ethicalhacking #technology #programing #python #tech #… -- XeronBot
CyberGovAU: Today, Head ACSC, Abigail Bradshaw officially launched the new ACSC ‘Have you been hacked?’ tool, to help you assess if they’ve been hacked and guide you on how to respond. Check it out at https://t.co/F1YzqkHKbZ #ActNowStaySecure https:/ -- CyberGovAU
0xF2: RT @hackinarticles: Windows Commands Cheat Sheet #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecur… -- 0xF2
alimran13: Alhamdulillah, got listed in the Hall of Fame(HOF) for the contribution to secure their domain. #bugbounty… https://t.co/2Mei0YyWI5 -- alimran13
alljstweet: RT @programmerjoke9: Where is the lie?#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #reactjs #… -- alljstweet
ARealHumanName1: RT @programmerjoke9: Where is the lie?#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #reactjs #… -- ARealHumanName1
ChiNetworks: Dark Utilities C2 as a service tool leverages IPFS, targets several operating systems https://t.co/v2dXm2b413 via… https://t.co/wCBXSjorj4 -- ChiNetworks
codedailybot: RT @programmerjoke9: Where is the lie?#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #reactjs #… -- codedailybot
codedailybot: RT @programmerjoke9: Where is the lie?#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #reactjs #… -- codedailybot
CodeWithTwitchi: RT @Imminent_Flair: New Day in Technology . #cybersecurity #autimation #security #technology #tech #linux #programming #cyber #computersci… -- CodeWithTwitchi
CrazymanArmy: RT @bugraeskici: Google Bug Bounty - Cloud Shell Command Injection I hope you like it! :) #bugbounty https://t.co/B6mwlohxzi -- CrazymanArmy
CyberSecurityN8: RT @weinhouser: just found this on #amazon, Citygirl!!! Can't wait!! #THESINSOFCYBER. This will be a #blockbuster @citygirl https://t… -- CyberSecurityN8
CyberSecurityN8: RT @OnyxGovernment: .@USTreasury sanctions #cryptocurrency mixer Tornado Cash, saying the service was used to launder $7 billion worth of v… -- CyberSecurityN8
CyberSecurityN8: RT @Imminent_Flair: New Day in Technology . #cybersecurity #autimation #security #technology #tech #linux #programming #cyber #computersci… -- CyberSecurityN8
donna_devos: RT @Cybersixgill: Here’s a sneak peek inside our #DarkLab ???? Come and track down cybercriminals for a chance to win the trip of a lifetime… -- donna_devos
Fabriciosx: RT @Imminent_Flair: New Day in Technology . #cybersecurity #autimation #security #technology #tech #linux #programming #cyber #computersci… -- Fabriciosx
Imminent_Flair: RT @Imminent_Flair: New Day in Technology . #cybersecurity #autimation #security #technology #tech #linux #programming #cyber #computersci… -- Imminent_Flair
JameyDev: RT @programmerjoke9: Where is the lie?#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #reactjs #… -- JameyDev
mr_akb60x: RT @0xElkot: Hacking with the boys @0xRyies @0xmahmoudJo0 Tip : always check POST requests and try to find more Parameters #sqli #BugBou… -- mr_akb60x
mr_akb60x: RT @SaraBadran18: Stored XSS to Account Takeover : Going beyond document.cookie | Stealing Session Data from IndexedDB By @AdmiralSec0x01… -- mr_akb60x
OnyxKen: RT @OnyxGovernment: .@USTreasury sanctions #cryptocurrency mixer Tornado Cash, saying the service was used to launder $7 billion worth of v… -- OnyxKen
PythonBot_By_PM: RT @Imminent_Flair: New Day in Technology . #cybersecurity #autimation #security #technology #tech #linux #programming #cyber #computersci… -- PythonBot_By_PM
PythonRoboto: RT @programmerjoke9: Where is the lie?#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #reactjs #… -- PythonRoboto
riskigy: #Cloudflare disclosed employees and their family members received text messages on their personal and work phones s… https://t.co/retDqElFnT -- riskigy
sectest9: RT @OnyxGovernment: .@USTreasury sanctions #cryptocurrency mixer Tornado Cash, saying the service was used to launder $7 billion worth of v… -- sectest9
sectest9: RT @Imminent_Flair: New Day in Technology . #cybersecurity #autimation #security #technology #tech #linux #programming #cyber #computersci… -- sectest9
sectest9: RT @college_cyber: “If you spend more on coffee than on IT security, you will be hacked.” - Richard Clarke. Tags: #cybersecurity #onlinele… -- sectest9
Steve12238317: RT @Cybersixgill: Here’s a sneak peek inside our #DarkLab ???? Come and track down cybercriminals for a chance to win the trip of a lifetime… -- Steve12238317
xaelbot: RT @programmerjoke9: Where is the lie?#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #reactjs #… -- xaelbot
__winn: RT @henkvaness: Reverse image search tip: Google Lens now supports "find image source". How does it work on a desktop? 1. Type in https://t… -- __winn
1Knight72: Anyone recommend any good budget (or free) #investigation case management software? #intelligence #osint… https://t.co/9ec2WYfEUa -- 1Knight72
AnacompInc: More details have emerged on Maui #ransomware with analysis revealing a lack of "several key features" typically as… https://t.co/4p3vujUpUA -- AnacompInc
animal: RT @braingain: Thanks @henkvaness for pointing it out! "Find image source" works way better on Google Lens than Google's reverse image sear… -- animal
asaptech360hack: Don't panic over a Hack Just contact a professional hacker!! I'm always available 24/7 Inbox me Now!! Your professi… https://t.co/dp0xAujYUU -- asaptech360hack
asaptech360hack: Have exclusive Hacking jobs? DM and Ask for my service. #hacked #icloud #facebookdown #imessage #ransomware… https://t.co/KHXAMmA4Hn -- asaptech360hack
bahepa: RT @NLwartracker: 1/10 #Kherson western front update ????is finally here.Been working on checking info from local,#OSINT,sat &amp; other sources… -- bahepa
beefyspace: RT @ecarlesi: Threat on hxxp://redirect1[.]online/important/ #phishing #opendir @Chase @Bank_Security https://t.co/5x0EbfrTrY -- beefyspace
CyberIQs_: Zentera Systems appoints Stephanie Fohn and Sreeni #infosec #infosecurity #cybersecurity #threatintel… https://t.co/Nxdm8miVh6 -- CyberIQs_
CyberIQs_: Rik Ferguson joins to Forescout as VP of Security #infosec #infosecurity #cybersecurity #threatintel… https://t.co/z3P2YWqSTm -- CyberIQs_
CyberIQs_: Kajeet and Samsung join forces to deliver 5G private #infosec #infosecurity #cybersecurity #threatintel… https://t.co/EdoPJt3z54 -- CyberIQs_
CyberSecurityN8: RT @CyberIQs_: Open Cybersecurity Schema Framework project helps #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #ha… -- CyberSecurityN8
di_sociedad: RT @SaraBadran18: How To Test For Web Cache Vulnerabilities + Tips And Tricks https://t.co/RhfCMFSLpZ by @bxmbn #hackerone #BugBounty #… -- di_sociedad
Dorothy11405068: RT @MBThreatIntel: This threat actor (#techsupportscams) is using Google Ads for #malvertising via their newpop[.]org domain. We observed… -- Dorothy11405068
dwairlk: RT @Volexity: .@Volexity uncovers mass exploitation of #Zimbra Collaboration Servers (ZCS) via CVE-2022-27925 using authentication bypass.… -- dwairlk
fletch_ai: Andariel deploys DTrack and Maui ransomware Fletch Criticality Score: HIGH Find out if you're impacted.… https://t.co/NWdx5GxRBZ -- fletch_ai
HiepHoaNguyen1: RT @NLwartracker: 1/10 #Kherson western front update ????is finally here.Been working on checking info from local,#OSINT,sat &amp; other sources… -- HiepHoaNguyen1
jayeshmthakur: RT @polo_nmh: #Ransomware. Propaganda. Hacking power grids and oil pipelines. @TrendMicro #cybersecurity experts @Ed_E_Cabrera and Jon Clay… -- jayeshmthakur
jayeshmthakur: RT @ecarlesi: Threat on hxxp://redirect1[.]online/important/ #phishing #opendir @Chase @Bank_Security https://t.co/5x0EbfrTrY -- jayeshmthakur
JustmeAnybody: RT @NLwartracker: 1/10 #Kherson western front update ????is finally here.Been working on checking info from local,#OSINT,sat &amp; other sources… -- JustmeAnybody
mguhlin: RT @hackinarticles: Windows Commands Cheat Sheet #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecur… -- mguhlin
MicroFocusSec: Black Hat Welcome Reception now open! Come see us at booth 3125 and get a sneak peek at ✨#CyberResGalaxy ✨, our ne… https://t.co/EDPCdkk8We -- MicroFocusSec
NorthernLearner: Recover locked/lost accounts with ease, DM for all account retrievals. #gmailhack #gmaildown #hacked #Hacking… https://t.co/UkgU1nOUd2 -- NorthernLearner
NorthernLearner: Inbox now for all account recovery services,Lost or suspended, Inbox now let's get it done. #hacked #icloud… https://t.co/yt8FaH91KB -- NorthernLearner
NorthernLearner: Have a lost account you want to recover but don't know how? Inbox now for guide on how to recover your account imme… https://t.co/BKTPLeXxzp -- NorthernLearner
NorthernLearner: Inbox now for help and guide on how to recover lost accounts. #hacked #icloud #facebookdown #imessage #ransomware… https://t.co/ktoLQNapqZ -- NorthernLearner
NorthernLearner: Offering the best recovery services. All social media accounts hacking, Infiltration, and recovery.… https://t.co/uqTpzG986k -- NorthernLearner
NorthernLearner: Need a hacker to do the job? Lost your account and need a recovery but don't know how? Inbox now for help and guide… https://t.co/MRminEGJvq -- NorthernLearner
NorthernLearner: Offering the best recovery services. All social media accounts hacking, Infiltration, and recovery #hackedinstagram… https://t.co/ZUQ8rm56p0 -- NorthernLearner
NorthernLearner: Hacking is easy for specialists. DM for all cyber related problems. #hacked #icloud #facebookdown #imessage… https://t.co/FO2QxuIuGy -- NorthernLearner
NorthernLearner: You lost your account? A good hacker is all you need. DM now. #hacked #icloud #facebookdown #imessage #ransomware… https://t.co/wMtIwvJKIH -- NorthernLearner
Papa_Kosh: RT @dutch_osintguy: Reminder: ABC #OSINT A = Assume Nothing B = Believe Nothing / No one C = Challenge / Check everything #disinformatio… -- Papa_Kosh
peteraCMO: Despite a 50% reduction in its global impact compared to the previous month, #Emotet still took the top spot on Che… https://t.co/9BLBYGKfYc -- peteraCMO
ProtocolRonin: RT @dutch_osintguy: Reminder: ABC #OSINT A = Assume Nothing B = Believe Nothing / No one C = Challenge / Check everything #disinformatio… -- ProtocolRonin
RuOilTracker: ????????-&gt;???????? NS COMMANDER 100,000 tons of crude oil From: Ust-luga To: #Paradip #India #russianoil #osint #sanctions… https://t.co/55PHw8sfQK -- RuOilTracker
RuOilTracker: ????????-&gt;? MINERVA KYTHNOS Departed Novorossiysk with 110,000 tons of crude oil. Bound for Bosphorus Strait and out o… https://t.co/rsBGW6OF14 -- RuOilTracker
SoftIce2409: RT @hackinarticles: Windows Commands Cheat Sheet #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecur… -- SoftIce2409
Steve12238317: RT @CyberIQs_: Rik Ferguson joins to Forescout as VP of Security #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #ha… -- Steve12238317
Steve12238317: RT @fletch_ai: Andariel deploys DTrack and Maui ransomware Fletch Criticality Score: HIGH Find out if you're impacted. #CyberSecurity, #… -- Steve12238317
Steve12238317: RT @CyberIQs_: Zentera Systems appoints Stephanie Fohn and Sreeni #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #h… -- Steve12238317
threat_404: RT @UKikaski: Image of what is reported to be a destroyed RUSAF Su-24M at the Saki Airfield in Crimea. #OSINT #UkraineRussiaWar #RussiaU… -- threat_404
whovian9369: RT @SophosXOps: 3 attackers, 2 weeks – 1 entry point... Lockbit, Hive, and BlackCat attack an automotive supplier in this triple #ransomwa… -- whovian9369
YourAnonRiots: RT @MBThreatIntel: This threat actor (#techsupportscams) is using Google Ads for #malvertising via their newpop[.]org domain. We observed… -- YourAnonRiots
AAronL1968: &gt; Theme from the Bottom #PHiSH -- AAronL1968
beefyspace: RT @CyberIQs_: Spirent “Send Us Your Device” service opens new rou #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #… -- beefyspace
CyberIQs_: Spirent “Send Us Your Device” service opens new rou #infosec #infosecurity #cybersecurity #threatintel… https://t.co/ObLL3pElbL -- CyberIQs_
CyberSecurityN8: RT @HitechguruS: #Twilio #employees fell for #phishingtexts claiming to be from IT department https://t.co/E0g03I9oSG #security #infosec #i… -- CyberSecurityN8
CyberSecurityN8: RT @CyberIQs_: Rik Ferguson joins to Forescout as VP of Security #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #ha… -- CyberSecurityN8
dj_ir0ngruve: RT @accidentalrebel: New blog post: I talk about a malware sandbox evasion technique that checks the computer's RAM size. Also shared code… -- dj_ir0ngruve
GardenerSantana: RT @OSINTDojo: Curious about #OSINT for the Dark Web? Check out this video of a casual investigation of an alleged dark web arms dealer. Te… -- GardenerSantana
GuyForgetGhost: Set I: Sigma(11), Blaze On(9), Steam(11), MSO(2), Theme(X) (7:34pm-XX) #Phish -- GuyForgetGhost
GuyForgetGhost: Set I: Sigma, Blaze On, Steam, MSO, Theme (7:34pm-XX) #Phish -- GuyForgetGhost
im7below: RT @secretcabdriver: Theme From The Bottom #phish https://t.co/jKb11q4uTR -- im7below
Intel_sky: United States - US Air Force (USAF) Lockheed Martin F-35A Lightning II Callsign: No callsign Reg: 13-5067 Altitude:… https://t.co/PPpNzk2vBX -- Intel_sky
JEMPradio: Brett Slater - The Dead Zone 12-23-16 #Phish #JEMPRadio #CommunityRadio #NowPlaying https://t.co/Bz9yNRAZtE -- JEMPradio
keithdunn: So toss away stuff you don’t need in the end but keep what’s important and know who’s your friend. ❤️ #phish -- keithdunn
McAfee_Help: Protect your computer from viruses, #malware, and other threats by keeping your McAfee #antivirus product up to dat… https://t.co/yJosdvKJHH -- McAfee_Help
mdfaridulalam: What are the global #malware trends your organization needs to know about to stay ahead of #cybersecurity attacks?… https://t.co/5OsWOssKOl -- mdfaridulalam
mdfaridulalam: What was the most prevalent #malware last month? Read Check Point Research’s July 2022 Most Wanted Malware list to… https://t.co/fdXda71F32 -- mdfaridulalam
mdfaridulalam: RT @CheckPointSW: Did you know that #emotet has been the most prevalent #malware globally in H1 2022? Check Point’s Mid-Year Cyber Attack T… -- mdfaridulalam
mdfaridulalam: RT @CheckPointSW: Despite a 50% reduction in its global impact compared to the previous month, #Emotet still took the top spot on Check Poi… -- mdfaridulalam
olbioua: RT @Hakin9: Lnkbomb - Malicious shortcut generator for collecting NTLM hashes from insecure file shares https://t.co/g8luBhdHKk #infosec #… -- olbioua
PhishCompanion: 171st Theme From the Bottom Last played: 2022-08-05 at Atlantic City Beach Gap: 3 First played: 1995-05-16 at Lowe… https://t.co/FqMXy3jjgQ -- PhishCompanion
PhishPhashion: It sure does . . . Answer coming soon. Thanks for the help!!! #ittakesavillage #phish https://t.co/syt8hpR7OQ -- PhishPhashion
RuOilTracker: ????????-&gt;????‍☠️ PARAMOUNT Departed Nakhodka with 110,000 tons of crude oil. Destination unknown #russianoil #osint… https://t.co/VhjPeO9Bdm -- RuOilTracker
SDCarter10: .@FortiGuardLabs examines #SmokeLoader, a #malware variant that exploits CVE CVE-2017-0199 and CVE-2017-11882 in it… https://t.co/FNayDlUMM8 -- SDCarter10
secretcabdriver: My Sweet One #phish https://t.co/GvZjXu1yeE -- secretcabdriver
secretcabdriver: 171st Theme From The Bottom. 4th this year. LTP 8-5-22 Atlantic City. #phish -- secretcabdriver
secretcabdriver: Theme From The Bottom #phish https://t.co/jKb11q4uTR -- secretcabdriver
secretcabdriver: 253rd My Sweet One. 2nd this year. LTP 7-23-22 Bethel Woods. #phish -- secretcabdriver
sectest9: RT @HitechguruS: #Twilio #employees fell for #phishingtexts claiming to be from IT department https://t.co/E0g03I9oSG #security #infosec #i… -- sectest9
sectest9: RT @CyberIQs_: Rik Ferguson joins to Forescout as VP of Security #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #ha… -- sectest9
SecurityXTV: RT @CyberIQs_: Spirent “Send Us Your Device” service opens new rou #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #… -- SecurityXTV
Stub_Me_Down: RT @GuyForgetGhost: Set I: Sigma(11), Blaze On(9), Steam(11), MSO(2), Theme(X) (7:34pm-XX) #Phish -- Stub_Me_Down
ThunderOfThor65: Find it interesting that most big name #OSINT Twitter accounts are to dumb to know the truth why #Russia did what t… https://t.co/sUiULDFfMy -- ThunderOfThor65
UMfacts: RT @umWOWshow: My ears are convinced they heard (still hear) a quick jab of a Franklin’s Tower tease in the thick gooey goodness of Cities… -- UMfacts
umWOWshow: My ears are convinced they heard (still hear) a quick jab of a Franklin’s Tower tease in the thick gooey goodness o… https://t.co/wYPb6Yr4cp -- umWOWshow
CyberSecurityN8: RT @threatshub: ThreatsHub Cybersecurity News | As Black Hat kicks off, the US government is getting the message on hiring security talent… -- CyberSecurityN8
CyberSecurityN8: RT @_bughunter: Get Jira subdomains for your targets ???????????????? Use these Google dorks ???????? inurl:&lt;COMPANY_NAME&gt; intitle:JIRA inurl:&lt;COMPANY_NAME&gt;… -- CyberSecurityN8
CyberSecurityN8: RT @FreedomNetTech: Tripwire | Cybersecurity is Everyone's Job https://t.co/IJZT5D9yAs #cybercrime #cybersecurity https://t.co/Anl6pqHZeh -- CyberSecurityN8
Dyllansnow: RT @hackinarticles: Windows Commands Cheat Sheet #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecur… -- Dyllansnow
FreedomNetTech: Tripwire | Cybersecurity is Everyone's Job https://t.co/IJZT5D9yAs #cybercrime #cybersecurity https://t.co/Anl6pqHZeh -- FreedomNetTech
imhaxormad: RT @th3cyb3rk1tt3n: I’m just arriving to #dianainitiative with lots of @Bugcrowd swag to give out (hats, shirts, stickers, and more). Come… -- imhaxormad
m0ckingbird007: RT @hackinarticles: Windows Commands Cheat Sheet #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecur… -- m0ckingbird007
Mazt0r: RT @0xKaran: Collection of #bugbounty poc Consists almost every vulnerability (100+) HackerOne reports (1000+) ???????????????????? https://t.co/mX3Kfb… -- Mazt0r
Mostchubby25: RT @Ransome_Nsubong: Did you know that fraudsters use your personal information to commit #cybercrime? #Solcial does not ask for any perso… -- Mostchubby25
orfgeotech: #Encryption does not mean granting a fundamental right to evading law Watch Rajeev Chandrasekhar in conversation w… https://t.co/Ml2cEch6br -- orfgeotech
Panopticonomy: RT @Gate_15_Analyst: Three Nigerian Nationals Extradited to the United States from the United Kingdom for Participating in Business Email C… -- Panopticonomy
RemonRoland: RT @programmerjoke9: Look at me#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #reactjs #bugboun… -- RemonRoland
sectest9: RT @_bughunter: Get Jira subdomains for your targets ???????????????? Use these Google dorks ???????? inurl:&lt;COMPANY_NAME&gt; intitle:JIRA inurl:&lt;COMPANY_NAME&gt;… -- sectest9
sectest9: RT @FreedomNetTech: Tripwire | Cybersecurity is Everyone's Job https://t.co/IJZT5D9yAs #cybercrime #cybersecurity https://t.co/Anl6pqHZeh -- sectest9
sectest9: RT @weinhouser: just found this on #amazon, Citygirl!!! Can't wait!! #THESINSOFCYBER. This will be a #blockbuster @citygirl https://t… -- sectest9
sectest9: RT @threatshub: ThreatsHub Cybersecurity News | As Black Hat kicks off, the US government is getting the message on hiring security talent… -- sectest9
shohel_96: RT @0x0SojalSec: Reflected value check by extracting hidden params.… -- shohel_96
shohel_96: RT @SaraBadran18: How To Test For Web Cache Vulnerabilities + Tips And Tricks https://t.co/RhfCMFSLpZ by @bxmbn #hackerone #BugBounty #… -- shohel_96
shohel_96: RT @_bughunter: Get Jira subdomains for your targets ???????????????? Use these Google dorks ???????? inurl:&lt;COMPANY_NAME&gt; intitle:JIRA inurl:&lt;COMPANY_NAME&gt;… -- shohel_96
_DevinLynch: RT @security_score: SecurityScorecard investigated recent #CyberAttacks on #LocalGovernment and found a number of issues affecting organiza… -- _DevinLynch
_operations6_: RT @SophosXOps: 3 attackers, 2 weeks – 1 entry point... Lockbit, Hive, and BlackCat attack an automotive supplier in this triple #ransomwa… -- _operations6_
ABFilipczak: RT @_Vault_Security: Website OSINT. https://t.co/SQ649Dgu1N #infosec #cybersec #osint #cybersecurity #Website https://t.co/nIpLaR6nH7 -- ABFilipczak
AndreGironda: RT @JAMESWT_MHT: 109.206.241[.81/htdocs/ #opendir 465 samples #AsyncRAT #njRAT #Formbook #RemcosRAT #AgentTesla #RecordBreaker #NetWire #o… -- AndreGironda
CraneHassold: RT @AbnormalSec: Today we launched Abnormal Intelligence, new research and data hub designed to inform you of the most unique attacks and i… -- CraneHassold
CyberIQs_: Reimagining thence in the World of Hybrid Work #infosec #infosecurity #cybersecurity #threatintel… https://t.co/JpxG0sle6Y -- CyberIQs_
CyberIQs_: Sensitive data in the cloud gets new automated #infosec #infosecurity #cybersecurity #threatintel… https://t.co/C9eyymoA23 -- CyberIQs_
CyberIQs_: SimSpace Partner Network enables organizations to #infosec #infosecurity #cybersecurity #threatintel… https://t.co/ch9J6Gs2P8 -- CyberIQs_
CyberSecurityN8: RT @CyberIQs_: Reimagining thence in the World of Hybrid Work #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hacki… -- CyberSecurityN8
Diablo647080623: RT @NLwartracker: 11/11 Overall we can see ???????? small gaines &amp; some counter attacks by ????????.However the ???????? forces seem to wait till the ???????? re-s… -- Diablo647080623
fe_tsoc: RT @MBThreatIntel: This threat actor (#techsupportscams) is using Google Ads for #malvertising via their newpop[.]org domain. We observed… -- fe_tsoc
fkSays: RT @hackinarticles: Windows Commands Cheat Sheet #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecur… -- fkSays
gauch02: Get a sneak peek at @MicroFocusSec's new threat research platform, #CyberResGalaxy✨ at @BlackHatEvents on Aug 10-11… https://t.co/qAKS1yWHnM -- gauch02
gdprAI: RT @threatshub: ThreatsHub Cybersecurity News | As Black Hat kicks off, the US government is getting the message on hiring security talent… -- gdprAI
illumio: “Once they’re in you’re network…it’s game over” Paul Dant discussing why we’re still losing the #ransomware battle… https://t.co/oEtjqBGQjF -- illumio
InfonomicsInc: RT @modrnhealthcr: A ransomware attack at a vendor exposed data on almost 2 million patients, according to a report submitted to the @HHSGo… -- InfonomicsInc
InfoSecPhysa: #ransomware securityaffairs posted "Cisco was hacked by the Yanluowang ransomware gang" Full version: https://t.co/jWMaEEiXpU -- InfoSecPhysa
Intel_sky: Private owner Cessna 210M Centurion Callsign: MJN Reg: VH-MJN Altitude: 0 ft Fir: BRISBANE Tracking links: ●… https://t.co/PlzdO39Dvo -- Intel_sky
intelDose: Satellite images show scale of destruction on Russian military base in Crimea ⚠️ #intelligence #geopolitics #osint https://t.co/Czk6Vc8IPO -- intelDose
JanWillemdeGro1: RT @CovertShores: #OSINT The #Russian Navy Sukhoi Su-24 FENCER strike aircraft seen destroyed at Saki air base in Crimea, is likely the l… -- JanWillemdeGro1
jhangjuu: RT @Glacius_: Interesting #opendir currently spreading "HaiBonBay_bot". Usage of telegram API, defender bypass, storing secrets on custom C… -- jhangjuu
Jootar26: RT @OSINTDojo: Curious about #OSINT for the Dark Web? Check out this video of a casual investigation of an alleged dark web arms dealer. Te… -- Jootar26
JRoosen: RT @MBThreatIntel: This threat actor (#techsupportscams) is using Google Ads for #malvertising via their newpop[.]org domain. We observed… -- JRoosen
kirbstr: RT @OsintCurious: @ChristinaLekati and @WebBreacher love talking about #OSINT conferences, tools, and resources! Glad you liked it! #osint… -- kirbstr
MBThreatIntel: This threat actor (#techsupportscams) is using Google Ads for #malvertising via their newpop[.]org domain. We obse… https://t.co/eBhr1CNUEa -- MBThreatIntel
Mereiconoclast: RT @programmerjoke9: How rapid disassembly didn't happen, IDK#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNe… -- Mereiconoclast
peterjmsimons: #Cisco hacked by #Yanluowang #ransomware gang, 2.8GB allegedly stolen https://t.co/biZBw5rmte by @BleepinComputer #cyberattacks -- peterjmsimons
plaverty9: RT @OsintCurious: @ChristinaLekati and @WebBreacher love talking about #OSINT conferences, tools, and resources! Glad you liked it! #osint… -- plaverty9
PythonBot_By_PM: RT @programmerjoke9: How rapid disassembly didn't happen, IDK#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNe… -- PythonBot_By_PM
RedPacketSec: US-CERT Bulletin (SB22-220):Vulnerability Summary for the Week of August 1, 2022 - https://t.co/OKnXDO337v #USCERT… https://t.co/kqCun1ciHB -- RedPacketSec
releaseteam: RT @CyberIQs_: New Small Business Cybersecurity Funding Act: Good #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #h… -- releaseteam
rick_weav: RT @CheckPointSW: Despite a 50% reduction in its global impact compared to the previous month, #Emotet still took the top spot on Check Poi… -- rick_weav
rocio_reports: RT @modrnhealthcr: A ransomware attack at a vendor exposed data on almost 2 million patients, according to a report submitted to the @HHSGo… -- rocio_reports
RuOilTracker: ????????-&gt;? BEKS WORLD Departed Novorossiysk with 30,000 tons of oil products. Bound for Bosphorus Strait and out of t… https://t.co/c90ThnrUrC -- RuOilTracker
RuOilTracker: ????????-&gt;???????? MISCA Departed Novorossiysk with 140,000 tons of crude oil for delivery in #Korfez, #Turkey #russianoil… https://t.co/ogwe3Eztfm -- RuOilTracker
sectest9: RT @CyberIQs_: Sensitive data in the cloud gets new automated #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hacki… -- sectest9
shohel_96: RT @cycatz2: #cycatz #bugbounty #bugbountytips Exploit SQL Injection and bypass captcha with SQLMAP More..https://t.co/peLhlzAQkA #AppS… -- shohel_96
SupplyChainSN: RT @modrnhealthcr: A ransomware attack at a vendor exposed data on almost 2 million patients, according to a report submitted to the @HHSGo… -- SupplyChainSN
thepixeldevs: RT @programmerjoke9: How rapid disassembly didn't happen, IDK#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNe… -- thepixeldevs
WebBreacher: Excited to be keynoting the @ReconVillage at @defcon this year! Hoping to see some of #OSINT and #cyber people the… https://t.co/2uz372txOJ -- WebBreacher
zero_dot1: RT @MBThreatIntel: This threat actor (#techsupportscams) is using Google Ads for #malvertising via their newpop[.]org domain. We observed… -- zero_dot1
ABFilipczak: RT @_Vault_Security: VirusTotal Reveals List of Most Mimicked Legitimate Apps in Malware Attacks. https://t.co/JdfmVo30Kc #infosec #cybers… -- ABFilipczak
ABFilipczak: RT @_Vault_Security: Three ransomware gangs consecutively attacked the same network. https://t.co/Q9fAITbErV #Ransomware #cybercrime #cybe… -- ABFilipczak
AwakenNow5: RT @LanceSchukies: Windows Under Attack, Microsoft Says, All Users Should Update Now #cybersecurity #infosec #hacker #cyberattack #phishin… -- AwakenNow5
buzz2978: The date and location of the next @phish festival is etched on this pyramid! I just saw them!!!! #phishtwitter… https://t.co/bD0DpK5wzv -- buzz2978
CyberIQs_: How ML-driven search is helping ecommerce sites #infosec #infosecurity #cybersecurity #threatintel… https://t.co/TZdbOg71jj -- CyberIQs_
CyberIQs_: Cisco was hacked by the Yanluowang ransomware gang #infosec #infosecurity #cybersecurity #threatintel… https://t.co/Ek8Hn32Zzb -- CyberIQs_
CyberIQs_: How to Measure the Value of Information Security #infosec #infosecurity #cybersecurity #threatintel… https://t.co/p72KL6K6TW -- CyberIQs_
CyberKelvin: RT @Hakin9: Lnkbomb - Malicious shortcut generator for collecting NTLM hashes from insecure file shares https://t.co/g8luBhdHKk #infosec #… -- CyberKelvin
CyberSecurityN8: RT @CyberIQs_: How ML-driven search is helping ecommerce sites #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hack… -- CyberSecurityN8
CyberSecurityN8: RT @CyberIQs_: How ML-driven search is helping ecommerce sites #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hack… -- CyberSecurityN8
CyberSecurityN8: RT @PhishFindR: In the Last 24 Hours ???? PhishFindR Found: 887 NEW #Phishing Links ???? 568 NEW Phishing Domains ???? &gt; https://t.co/XwsMfLnEhL… -- CyberSecurityN8
ecarlesi: Threat on hxxp://apple-found[.]live/ #phishing #namesilo -- ecarlesi
Epic24313: #Pick5 #Phish Icculus Have Mercy Ghost Forbin's Wombat -- Epic24313
ErniesDad2001: Pre Show Couch Tour Vibes. #Phish #couchtour #StLawerenceRiver https://t.co/Aic6l2zhuZ -- ErniesDad2001
fe_tsoc: RT @KesaGataMe0: #Phishing #SMBC #三井住友銀行 #フィッシング詐欺 IP:204.152.210.142 (AS 8100 / ASN-QUADRANET-GLOBAL ) hxxps://direct.smbc.co.jp.fsgtp… -- fe_tsoc
Intel_sky: Royal Air Force (RAF) Eurofighter Typhoon FGR.4 Callsign: WOLF0041 Reg: ZK331 Altitude: 14,818 ft Fir: LONDON Trac… https://t.co/VfmExYkM35 -- Intel_sky
iot_marketing: #Maui #ransomware linked to North Korean group Andariel #Cybersecurity #Cyberattacks #Malware #DataBreach… https://t.co/KtZyoUkXUG -- iot_marketing
LanceSchukies: Can your EDR handle a ransomware attack? 6-point checklist for an anti-ransomware EDR #cybersecurity #infosec… https://t.co/gZZ9ku1y1m -- LanceSchukies
LanceSchukies: From zero to hero in blockchain security – A CP workshop at DEF CON 30 - Check Point Software #cybersecurity… https://t.co/eJzU8QKP4C -- LanceSchukies
OSINT_Research: Great and easily remembered reminder. Goes to the heart of all things #OSINT Verify all the things, all the time.… https://t.co/INJX4jDmvK -- OSINT_Research
phandy2001: Drift while you’re sleeping Stash Mull Secret Smile Joy #Phish #Pick5 -- phandy2001
PhishFindR: In the Last 24 Hours ???? PhishFindR Found: 887 NEW #Phishing Links ???? 568 NEW Phishing Domains ???? &gt;… https://t.co/gipucldHRP -- PhishFindR
PhishPlaysWP: Whipping Post Everything's Right Maple Leaf Rag Whipping Post Reprise Shake it Off #pick5 #phish -- PhishPlaysWP
RH_ISAC: 7-Eleven stores in Denmark closed due to a cyberattack #infosec #cybersecurity #cyberattack https://t.co/cejuHyM76t -- RH_ISAC
SDCCOE: Hackers who normally distributed #malware via phishing attachments with malicious macros have changed tactics after… https://t.co/BCQKy4LrW0 -- SDCCOE
sectest9: RT @CyberIQs_: How ML-driven search is helping ecommerce sites #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hack… -- sectest9
Steve12238317: RT @CyberIQs_: New Small Business Cybersecurity Funding Act: Good #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #h… -- Steve12238317
Steve12238317: RT @LanceSchukies: From zero to hero in blockchain security – A CP workshop at DEF CON 30 - Check Point Software #cybersecurity #infosec #… -- Steve12238317
Ultrascan419: 'Fall from grace': Former CEO of IWK Health Centre sentenced to 5 months in jail for fraud: Kitch was charged in Oc… https://t.co/FrS9ZsStxc -- Ultrascan419
xnevergetoutx: Looking for anything for Saturday Dick’s! I have either a Sunday field, a Thursday stand or a Friday stand to trade! #phish -- xnevergetoutx
BACSIRT: @barbaravespa @Personal_flow_ @PersonalFlow_At @PersonalAr Hola @barbaravespa ???? nos alegra que hayas detectado la amenaza y no hayas caído en una posible estafa. Para reportar incidentes relacionados con la ciberseguridad podés escribirnos por -- BACSIRT
CSIRTGOB: #CSIRTGob informa #phishing con #malware con falso documento de pago. Más información aquí: https://t.co/CVXAJtjegl Para más alertas y vulnerabilidades ingresa a https://t.co/y5f2vdRY06 #ciberseguridad https://t.co/zpuU9piEBr -- CSIRTGOB
DavidWhinray: RT @PriorityDomains: @Sysdig incorporates #MachineLearning to detect #cryptojacking attempts  https://t.co/YhSDc4N55g via @VentureBeat Co… -- DavidWhinray
DavidWhinray: RT @PriorityDomains: @JJdomains https://t.co/cKV8zvcoRt Domain Name for Sale Pay 12 interest free installments #cybersecurity #cybersec… -- DavidWhinray
DavidWhinray: RT @PriorityDomains: Why #Cryptojacking is #Dangerous Even if You Don't Own #Crypto https://t.co/COc7yC211i Coincidentally available for… -- DavidWhinray
MartinsAldrin: RT @PriorityDomains: Why #Cryptojacking is #Dangerous Even if You Don't Own #Crypto https://t.co/COc7yC211i Coincidentally available for… -- MartinsAldrin
PriorityDomains: Why #Cryptojacking is #Dangerous Even if You Don't Own #Crypto https://t.co/COc7yC211i Coincidentally available f… https://t.co/CicZtuTIga -- PriorityDomains
_WinterPrinting: RT @hackinarticles: Windows Commands Cheat Sheet #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecur… -- _WinterPrinting
beefyspace: RT @harshad_hacker: Essential #Windows commands everyone should know : Add all below commands in your cheatsheet for #recon &amp; #cybersecuri… -- beefyspace
cloudpreacher: RT @cloudpreacher: #Infographic: At the Heart❤️of #DataScience #MachineLearning #Python #IoT #100DaysOfCode #programming #CodeNewbie #rea… -- cloudpreacher
CodeWithTwitchi: RT @cloudpreacher: #Infographic: At the Heart❤️of #DataScience #MachineLearning #Python #IoT #100DaysOfCode #programming #CodeNewbie #rea… -- CodeWithTwitchi
CyberDFIR: RT @harshad_hacker: Essential #Windows commands everyone should know : Add all below commands in your cheatsheet for #recon &amp; #cybersecuri… -- CyberDFIR
CyberDFIR: RT @hackinarticles: SSRF Cheat Sheet Credit @d0nutptr #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informati… -- CyberDFIR
CyberSecurityN8: RT @freeprogrammers: Good Search Engines for Pentesters #Pentesting #CyberSec #cyberawarness #cybersecuritytips #informationsecurity #info… -- CyberSecurityN8
CyberSecurityN8: RT @PriorityDomains: https://t.co/cKV8zvcoRt Domain Name for Sale Pay 12 interest free installments or arrange a multi month lease to buy… -- CyberSecurityN8
DavidWhinray: RT @PriorityDomains: https://t.co/cKV8zvcoRt Domain Name for Sale Pay 12 interest free installments or arrange a multi month lease to buy… -- DavidWhinray
hudsonseiler: RT @haneeni61853819: Top 25 Remote Code Execution (RCE) Parameters For Bug Hunters #Linux #KaliLinux #Ubuntu #hacking #Cybersecurity #info… -- hudsonseiler
IoTdevOps: RT @PriorityDomains: @Sysdig incorporates #MachineLearning to detect #cryptojacking attempts  https://t.co/YhSDc4N55g via @VentureBeat Co… -- IoTdevOps
JJdomains: RT @PriorityDomains: @Sysdig incorporates #MachineLearning to detect #cryptojacking attempts  https://t.co/YhSDc4N55g via @VentureBeat Co… -- JJdomains
LySlayer1: RT @hackinarticles: Windows Commands Cheat Sheet #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecur… -- LySlayer1
maurotedesco68: RT @haneeni61853819: Offensive Shellcode from Scratch You can download it from: https://t.co/eHJcQFI1lL #Linux #KaliLinux #Ubuntu #hacki… -- maurotedesco68
maurotedesco68: RT @steiner254: "Top 40 Shodan Dorks for Finding Sensitive IoT Data" by @SecurityTrails #BugBounty #bugbountytips #CyberSecurity https:/… -- maurotedesco68
PriorityDomains: RT @PriorityDomains: Why #Cryptojacking is #Dangerous Even if You Don't Own #Crypto https://t.co/COc7yC211i Coincidentally available for… -- PriorityDomains
PriorityDomains: RT @PriorityDomains: @JJdomains https://t.co/cKV8zvcoRt Domain Name for Sale Pay 12 interest free installments #cybersecurity #cybersec… -- PriorityDomains
PriorityDomains: RT @PriorityDomains: @Sysdig incorporates #MachineLearning to detect #cryptojacking attempts  https://t.co/YhSDc4N55g via @VentureBeat Co… -- PriorityDomains
PriorityDomains: RT @PriorityDomains: https://t.co/cKV8zvcoRt Domain Name for Sale Pay 12 interest free installments or arrange a multi month lease to buy… -- PriorityDomains
rick_weav: RT @CheckPointSW: Did you know that #emotet has been the most prevalent #malware globally in H1 2022? Check Point’s Mid-Year Cyber Attack T… -- rick_weav
RiteshBhosle2: RT @BountyOverflow: Hmmm... well! #bugbounty https://t.co/yTWCfy3YXL -- RiteshBhosle2
sectest9: RT @freeprogrammers: Good Search Engines for Pentesters #Pentesting #CyberSec #cyberawarness #cybersecuritytips #informationsecurity #info… -- sectest9
sectest9: RT @PriorityDomains: https://t.co/cKV8zvcoRt Domain Name for Sale Pay 12 interest free installments or arrange a multi month lease to buy… -- sectest9
tutti73712085: RT @freeprogrammers: Good Search Engines for Pentesters #Pentesting #CyberSec #cyberawarness #cybersecuritytips #informationsecurity #info… -- tutti73712085
Venafi: Cybercriminals can leverage encryption protocols such as SSL and HTTPS to hide their attacks and make them harder t… https://t.co/cDYLpBPkA9 -- Venafi
xaelbot: RT @cloudpreacher: #Infographic: At the Heart❤️of #