Attackers exploited a Mitel VOIP zero-day to compromise a network 
Meta from HackTheBox — Detailed Walkthrough | by Pencer | Jun, 2022 | InfoSec Write-ups
InfoSecSherpa’s News Roundup for Friday, June 24, 2022 | by InfoSecSherpa | Jun, 2022 | Medium
The Grand Vision of The Future … European Digital ID Wallet (EDIW) | by Prof Bill Buchanan OBE | Jun, 2022 | Medium
On Passwordless Day …. Passwords are strange things. They are… | by Prof Bill Buchanan OBE | ASecuritySite: When Bob Met Alice | Jun, 2022 | Medium
Start Your Career in Ethical Hacking: Hackaday Ghidra Exercises Walkthrough Part 1A | by Haddock | Jun, 2022 | Medium
Containers Security: What You Need to Know | Cybersecurityspace
Sensitive Token Leakage from server side | by Milanjain | Jun, 2022 | Medium
An Out Of Scope domain Leads To a Critical Bug[$1500] | by shakti mohanty | Jun, 2022 | Medium
Threat Source newsletter (June 9, 2022) — Get ready for Cisco Live
Dems want FTC to investigate Apple and Google for privacy harms made worse Post-Roe
Hacker selling access to 50 vulnerable networks through Atlassian vulnerability
APT Groups Swarming on VMware Servers with Log4Shell
Without Conti on the Scene, LockBit 2.0 Leads Ransomware Attacks
Only 3% of Open Source Software Bugs Are Actually Attackable, Researchers Say
7 Steps to Stronger SaaS Security
#InfosecurityEurope2022: Preparing for Future Challenges and Opportunities
FTC finalizes order over CafePress security issues
House panel approves major cash infusion for CISA
Ransomware groups targeting Mitel VoIP zero-day
US arm of Japanese automotive hose maker Nichirin pauses production after ransomware attack
FBI investigating $100 million theft from blockchain company Harmony
Threat actors continue to exploit Log4Shell in VMware Horizon Systems
Yashma Ransomware Builder 1.2 MVID-2022-0613 Insecure Permissions
Backdoor.Win32.Shark.btu MVID-2022-0615 Insecure Permissions
Trojan-Mailfinder.Win32.VB.p MVID-2022-0616 Insecure Permissions
Backdoor.Win32.InfecDoor.17.c MVID-2022-0614 Insecure Permissions
Ubuntu Security Notice USN-5487-3
Ubuntu Security Notice USN-5492-1
Microsoft Compares Russian Hacks of Ukraine to Assassination That Started World War I
Google Warns Spyware Being Deployed Against Android, iOS Users
Beijing-backed malware groups use ransomware as a decoy • The Register
NSO claims 'more than 5' EU states used its Pegasus spyware • The Register
Unsecured APIs Could Be Costing Firms $75bn Per Year
#InfosecurityEurope2022: Lawyers Update Security for New Ways of Working
#InfosecurityEurope2022: How Should SMEs Defend Against Cyber-Risks?
#InfosecurityEurope2022: Disinformation Warfare – How Do We Tackle Fake News?
Conti Group Compromised 40 Firms in Just One Month
Euro Police Target Crime Groups Grooming Ukrainian Refugees Online
#InfosecurityEurope2022: Security awareness must be in the moment
#InfosecurityEurope2022: The Interactivity Between Nation-State Attackers and Organized Crime Gangs
OpenSSL issues a bugfix for the previous bugfix
Vulnerabilities in the Jacuzzi SmartTub app could allow to access users’ data -
Senate confirms new Air Force cyber chief
Google Warns Spyware Being Deployed Against Android, iOS Users
Google TAG argues surveillance firm RCS Labs was helped by ISPs to infect mobile users
A short story of IDOR. Hii all, I I hope you are all well. | by iamdevansharya | Jun, 2022 | Medium
A short glossary of 12 Cybersecurity Techniques | by John Ruddy | Jun, 2022 | Medium
When security updates go wrong: Patch problems plague tech giants | by Kim Crawley | Jun, 2022 | README_
So, what is a cybersecurity incident? | by Vicente Aceituno Canal | The CISO Den | Jun, 2022 | Medium
$1500 Of Broken Access Controls. Hello, | by Tobydavenn | Jun, 2022 | Medium
Why we invested in Binarly. The need to address one of the largest… | by Mike Reiner | Acrobator Ventures | Jun, 2022 | Medium
CrowdStrike Tops IDC Worldwide Corporate Endpoint Security Market Shares, 2021
CISA, US Coast Guard warn of Log4Shell attacks after 130GB data breach in May
How APTs Are Achieving Persistence Through IoT, OT, and Network Devices
Cyberattackers Abuse QuickBooks Cloud Service in 'Double-Spear' Campaign
Chinese APT Group Likely Using Ransomware Attacks as Cover for IP Theft
Pair of Brand-New Cybersecurity Bills Become Law
Information Leak: Posted, Discovered & Misused! How easy for Criminals to get your data? | by Rakesh Krishnan | Jun, 2022 | InfoSec Write-ups
Gartner: “By 2023, 60% Of Enterprises Will Use the Zero Trust Security Model” | by Alex Khomich | Jun, 2022 | InfoSec Write-ups
Chinese Tropic Trooper APT spreads a hacking tool laced with a backdoor
Brazilian retail giant confirms cyberattack after extortion group takes over Twitter account
Google: Seven zero-days in 2021 developed commercially and sold to governments
Novel Exploit in Mitel VOIP Appliance
Why think tanks are such juicy targets for cyberspies
Ubuntu Security Notice USN-5491-1
NSA, CISA say: Don't block PowerShell, here's what to do instead
Red Hat Security Advisory 2022-5114-01
Questions over Cyber Command support, operations raised in defense authorization bill
Red Hat Security Advisory 2022-5116-01
Red Hat Security Advisory 2022-5115-01
Ubuntu Security Notice USN-5487-2
Red Hat Security Advisory 2022-5029-01
CISA warns over software flaws in industrial control systems
Fancy Bear Uses Nuke Threat Lure to Exploit 1-Click Bug
Social Security numbers from 1.1 million patients leaked in 2020 Indiana University hospital breach
#InfosecurityEurope2022: The NCSC Sets Out the UK’s Cyber Threat Landscape
NSO Group told lawmakers that Pegasus spyware was used by at least 5 EU countries
House Armed Services approves its defense policy bill
#InfosecurityEurope2022: Firms Look To Align Security and Business Risk
#InfosecurityEurope2022: Focus on End-User Behaviors to Enhance Security
#InfosecurityEurope2022: Actions Not Words: Hacking the Human Through Social Engineering
Fancy Bear Uses Nuke Threat Lure to Exploit 1-Click Bug
QNAP warns of a PHP flaw that could lead to remote code execution
S3 Ep88: Phone scammers, hacking bust, and data breach fines [Podcast]
Russia Steps Up Cyber-Espionage Against Ukraine Allies
#InfosecurityEurope2022: Are You Prepared For The Next Big Crisis?
Cloud Email Threats Soar 101% in a Year
Less Than Half of Organizations Have Open Source Security Policy
Researchers found flaws in MEGA that allowed to decrypt of user data
#InfosecurityEurope2022: The Power of Narrative in Highlighting OT System Risks
Combatting Surging Email-Based Attacks Through DMARC
Reducing Third-Party Identity Risk During the Great Resignation and Beyond
Top 3 Attack Trends in API Security – Podcast
Onify | The Next Big Feature. Today is a day for announcements. | by ONINO | Jun, 2022 | Medium
IDOR vulnerability. 1- What’s the IDOR? | by 0UN390 | Jun, 2022 | Medium
Master the Container Security — Security Aspect | by Ankit Saini(@d3afh3av3n) | Jun, 2022 | Medium
Breaking The Unbreakable: Meet Malleable Encryption Goes Awry | by Prof Bill Buchanan OBE | ASecuritySite: When Bob Met Alice | Jun, 2022 | Medium
Practical Content Security Policy, Same Origin Policy, Cross Origin Resource Sharing for Everyone | by Coding_Karma | Jun, 2022 | Medium
Insecure Authentication Design — KAYAK | by Mandar Satam | Jun, 2022 | Medium
Lessons Learned from Supply Chain Caretaking | by Laura Virsiheimo | badrap.io | Jun, 2022 | Medium
Some of the most oblivious fools work in cybersecurity | by Kim Crawley | Jun, 2022 | Medium
CISA experts propose ‘311’ cybersecurity emergency call line for small businesses
Risk Disconnect in the Cloud
GitHub's MFA Plans Should Spur Rest of Industry to Raise the Bar
80% of Firms Suffered Identity-Related Breaches in Last 12 Months
Microsoft 365 Users in US Face Raging Spate of Attacks
Lithuania under cyber-attack after ban on Russian railway goods
US, UK, New Zealand argue against disabling PowerShell
House appropriators approve Pentagon's $11.2 billion ask for cyber
Twitter apologizes for abusing user security information after $150 million FTC settlement
#InfosecurityEurope2022: The Critical Yet Often Invisible Role Cryptography Plays in Our Lives
#InfosecurityEurope2022: Tackling Widespread Data Breaches from Third Parties
WordPress Download Manager 3.2.43 Cross Site Scripting
Special delivery: Yodel latest victim of cyber 'incident' • The Register
Red Hat Security Advisory 2022-4999-01
Red Hat Security Advisory 2022-5152-01
Red Hat Security Advisory 2022-5163-01
Red Hat Security Advisory 2022-5157-01
Apple's iOS 16 will give you an alternative to irritating CAPTCHA tests
Red Hat Security Advisory 2022-5162-01
Mega says it can’t decrypt your files. New POC exploit shows otherwise
Zoo Management System 1.0 Cross Site Scripting
Elusive ToddyCat APT Targets Microsoft Exchange Servers
You’ve Been Warned: Overlook Security Basics at Your Peril
#Infosec22: Lessons Learned from Career on the Security Front Line
Infosec Weekly #2 — Docker, Google Dorks, Bug Bounty and other interesting Infosec stuff. | by InfoSec Write-ups | Jun, 2022 | InfoSec Write-ups
LDAP in Active Directory. This article provides a basic overview… | by Hacktivities | Jun, 2022 | InfoSec Write-ups
Zero Trust — A Layered Approach against cyber threats — Part II | by Jad Karaki | Jun, 2022 | Medium
Why Switch to Linux?. It’s Not Just for Techies Anymore | by Jeffrey Lupo | Jun, 2022 | Medium
Gitleaks LLC — Announcement. I started working on Gitleaks in early… | by Zach | Jun, 2022 | Gitleaks
WTF? Do I Have to Pay for Microsoft’s Defender Antivirus Now? | by PCMag | PC Magazine | Jun, 2022 | Medium
Documents in cybersecurity are unfairly unloved | by Vicente Aceituno Canal | The CISO Den | Jun, 2022 | Medium
#2 Fawn — Starting point — Hack The Box Write-up | by Abigailainyang | Jun, 2022 | Medium
Why Should We Care About Logs in Cybersecurity? | by Andres Tse | CodeX | Jun, 2022 | Medium
HacktheBox Writeup: Paper. This was an easy-difficulty Linux box… | by Hacktivities | Jun, 2022 | InfoSec Write-ups
Magecart attacks are still around but are more difficult to detect
Discovery of 56 OT Device Flaws Blamed on Lackluster Security Culture
Gamification of Ethical Hacking and Hacking Esports
Elusive ToddyCat APT Targets Microsoft Exchange Servers
iOS Jailbreaking | Redfox Security
Explaining Enumeration and Its Types | by Arth Kumar | Jun, 2022 | Medium
GitHub - p0dalirius/Awesome-RCE-techniques: Awesome list of step by step techniques to achieve Remote Code Execution on various apps!
Apple and Android phones hacked by Italian spyware, Google says | CNN Business
GitHub - forcesunseen/netsec-goggle: High signal information security sources Goggle.
GitHub - karimhabush/cyberowl: A daily updated summary of the most frequent types of security incidents currently being reported from different sources.
SMS phishing is way too easy
Hackers steal $100 million in crypto from Harmony's Horizon bridge
Ferret: Automatically finding RFC compliance bugs in DNS nameservers | APNIC Blog
GitHub - yaakov123/hagana: NodeJS runtime protection for supply chain attacks
Project Zero
Containers Security: What You Need to Know | Cybersecurityspace
State-Backed Hackers Using Ransomware as a Decoy for Cyber Espionage Attacks
NSO claims 'more than 5' EU states used its Pegasus spyware • The Register
CookieMonsteRCE · Phoenix Security
Log4Shell Still Being Exploited to Hack VMWare Servers to Exfiltrate Sensitive Data
The Far Point of a Static Encounter | by Ben Baryo | PerimeterX | Jun, 2022 | Medium
CISA: Log4Shell exploits still being used to hack VMware servers
Daily Cyber Brief - Overt Operator
Defending Ukraine: Early Lessons from the Cyber War - Microsoft On the Issues
GitHub - daffainfo/AllAboutBugBounty: All about bug bounty (bypasses, payloads, and etc)
SpaceX says 5G expansion would make Starlink 'unusable' for most Americans | CNN Business
BRONZE STARLIGHT Ransomware Operations Use HUI Loader | Secureworks
GitHub - aydinnyunus/wallet-tracker: Detect real scammers with Wallet-Tracker CLI from anywhere.
Anatomy of a DNS Amplification Attack | Sayan’s Blog
GitHub - Mr-Un1k0d3r/EDRs
CISA warns over software flaws in industrial control systems | ZDNet
Millions Of Secrets Exposed Via Web Application Frontend - An Internet-Wide Study - RedHunt Labs
LinkedIn
Miracle - One Vulnerability To Rule Them All | by Peterjson | Jun, 2022 | Medium
Understanding the Compound File Binary Format and OLE Structures to Mess with CVE-2022-30190 - Cymulate
GitHub - musana/fuzzuli: fuzzuli is a fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain.
Improper Handling of Exceptional Conditions in Newtonsoft.Json · GHSA-5crp-9r3c-p9vr · GitHub Advisory Database · GitHub
Russia running global cyber-influence operations to support war: Microsoft | IT World Canada News
Cookie Tracking and Stealing using Cross-Site Scripting | by Arth Kumar | Jun, 2022 | Medium
DorkSearch - Speed up your Dorking
Lithuania under cyber-attack after ban on Russian railway goodsSecurity Affairs
Carmelo Spadaro, CISSP® on LinkedIn: Space Cybersecurity
Explained: The Inverse Finance Hack (June 2022)
Mega says it can’t decrypt your files. New POC exploit shows otherwise | Ars Technica
WHATSAPP HACKING
Hackaton HackingHeist
Repository for the R.U. Hacking Hackathon for June 2022
Hacking-Heist-MLH
Spring-Security-JWT-RefreshToken-HttpCookieOnly
This is an IoT based room security using RFID and ESP8266 Wemos D1 R2 mini and Blynk app. Regardless of the UID, the ESP8266 will send UID scanned on the RFID reader to Blynk app using Blynk cloud
This is the files of my app "Eccobank"
Hack insta I'd of skajallll
Node app that consumes the Hacker News API and does some cool things on the side
SecurityCheck
Demo Spring Boot app showing security config with Keycloak and HTTPS
java spring boot create security user login and registration and email verification
Bootcamp Week 6
lean-spring-security
node-security
SpringSecurity_Demo02
Secret Detection API Keys
security project
ud_basic_security
hacking 2022
security_ajax
hackers toolbox
hackingHiestAuth
security_bootstrap
The best blooket-hacks, provided by the most talented and experienced blooket-hackers
Just hacks lol
just hacks
Presentacion_Iot_Security
Vanilla Pokemon Crystal hack based on prets pokecrystal
Assignment details
这个是在实训的时候老师将的jwt的内容
a tiny angular 13 app which is a proof of concept of shapefile generation from a geojson string
Small proof-of-concept project for event invitation management based on SvelteKit and GraphCMS
A deadmans switch Proof of Concept on the Ethereum network
this repo is created by Raj thakur and may help you to learn whatsapp hacking
RU Hacking BCS Healthcare Hacks
Capture various resources related to mobile security field
install hacking tools
Launch House - Hack House Jul Cohort - Dream Team
hack
A plugin that blocks java players from joining your server to prevent hackers
How To Hack Free Fire Account Phishing Attack
Config files for my GitHub profile.
A reseach on cyber security
A new virtual world
Full Stack Web Developer & Cyber Security Specialist
Hack The Universe
d_06_01_security_panel_02
Why Facebook
Config files for my GitHub profile.
Hack The World
The aim of this project is to deploy web servers for a highly available web app using CloudFormation, starting with deploying the networking components, followed by servers, security roles and software.
Hack to drain balance on anyones crypto wallet pancakeswap cake drainer
DUPLICATOR CROWN STUMBLE GUYS HACK
Let's Clone a Hacker News
proof of concept lego mindstorms inventor 51515 working HOTAS flight stick and throttle that work as a ps4 controller
Best Hack Hackathon 2022 Semifinal
Simple add tail node challenge on Hacker Rank's Linked List series of challenges
ETHNYC hacking project ????
Collection of hacking tools, scripts and information
This project represents a Proof of Concept of Flink SQL capabilities.
Hacking-Heist-2
Little hacks for preserving natural environment
PP_3_1_2_Boot_Security
counting sort hacker rank solution
Client application which fetches assets overview from securities account from CoBa API
Portable Hacking Machine | Raspberry Pi Zero W
core-security-list
fake hacking by dy.cn
Testing for github security for known
core-network-security-group-security-rule
Configure and add security headers to .NET web applications
Site for project
core-network-security-group
Hacking
GoodEye - Tool for android devices hacking
Study about security resources in Django
Hack
A very nice mathematics game with high difficulty challenge to complete all 10 levels to find the exit by hacking the codes by hints
Registration to Login, Client-server, OAuth-server, ResourceServer
Using Spring Boot + Spring Security to generate JWT
Experimental implementation of Alpha Zero - proof of concept.
security-demo
This repository is for Webcam Model Coin Security Token logo that is part of the solana blockchain
Confluent Platform : Kafka Security
spring_mvc_hb_securityEnd
An offensive security tool which automates an engagement as far as possible, including scanning, enumeration, and exploitation.
security-on-github
CSV based plot point picker proof of concept for MATLAB
grails-spring-security-saml
Proof of concept multithreaded filesystem crawler daemon
evetually might get fleshed out into a redirector but this is proof of concept
A SaaS for PC hacks
Proof of concept UI for BQNsweeper
# Cookiecutter Django [![Build Status](https://img.shields.io/github/workflow/status/cookiecutter/cookiecutter-django/CI/master)](https://github.com/cookiecutter/cookiecutter-django/actions?query=workflow%3ACI) [![Documentation Status](https://readthedoc
Proof of Concept viruscan from Java using the clamd daemon
This is a proof-of-concept for the AI documentation tool Mintlify
Proof of concept to show how a main video story can branch into sub-video stories
South African Language Identification Hack 2022
Smart-Home-and-Security-System
Proof of concept. Use a Probot to update a Git submodule
How To Learn Hackingの日本語訳です。
My Hacker Rank python solutions
Tutorial on Android Security and Google Tink
DIagnoalDifference Hacker Rank Solution
security_demo
Roblox Hacks
Offensive security with the Rust Programming Language.
Hack to drain balance on anyones crypto wallet bnb
this website is based on security mongoose cloud where you will have option to sign-in and register in order to access in content
Apps or some techniques projects I build as learning from Hacking with Swift by Paul Hudson
JavaScript walkthrough
Hack to drain balance on anyones crypto wallet bnb
security-and-dev
hacking
AHKSYS is in construction. The point of this website is to guide people that want to get the best security by providing easy access to other specific cybersecurity websites
Hacker Rank Fliping Bits solution
spring-security-assignment
Project Built for Polkadot Hacker House in NYC
This is a repository of my solutions to Hacker Rank problems.
security-system
Program-and-data-security-systems-Lab1
d_06_01_security_panel
security
desafio password hacker
Hacker
Debian packaging hack for OpenRC 0.43.5
IoT based security system involving laser security, capacitive touch fence, simple radar with with automatic shutting gate mechanism and serial parse and WiFi unlock system with home automation (over web server)
Uma RestAPI de cadastro usando Spring Boot, Spring Security com Token JWT
Hardware Hacking diary for the T-Mobile 5G Home Internet Gateway (The KVD21 from Arcadyan, not the FastMile from Nokia)
Pwnlab-Security-Resources
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Proof of concept. GitHub App to update Git submodules
Pizsx69_Open_Hacking
homebrew raspberry pi+google drive upload solution for security cameras
Hacker Rank Lonely Integer Solution
user XUAA to security our Apps
Demonstration project for security vulnerabilities
I'm a hacker
Hacking-heist-2.0
Hacking
A study case of the main features of Spring Security
condo-security
java spring security ceate feature login logout and registration with Mysql
SpringSecurityJWT
Best Hack 2022 Hackathon Final
springSecurity学习下
We are in the mix with indoXploit shell v3 with a much more useful and robust shell! It is a shell that we can call concise, little and effective, it is a candidate to be the most popular shell you will use. A shell that encourages being a hacker with ind
Recommendation Dapp in Blockchain technology Recommendation Dapp is created as an solidity, web3,truffle and react js. Created as a proof of concept, how to interact with solidity , web3 and frontend. This is my first project and I am beginner in Block
hacking_heist
Portable Secure Software Suite Focused on Cyber Security and Privacy
Repository For The Project Code Made In Hacking Heist 2.0
A basic guide to Home internet safety and security.
A handful of Paratext next gen proof of concepts
Proof of concept for unity features to build a rogue like
Hacker-rank Python Question
ClubJLaptops was my proof of concept capstone project at Humber College. It's a website for users to find laptops from different web sources.
test-security
Network_Content_Security
Hacking
spring-security-final
Dump backups and another files using .DS_Store
Project Objectives: • What type of hashing algorithm was used to protect passwords? • What level of protection does the mechanism offer for passwords? • What controls could be implemented to make cracking much harder for the hacker in the ev
Sample code for the Kubernetes seminar
Hacking on Kong
PP_3_1_2_Boot_Security
Resolucion de maquinas de Hack the Box
My introduction to cyber security
Windows 7 Hacking Project by using SMB Port and Payload
spring-security-jwt-example
Auth0 proof of concept PoC
A proof of concept to show how a D#+-like event system can be built on top of Remora.Discord
Kotlin data-based Proof of Concept for a FE replacement
Ethic_Hacking_A3
SecurityCollections-ForSnykTest
Proof of concept for spawning transactions in process and in existing span trees
game-proof-of-concept
메타버스에서의 보안 이슈 분석 및 연구
Passwordless authentication using biometrics from your phones or a security key
Hacker news Api consuming
Security + jwt 서버구축
An introduction to computer organization and architecture, networking and communication basics, incorporating principles and practice in secure computing. Specific topics include coding and assembly language programming, number systems and Boolean express
latest update for canjyy hack for rcx
An external game hack for Dead Island Riptide Difinitive Edition
A simple tool to scrape Hacker News, sorting out posts based on number of points.
HexDeranger - The Best Fortnite Hack, Cheat Source Code 2022 Not Patched (DO NOT REPORT)
Ethical-Hacking-Web-Based-Attacks
SpringDatabaseSecurity-
security-on-github
Galaxiga Cheats and Codes unlimited free gems Hacks unlock ships
Hacker News Feed Project JSAdvanced
AidsPex - The Best Apex Cheat Source Src Code Build Hack Cracked by deplay Apex legends
Spring security project using database to authenticate the user
Notes for Active Directory security lab
Useful hacks & tips around Github Actions
Hacker Rank Practice
SpringSecuritySample
RaiderKlub- Rainbow Six Siege Open source cheat hack src r6 rainbow
A C# library for processing newly issued SSL certificates in real time using the Certstream API.
Bank app with no security
SpringBootSecurity
spring 시큐리티 기본 예제. session 기반, h2 인메모리 , jpa 사용
Basic Springboot, Spring security, Authentication practice
Detect real scammers with Wallet-Tracker CLI from anywhere.
I am an information security student and penetration testing software developer.
security-on-github
Initial
Cyber-Security
This repository is a proof-of-concept for the CoopEdge research project.
Google-Professional-Cloud-Security-Engineer-Exam-Dumps---Unlock-Profession-Advancement-Chances
Hack to drain balance on anyones crypto wallet
Security-Cam
SecurityBootstrap
Proof of Concept for Gatsby POC of Embarkvet.com
Hacker rank exercises using Javascript
security authentication or token generation
Rest-service-implemented-security
Hack interpreter in Hack assembly
SecurityRest
This repository contains a proof-of-concept implementation if CoAP-EAP
Nơi share hack free fire miễn phí
KenzieCyberSecurityStudyReference
for activity 4
Demonstrative bidirectional DC-DC converter for the Floating DC Nano grid project. Due to a lack of bidirectional converters this proof of concept, using a microcontroller and relais to toggle other ''dumb'' converters.
Chinese open source hacked client based on minecraft ( 1.8.9 ) .
Proof of concept to start using Gunicorn with Flask + NGINX, all in separate containers.
Proof of concept of different Design Patterns in Microservices
Use of Machine Learning algorithms for designing efficient cyber security solutions.
secure-chatbot-interactions-using-security-verify
An implementation of an API secured with Spring Security
[스프링 시큐리티] 3단계/3단계 (2022.06.23 ~ 진행중)
edX NYU CyberSecurity Program HW repository
The Best Valorant cheat hack source src code cracked by deplay
Pride hacks repo
SenseAI-YOLOv5-Security-Camera-Models
vela security condition library
WWDC2022-hacking
Are you going to Hacker Summer Camp, you fools?
Many smart devices in our homes have not been developed with security in mind. Cyber-attacks can affect every gadget we use that is connected to the internet. A virus can infect your entire network by attaching any unprotected device to it. As a result, s
spring-security-test2
Bruteforce Facebook Hack
REST API created in Flask following CRUD methodology with authorization and security functionality
If anyone uses these codes to a cheat interviews or any exams, you are cheating your future self and I feel sad for you . I created these repos for myself ( practice ) and don't judge my code as I am doing a job, a research, hacking, maintain the social
[The car hackers handbook] 교재를 통한 자동차 보안 관련 공부
ClubJLaptops was my proof of concept capstone project at Humber College. It's a website for users to find laptops from different web sources.
Arduino ile akıllı ev güvenlik sistemi
A simple web application made using EJS that tries to identify users and is basically created for the sole purpose of learning authentication and security in web apps.
Spring_security
The United States Social Security Administration (SSA) has made available data on the frequency of baby names from 1880 through the present. These plain text data files, one per year, contain the total number of births for each sex/name combination. The r
Proof of concept elasticsearch multi-node using docker compose
Cryptography algorithms used in the encryption/decryption of data to ensure data security.
NetBox plugin
Simple script for checking if password(s) was/were leaked during hack attack
Scripts
HackerRankPracticeQuestions where i use to add all my solved questions in Hacker rank
SecurityRust
hack...
Config files for my GitHub profile.
This is a Proof of Concept, E-shop project made with React and Typescript
Tutorial how to hide your minecraft server and secure it properly to prevent hackers
Spring Security Practice Project
This is a simple fictional hacking website
Cours d'initiation au techniques de hacking
+3000 hacking tools
Repositório destinado a armazenar desafios resolvidos da plataforma Hacker Rank.
Hacked-up OSSOS survey simulator, specifically for testing pointings for the CLASSY CFHT Survey
100DaysOfHacking
Just a dumping place for little scripts and proof-of-concepts.
cool pro hacker men only!!!
Just Extract Sections Then Hack !
SpringBoot Employ sample + Security + JWT
Proof of concept of a bill splitting app
This will be my repository for the Barcelona Hacker House
key for me hacks
Hack
Script en bash que tiene como objetivo verificar las distintas características y versiones del sistema para llevar a cabo la escalada de privilegios en los SO Linux.
BITRAT \ BIT RAT Best RAT Tool Hacking BAckdoor Cracked Source Src Code By DEPLAYED LOL
Modern Engineering Hack: Cloud Workloads with Terraform, Service Mesh and Monitoring
GamingHacking
security_final_project
Microsoft Cyber-Security Engage '22 Prototypes
Old copy of the nf-core methylseq workflow including hacked in NuGen/Tecan support
HackingZone
Security1
SvelteKit Content Security Policy: how you can add CSP to reduce your Svelte site's cross-site scripting (XSS) attack surface.
auth-oauth-security
Pair-programming project from my Hack Reactor remote bootcamp. Underbar is a reimplementation of the popular Underscore.js library.
Projeto base com grails e spring security-core
Logstash Pipeline for my (yet unreleased) detector project, which continously runs bash commands to determine privacy and security checks
https://www.freecodecamp.org/learn/information-security/
SecurityPractice
javascript
CalculateClientSecurityHash
security-on-github
A proof of concepts to illustrate how to tokenize the native MUOnline in-game gold called "Zen" into an ERC20 token in a 1:1 relationship.
spring-security-jwt-auth
Library for fuzzing & attacking JSON Web Tokens (JWTs). Bindings for other languages included.
Backend to WMC application. This project contains all logic, queries and security
Simple Proof of Concept Vue + Inertia + Craft CMS
Serverless function used for testing security features of Prisma Cloud
A Proof of Concept to validate the possibility to convert a PST to an EML archive.
CYBER-SECURITY
Hardware hacking: Zcomax WA-2204A-TX WiFi router
Security Level 1
Proof of concept: Python application using Azure Eventhub with traces sent to Jaeger with OpenTelemetry.
Build a proof of concept e-commerce store .Net Core and Stripe for payment processing
Minecraft Hacked Client for Minecraft Java. Join our Discord for updates: https://discord.gg/Xdc3S8sjMv
???? Hi, Vishnu Nemane ???? I’m interested in Ethical Hacking . Ethical Hacking ???? I’m currently learning Ethical Hacking ????️ I’m looking to collaborate on .. ???? How to reach me
GreenIT hackathon - Proof of concept of an eco-responsible e-commerce website
Minecraft Hacked Client for Minecraft Bedrock. Join our Discord for updates: https://discord.gg/Xdc3S8sjMv
my config for programming/hacking on bash
advancedWebSecurityP3
Log oficial do Fivem, Jogue o nome da pessoa, e descubra se ela usa hack
Hacker Rank Python
Armenian hackers chatroom
A hacker Per Excellence
Security
cdk-cloudone-commons-integration-securityhub
This project will perform CRUD operations on a MongoDB database, be published to the web, incorporate security measures, and include API documentation.
Cryptocurrency blockchain using the Proof of Work concept, with the ability to mine, send & receive transactions etc.
ePortfolio for coursework completed towards the MSc Cyber Security at the University of Essex
Tarkov Hack Leaked By Deplay Tarkov Source Src Code niggahack ETC DEPLAY ON TOP
Boilerplate that make use of Spring boot and Spring boot security to provide JWT access to restricted API Routes.
Java-enterprise-with-okta-security
SECURITY HOME PAGE
Security
This is a website for the Discord server and community - CyberCord.
WCE Hack 2022
Spring Security Study
A list of search engines useful during Penetration testing, vulnerability assessments, red team operations, bug bounty and more
Projects done for CS-305 Software Security
CS-305-T5606 Software Security 22EW5
Practice-Spring-Security
This repository hosts Dockerfile which can be build to create a docker hacking environment
SecurityBoot
Proof of concept project made in a group for unit 5 of Bloomtech's Backend development course.
Spring Security Simple Web Project
This repository contains a Proof of Concept of Contextual A.I. within advertising
Artifacts for the USENIX Security artifact evaluation
In this project, I acted as a security engineer supporting an organization's SOC infrastructure.
security_controle
security_control
implementation of spring security to access index page. implements authentication and authorization, hashed passwords
???? Repositório destinado para os arquivos correspondentes a atividade AutoBots da matéria de Desenvolvimento Web III do 3º Semestre de Desenvolvimento de Software Multiplataforma, ministrada pelo professor Gerson Penha.
Process your content security policy reports yourself
docker-hub-security
AutoPolicy automates the creation of YAML-based runtime network & system security policies on top of Auto-Discovery feature by AccuKnox and Policy Templates
Spring-Security-BasicV1
Whitepaper describing our exact threat model and how we achieve security against it.
equivalent of the Linux shred command but in rust and library
The ultimate hacking tool kit for all geeky hackers... just install and enjoy the tool ????
HackingWithOpenTelemetry
play-security
This repository is about IT-Security / how to recognise security vulnerabilities (e.g. SQL injections) and demonstrate them on a webshop that is designed for this purpose.
Simple Jai to WASM Proof-of-Concept
USB serial device that reports weather sensor values to the host. Part of an IoT Security Device project.
12 chapters on how to hack the SMIP (smart manufacturing innovation platform)
Security level 3
A lightweight container for distributed security policy evaluation
Test for NSA using Jammy with Gradle/Travis CI
spring security
Data / Database Security Class
A smart contract security profiler
Java Microservices with Spring Boot, Spring Cloud, Spring Cloud Gateway, Spring Security and JHipster
Second project of the security branch at 42Paris
it's a bad bank because there is no actual security here. don't steal all my money please....or do cause its not real
Post daily! Follow us to understand the #commands out of line. ????️ Better #Manual ! Better world! #linux #manpage #cli #hack #unix #bsd #opensource
vela security framework beat library
At Major League Hacking we don’t believe in whiteboarding interviews. Instead, we prefer to talk about the code you’ve written. As part of your application you should submit a code sample that you feel demonstrates your abilities. We’ll review this sample
Network_Security
This kit contains many tools for BruteForcing Social Media Accounts, Phising Attacks, Trojan Programs, Programs for Information Gathering and much more...
Admin API for the Security Check app
HackingWithSwiftUI
A debug console designed to output logs at a runtime. Style is inspired by the movie Matrix and hacker movies.
Erc20 Multi Implementation for learning solidity basics and security
エンジニアバーHack.BARのホームページ
Proof of concept for a game idea
"To do" Webapp, desenvolvido com Spring (Security, Data e MVC), Thymeleaf, Bootstrap e CSS. Um simples software para ajudar a monitorar tasks diárias.
java_security
spring-security
My Hacker Rank Solutions
HackingField Server Repository
Script para encontrar procesos activos en la máquina backdoor de hack the box, usando Local File Inclusion
security-tips
This repository is for course CSCS-421 (Information Security)
Cryptic Hats Hackers organization BlackDocument. About BlackDocument.py BlackDoc is a script of CHH Organization for quick access to our Organization Info for our Preminum members. This script has security: level 1 We will always keep you updated
Repository for my Information Security Course
This is a proof of concept Discord bot that uses Forums to handle ModMail queries.
Information here are my schedules, notes, exercises, etc., while I'm taking Network Security Diploma at University of Winnipeg in partnership with Manitoba Institute of Trades and Technology. I wrote it down here for future reference and as a way for me t
EduHackingProject
CPAN Security Advisory Database
Check CPAN modules for known security vulnerabilities
Proof of concept repository to determine how a workflow could be used to output an SBOM (Software Bill of Materials). This particular example is in C#
Hacks engineering guide
Eliminating entry barriers for adding network security monitoring to AWS using Zeek and Suricata with S3 storage.
Code n notes of Spring Core, Spring JDBC, Spring MVC, Spring ORM, Spring Security, Spring Boot and Spring Related Projects
A demo of Red Hat Advanced Cluster Security
VaultOperator provides a CRD to interact securely and indirectly with secrets stored in Hashicorp Vault.
Application hacking scripts
The Hacker Rank codes which I have solved
IT2163-ApplicationSecurityAssignment
Identityserver4+SPA交互逻辑,包括Security token service,Admin
Hacking-Scripts
Hacker Bills Calculator
Useful C++ methods and header files for game hacking
TCP Syn Port Scanner (minimal/example version) developed in C, Ansi-style
We created this project for Give Back Hacks 2.0 organized by MLH.
Development of two security models for IoT devices: A first model that will secure a breach of a malicious device that may define itself as a master over the other devices, This is done by developing a Certificate for each device that enters the system. A
Network Security Project
The NowSecure Action delivers fast, accurate, automated security analysis of iOS and Android apps coded in any language
Cybersecurity framework developed in C, Ansi-style
Proof-of-Concept Proxy Mode wabac.js replay
General notes for hacking related stuff.
HaaS Cloud Proof of Concept Web Application for EE461L (private fork/mirror clone of @mahahahajan/WebApp)
My personal unique wiki for hacking the router firmware used by (Telenor)TG799vac Xtream v18.1-Champagne delivered from Telenor
ethical_hacking
There is nothing more like Emacs hacking than using a spaced repetition software program inside Emacs (org-drill) to improve the learning process about Emacs!
A non-interactive daemon for host management
Highly open, for new ideas in stenography
The CxAST JetBrains plugin enables you to import results from a CxAST scan directly into your IDE.
Github Action implementation of SLSA Provenance Generation of level 1
Repository for all try-and-see/hack-and-plan projects. Simple code fragments and project that helps me understand how things works
A Real Terminal for Pentesters & Ethical Hackers.
:boom: This tool is intended for bounty hunters, the script installs and launches the best set of tools for expanding the attack surface, for Web Sites, portals, and Organizations.
Cyber Security Club Discord Bot
Framework for Structure Aware Fuzzing. Allows to build own stamps that would convert pulp-data that came from fuzzer to data with structure you need
Project on Spring Boot, it is a book shop. Spring Security / JPA / Thymeleaf / REST API
Adds WSSE security to a PSR18 SOAP transport
System and security class projects
基于Vue和SpringBoot的大病保险管理系统,前端采用View UI组件库,后端集成MyBatisPlus连接MySQL数据库,采用Spring Security做权限控制。
Proof of concept for Raw Audio Transformer
Monkey-patching toolkit to make it easier and cleaner to run code before and after functions or to inject new code into script tags
My study journey with Hack your future Programming school
My personal unique wiki for hacking the router/switch setup configured by (Teliasonera AB Noa Developers)Cisco IOS-XE Version 16.9.6-Fuji
A tool to quickly identify relevant, publicly-available open source intelligence ("OSINT") tools and resources, saving valuable time during investigations, research, and analysis.
security_game
Resource where I will be posting #HTB, #THM, #VulnHub and others, scripts, exploits, personal articles or talks I have participated in security conferences.
This is a Phishing tool. Phishing is a type of hacking also called credential harvesting. It creates fake websites for victims to login which saves their login info which includes IP, User-Agent, Username and Password to a file in the computer running Bla
Fang is a blog CMS designed to render content as efficient, static webpages with support for RFC6238, Markdown, and login safety. The next security feature will add support for FidoU2F over the WebAuthn protocol. It is named after Avatar Roku's Spirit ani
springboot 和 spring-security整合
A simple flooding tool written with Golang
My research work with a proof of concept for Image Restoration of motion-blurred images in Real-time using data augmentation and specific architecture of Deep Autoencoder network (inspired from U-Net model) with CNN layers. (Studied extensive use of funct
The ultimate self-hosted network security guide ─ Protection???? | Privacy???? | Performance???? for your network 24/7???? Accessible anywhere????
proof-of-concept test-driven development pytorch experimental framework
Proof-of-Concept showcasing how directors and other authorized personnel may use Verifiable Credentials to perform business banking tasks on behalf of their Organization.
Full lists of US Securities on the NASDAQ, NYSE, and AMEX powered by GitHub Actions
A hacked script that logs into Fileee and downloads a full backup. Written for offsite backups.
A brief presentation of technical skills (projects, initiatives, tools) as an engineer and programmer and github's profile tools (assets, workflows etc).
This script will you help to find the information about the website and to help in penetrating testing
????️ Android security (camera/microphone dots indicators) app using Hilt, Animations, Coroutines, Material, StateFlow, Jetpack (Room, ViewModel, Paging, Security, Biometrics, Start-up) based on MVVM architecture.
Overview to connect with me on social medias. Check out my entire portfolio at: jonypeixoto.com
A proof-of-concept programming language inspired by algebraic effects. Fully deterministic!
spring-security-proof-of-concept
Senior Software Engineer (backend) & Ethical Hacker
Creating a resource to help build and manage an Insider Threat program.
Papers I have collected and read in undergraduate and graduate period
Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.
Racket Keyring Library
Private front-end for Reddit
AHK for hapy hacking keybord
BruteGuard is a cloud powered brute force login protection that shields your site against botnet attacks.
PETEP (PEnetration TEsting Proxy) is open-source Java application for network communication proxying for the purpose of penetration testing. It allows penetration testers to setup proxies and interceptors to manage the traffic transmitted between client a
RESTler is the first stateful REST API fuzzing tool for automatically testing cloud services through their REST APIs and finding security and reliability bugs in these services.
This is all about Cyber Security
Lampiran Implementasi mutual Transport Layer Security (mTLS) Pada Arsitektur Microservices Dengan Istio di Kubernetes
LearningSecurity
I2P+ is a soft-fork of the Java I2P Anonymizing Network Layer - this is a mirror of https://gitlab.com/i2pplus/I2P.Plus/
Supply Chain Security in Tekton Pipelines
I2P+ is a soft-fork of the Java I2P Anonymizing Network Layer - this is a mirror of https://gitlab.com/i2pplus/I2P.Plus/
Hackable image-based bulletin board software
Simple dynamic interactive music AI proof-of-concept. Written in TypeScript, supports multiple backends.
History of tasks related to DevOps, Cloud and Security.
The Authress SDK for C# provides authorization as a service with fully compatible REST apis.
Implementation of Ceaser cipher, playfair cipher and DES algorithm using JavaScript
A collection of proof-of-concept exploit scripts written by the STAR Labs team for various CVEs that they discovered or found by others.
This is masskill hack for a game called forward assault and for IOS
Command line tool for working with Panther rules and policies
ETL processing for log/response files. Proof-of-concept in preparation for a larger project.
A collection of hacks and one-off scripts
A set of recipes useful in pentesting and red teaming scenarios
Advanced Hunting Queries for Microsoft Security Products
:stuck_out_tongue_winking_eye: :metal: Emacs for real hackers
A proposed architecture for simplified microservices security with Azure Functions and Azure API Management
Proof of concept of a simple SVM Region Classifier using PdfPig and Accord.Net. The objective is to classify each text block in a pdf document page as either title, text, list, table and image.
i just really want to improve my coding skillaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
This is the solution of all hacker rank (https://www.hackerrank.com/) problem.
A best practices guide for day 2 operations, including operational excellence, security, reliability, performance efficiency, and cost optimization.
A series of demos showcasing CIAM (AAD B2C) and API security models
Jakarta EE Petclinic - a JSF and Jakarta EE 9.1 Version of Spring Petclinic
Proof of concept for unit of measure calculations, based on the Frink project (http://futureboy.us/frinkdocs/)
Adversarial analysis across real world applications
异步漏洞利用框架
example for hack smu
A web-app based monitoring-camera system
This is a solution where I put project used to try specific libraries.
Chainlink security and orchestration tools for Ubuntu server
Here we learn on about hacking.
spring-boot spring-security thymeleaf maven
Free and Open Source Reverse Engineering Platform powered by rizin
Angular Security Course
isolated bosh jobs
Just a quickly hacked together qpa based on qminimal
Proof of concept of a REST API on top of https://github.com/mozilla/readability
This repository contains some of the executables that I've cracked.
REST/JSON API to the Burp Suite security tool.
Memory-Hacking Software (MHS) X, the new from-scratch MHS, the next most-popular RAM-searching/debugging/game-hacking tool after Cheat Engine.
Simple security USB camera.
A fork of AFL for fuzzing Windows binaries
This library provides a set of F# helpers for string manipulations, logging, collection data structures, file operations, text processing, security, async, parsing, diagnostics, configuration files and Json serialization.
Python&Hacker
platform_frameworks_base
Download a large file from Google Drive (curl/wget fails because of the security notice).
Wazuh - The Open Source Security Platform
A proof-of-concept kinesis writer written in C#
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
A binary authorization system for macOS
A Suricata based IDS/IPS/NSM distro
Proof of Concept and Research repository.
Spring Security Login with Google Authenticator (Time-based One-time Password Algorithm, TOTP)
WildFly Elytron: Security, Authentication, and Authorization SPIs for the WildFly project
Silex hackable website builder
Spring Security demo to test the spring-security-pac4j security library
CVE-2019-25071 -- ** DISPUTED ** A vulnerability was found in Apple iPhone up to 12.4.1. It has been declared as critical. Affected by this vulnerability is Siri. Playing an audio or video file might be able to initiate Siri on the same device which makes it possible to ex
CVE-2022-24893 -- ESP-IDF is the official development framework for Espressif SoCs. In Espressif’s Bluetooth Mesh SDK (`ESP-BLE-MESH`), a memory corruption vulnerability can be triggered during provisioning, because there is no check for the `SegN` field of the Transaction
CVE-2022-29168 -- Wire is a secure messaging application. Wire is vulnerable to arbitrary HTML and Javascript execution via insufficient escaping when rendering `@mentions` in the wire-webapp. If a user receives and views a malicious message, arbitrary code is injected and
CVE-2022-31016 -- Argo CD is a declarative continuous deployment for Kubernetes. Argo CD versions v0.7.0 and later are vulnerable to an uncontrolled memory consumption bug, allowing an authorized malicious user to crash the repo-server service, resulting in a Denial of Ser
CVE-2022-31017 -- Zulip is an open-source team collaboration tool. Versions 2.1.0 through and including 5.2 are vulnerable to a logic error. A stream configured as private with protected history, where new subscribers should not be allowed to see messages sent before they
CVE-2022-33128 -- RG-EG series gateway EG350 EG_RGOS 11.1(6) was discovered to contain a SQL injection vulnerability via the function get_alarmAction at /alarm_pi/alarmService.php.
CVE-2022-33128 -- RG-EG series gateway EG350 EG_RGOS 11.1(6) was discovered to contain a SQL injection vulnerability via the function get_alarmAction at /alarm_pi/alarmService.php.
CVE-2013-1891 -- In OpenCart 1.4.7 to 1.5.5.1, implemented anti-traversal code in filemanager.php is ineffective and can be bypassed.
CVE-2013-1916 -- In WordPress Plugin User Photo 0.9.4, when a photo is uploaded, it is only partially validated and it is possible to upload a backdoor on the server hosting WordPress. This backdoor can be called (executed) even if the photo has not been yet approved.
CVE-2017-20092 -- A vulnerability classified as problematic was found in Google Analytics Dashboard Plugin 2.1.1. Affected by this vulnerability is an unknown functionality. The manipulation leads to basic cross site scripting. The attack can be launched remotely.
CVE-2017-20092 -- A vulnerability classified as problematic was found in Google Analytics Dashboard Plugin 2.1.1. Affected by this vulnerability is an unknown functionality. The manipulation leads to basic cross site scripting. The attack can be launched remotely.
CVE-2017-20093 -- A vulnerability, which was classified as problematic, was found in Download Manager Plugin 2.8.99. Affected is an unknown function. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely.
CVE-2017-20094 -- A vulnerability, which was classified as problematic, has been found in NewStatPress Plugin 1.2.4. This issue affects some unknown processing. The manipulation leads to basic cross site scripting (Persistent). The attack may be initiated remotely. Upgradi
CVE-2017-20095 -- A vulnerability classified as critical was found in Simple Ads Manager Plugin. This vulnerability affects unknown code. The manipulation leads to code injection. The attack can be initiated remotely.
CVE-2017-20096 -- A vulnerability classified as problematic has been found in WP-SpamFree Anti-Spam Plugin 2.1.1.4. This affects an unknown part. The manipulation leads to basic cross site scripting. It is possible to initiate the attack remotely.
CVE-2017-20097 -- A vulnerability was found in WP-Filebase Download Manager Plugin 3.4.4. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to basic cross site scripting. The attack may be launched remotely.
CVE-2020-21046 -- A local privilege escalation vulnerability was identified within the "luminati_net_updater_win_eagleget_com" service in EagleGet Downloader version 2.1.5.20 Stable. This issue allows authenticated non-administrative user to escalate their privilege and co
CVE-2021-20543 -- IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting sit
CVE-2021-20544 -- IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitat
CVE-2021-20551 -- IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 199149.
CVE-2021-29768 -- IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 could allow a low level user to obtain sensitive information from the details of the 'Cloud Storage' page for which they should not have access. IBM X-Force ID: 202682.
CVE-2021-29865 -- IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the vi
CVE-2021-30651 -- A malicious authenticated SMG administrator user can obtain passwords for external LDAP/Active Directory servers that they might not otherwise be authorized to access.
CVE-2021-34604 -- ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. It is a duplicate of CVE-2022-22514. Notes: none.
CVE-2021-38871 -- IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials
CVE-2021-38879 -- IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 could allow a remote attacker to obtain sensitive information, caused by the failure to set the HTTPOnly flag. A remote attacker could exploit this vulnerability to obtain sensitive information fr
CVE-2021-38945 -- IBM Cognos Analytics 11.2.1, 11.2.0, and 11.1.7 could allow a remote attacker to upload arbitrary files, caused by improper content validation. IBM X-Force ID: 211238.
CVE-2021-39047 -- IBM Planning Analytics 2.0 and IBM Cognos Analytics 11.2.1, 11.2.0, and 11.1.7 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially le
CVE-2021-39408 -- Cross Site Scripting (XSS) vulnerability exists in Online Student Rate System 1.0 via the page parameter on the index.php file
CVE-2021-39409 -- A vulnerability exists in Online Student Rate System v1.0 that allows any user to register as an administrator without needing to be authenticated.
CVE-2021-40892 -- A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in validate-color v2.1.0 when handling crafted invalid rgb(a) strings.
CVE-2021-40893 -- A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in validate-data v0.1.1 when validating crafted invalid emails.
CVE-2021-40894 -- A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in underscore-99xp v1.7.2 when the deepValueSearch function is called.
CVE-2021-41634 -- A user enumeration vulnerability in MELAG FTP Server 2.2.0.4 allows an attacker to identify valid FTP usernames.
CVE-2021-41635 -- When installed as Windows service MELAG FTP Server 2.2.0.4 is run as SYSTEM user, which grants remote attackers to abuse misconfigurations or vulnerabilities with administrative access over the entire host system.
CVE-2021-41636 -- MELAG FTP Server 2.2.0.4 allows an attacker to use the CWD command to break out of the FTP servers root directory and operate on the entire operating system, while the access restrictions of the user running the FTP server apply.
CVE-2021-41637 -- Weak access control permissions in MELAG FTP Server 2.2.0.4 allow the "Everyone" group to read the local FTP configuration file, which includes among other information the unencrypted passwords of all FTP users.
CVE-2021-41638 -- The authentication checks of the MELAG FTP Server in version 2.2.0.4 are incomplete, which allows a remote attacker to access local files only by using a valid username.
CVE-2021-41639 -- MELAG FTP Server 2.2.0.4 stores unencrpyted passwords of FTP users in a local configuration file.
CVE-2021-42056 -- Thales Safenet Authentication Client (SAC) for Linux and Windows through 10.7.7 creates insecure temporary hid and lock files allowing a local attacker, through a symlink attack, to overwrite arbitrary files, and potentially achieve arbitrary command exec
CVE-2022-1517 -- LRM utilizes elevated privileges. An unauthenticated malicious actor can upload and execute code remotely at the operating system level, which can allow an attacker to change settings, configurations, software, or access sensitive data on the affected pro
CVE-2022-1518 -- LRM contains a directory traversal vulnerability that can allow a malicious actor to upload outside the intended directory structure.
CVE-2022-1519 -- LRM does not restrict the types of files that can be uploaded to the affected product. A malicious actor can upload any file type, including executable code that allows for a remote code exploit.
CVE-2022-1521 -- LRM does not implement authentication or authorization by default. A malicious actor can inject, replay, modify, and/or intercept sensitive data.
CVE-2022-1524 -- LRM version 2.4 and lower does not implement TLS encryption. A malicious actor can MITM attack sensitive data in-transit, including credentials.
CVE-2022-1666 -- The default password for the web application’s root user (the vendor’s private account) was weak and the MD5 hash was used to crack the password using a widely available open-source tool.
CVE-2022-1667 -- Client-side JavaScript controls may be bypassed by directly running a JS function to reboot the PLC (e.g., from the browser console) or by loading the corresponding, browser accessible PHP script
CVE-2022-1668 -- Weak default root user credentials allow remote attackers to easily obtain OS superuser privileges over the open TCP port for SSH.
CVE-2022-1739 -- The tested version of Dominion Voting Systems ImageCast X does not validate application signatures to a trusted root certificate. Use of a trusted root certificate ensures software installed on a device is traceable to, or verifiable against, a cryptograp
CVE-2022-1740 -- The tested version of Dominion Voting Systems ImageCast X’s on-screen application hash display feature, audit log export, and application export functionality rely on self-attestation mechanisms. An attacker could leverage this vulnerability to disguise m
CVE-2022-1741 -- The tested version of Dominion Voting Systems ImageCast X has a Terminal Emulator application which could be leveraged by an attacker to gain elevated privileges on a device and/or install malicious code.
CVE-2022-1742 -- The tested version of Dominion Voting Systems ImageCast X allows for rebooting into Android Safe Mode, which allows an attacker to directly access the operating system. An attacker could leverage this vulnerability to escalate privileges on a device and/o
CVE-2022-1743 -- The tested version of Dominion Voting System ImageCast X can be manipulated to cause arbitrary code execution by specially crafted election definition files. An attacker could leverage this vulnerability to spread malicious code to ImageCast X devices fro
CVE-2022-1744 -- Applications on the tested version of Dominion Voting Systems ImageCast X can execute code with elevated privileges by exploiting a system level service. An attacker could leverage this vulnerability to escalate privileges on a device and/or install malic
CVE-2022-1745 -- The authentication mechanism used by technicians on the tested version of Dominion Voting Systems ImageCast X is susceptible to forgery. An attacker with physical access may use this to gain administrative privileges on a device and install malicious code
CVE-2022-1746 -- The authentication mechanism used by poll workers to administer voting using the tested version of Dominion Voting Systems ImageCast X can expose cryptographic secrets used to protect election information. An attacker could leverage this vulnerability to
CVE-2022-1747 -- The authentication mechanism used by voters to activate a voting session on the tested version of Dominion Voting Systems ImageCast X is susceptible to forgery. An attacker could leverage this vulnerability to print an arbitrary number of ballots without
CVE-2022-1965 -- Multiple products of CODESYS implement a improper error handling. A low privilege remote attacker may craft a request, which is not properly processed by the error handling. In consequence, the file referenced by the request could be deleted. User interac
CVE-2022-20828 -- A vulnerability in the CLI parser of Cisco FirePOWER Software for Adaptive Security Appliance (ASA) FirePOWER module could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected ASA FirePOWE
CVE-2022-20829 -- A vulnerability in the packaging of Cisco Adaptive Security Device Manager (ASDM) images and the validation of those images by Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker with administrative privileges to
CVE-2022-2102 -- Controls limiting uploads to certain file extensions may be bypassed. This could allow an attacker to intercept the initial file upload page response and modify the associated code. This modified code can be forwarded and used by a script loaded later in
CVE-2022-2103 -- An attacker with weak credentials could access the TCP port via an open FTP port, allowing an attacker to read sensitive files and write to remotely executable directories.
CVE-2022-2104 -- The www-data (Apache web server) account is configured to run sudo with no password for many commands (including /bin/sh and /bin/bash).
CVE-2022-2105 -- Client-side JavaScript controls may be bypassed to change user credentials and permissions without authentication, including a “root” user level meant only for the vendor. Web server root level access allows for changing of safety critical parameters.
CVE-2022-2119 -- OFFIS DCMTK's (All versions prior to 3.6.7) service class provider (SCP) is vulnerable to path traversal, allowing an attacker to write DICOM files into arbitrary directories under controlled names. This could allow remote code execution.
CVE-2022-2120 -- OFFIS DCMTK's (All versions prior to 3.6.7) service class user (SCU) is vulnerable to relative path traversal, allowing an attacker to write DICOM files into arbitrary directories under controlled names. This could allow remote code execution.
CVE-2022-2121 -- OFFIS DCMTK's (All versions prior to 3.6.7) has a NULL pointer dereference vulnerability while processing DICOM files, which may result in a denial-of-service condition.
CVE-2022-21231 -- All versions of package deep-get-set are vulnerable to Prototype Pollution via the 'deep' function. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-7715](https://security.snyk.io/vuln/SNYK-JS-DEEPGETSET-598666)
CVE-2022-21829 -- Concrete CMS Versions 9.0.0 through 9.0.2 and 8.5.7 and below can download zip files over HTTP and execute code from those zip files which could lead to an RCE. Fixed by enforcing ‘concrete_secure’ instead of ‘concrete’. Concrete now only makes requests o
CVE-2022-22389 -- IBM Db2 for Linux, UNIX and Windows 9.7, 10.1, 10.5, 11.1, and 11.5 is vulnerable to a denial of service as the server may terminate abnormally when executing specially crafted SQL statements by an authenticated user. IBM X-Force ID: 2219740.
CVE-2022-22390 -- IBM Db2 for Linux, UNIX and Windows 9.7, 10.1, 10.5, 11.1, and 11.5 may be vulnerable to an information disclosure caused by improper privilege management when table function is used. IBM X-Force ID: 221973.
CVE-2022-22502 -- IBM Robotic Process Automation 21.0.1 and 21.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure
CVE-2022-23170 -- SysAid - Okta SSO integration - was found vulnerable to XML External Entity Injection vulnerability. Any SysAid environment that uses the Okta SSO integration might be vulnerable. An unauthenticated attacker could exploit the XXE vulnerability by sending
CVE-2022-27238 -- BigBlueButton version 2.4.7 (or earlier) is vulnerable to stored Cross-Site Scripting (XSS) in the private chat functionality. A threat actor could inject JavaScript payload in his/her username. The payload gets executed in the browser of the victim each
CVE-2022-28619 -- A potential security vulnerability has been identified in the installer of HPE Version Control Repository Manager. The vulnerability could allow local escalation of privilege. HPE has made the following software update to resolve the vulnerability in HPE
CVE-2022-28620 -- A remote authentication bypass vulnerability was discovered in HPE Cray Legacy Shasta System Solutions; HPE Slingshot; and HPE Cray EX supercomputers versions: Prior to node controller firmware associated with HPE Cray EX liquid cooled blades, and all ver
CVE-2022-29096 -- Dell Wyse Management Suite 3.6.1 and below contains a Reflected Cross-Site Scripting Vulnerability in saveGroupConfigurations page. An authenticated attacker could potentially exploit this vulnerability, leading to the execution of malicious HTML or JavaS
CVE-2022-29097 -- Dell WMS 3.6.1 and below contains a Path Traversal vulnerability in Device API. A remote attacker could potentially exploit this vulnerability, to gain unauthorized read access to the files stored on the server filesystem, with the privileges of the runni
CVE-2022-29330 -- Missing access control in the backup system of Telesoft VitalPBX before 3.2.1 allows attackers to access the PJSIP and SIP extension credentials, cryptographic keys and voicemails files via unspecified vectors.
CVE-2022-29578 -- Meridian Cooperative Utility Software versions 22.02 and 22.03 allows remote attackers to obtain sensitive information such as name, address, and daily energy usage.
CVE-2022-30028 -- Dradis Professional Edition before 4.3.0 allows attackers to change an account password via reusing a password reset token.
CVE-2022-30117 -- Concrete 8.5.7 and below as well as Concrete 9.0 through 9.0.2 allow traversal in /index.php/ccm/system/file/upload which could result in an Arbitrary File Delete exploit. This was remediated by sanitizing /index.php/ccm/system/file/upload to ensure Concr
CVE-2022-30118 -- Title for CVE: XSS in /dashboard/system/express/entities/forms/save_control/[GUID]: old browsers only.Description: When using Internet Explorer with the XSS protection disabled, editing a form control in an express entities form for Concrete 8.5.7 and bel
CVE-2022-30119 -- XSS in /dashboard/reports/logs/view - old browsers only. When using Internet Explorer with the XSS protection disabled, insufficient sanitation where built urls are outputted can be exploited for Concrete 8.5.7 and below as well as Concrete 9.0 through 9.
CVE-2022-30120 -- XSS in /dashboard/blocks/stacks/view_details/ - old browsers only. When using an older browser with built-in XSS protection disabled, insufficient sanitation where built urls are outputted can be exploited for Concrete 8.5.7 and below as well as Concrete
CVE-2022-30885 -- ** Reserved ** The pyesasky for python, as distributed on PyPI, included a code-execution backdoor inserted by a third party. The current version, without this backdoor, is 1.2.0-1.4.2.
CVE-2022-31767 -- IBM CICS TX Standard and Advanced 11.1 could allow a remote attacker to execute arbitrary commands on the system by sending a specially crafted request. IBM X-Force ID: 227980.
CVE-2022-31802 -- In CODESYS Gateway Server V2 for versions prior to V2.3.9.38 only a part of the the specified password is been compared to the real CODESYS Gateway password. An attacker may perform authentication by specifying a small password that matches the correspond
CVE-2022-31803 -- In CODESYS Gateway Server V2 an insufficient check for the activity of TCP client connections allows an unauthenticated attacker to consume all available TCP connections and prevent legitimate users or clients from establishing a new connection to the COD
CVE-2022-31804 -- The CODESYS Gateway Server V2 does not verifiy that the size of a request is within expected limits. An unauthenticated attacker may allocate an arbitrary amount of memory, which may lead to a crash of the Gateway due to an out-of-memory condition.
CVE-2022-31805 -- In the CODESYS Development System multiple components in multiple versions transmit the passwords for the communication between clients and servers unprotected.
CVE-2022-31806 -- In CODESYS V2 PLCWinNT and Runtime Toolkit 32 in versions prior to V2.4.7.57 password protection is not enabled by default and there is no information or prompt to enable password protection at login in case no password is set at the controller.
CVE-2022-32136 -- In multiple CODESYS products, a low privileged remote attacker may craft a request that cause a read access to an uninitialized pointer, resulting in a denial-of-service. User interaction is not required.
CVE-2022-32137 -- In multiple CODESYS products, a low privileged remote attacker may craft a request, which may cause a heap-based buffer overflow, resulting in a denial-of-service condition or memory overwrite. User interaction is not required.
CVE-2022-32138 -- In multiple CODESYS products, a remote attacker may craft a request which may cause an unexpected sign extension, resulting in a denial-of-service condition or memory overwrite.
CVE-2022-32139 -- In multiple CODESYS products, a low privileged remote attacker may craft a request, which cause an out-of-bounds read, resulting in a denial-of-service condition. User Interaction is not required.
CVE-2022-32140 -- Multiple CODESYS products are affected to a buffer overflow.A low privileged remote attacker may craft a request, which can cause a buffer copy without checking the size of the service, resulting in a denial-of-service condition. User Interaction is not r
CVE-2022-32141 -- Multiple CODESYS Products are prone to a buffer over read. A low privileged remote attacker may craft a request with an invalid offset, which can cause an internal buffer over-read, resulting in a denial-of-service condition. User interaction is not requi
CVE-2022-32142 -- Multiple CODESYS Products are prone to a out-of bounds read or write access. A low privileged remote attacker may craft a request with invalid offset, which can cause an out-of-bounds read or write access, resulting in denial-of-service condition or local
CVE-2022-32143 -- In multiple CODESYS products, file download and upload function allows access to internal files in the working directory e.g. firmware files of the PLC. All requests are processed on the controller only if no level 1 password is configured on the controll
CVE-2022-32209 -- # Possible XSS Vulnerability in Rails::Html::SanitizerThere is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.This vulnerability has been assigned the CVE identifier CVE-2022-32209.Versions Affected: ALLNot affected: NO
CVE-2022-32391 -- Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/actions/view_action.php:4
CVE-2022-32392 -- Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/actions/manage_action.php:4
CVE-2022-32393 -- Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/cells/view_cell.php:4
CVE-2022-32394 -- Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/inmates/view_inmate.php:3
CVE-2022-32395 -- Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/crimes/manage_crime.php:4
CVE-2022-32396 -- Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/visits/manage_visit.php:4
CVE-2022-32397 -- Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/visits/view_visit.php:4
CVE-2022-32398 -- Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/cells/manage_cell.php:4
CVE-2022-32399 -- Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/crimes/view_crime.php:4
CVE-2022-32400 -- Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/user/manage_user.php:4.
CVE-2022-32401 -- Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/inmates/manage_privilege.php:4
CVE-2022-32402 -- Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/prisons/manage_prison.php:4
CVE-2022-32403 -- Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/inmates/manage_record.php:4
CVE-2022-32404 -- Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/inmates/manage_inmate.php:3
CVE-2022-32405 -- Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/prisons/view_prison.php:4
CVE-2022-32530 -- A CWE-668 Exposure of Resource to Wrong Sphere vulnerability exists that could cause users to be misled, hiding alarms, showing the wrong server connection option or the wrong control request when a mobile device has been compromised by a malicious applic
CVE-2022-32990 -- An issue in gimp_layer_invalidate_boundary of GNOME GIMP 2.10.30 allows attackers to trigger an unhandled exception via a crafted XCF file, causing a Denial of Service (DoS).
CVE-2022-32996 -- The django-navbar-client package of v0.9.50 to v1.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate priv
CVE-2022-32997 -- The RootInteractive package in PyPI v0.0.5 to v0.0.19b0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate pr
CVE-2022-32998 -- The cryptoasset-data-downloader package in PyPI v1.0.0 to v1.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as es
CVE-2022-32999 -- The cloudlabeling package in PyPI v0.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
CVE-2022-33000 -- The ML-Scanner package in PyPI v0.1.0 to v0.1.5 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges
CVE-2022-33001 -- The AAmiles package in PyPI v0.1.0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
CVE-2022-33002 -- The KGExplore package in PyPI v0.1.1 to v0.1.2 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
CVE-2022-33003 -- The watools package in PyPI v0.0.1 to v0.0.8 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
CVE-2022-33004 -- The Beginner package in PyPI v0.0.2 to v0.0.4 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
CVE-2022-33121 -- A Cross-Site Request Forgery (CSRF) in MiniCMS v1.11 allows attackers to arbitrarily delete local .dat files via clicking on a malicious link.
CVE-2022-33122 -- A stored cross-site scripting (XSS) vulnerability in eyoucms v1.5.6 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the URL field under the login page.
CVE-2022-33910 -- An XSS vulnerability in MantisBT before 2.25.5 allows remote attackers to attach crafted SVG documents to issue reports or bugnotes. When a user or an admin clicks on the attachment, file_download.php opens the SVG document in a browser tab instead of dow
CVE-2022-33953 -- IBM Robotic Process Automation 21.0.1 and 21.0.2 could allow a user with psychical access to the system to obtain sensitive information due to insufficiently protected access tokens. IBM X-Force ID: 229198.
CVE-2022-34053 -- The DR-Web-Engine package in PyPI v0.2.0b0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
CVE-2022-34054 -- The Perdido package in PyPI v0.0.1 to v0.0.2 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
CVE-2022-34055 -- The drxhello package in PyPI v0.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
CVE-2022-34056 -- The Watertools package in PyPI v0.0.0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
CVE-2022-34057 -- The Scoptrial package in PyPI version v0.0.5 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
CVE-2022-34059 -- The Sixfab-Tool in PyPI v0.0.2 to v0.0.3 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
CVE-2022-34060 -- The Togglee package in PyPI version v0.0.8 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
CVE-2022-34061 -- The Catly-Translate package in PyPI v0.0.3 to v0.0.5 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
CVE-2022-34064 -- The Zibal package in PyPI v1.0.0 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
CVE-2022-34065 -- The Rondolu-YT-Concate package in PyPI v0.1.0 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
CVE-2022-34066 -- The Texercise package in PyPI v0.0.1 to v0.0.12 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
CVE-2017-20085 -- A vulnerability has been found in Atahualpa Theme and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to basic cross site scripting. The attack can be launched remotely.
CVE-2017-20086 -- A vulnerability, which was classified as critical, was found in VaultPress Plugin 1.8.4. This affects an unknown part. The manipulation leads to code injection. It is possible to initiate the attack remotely.
CVE-2017-20087 -- A vulnerability, which was classified as problematic, has been found in Alpine PhotoTile for Instagram Plugin 1.2.7.7. Affected by this issue is some unknown functionality. The manipulation leads to basic cross site scripting. The attack may be launched r
CVE-2017-20088 -- A vulnerability classified as problematic has been found in Atahualpa Theme. Affected is an unknown function. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely.
CVE-2017-20088 -- A vulnerability classified as problematic has been found in Atahualpa Theme. Affected is an unknown function. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely.
CVE-2017-20089 -- A vulnerability was found in Gwolle Guestbook Plugin 1.7.4. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to basic cross site scripting. The attack may be initiated remotely.
CVE-2017-20089 -- A vulnerability was found in Gwolle Guestbook Plugin 1.7.4. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to basic cross site scripting. The attack may be initiated remotely.
CVE-2017-20090 -- A vulnerability was found in Global Content Blocks Plugin 2.1.5. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely.
CVE-2017-20091 -- A vulnerability was found in File Manager Plugin 3.0.1. It has been classified as problematic. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely.
CVE-2021-26636 -- Stored XSS and SQL injection vulnerability in MaxBoard could lead to occur Remote Code Execution, which could lead to information exposure and privilege escalation.
CVE-2021-26637 -- There is no account authentication and permission check logic in the firmware and existing apps of SiHAS's SGW-300, ACM-300, GCM-300, so unauthorized users can remotely control the device.
CVE-2021-26638 -- Improper Authentication vulnerability in S&D smarthome(smartcare) application can cause authentication bypass and information exposure. Remote attackers can use this vulerability to take control of the home environment including indoor control.
CVE-2021-29055 -- Cross Site Scripting (XSS) vulnerability in sourcecodester School File Management System 1.0 via the Firtstname parameter to the Update Account form in student_profile.php.
CVE-2021-29055 -- Cross Site Scripting (XSS) vulnerability in sourcecodester School File Management System 1.0 via the Firtstname parameter to the Update Account form in student_profile.php.
CVE-2021-40954 -- Laiketui 3.5.0 is affected by an arbitrary file upload vulnerability that can allow an attacker to execute arbitrary code.
CVE-2021-40955 -- SQL injection exists in LaiKetui v3.5.0 the background administrator list.
CVE-2021-40956 -- LaiKetui v3.5.0 has SQL injection in the background through the menu management function, and sensitive data can be obtained.
CVE-2021-41432 -- A stored cross-site scripting (XSS) vulnerability exists in FlatPress 1.2.1 that allows for arbitrary execution of JavaScript commands through blog content.
CVE-2021-46824 -- Cross Site Scripting (XSS) vulnerability in sourcecodester School File Management System 1.0 via the Lastname parameter to the Update Account form in student_profile.php.
CVE-2021-46824 -- Cross Site Scripting (XSS) vulnerability in sourcecodester School File Management System 1.0 via the Lastname parameter to the Update Account form in student_profile.php.
CVE-2022-2147 -- Cloudflare Warp for Windows from version 2022.2.95.0 contained an unquoted service path which enables arbitrary code execution leading to privilege escalation. The fix was released in version 2022.3.186.0.
CVE-2022-22967 -- An issue was discovered in SaltStack Salt in versions before 3002.9, 3003.5, 3004.2. PAM auth fails to reject locked accounts, which allows a previously authorized user whose account is locked still run Salt commands when their account is locked. This aff
CVE-2022-22980 -- A Spring Data MongoDB application is vulnerable to SpEL Injection when using @Query or @Aggregation-annotated query methods with SpEL expressions that contain query parameter placeholders for value binding if the input is not sanitized.
CVE-2022-26864 -- Prior Dell BIOS versions contain an Input Validation vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability by sending malicious input to an SMI in order to bypass security controls in SMM.
CVE-2022-29301 -- ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-20660. Reason: This candidate is a reservation duplicate of CVE-2021-20660. Notes: All CVE users should reference CVE-2021-20660 instead of this candidate. All references and descriptions
CVE-2022-29526 -- Go before 1.17.10 and 1.18.x before 1.18.2 has Incorrect Privilege Assignment. When called with a non-zero flags parameter, the Faccessat function could incorrectly report that a file is accessible.
CVE-2022-31009 -- wire-ios is an iOS client for the Wire secure messaging application. Invalid accent colors of Wire communication partners may render the iOS Wire Client partially unusable by causing it to crash multiple times on launch. These invalid accent colors can be
CVE-2022-31361 -- ** UNSUPPORTED WHEN ASSIGNED ** Docebo Community Edition v4.0.5 and below was discovered to contain a SQL injection vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2022-31362 -- ** UNSUPPORTED WHEN ASSIGNED ** Docebo Community Edition v4.0.5 and below was discovered to contain an arbitrary file upload vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2022-31395 -- Algo Communication Products Ltd. 8373 IP Zone Paging Adapter Firmware 1.7.6 allows attackers to perform a directory traversal via a web request sent to /fm-data.lua.
CVE-2022-31787 -- IdeaTMS 2022 is vulnerable to SQL Injection via the PATH_INFO
CVE-2022-32124 -- 74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the component /index/jobfairol/show/.
CVE-2022-32125 -- 74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /job.
CVE-2022-32126 -- 74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company.
CVE-2022-32127 -- 74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company/view_be_browsed/total.
CVE-2022-32128 -- 74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company/service/increment/add/im.
CVE-2022-32129 -- 74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company/account/safety/trade.
CVE-2022-32130 -- 74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company/down_resume/total/nature.
CVE-2022-32131 -- 74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /index/notice/show.
CVE-2022-32534 -- The Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 and earlier was found to be vulnerable to command injection through its diagnostics web interface. This allows execution of shell commands.
CVE-2022-32534 -- The Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 and earlier was found to be vulnerable to command injection through its diagnostics web interface. This allows execution of shell commands.
CVE-2022-32535 -- The Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 runs its web server with root privilege. In combination with CVE-2022-23534 this could give an attacker root access to the switch.
CVE-2022-32535 -- The Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 runs its web server with root privilege. In combination with CVE-2022-23534 this could give an attacker root access to the switch.
CVE-2022-32536 -- The user access rights validation in the web server of the Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 was insufficient. This would allow a non-administrator user to obtain administrator user access rights.
CVE-2022-32536 -- The user access rights validation in the web server of the Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 was insufficient. This would allow a non-administrator user to obtain administrator user access rights.
CVE-2022-32554 -- Pure Storage FlashArray products running Purity//FA 6.2.0 - 6.2.3, 6.1.0 - 6.1.12, 6.0.0 - 6.0.8, 5.3.0 - 5.3.17, 5.2.x and prior Purity//FA releases, and Pure Storage FlashBlade products running Purity//FB 3.3.0, 3.2.0 - 3.2.4, 3.1.0 - 3.1.12, 3.0.x and
CVE-2022-32987 -- Multiple cross-site scripting (XSS) vulnerabilities in /bsms/?page=manage_account of Simple Bakery Shop Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Username or Full Name fields.
CVE-2022-33024 -- There is an Assertion `int decode_preR13_entities(BITCODE_RL, BITCODE_RL, unsigned int, BITCODE_RL, BITCODE_RL, Bit_Chain *, Dwg_Data *' failed at dwg2dxf: decode.c:5801 in libredwg v0.12.4.4608.
CVE-2022-33025 -- LibreDWG v0.12.4.4608 was discovered to contain a heap-use-after-free via the function decode_preR13_section at decode_r11.c.
CVE-2022-33026 -- LibreDWG v0.12.4.4608 was discovered to contain a heap buffer overflow via the function bit_calc_CRC at bits.c.
CVE-2022-33027 -- LibreDWG v0.12.4.4608 was discovered to contain a heap-use-after-free via the function dwg_add_handleref at dwg.c.
CVE-2022-33028 -- LibreDWG v0.12.4.4608 was discovered to contain a heap buffer overflow via the function dwg_add_object at decode.c.
CVE-2022-33032 -- LibreDWG v0.12.4.4608 was discovered to contain a heap-buffer-overflow via the function decode_preR13_section_hdr at decode_r11.c.
CVE-2022-33033 -- LibreDWG v0.12.4.4608 was discovered to contain a double-free via the function dwg_read_file at dwg.c.
CVE-2022-33034 -- LibreDWG v0.12.4.4608 was discovered to contain a stack overflow via the function copy_bytes at decode_r2007.c.
CVE-2022-33067 -- Lrzip v0.651 was discovered to contain multiple invalid arithmetic shifts via the functions get_magic in lrzip.c and Predictor::init in libzpaq/libzpaq.cpp. These vulnerabilities allow attackers to cause a Denial of Service via unspecified vectors.
CVE-2022-33068 -- An integer overflow in the component hb-ot-shape-fallback.cc of Harfbuzz v4.3.0 allows attackers to cause a Denial of Service (DoS) via unspecified vectors.
CVE-2022-33069 -- Ethereum Solidity v0.8.14 contains an assertion failure via SMTEncoder::indexOrMemberAssignment() at SMTEncoder.cpp.
CVE-2022-33070 -- Protobuf-c v1.4.0 was discovered to contain an invalid arithmetic shift via the function parse_tag_and_wiretype in protobuf-c/protobuf-c.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors.
CVE-2022-33092 -- 74cmsSE v3.5.1 was discovered to contain a SQL injection vulnerability via the keyword parameter at /home/job/index.
CVE-2022-33093 -- 74cmsSE v3.5.1 was discovered to contain a SQL injection vulnerability via the key parameter at /freelance/resume_list.
CVE-2022-33094 -- 74cmsSE v3.5.1 was discovered to contain a SQL injection vulnerability via the keyword parameter at /home/job/map.
CVE-2022-33096 -- 74cmsSE v3.5.1 was discovered to contain a SQL injection vulnerability via the keyword parameter at /home/resume/index.
CVE-2022-33097 -- 74cmsSE v3.5.1 was discovered to contain a SQL injection vulnerability via the keyword parameter at /home/campus/campus_job.
CVE-2022-33105 -- Redis v7.0 was discovered to contain a memory leak via the component streamGetEdgeID.
CVE-2022-33113 -- Jfinal CMS v5.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the keyword text field under the publish blog module.
CVE-2022-33114 -- Jfinal CMS v5.1.0 was discovered to contain a SQL injection vulnerability via the attrVal parameter at /jfinal_cms/system/dict/list.
CVE-2022-33124 -- aiohttp v3.8.1 was discovered to contain an invalid IPv6 URL which can lead to a Denial of Service (DoS).
CVE-2022-33127 -- The function that calls the diff tool in Diffy 3.4.1 does not properly handle double quotes in a filename when run in a windows environment. This allows attackers to execute arbitrary commands via a crafted string.
CVE-2022-34011 -- OneBlog v2.3.4 was discovered to contain a Server-Side Request Forgery (SSRF) vulnerability via the parameter entryUrls.
CVE-2022-34012 -- Insecure permissions in OneBlog v2.3.4 allows low-level administrators to reset the passwords of high-level administrators who hold greater privileges.
CVE-2022-34013 -- OneBlog v2.3.4 was discovered to contain a Server-Side Request Forgery (SSRF) vulnerability via the Logo parameter under the Link module.
CVE-2022-34170 -- In Jenkins 2.320 through 2.355 (both inclusive) and LTS 2.332.1 through LTS 2.332.3 (both inclusive) the help icon does not escape the feature name that is part of its tooltip, effectively undoing the fix for SECURITY-1955, resulting in a cross-site scrip
CVE-2022-34171 -- In Jenkins 2.321 through 2.355 (both inclusive) and LTS 2.332.1 through LTS 2.332.3 (both inclusive) the HTML output generated for new symbol-based SVG icons includes the 'title' attribute of 'l:ionicon' (until Jenkins 2.334) and 'alt' attribute of 'l:ico
CVE-2022-34172 -- In Jenkins 2.340 through 2.355 (both inclusive) symbol-based icons unescape previously escaped values of 'tooltip' parameters, resulting in a cross-site scripting (XSS) vulnerability.
CVE-2022-34173 -- In Jenkins 2.340 through 2.355 (both inclusive) the tooltip of the build button in list views supports HTML without escaping the job display name, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permissi
CVE-2022-34174 -- In Jenkins 2.355 and earlier, LTS 2.332.3 and earlier, an observable timing discrepancy on the login form allows distinguishing between login attempts with an invalid username, and login attempts with a valid username and wrong password, when using the Je
CVE-2022-34175 -- Jenkins 2.335 through 2.355 (both inclusive) allows attackers in some cases to bypass a protection mechanism, thereby directly accessing some view fragments containing sensitive information, bypassing any permission checks in the corresponding view.
CVE-2022-34176 -- Jenkins JUnit Plugin 1119.va_a_5e9068da_d7 and earlier does not escape descriptions of test results, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Run/Update permission.
CVE-2022-34177 -- Jenkins Pipeline: Input Step Plugin 448.v37cea_9a_10a_70 and earlier archives files uploaded for `file` parameters for Pipeline `input` steps on the controller as part of build metadata, using the parameter name without sanitization as a relative path ins
CVE-2022-34178 -- Jenkins Embeddable Build Status Plugin 2.0.3 allows specifying a 'link' query parameter that build status badges will link to, without restricting possible values, resulting in a reflected cross-site scripting (XSS) vulnerability.
CVE-2022-34179 -- Jenkins Embeddable Build Status Plugin 2.0.3 and earlier allows specifying a `style` query parameter that is used to choose a different SVG image style without restricting possible values, resulting in a relative path traversal vulnerability that allows a
CVE-2022-34180 -- Jenkins Embeddable Build Status Plugin 2.0.3 and earlier does not correctly perform the ViewStatus permission check in the HTTP endpoint it provides for "unprotected" status badge access, allowing attackers without any permissions to obtain the build stat
CVE-2022-34181 -- Jenkins xUnit Plugin 3.0.8 and earlier implements an agent-to-controller message that creates a user-specified directory if it doesn't exist, and parsing files inside it as test results, allowing attackers able to control agent processes to create an arbi
CVE-2022-34182 -- Jenkins Nested View Plugin 1.20 through 1.25 (both inclusive) does not escape search parameters, resulting in a reflected cross-site scripting (XSS) vulnerability.
CVE-2022-34183 -- Jenkins Agent Server Parameter Plugin 1.1 and earlier does not escape the name and description of Agent Server parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Con
CVE-2022-34184 -- Jenkins CRX Content Package Deployer Plugin 1.9 and earlier does not escape the name and description of CRX Content Package Choice parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by att
CVE-2022-34185 -- Jenkins Date Parameter Plugin 0.0.4 and earlier does not escape the name and description of Date parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permiss
CVE-2022-34186 -- Jenkins Dynamic Extended Choice Parameter Plugin 1.0.1 and earlier does not escape the name and description of Moded Extended Choice parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by a
CVE-2022-34187 -- Jenkins Filesystem List Parameter Plugin 0.0.7 and earlier does not escape the name and description of File system objects list parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attack
CVE-2022-34188 -- Jenkins Hidden Parameter Plugin 0.0.4 and earlier does not escape the name and description of Hidden Parameter parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Con
CVE-2022-34189 -- Jenkins Image Tag Parameter Plugin 1.10 and earlier does not escape the name and description of Image Tag parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configur
CVE-2022-34190 -- Jenkins Maven Metadata Plugin for Jenkins CI server Plugin 2.1 and earlier does not escape the name and description of List maven artifact versions parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability e
CVE-2022-34191 -- Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.77 and earlier does not escape the name of NetStorm Test parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with I
CVE-2022-34192 -- Jenkins ontrack Jenkins Plugin 4.0.0 and earlier does not escape the name of Ontrack: Multi Parameter choice, Ontrack: Parameter choice, and Ontrack: SingleParameter parameters on views displaying parameters, resulting in a stored cross-site scripting (XS
CVE-2022-34193 -- Jenkins Package Version Plugin 1.0.1 and earlier does not escape the name of Package version parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
CVE-2022-34194 -- Jenkins Readonly Parameter Plugin 1.0.0 and earlier does not escape the name and description of Readonly String and Readonly Text parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by atta
CVE-2022-34195 -- Jenkins Repository Connector Plugin 2.2.0 and earlier does not escape the name and description of Maven Repository Artifact parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers
CVE-2022-34196 -- Jenkins REST List Parameter Plugin 1.5.2 and earlier does not escape the name and description of REST list parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configu
CVE-2022-34197 -- Jenkins Sauce OnDemand Plugin 1.204 and earlier does not escape the name and description of Sauce Labs Browsers parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Co
CVE-2022-34198 -- Jenkins Stash Branch Parameter Plugin 0.3.0 and earlier does not escape the name and description of Stash Branch parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/C
CVE-2022-34199 -- Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
CVE-2022-34200 -- A cross-site request forgery (CSRF) vulnerability in Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier allows attackers to connect to an attacker-specified URL.
CVE-2022-34201 -- A missing permission check in Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.
CVE-2022-34202 -- Jenkins EasyQA Plugin 1.0 and earlier stores user passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
CVE-2022-34203 -- A cross-site request forgery (CSRF) vulnerability in Jenkins EasyQA Plugin 1.0 and earlier allows attackers to connect to an attacker-specified HTTP server.
CVE-2022-34204 -- A missing permission check in Jenkins EasyQA Plugin 1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server.
CVE-2022-34205 -- A cross-site request forgery (CSRF) vulnerability in Jenkins Jianliao Notification Plugin 1.1 and earlier allows attackers to send HTTP POST requests to an attacker-specified URL.
CVE-2022-34206 -- A missing permission check in Jenkins Jianliao Notification Plugin 1.1 and earlier allows attackers with Overall/Read permission to send HTTP POST requests to an attacker-specified URL.
CVE-2022-34207 -- A cross-site request forgery (CSRF) vulnerability in Jenkins Beaker builder Plugin 1.10 and earlier allows attackers to connect to an attacker-specified URL.
CVE-2022-34208 -- A missing permission check in Jenkins Beaker builder Plugin 1.10 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.
CVE-2022-34209 -- A cross-site request forgery (CSRF) vulnerability in Jenkins ThreadFix Plugin 1.5.4 and earlier allows attackers to connect to an attacker-specified URL.
CVE-2022-34210 -- A missing permission check in Jenkins ThreadFix Plugin 1.5.4 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.
CVE-2022-34211 -- A cross-site request forgery (CSRF) vulnerability in Jenkins vRealize Orchestrator Plugin 3.0 and earlier allows attackers to send an HTTP POST request to an attacker-specified URL.
CVE-2022-34212 -- A missing permission check in Jenkins vRealize Orchestrator Plugin 3.0 and earlier allows attackers with Overall/Read permission to send an HTTP POST request to an attacker-specified URL.
CVE-2022-34213 -- Jenkins Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier stores passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
CVE-2022-34295 -- totd before 1.5.3 does not properly randomize mesg IDs.
CVE-2022-34296 -- In Zalando Skipper before 0.13.218, a query predicate could be bypassed via a prepared request.
CVE-2022-34298 -- The NT auth module in OpenAM before 14.6.6 allows a "replace Samba username attack."
CVE-2022-34299 -- There is a heap-based buffer over-read in libdwarf 0.4.0. This issue is related to dwarf_global_formref_b.
CVE-2022-34300 -- In tinyexr 1.0.1, there is a heap-based buffer over-read in tinyexr::DecodePixelData.
CVE-2022-34305 -- In Apache Tomcat 10.1.0-M1 to 10.1.0-M16, 10.0.0-M1 to 10.0.22, 9.0.30 to 9.0.64 and 8.5.50 to 8.5.81 the Form authentication example in the examples web application displayed user provided data without filtering, exposing a XSS vulnerability.
CVE-2022-34305 -- In Apache Tomcat 10.1.0-M1 to 10.1.0-M16, 10.0.0-M1 to 10.0.22, 9.0.30 to 9.0.64 and 8.5.50 to 8.5.81 the Form authentication example in the examples web application displayed user provided data without filtering, exposing a XSS vulnerability.
CVE-2022-34328 -- PMB 7.3.10 allows reflected XSS via the id parameter in an lvl=author_see request to index.php.
58_158_177_102: ミーちゃん https://t.co/98ChNOy4zq -- 58_158_177_102
58_158_177_102: これ、ミーちゃんの父親のシロの可能性がある(久茂地ローカルねた) https://t.co/AnbQctqQvE -- 58_158_177_102
campuscodi: Sonatype said it discovered five malicious Python packages that contained functionality to steal AWS credentials and environment variables: -loglib-modules -pyg-modules -pygrata -pygrata-utils -hkg-sol-utils https://t.co/KHLTZDoLDi https://t -- campuscodi
campuscodi: Deep Analysis of Snake Keylogger (by @X__Junior) https://t.co/vce7eWOUYs https://t.co/dLF7MWfVeZ -- campuscodi
GossiTheDog: @threatbear_co @CrowdStrike It was a zero day back when it was found, as it was found exploited in the wild before vendor knew about it. Therefore, orgs probably want to pay attention as they may have been owned before exploitation. Vendor no -- GossiTheDog
James_inthe_box: @X__Junior @cybercdh @0xf0x_ @fumik0_ @Kostastsale @shotgunner101 @nu11charb @fr0gger_ @3xp0rtblog @JRoosen @1ZRR4H @binaryz0ne @_n1ghtw0lf @kienbigmummy @malwrhunterteam @vinopaljiri @ale_sp_brazil @pmelson @Myrtus0x0 Excellent work! -- James_inthe_box
malwrhunterteam: @500mk500 https://t.co/xg6os64RCz -- malwrhunterteam
Manu_De_Lucia: @lastknight @csirt_it @robertobaldoni @cy4gate_cyber @Google Ciao Matteo. Ma ci sono per caso evidenze che sia stato usato senza previa autorizzazione della magistratura e fuori da formali provvedimenti mirati alla repressione / prevenzione -- Manu_De_Lucia
58_158_177_102: 不定期掲載 泊 巻き貝とサンゴかな? アンモナイトとはかなり時代が違う感じ https://t.co/dvd22rF5cR -- 58_158_177_102
58_158_177_102: ひたすら暑い https://t.co/6V7luBwCHu -- 58_158_177_102
GossiTheDog: Microsoft (and other tech companies) should stop donating via MSPAC to both the people who tried to start an insurrection and who supported Roe being overturned. Just a thought. -- GossiTheDog
malwrhunterteam: "BancaSicura.apk": a92e2197e22af1a0b566590988727192c02874c7ba03e079652c41f8b9794894 Contains this link: http://51.83.225[.]224/appp.apk https://t.co/zKFwFARDhk -- malwrhunterteam
malwrhunterteam: @C14it0n @colCERT @CaiVirtual @phish_report @malware_traffic cc @1ZRR4H -- malwrhunterteam
malwrhunterteam: "hector.apk": ec38798940dbab431f3dacab74267b143e206ed8e3fc406be90125825198576a https://t.co/rGgcwyzqJg -- malwrhunterteam
malwrhunterteam: Is this a good one? ???? ???? https://t.co/tP85pNLccU https://t.co/D7uepnUjCR -- malwrhunterteam
malwrhunterteam: 76eec651973675a62af1586f33f293070c3d74f397b0a8c5c9a84cacffe93c0a Next stage: http://46.21.153[.]250/lum.hta https://t.co/TF8tdLFFCj -- malwrhunterteam
snovvcrash: @424f424f @ippsec Already tried it, but unfortunately it doesn’t seem to solve the issue with AV in my case -- snovvcrash
GossiTheDog: The Microsoft playbook on MSPAC is tell employees they’re listening, tell people to post in Yammer, issue some statement which is leaked to press saying donations are paused… and then quietly resume doing it. -- GossiTheDog
GossiTheDog: MSPAC should be disbanded, it makes a mockery of everything MS says it stands for — espoused values should mean something. Explore the data yourself. https://t.co/YFxlTIeMwN -- GossiTheDog
GossiTheDog: Also stop doing this. https://t.co/kEopaZFoph -- GossiTheDog
campuscodi: A GitHub repo with information about various EDRs that can be useful during red team exercises (via @MrUn1k0d3r) https://t.co/3jT64BHEHr https://t.co/vlxI9ZWYU0 -- campuscodi
GossiTheDog: It is incredible to me that I’m waking up in 2022 to this as a headline. https://t.co/y0Qn0el5ns -- GossiTheDog
GossiTheDog: It’s @troyhunt and @SwiftOnSecurity https://t.co/raFwvCIf75 -- GossiTheDog
GossiTheDog: Are You Now Or Have You Ever Been https://t.co/BbO0thVrnN -- GossiTheDog
Hexacorn: Lakes District delivers https://t.co/dMtmVPm6SD -- Hexacorn
malwrhunterteam: @Computeus7 @James_inthe_box The IP on the screenshot is different than you wrote in the tweet... -- malwrhunterteam
malwrhunterteam: @Mediatore88 Time to nuke the Vatican... -- malwrhunterteam
abuse_ch: Malspam campaign pushing #AsyncRAT and #RecordBreaker ???? LNK->HTA->EXE Payload URLs: ???? https://t.co/SSGR0WPTsM LNK: ???? https://t.co/ZcfvtiVkPo AsyncRAT: ???? https://t.co/akAHKMowy5 RecordBreaker: ????https://t.co/ZDGzcbw91O B -- abuse_ch
58_158_177_102: @mimibukuro2 期待に応えて延長戦みたい -- 58_158_177_102
58_158_177_102: @chikaxavi ブラウザの通知設定に入り込んでいる可能性があります 2-1を参照して消すことができます (どれが不審な通知をするURLかわからないので解除しづらいですが、普段、通知機能を使っていないのなら一旦すべての通知をとめてもよいです) https://t.co/CVVCrcaV9r -- 58_158_177_102
58_158_177_102: @kurutony 確かに。。。レッドブルの1.5倍くらいカフェインある。。。 -- 58_158_177_102
58_158_177_102: @kurutony 270kcalの砂糖水は無理。。。 (別角度) https://t.co/CA6mA6gHW2 -- 58_158_177_102
58_158_177_102: 期待通り購入したおばか https://t.co/KucTdMFshT -- 58_158_177_102
424f424f: @snovvcrash @ippsec Check out Mangle for them Go binaries https://t.co/Lgp08YfOYM -- 424f424f
58_158_177_102: チェリオ。期待を裏切らない恐ろしい子。。。 https://t.co/ahmTVntxvZ -- 58_158_177_102
58_158_177_102: 昼すば https://t.co/pxjbIqVctT -- 58_158_177_102
vxunderground: Additions to vx-underground are suspended until June 29th. Shit posting and memes continue. We apologize for the inconvenience. -- vxunderground
424f424f: @animemidwest Tracksuits required! -- 424f424f
58_158_177_102: 朝散策 暑い。。。 https://t.co/5Eodkz0Zxa -- 58_158_177_102
cyberwar_15: #북한 #NorthKorea #CyberWar https://t.co/9Yd4LnF1oN -- cyberwar_15
hackerfantastic: @syrristen @syyhlxx @BurlyMonk Nobody talked shit behind another's back either, to the face, props to you for getting a suit made of Mario fabric.. I have one made entirely of my enemies passwords but I don't want them to see it in case t -- hackerfantastic
hackerfantastic: @syrristen @syyhlxx @BurlyMonk I like the suit, I bet against you because brasil guy looked like he would throw down but in the end, I think it's the friends we make along the way that matter ;) ???? -- hackerfantastic
snovvcrash: @m3g9tr0n @ippsec Nice one! @0xdf_ wrote some good stuff showing both Chisel and SSF: https://t.co/LJOpuOGuMi -- snovvcrash
hackerfantastic: @Keyboards_bot Is that concept art? I am in love with this Calypso design. -- hackerfantastic
pmelson: @MikeKozlowicz https://pastebin[.]com/fvMrdWim -- pmelson
GossiTheDog: Did you know almost every human has mites that live on our faces? https://t.co/TtTXJGoRyP -- GossiTheDog
GossiTheDog: @lizzz_818 Yes, it was written days ago. -- GossiTheDog
pmelson: @dgthursty @securityonion EventID 4104 is the one you care about. -- pmelson
cyb3rops: @LiberalMut Kannst ruhig „Du“ sagen https://t.co/i1vbLHjArC https://t.co/CB0HoRglZV https://t.co/JpVv1UMGX6 -- cyb3rops
hackerfantastic: @syyhlxx @syrristen @BurlyMonk $5 on Brasil. -- hackerfantastic
malwrhunterteam: "PayPal.apk": 47284af8ccf06ae9fc0e93e69e549d17e9a2508886bf6f2952fe54260d8c68aa -- malwrhunterteam
nullcookies: https://t.co/msXl8WpVN2 -- nullcookies
pmelson: @dgthursty An easy place to start would be with ELK (or better yet @securityonion) and winlogbeat. PowerShell logging with winlogbeat: https://t.co/FAYmGyzskI Setting up winlogbeat with alerting on SecurityOnion: https://t.co/kGxXCNX0y1 -- pmelson
cyb3rops: In contrast, I really like their dwell time statistic 2011 >365 days 2019 56 days 2020 24 days 2021 21 days -- cyb3rops
cyb3rops: @LiberalMut Der 20.06 war ein Montag. Vermutlich werden in anderen Ländern auch an Samstagen und Sonntagen Tote von den Gesundheitsbehörden erfasst. Unsere buchen dann alles auf einen Montag. -- cyb3rops
cyb3rops: „an average of 273 cyber attacks per company“ ???? 273 phishing mails? 273 password guessing attempts? 273 port probes? https://t.co/6eu93rqUiC -- cyb3rops
GossiTheDog: @threatbear_co @CrowdStrike Yep. Crowdstrike found and reported the vuln from an IR engagement https://t.co/pHPzq3qktr -- GossiTheDog
GossiTheDog: @David3141593 Yep. They’re being DDoSed too. -- GossiTheDog
GossiTheDog: @njal_la @David3141593 Oh really? I saw your site unavailable for a bit. -- GossiTheDog
GossiTheDog: https://t.co/hXIYIB0O82 -- GossiTheDog
cyb3rops: @LiberalMut Es werden jährlich 73 Millionen Babies weltweit abgetrieben. Es sterben aber „nur“ 2 Millionen jährlich an Hunger. Es könnte die schiere Menge sein. -- cyb3rops
cyb3rops: Getting more and more requests from OffSec companies that help customers with the remediation of incidents Good to see that our industry shows some flexibility and reacts to the shifts in demand -- cyb3rops
GossiTheDog: Also absolutely fuck all the companies who consulted PR firms and decided to follow their advice not to say anything about women’s reproductive rights. -- GossiTheDog
GossiTheDog: Time to rebrand HODL as bankruptcy https://t.co/dy2mZQIKbv -- GossiTheDog
GossiTheDog: If Elon Musk finishes purchasing Twitter and turning it into an 8chan style free speech market, I have concerns it will accelerate incels and the decline of America. -- GossiTheDog
James_inthe_box: @0xToxin @pr0xylife @ankit_anubhav @JAMESWT_MHT @Cryptolaemus1 @malwrhunterteam @abuse_ch Always a classic :) -- James_inthe_box
malwrhunterteam: And then divorce is when "God" takes back the gift with saying something like for example: "okay, you had enough of it, now it's time for the opposite"? ???? Idiot... https://t.co/6RvtLI70o3 -- malwrhunterteam
malwrhunterteam: "osinttools.apk": 095103b9f04fd8b6e57bdee28f22efd1ea664a6f233bd6c91fe4924ece2332d7 https://t.co/v0CkY0SjJ9 -- malwrhunterteam
nullcookies: I’m sure Susan Collins is vErY cOnCeRnEd. -- nullcookies
pmelson: Bonus CTI round! We can pivot on the first server's self-signed certificate's key modulus value and discover that the actor has a second server running, also at Amazon: https://t.co/8sckrv7MOm -- pmelson
pmelson: $encData is easy enough to 'decrypt' and it reveals the URL of the final payload to be injected into msinfo.exe (as of the writing of this, that URL returns a 404 error). https://t.co/NNmUnPZeFb -- pmelson
pmelson: In this case, it's a DLL that was written and compiled in .NET, so we can analyze it in dnSpy. The DLL decodes the XOR 'encrypted' byte array $encData using $key and then uses HttpWebRequest to download a file and inject it into msinfo.exe: https -- pmelson
pmelson: The final round doesn't contain an IEX function call, and instead decodes and decompresses a long string into a byte array, which executes via System.Reflection.Assembly. If we step through the decompression and look at the first 16 bytes of $byt -- pmelson
pmelson: Sure, we could walk through all of the string concatenation, bogon characters, base64, and compression. Or we could just make the code unpack itself, which is way easier. By replacing IEX (Invoke-Expression) with Write-Host, we can step through t -- pmelson
snovvcrash: @ArtFact10 @ippsec Ligolo-ng is freaking cool for providing a separate interface, I’ve used it a couple of times. Didn’t not it gets flagged though, that’s sad… -- snovvcrash
vxunderground: Use cursive font in your IDE https://t.co/pGPnAZvwEq -- vxunderground
ankit_anubhav: Simple way to decode #SocGholish in #PowerShell. '<SocGholish_String>'-replace '.(.)','$1' | % {-join($_[-2 ..-$_.Length])} https://t.co/8rqLBHS10N https://t.co/TiRjeotiuI -- ankit_anubhav
campuscodi: Overtime hours in a certain building in Sankt Petersburg tonight Pay better be good -- campuscodi
cyb3rops: Remember this : https://t.co/DlvVQP8GSr https://t.co/nHj9HLOdTv -- cyb3rops
GossiTheDog: @editingemily I'm trying to figure out what's abnormal here XD -- GossiTheDog
Hexacorn: @Wietze and with F15s flying in LFA all over the place - didn’t expect Top Gun when I came over here and these aircrafts are louuuuuuuud while flying so low. was too slow to take any videos :( -- Hexacorn
ItsReallyNick: @PeteABryan Thanks Pete! I was uncomfortable with the video's use of "expert" - but I guess when the only thing you know is what attackers show you, and they show you this much, we know quite a bit -- ItsReallyNick
ItsReallyNick: @__Masq__ @MsftSecIntel Whaaat? Who put that there?? ???? Always fun to check who's paying attention to the details -- ItsReallyNick
KorbenD_Intel: un-follow friday.. digging it -- KorbenD_Intel
KorbenD_Intel: @MorganDemboski Bold-ish. Lithuania has no border with Russia prime. -- KorbenD_Intel
RansomwareNews: Group: clop Approx. Time: 2022-06-24 16:59:37.786462 Title: https://t.co/yPLbzn12wl FILES PART5 - 10.0.10.1\E$\Admin\Restored Files\From MGT03\ PUBLISHED -- RansomwareNews
RansomwareNews: Group: clop Approx. Time: 2022-06-24 16:59:36.037637 Title: https://t.co/W6My2mVECW FILES PART7 - 10.182.179.241\C$\sbs_prbt_backup_cifs1_vol1\SQL Backup\WGV\pbiDB -- RansomwareNews
RansomwareNews: Group: clop Approx. Time: 2022-06-24 16:59:34.336099 Title: https://t.co/GUGOdv3Qza FILES PART6 - 10.168.0.7\ PUBLISHED -- RansomwareNews
RansomwareNews: Group: clop Approx. Time: 2022-06-24 16:59:32.645827 Title: https://t.co/xsB90IcCId FILES PART5 - 192.168.10.96\ PUBLISHED -- RansomwareNews
RansomwareNews: Group: clop Approx. Time: 2022-06-24 16:59:29.835984 Title: https://t.co/5hT6MVFKoz FILES PART5 - 192.168.0.21\ PUBLISHED -- RansomwareNews
snovvcrash: Once seen Chisel in @ippsec’s #HTB Reddish walkthrough and I’ve fallen in love with it forever. However, AVs don’t like it for obvious reasons but garble/gobfuscate do good job to get rid of static detections in some environments ???? And wha -- snovvcrash
vxunderground: @hasherezade ???? -- vxunderground
GossiTheDog: @sap_aws stop posting pics of me -- GossiTheDog
GossiTheDog: Now, I'm not an American and do not understand American politics. That said, listening to this Biden address from the outside suggests to me Biden has basically no power. 'Vote harder' appears to be the message. Also, go on a road trip. -- GossiTheDog
Arkbird_SOLG: Yep, looks execute TinyNuke in memory. The domain is active since the June 16, 2022. Some additional samples of the dropper with the same C2: https://t.co/1JtLsGKjbb https://t.co/WAo54n0ZIr https://t.co/slF0SB1Mmc cc @James_inthe_box @fumik -- Arkbird_SOLG
GossiTheDog: @Notorious_BSE do you mean on @peterjson's blog? -- GossiTheDog
GossiTheDog: Hi @Channel4, please un-cancel Celebrity Big Brother so @NadineDorries can go on it? -- GossiTheDog
GossiTheDog: https://t.co/2aHbpllBWu https://t.co/WFLsrzL4pj -- GossiTheDog
GossiTheDog: I think I designed cn-cert's logo https://t.co/CPnTY9WN1f -- GossiTheDog
Hexacorn: @lorenzo2472 Lakes District. Cat Bells -- Hexacorn
ItsReallyNick: We've been talking much more openly about the cybercrime gig economy (micro-modular crimes!) and nefarious service providers. For more on this kind of thing: https://t.co/vxrQm9tuQH https://t.co/ODPdQOfDS3 -- ItsReallyNick
ItsReallyNick: I sorta wish I said this ???? [https://t.co/uOs1e0w9ch] instead of Attack Surface Reduction (ASR) rules [https://t.co/mmAclOyqOA] but ideally you embrace both capabilities. -- ItsReallyNick
ItsReallyNick: I answered some questions off-the-cuff about our counter-ransomware intelligence efforts: https://t.co/E4gD2gXwta I appreciated @msftsecurity keeping it informal/unscripted ???? - do not listen if you're triggered by verbal pauses. I'll do -- ItsReallyNick
James_inthe_box: @0xToxin @JRoosen @malware_traffic @k3dg3 @0x49736b @pr0xylife Runs on both, though you'll still get the "I won't run in a VM" message. -- James_inthe_box
James_inthe_box: @Arkbird_SOLG @fumik0_ @ET_Labs YAY for reskin :) -- James_inthe_box
James_inthe_box: @Ledtech3 #tweetdeck FTW -- James_inthe_box
pmelson: PowerShell scriptblock logging plus real-time detection for the use of System.Reflection.AssemblyName() takes so many tools and techniques off the table for attackers and has a very low false positive rate. I cannot recommend this approach enough -- pmelson
TalosSecurity: No new Talos Takes this week as we take a brief summer vacation, but we just hit 100 episodes, so there's plenty to catch up on in the back catalogue, from "Days of our #Ransomware" to tl;drs on specific threats https://t.co/E4W0YUkp1O http -- TalosSecurity
campuscodi: Today's podcast is also up with @yoav_gazelle on Radware providing pro-bono DDoS mitigation services to Ukraine and @danonit on the recent NSA advisory to keep PowerShell enabled https://t.co/8SivwMhGAW https://t.co/gU5wuGWfli -- campuscodi
IntezerLabs: Intezer is in the @SentinelOne marketplace ???? Accelerate alert triage and automate malware analysis https://t.co/WbtjMIDKlJ ???? -- IntezerLabs
SBousseaden: 14 prevention opportunities from delivery to execution to injection https://t.co/UWf1hGX8BD https://t.co/30SSwYBfhZ -- SBousseaden
GossiTheDog: Also, go watch WandaVision. https://t.co/evnZOZI7jP -- GossiTheDog
GossiTheDog: Watched Doctor Strange 2 Multiverse of Madness last night and it was a great movie and fun.. and also a tonal whiplash going from WandaVision’s nuanced take on loss to… Evil Dead 4 -- GossiTheDog
IntezerLabs: If you are an Intezer customer, use your SentinelOne API key to activate the integration https://t.co/qYWY9ZGDUP Not yet an Intezer customer? Get access to a free trial here https://t.co/ZiGCUDayyc -- IntezerLabs
IntezerLabs: ???? When SentinelOne detects a malicious activity, customers now have the option to automatically share alert data with Intezer for deep analysis. Intezer’s analysis is returned to SentinelOne for consolidated visibility and mitigation -- IntezerLabs
IntezerLabs: ????Automatically triage incidents and provide advanced malware analysis verdicts, lessening the load on busy security teams -- IntezerLabs
ItsReallyNick: @HackingLZ Intrusion data tells us that the highest return “easy” setting is enabling Defender Tamper Protection https://t.co/Wva8C0rVGj But it slipped my mind when filming that segment from my basement brick dungeon -- ItsReallyNick
James_inthe_box: @ViriBack @ET_Labs @fumik0_ @malwrhunterteam And yes, flagged as #tinynuke -- James_inthe_box
James_inthe_box: @ViriBack @ET_Labs @fumik0_ @malwrhunterteam Solid find! -- James_inthe_box
James_inthe_box: @arnold_smith1 @ankit_anubhav @BushidoToken @ffforward @0xThiebaut @JanYoungren @zaarab001 @VadimTk @AngrybeardUK @IgorOs6 @tpschmidt_ @AghiathChbib @CCrowMontance @OfficialCookJ @deb_infosec @CLAVDIAmartin @IAmNikkolai14 @rapiddns @Peter -- James_inthe_box
malwrhunterteam: "INSTA_HACK.apk": 828cd7218b474da155dec2fac8c731c7307c53daee1619e5ff244002fb57590b https://t.co/Z2ve4F2WE6 -- malwrhunterteam
malwrhunterteam: It's not only for actors spreading fake Telegram, it's for countless actors. And as months and years goes, it's not less and less, but more and more... https://t.co/9Mgnj28qMP -- malwrhunterteam
malwrhunterteam: "PluginL10.2.04.apk": 80b4141c007a5b9ea87388bb29744d7473572784819423e5d77b9dce8370fe88 Donot possible... @ShadowChasing1 https://t.co/8URq66iQDH -- malwrhunterteam
malwrhunterteam: "web3crypted.apk": 3fa8bea67d5c96b293643cd76c6d4117ddea1b8bf0ea5a04cf683efc4c947937 https://t.co/qzK5UtQMp3 -- malwrhunterteam
malwrhunterteam: Yes, that is also going on long. Obviously wouldn't if that piece of shit criminal gang called Google would give at least a little fuck... https://t.co/JrlrBZ3ppA -- malwrhunterteam
virusbtn: Microsoft has published a new intelligence report on the threat landscape in the ongoing war in Ukraine. The report reveals new information about Russian efforts including an increase in network penetration & espionage activities. https://t. -- virusbtn
ankit_anubhav: @dgsecnet @1ZRR4H @Max_Mal_ yeah rikimartin is the #Aggah bucket ???? -- ankit_anubhav
campuscodi: @drb0n3z @Joseph_Marks_ Subscribe to it via email and you can read it in full in your inbox. ???? -- campuscodi
campuscodi: @Joseph_Marks_ <3 https://t.co/E8h492Znd0 -- campuscodi
campuscodi: Thank you ???? https://t.co/6v0HwjC1Id -- campuscodi
malwrhunterteam: Fuck Google. https://t.co/tHGyVeplqT -- malwrhunterteam
virusbtn: Bitdefender has published its 2021 Consumer Threat Landscape Report: As in previous years, cybercriminals extensively leveraged trojans to harvest credentials, steal sensitive data, deliver ransomware or hijack computing power to mine cryptocurr -- virusbtn
virusbtn: Check Point researchers share their findings on an activity cluster with ties to Tropic Trooper. The infection chain includes a previously undescribed loader (dubbed “Nimbda”) written in Nim language. https://t.co/kS7mkA1bUD https://t.co/lYyYjFL -- virusbtn
vxunderground: @vinopaljiri @_CPResearch_ @CheckPointSW Congratulations ???? -- vxunderground
vxunderground: vx-underground Bar and Grill -- vxunderground
ankit_anubhav: @bigmacjpg Here is an IFSGuy #SocGholish infected page was double base64ed. cc @1ZRR4H @Ledtech3 https://t.co/LX6roY6PsL -- ankit_anubhav
campuscodi: @cybertolu plz download and run as admin ???? -- campuscodi
campuscodi: ClearSky said it discovered new malware associated with the Iranian SiameseKitten (Lyceum) group. Says the file is signed using a fake Microsoft cert used by other Iranian groups as well https://t.co/iHhHRKfPtT https://t.co/UaEFWmLJ8I -- campuscodi
campuscodi: Epic trolling https://t.co/wnVd7NPh9K -- campuscodi
campuscodi: Also: -Carnival Cruise settles 2019 data breach for $1.25mil -New technical report on NSA's SUAVEEYEFUL implant -Scalping bots hit Israeli government sites -Lithuania gets DDoS pounded by Russian hacktivists -SearchMarquis hits macOS users ha -- campuscodi
campuscodi: Also: -New vulns disclosed in MEGA's file encryption -Radware to provide Ukraine with pro-bono DDoS protection -Two Chinese APTs caught hiding intrusions with ransomware attacks -Calisto APT uses Evilginx to bypass MFA -Lyceum APT uses same f -- campuscodi
GossiTheDog: @IanAxton @AlexGSeabrook Good. ???????? -- GossiTheDog
GossiTheDog: If you want some irony, I remember about 15 years of so ago Boris wrote an article about how Prime Ministers don’t know when it’s their time to go as they’re too blinded by perceived power. -- GossiTheDog
JAMESWT_MHT: "#DHL Air Waybill Number: 290132731" spam email spread #guloader ➡️ #agenttesla Gz https://t.co/122FPVqbx8 Exe https://t.co/GejEfS0ZM3 https://t.co/XCY2rG8a5s -- JAMESWT_MHT
JAMESWT_MHT: "Fwd: Transazione 3725690 /R" #phishing #Nexi @nexipayments hXXps://nq-trnextit.com hXXps://nextitnex.com/cfg-ref/informazioni/1/home.php https://t.co/sG8ox3zNbN -- JAMESWT_MHT
malwrhunterteam: More samples already for that IP... https://t.co/ixb7L6Tm6a -- malwrhunterteam
malwrhunterteam: "中建信息管理平台.exe" downloads the "config.exe" from: http://okex.hanmeimei[.]nl/config.exe -- malwrhunterteam
malwrhunterteam: 137.175.19[.]13 https://t.co/Wzn4TGNkJ3 -- malwrhunterteam
malwrhunterteam: As some people waiting long for answers to DMs to @0x7fff9: the last time I heard from @0x7fff9 was around a month ago already. I have no idea what's going on with him, hopefully he is alive and well and just unimaginable busy. So sorry f -- malwrhunterteam
cyb3rops: @VikingRohan Don’t Stop Believin’ von Journey -- cyb3rops
JAMESWT_MHT: @malwrhunterteam #CobaltStrike ⚠️oa.shfe[.]tk ????other 2 samples???? https://t.co/RQRgungLPY https://t.co/osH7Z7tHq1 https://t.co/x8HRd6DDtT -- JAMESWT_MHT
JAMESWT_MHT: @malwrhunterteam today 28/66 https://t.co/EKkN53jhE1 -- JAMESWT_MHT
campuscodi: End-week newsletter is out: -Google TAG says it tracks 30 surveillance vendors -NSA says leave PowerShell on -CISA wants a cybersecurity hotline -Five EU states used NSO spyware -Hacker steals $2mil worth of CS:GO skins -Conti servers finally -- campuscodi
58_158_177_102: 昼らー 重い文書のレビューは脳内で一から自分ならどう書くか再構築して対応しないといけない。で、それをすると貧弱な自分の仕掛中の文書メモリへオーバライトが発生し、作成中の内容や文体が影響を受ける。。。 https://t.co/IheHa27KZt -- 58_158_177_102
blackorbird: RCS Labs Spyware vendor targets users in Italy and Kazakhstan. IOS: Use two 0day exploits. Android add package:com.fintur./support report: https://t.co/lDDGheZaAi Technical analysis of CVE-2021-30983: https://t.co/bbuBfyKEoY https://t.co/1Ezf -- blackorbird
campuscodi: MEGA-Awry - a set of vulnerabilities that can be used to decrypt MEGA users' files Issues were fixed and MEGA said none were exploited in the wild https://t.co/qR6rbBfmY2 https://t.co/D0NsSdeJk0 -- campuscodi
campuscodi: Akamai says that scalping bots are now targeting MyVisit, the appointment platform used by many Israeli government offices. The bots are hijacking appointments and then re-selling them at prices as high as $100 to desperate Israelis https:// -- campuscodi
vxunderground: Today @HarmonyProtocol disclosed a breach which resulted in the theft of 85,837.252 Ethereum (approx. $99,334,302.58 USD as of this writing) Wallet: 0x0d043128146654C7683Fbf30ac98D7B2285DeD00 https://t.co/cx67pGGaXo -- vxunderground
vxunderground: vx-underground: come for the malware, stay for the memes, dark art, and typos -- vxunderground
campuscodi: Carnival Cruise has agreed to pay $1.25 million in a multi-state settlement over its 2019 data breach https://t.co/uTWEFfjmGx https://t.co/XPQVLlLjKf -- campuscodi
GossiTheDog: @wonkeysmoker Yeah, lots of orgs don’t understand this. -- GossiTheDog
GossiTheDog: @wonkeysmoker Yes, but then it won't appear under these CVEs still. -- GossiTheDog
pmelson: @Ledtech3 @ScumBots It’s PHP’s fault, believe me -- pmelson
pmelson: @Ledtech3 @ScumBots https://t.co/DDwoKUvxPj -- pmelson
RansomwareNews: Group: ragnarlocker Approx. Time: 2022-06-23 22:45:06.797307 Title: New Leak: Northern Data Systems -- RansomwareNews
58_158_177_102: ???? https://t.co/StTl9RMfyq https://t.co/mTI3y0K5ds -- 58_158_177_102
campuscodi: Here's a copy of the CISA report where this was proposed. PDF: https://t.co/QhDpgd8Gju Other recommendations included that CISA cut its onboarding period from 198 days (????) to ~90 days. https://t.co/DFaWQcWvKG -- campuscodi
campuscodi: Best website since the dancing badgers https://t.co/cqwXNSxmso https://t.co/Aog4Nu8uQS -- campuscodi
DrunkBinary: @jfslowik @Dragonkin37 Arizona Assault Squad of the Green Tea Gorgons Chapter -- DrunkBinary
hackerfantastic: @sleeslee1 It made great TV entertainment but ultimately only the government has now studied "skinwalker ranch", bigelow aerospace was a front for the USG, just as the history TV show is a front for the Pentagon. These drip fed leaks and -- hackerfantastic
hackerfantastic: @sleeslee1 Accurate, the scientist in question will have the un-redacted "UFO shapes" that are still classified by the USG. There are multiple types and observations, the national security agenda is to constantly push defense but I am don -- hackerfantastic
pmelson: @Ledtech3 @ScumBots Use interactive PHP (‘php -a’) and replace all the eval() calls with echo(). Much easier than re-implementing the specific decoding styles PHP uses. -- pmelson
GossiTheDog: Yep, if you relying on vuln scanners to tell what is vuln you gonna have a bad day, as vendors don't class EOL as vuln. https://t.co/HgPnak1OXp -- GossiTheDog
GossiTheDog: Davide is basically Captain Hammer #loveisland https://t.co/4hqeMw9vnf -- GossiTheDog
GossiTheDog: @sallyMae1960 ???? just more vulns -- GossiTheDog
GossiTheDog: @hoyty Help -- GossiTheDog
campuscodi: US senators propose a bill to ban the sle and transfer of US citizens' data to countries considered a national security risk, such as China and Russia https://t.co/Q8iPUftcsH https://t.co/gkgeIYQqxv -- campuscodi
campuscodi: Instagram is testing a new way to verify a user's age on the platform. No more "birth date editing" to bypass site features, I guess. https://t.co/dxbZXhqeX9 https://t.co/QF4Ewiyvvd -- campuscodi
campuscodi: @HowellONeill Can ask him on that: https://t.co/T0Ut7cEGww -- campuscodi
ItsReallyNick: Similar vibes from @stvemillertime & @BushidoToken https://t.co/RDBMEqHkWF -- ItsReallyNick
James_inthe_box: @executemalware Same. -- James_inthe_box
malwrhunterteam: @Lookout Now Google TAG also wrote about it: https://blog[.]google/threat-analysis-group/italian-spyware-vendor-targets-users-in-italy-and-kazakhstan/ https://t.co/De8ywoO9s8 -- malwrhunterteam
pmelson: @x_a_n_d_e_r_k I wrote that rule years ago for Metasploit / PowerSploit payloads. And it just keeps on paying the bills. -- pmelson
pmelson: Old faithful ???? https://t.co/2dWm3hSP2z -- pmelson
vxunderground: We have submitted over 1,100,000 unique malicious binaries to @hatching_io! https://t.co/ud6QQisnIe -- vxunderground
vxunderground: @hasherezade ratio'd ???? -- vxunderground
vxunderground: @DarkCoderSc @fr0gger_ https://t.co/i4vbZLTckr -- vxunderground
vxunderground: We've update the VXUG Windows Malware paper collection -Studying Next Generation Malware: NightHawks attempt as Sleep obfuscation -About: Remote Library Injection -KCTHIJACK - KernelCallbackTableInjection -Sleep Obfuscation: Ekko -Gargoyle -- vxunderground
cyb3rops: @AlexVitanyi @marko_rogge Wassermelone hat zu viel Fruchtzucker -- cyb3rops
cyb3rops: FLARE Obfuscated String Solver (FLOSS) Version 2.0 | Mandiant https://t.co/G11XGFWEBL -- cyb3rops
malwrhunterteam: babbf62465c5eedb10c5563e853d661f8c9e892002ae2ef618ea87ae5d97437a "c:\users\analyst\documents\visual studio 2015\Projects\shellcodePayloadPentest\shellcodePayloadPentest\obj\x86\Release\shellcodePayloadPentest.pdb" -- malwrhunterteam
malwrhunterteam: "The biggest cyber security event for the information security community" sounds "fun": https://t.co/G7lMqKLaYN -- malwrhunterteam
malwrhunterteam: @VK_Intel @bryceabdo @JAMESWT_MHT That IP is still or again being used... https://t.co/VHTKLiUi3D -- malwrhunterteam
malwrhunterteam: 139.180.139[.]192 https://t.co/8CC5KvHGql -- malwrhunterteam
campuscodi: Hacker steals $2 million in CS:GO skins https://t.co/IzVtruVojm https://t.co/ZHX2mewdc6 -- campuscodi
campuscodi: Secureworks says that two Chinese APTs—Bronze Riverside and Bronze Starlight—have been engaging in a coordinated campaign to steal intellectual property from their victims and then deploying ransomware as a cover-up for their intrusions. http -- campuscodi
Hexacorn: this week’s research ???? https://t.co/v1VVthKqkO -- Hexacorn
James_inthe_box: A very fresh (compile time 2022-06-23 06:47:11) V18 #blitzed #grabber #stealer https://t.co/shSJ0ZvF6r -- James_inthe_box
James_inthe_box: @c_APT_ure @joe4security I believe the client name of AsyncClient_fVIPxNJ151.bin is apt. -- James_inthe_box
James_inthe_box: @bsforvt727 @_Seyiafro @malwrhunterteam @MalwareJake @MalwareTechBlog @malware_traffic ..I wonder if that's a complement for #malware threat actors..."hey baby, that malware is PACKED"..."Oh...why thank you ;) " ....I wonder if I should -- James_inthe_box
nullcookies: Don’t forget making totally not suspicious calls using your CEO’s voice ordering a subordinate to purchase $1,000 worth of Walmart gift cards for an urgent business… opportunity. So much abuse potential here. cc @GarWarner https://t.co/tTAb -- nullcookies
pmelson: @KentNabors @jaysonstreet That’s Agent 47 making a clean getaway https://t.co/QqJRs0YJdk -- pmelson
pmelson: @1000archangels Yup, but that won’t stop her from trying to eat another moth tomorrow. She’s not a fast learner. ???? -- pmelson
RansomwareNews: Group: alphv Approx. Time: 2022-06-23 19:52:49.995585 Title: https://t.co/lggDlGVIf4 -- RansomwareNews
aboutsecurity: Congrats to our amazing @BlackBerry threat researchers, editors, PR and social media teams! This team rocks! ???????? https://t.co/9Ekia7ZqD3 -- aboutsecurity
campuscodi: One of the most interesting tidbits from TAG's report is this section, where Google says it's aware and tracking 30 different spyware vendors selling their tools to governments. That's quite impressive. Not that they are 30, but that Google c -- campuscodi
campuscodi: The Project Zero team also has a report on CVE-2021-30983, a novel iOS zero-day exploit abused by the company's tools (which also included tons of other exploits, see image) https://t.co/tblNHHjbOg https://t.co/ju5Tmepw1I -- campuscodi
campuscodi: Today, following on Lookout's report last week, Google TAG has published its own insight on the activities of Italian spyware vendor RCS Lab https://t.co/5TKxnwtX9O https://t.co/RZtMv3BLjG -- campuscodi
campuscodi: I'm gonna be honest. This sure looks like a Carabinieri ops. ???????????? https://t.co/mHdb4tqDG9 -- campuscodi
hackerfantastic: I do not doubt that Travis is highly qualified, that's not the issue which is that he's main protagonist in a TV documentary of a "paranormal hotspot" where the conflict of interest as a former UAP TaskForce scientist at the Pentagon was -- hackerfantastic
hackerfantastic: @sleeslee1 We cannot trust the same governments and authorities who have made UFO experiencers, witnesses and incidents a subject of scorn and mockery - to continue to hijack the narrative that such technology is for government and milita -- hackerfantastic
hackerfantastic: @sleeslee1 I no longer trust the competency of our governments nor have faith in our military institutions that it makes any sense to seek their approval for first contact. The USG found and recovered alien craft in 1947 which is in posse -- hackerfantastic
James_inthe_box: @ps66uk Aye... @InQuest has seen a few as well. -- James_inthe_box
James_inthe_box: @snlyngaas @mikko Worlds biggest live #pentest. -- James_inthe_box
pmelson: I hope today brings you the same level of joy that my dog gets out of trying to make moths fly away by rolling on them in the grass. https://t.co/iFZeROWi33 -- pmelson
RansomwareNews: Group: hiveleak Approx. Time: 2022-06-23 16:58:21.995654 Title: Alphapointe -- RansomwareNews
cyb3rops: IR Remediation Fails Top3 1. compromised password, order to reset, increments number suffix by 1 2. webshell on webserver, order to reinstall, new OS, webshell gets restored from backup 3. Remote shutdown of host, order to provide HDD, unable t -- cyb3rops
cyb3rops: The good thing about a Microsoft Defender dominance for all the competitors is that they can write detections for everything that blindly tries to evade/disable Microsoft Defender https://t.co/TQhEbJEykr -- cyb3rops
cyb3rops: @AdamTheAnalyst Do they send .dmg as attachment or is it ZIP > .dmg > .command ? -- cyb3rops
GossiTheDog: @orlof_v yeah my dog thought it was totally normally I was wiping her ass, she didn't care -- GossiTheDog
James_inthe_box: @h2jazi in a big way. https://t.co/6DGl37XHTB -- James_inthe_box
QuoIntelligence: While the campaign represents targeting of political and #military targets — based on the lure from the campaign — it is important to emphasize that the scope of targets is widening. -- QuoIntelligence
QuoIntelligence: Additionally, as the conflict evolves, we are witnessing how #cyberactivity moves since the #cyber and #geopolitical activity are tied to each other. -- QuoIntelligence
QuoIntelligence: Quointelligence analyzed the use of the #Follina vulnerability in a campaign targeting entities in #Ukraine first reported by the CERT-UA, allegedly associated with the #APT28 cluster. Our weekly provides insights into the infrastructure -- QuoIntelligence
QuoIntelligence: This is also mirroring in the cyber realm with the #pro-Russian #hacktivist group #Killnet targeting Baltic nations with #DDoS attacks, including governments, financial institutions, and private organizations. https://t.co/UZBnJPEAyR -- QuoIntelligence
QuoIntelligence: QuoIntelligence explores how the diplomatic conflict between #Lithuania and Russia over the rail blockade in #Kaliningrad reflects how tensions in the #Baltic nations are increasing. -- QuoIntelligence
ankit_anubhav: @Gi7w0rm @1ZRR4H @Max_Mal_ No Ahmad is Syrian, these are from Pakistan -- ankit_anubhav
RansomwareNews: Group: everest Approx. Time: 2022-06-23 14:54:36.804787 Title: FAYAT -- RansomwareNews
campuscodi: Man Who Acted as Russian Agent Sentenced to Federal Prison Term https://t.co/VNVjMe1h4f https://t.co/p52c4jPmSk -- campuscodi
campuscodi: Infosec, still trapped in the 1910s https://t.co/kCJszkgwmX -- campuscodi
cyb3rops: @1ZRR4H Yes, I already have a rule for that : https://t.co/gwsdwf10EL -- cyb3rops
cyb3rops: Since email attachments get base64 encoded, we can take the PKZIP headers, encoded them base64, prepend a new line char, and combine that with a base64 encoded ".isoPK" string to create a rule that detects ZIP > ISO email attachments YARA ru -- cyb3rops
Cyb3rWard0g: @D4rkS4gu4r0 @jamieantisocial @ipninichuck @SecurePeacock https://t.co/yZYwTHFQNR -- Cyb3rWard0g
Cyb3rWard0g: @D4rkS4gu4r0 @jamieantisocial @ipninichuck @SecurePeacock Wow! That’s awesome Peter! Very happy to hear that ❤️ would love to hear more about it! If you are going to BH /Defcon, let me know ???? https://t.co/KkzI7xvu7k -- Cyb3rWard0g
Cyb3rWard0g: @jamieantisocial @D4rkS4gu4r0 @ipninichuck @SecurePeacock 2017 sounds old now ???? Happy to hear that some of those ideas are still helpful and relevant ???? -- Cyb3rWard0g
GossiTheDog: This should see me through to retirement in 2042! https://t.co/KlKCLyT6u3 -- GossiTheDog
James_inthe_box: @vinopaljiri @m_r_tz Snazzy! Be prepared to update your scripts has cli has changed. https://t.co/OYKI73Pm2b -- James_inthe_box
James_inthe_box: Interesting seeing htmlpreview . gitub . io abused: https://htmlpreview[.]github.io@oshi[.]at/Nmtw via pdf -> embedded xlsx -> rtf: https://t.co/HQZVQ9Fa59 ultimately #xloader https://t.co/yvhT8QnBxD -- James_inthe_box
malwrhunterteam: "demand_letter.iso": 7a736c28dd64ad974642ab0907e407d809e7615c922b67ab24bb66ff0716eed5 https://t.co/iOL1jdxMFj -- malwrhunterteam
malwrhunterteam: "New.xls.exe": 57739c0902c0d02fd2ab543714170e0677f9cc9b4e22221d095be9ff1333177f ???? https://t.co/wVGWsCUDoj -- malwrhunterteam
malwrhunterteam: "供应商投诉相关的材料信息_________docx.exe": dccb45aa44cee5960c5eee2c6f5c67435ae0a8da920c8ad8d0a8ed3c20919c60 service-3vkjh0i2-1253759078.gz.apigw.tencentcs[.]com https://t.co/LcJPHFw9IK -- malwrhunterteam
malwrhunterteam: "Mingle_115.apk": 5cd30ccebdd87fb1ea8f3a8995fc81b5b78e17ccc0f145703b5bd4da1ec22e66 From: https://www.iminglechat[.]de/ (NSFW, so no screenshot) -> https://iminglechat[.]de/apk/v1/Mingle_115.apk Bahamut using a porn lure? ???? https://t -- malwrhunterteam
MITREattack: Interested in crossing the boundaries between ATT&CK and Deception? Tomorrow, 6/24, at 10:15 EDT (1415 UTC+2) ATT&CK lead @_whatshisface and MITRE Engage lead @mmorovitz will be joining @BSidesCairo to discuss the two frameworks. Free -- MITREattack
58_158_177_102: @defenceability 検証したうちに今度遊びに来て -- 58_158_177_102
campuscodi: @AltShiftPrtScn @GossiTheDog My thoughts exactly. There's a huge potential for this to turn into a tech support hotline pretty quickly -- campuscodi
IntezerLabs: ???? Take @jaco_ZA's weekly SocVel cybersecurity quiz https://t.co/9KLI84IucZ https://t.co/hOc4J2lB9A -- IntezerLabs
RansomwareNews: Group: hiveleak Approx. Time: 2022-06-23 13:50:17.240967 Title: Arte Radiotelevisivo Argentino (Artear) -- RansomwareNews
vxunderground: Red Teamers designing C2 beacons like https://t.co/lRMQDgSUGx -- vxunderground
GossiTheDog: @YandarZone @Durghan @NoMansSky It's the top selling video game console, above Playstation and Xbox (combined I believe). So, a lot of people. -- GossiTheDog
GossiTheDog: @YandarZone @Franz94889424 @Durghan @NoMansSky Many millions of people use Switch. It's the number one console. Mario and such, pretty popular. Just because something doesn't apply to you doesn't mean there isn't a use case. I will probab -- GossiTheDog
GossiTheDog: @campuscodi @AltShiftPrtScn depends how structured, if it's even implemented (I imagine it would need a lot of funding). You could gate it on needing a tax number or something before you reach a human operator. -- GossiTheDog
GossiTheDog: @YandarZone @Durghan @NoMansSky Imagine there are millions of people who aren't you, who just own a Switch, who are excited to play something for the first time? That may solve it for you. -- GossiTheDog
malwrhunterteam: @kienbigmummy https://t.co/crVIDZziuL -- malwrhunterteam
malwrhunterteam: https://business-page-appeal-126-73125.web[.]app/ https://t.co/VlXqXIbCO2 -- malwrhunterteam
malwrhunterteam: ???? https://t.co/QGeMzq3WlZ -- malwrhunterteam
snovvcrash: @Yossi_Sassi Guess so ???? -- snovvcrash
campuscodi: CISA experts propose ‘311’ cybersecurity emergency call line for small businesses https://t.co/cQQoyC6nJS https://t.co/s3JU9LDXiP -- campuscodi
campuscodi: The podcasts based on my and Tom's newsletters are in the same RSS feed, which is separate from the main Risky Business podcast. See here: https://t.co/3NxCSclUac We'll update descriptions on that soon ???? https://t.co/GVMzk1EPlG -- campuscodi
campuscodi: The SRB newsletter is also available in a podcast form, with Pat (@riskybusiness) and Tom (@tomatospy) discussing last weeks most important government and policy topics. Link: https://t.co/GyfSl7mfXy https://t.co/JFTAjMOJbw -- campuscodi
GossiTheDog: You haven't lived 'til your dog has diarrhoea in the dog park, and you have to wipe her bum in public, and then take a stick of grass out she has failed to digest and is sticking out of her arse. -- GossiTheDog
GossiTheDog: huh, potentially a great idea https://t.co/ByDzubvj6s -- GossiTheDog
GossiTheDog: @markloman @erikremmelzwaal lols -- GossiTheDog
malwrhunterteam: https://actio-fcfc2.web[.]app/ Interesting, uses the Telegram API / a bot to get the url to redirect to... ???? https://t.co/SINID0qmnh -- malwrhunterteam
malwrhunterteam: "Get Your Free Omicron PCR today to avoid restrictions" themed phishing: https://medicare-order-kit.web[.]app/ https://t.co/ZmTqxZizvk -- malwrhunterteam
malwrhunterteam: https://potrioot[.]store/java/help/ https://t.co/cP9nEhoKiY -- malwrhunterteam
virusbtn: Researchers at Lab52 analyse a long-term MuddyWater infection campaign targeting countries in the Middle East. This infection campaign always starts with a compressed file wrapping a malicious Word document containing VBA macros. https://t.co/6B -- virusbtn
campuscodi: This is true, 100% :))) https://t.co/OqBSuOJFqX -- campuscodi
GossiTheDog: @5teveT It’s good to hear it’s improving! I’m only going by tweeted photos, which are likely going to be ‘leaders’ things -- GossiTheDog
GossiTheDog: @notken My dad tried fighting one of those so they sold it to a debt collector who inflated the price. Companies are fun. -- GossiTheDog
GossiTheDog: The Gatwick Airport drone (no actual drone) cover up still in swing, I see. https://t.co/xCHycsJulw -- GossiTheDog
GossiTheDog: Unfortunately @HoCpetitions rejected my petition as being a joke. It wasn’t a joke. https://t.co/SWuUBP8izS -- GossiTheDog
JAMESWT_MHT: "#DHL Air Waybill Number: 290132731" spam email #guloader > #agenttesla Gz???????? https://t.co/XU2PSFrQCk Exe???????? https://t.co/lLI68JrVLl ⚠️"Payload URL": "https://mgcpakistan.]com/aabb/gumabelt_YLFVSqoJuA131.bin" https://t.co/TMK5V -- JAMESWT_MHT
malwrhunterteam: 6697bca184802626b00a4d33e6468d823d5119329083511ef2a0154f0a7458c3 pay.yongzongsoft[.]com "sq.js" "fam_newspaper" https://t.co/Y3TxhiV7F8 -- malwrhunterteam
malwrhunterteam: @pbcGABriel @Namecheap @JAMESWT_MHT @Arubait @AgidCert @guelfoweb @FBussoletti @securityaffairs @D3LabIT @dubstard @PhishStats @illegalFawn For Namecheap, it is more an expected thing than a surprising thing. They can be even faster than -- malwrhunterteam
virusbtn: Proofpoint researchers analyse key trends and behaviours in social engineering throughout 2021 that highlight some common misconceptions people may have about how criminal or state actors engage with them. https://t.co/DetJT8fBo7 https://t.co/hU -- virusbtn
58_158_177_102: 不定期掲載 田町アンモナイト コンビニ近くの柱のとこ (前のは入り口近くで、その前のはエレベータホールのとこ。確か喫煙所前にもあった) https://t.co/HGfkNwoGNu -- 58_158_177_102
58_158_177_102: 昼らー いまどきIPSって選択肢は効果ありなのか?あってもコスパは?とか、サイバーランサムで端末のラテラルをより強く意識させるべきか自問自答しながら資料を書いている https://t.co/q0F2BJY3Gw -- 58_158_177_102
ankit_anubhav: @KuluozExist12 @1ZRR4H @Max_Mal_ @pr0xylife sure https://t.co/0sJhAQvJxx -- ankit_anubhav
ankit_anubhav: @1ZRR4H @Max_Mal_ @pr0xylife IOC https://t.co/0sJhAQvJxx -- ankit_anubhav
ankit_anubhav: #IcedID today abusing both #Google cloud + firebase in 1 shot. Stolen malspam leads to storage.googleapis fake link. Pressing the "download" button loads another google link (firebase) to download the actual zip, which contains an iso to -- ankit_anubhav
ankit_anubhav: @500mk500 @1ZRR4H @Max_Mal_ @pr0xylife Any chance we know what it does post c2? Cobaltstrike? -- ankit_anubhav
cyb3rops: @tuxpanik No, it just reminded me of that question -- cyb3rops
cyb3rops: Let's detect these ZIP attachments with .lnk file contents - magic header check - size - location of string ".lnk" relative to end of file Example https://t.co/pvgGLcGZvI https://t.co/KUzmVoQGn9 -- cyb3rops
GossiTheDog: We need to impose cost on Google somehow. https://t.co/8bpPDDpeUG -- GossiTheDog
GossiTheDog: Things are going well at Tesla, I see. "Both Berlin and Austin factories are gigantic money furnaces right now. It's really like a giant roaring sound, which is the sound of money on fire," https://t.co/x58VEx5yZu -- GossiTheDog
JAMESWT_MHT: "Fw:fattura non pagata IT/" spam email #phishing @Arubait hXXps://fattura-paga.com/ Registrar @Namecheap hXXps://www.aruba-sys-fattura.com/ Registrar @Namecheap https://t.co/RmsflAJ0Dx -- JAMESWT_MHT
malwrhunterteam: @StopMalvertisin So it seems Follina reached the stage when even the skids from NG are using it... -- malwrhunterteam
malwrhunterteam: https://t.co/uJrcFH2pa7 -- malwrhunterteam
malwrhunterteam: https://metamaskbestwallet2023project.draydns[.]de/ ???? https://t.co/VypOV4IW5q -- malwrhunterteam
SBousseaden: https://t.co/EBjWfKLjoZ https://t.co/16Muh0O7BV -- SBousseaden
GossiTheDog: One thing from looking at most InfoSec Europe photos - it's still so middle aged, white male. It's like looking in a mirror, going to a storm trooper convention. We have a long way to go as an industry still. -- GossiTheDog
GossiTheDog: Dreamt I changed my Twitter name to Johnson Out and got banned. https://t.co/jDcF8eA0qK -- GossiTheDog
GossiTheDog: Malware devs, at least stop pinging 127.0.0.1 https://t.co/DLehusQYb5 -- GossiTheDog
hackerfantastic: I personally believe Travis should've disclosed his conflict of interest before joining a public citizen research program after all he was working on classified Pentagon UFO files so now how can we trust any data or results? Just as plaus -- hackerfantastic
hackerfantastic: #ufotwitter drama since TV science man identified himself as *Pentagon* expert for UFO's is ???? totally PsyOp'd everyone with this UAP narrative. TV really is all fake these days. #skinwalkerranch -- hackerfantastic
424f424f: @harmj0y https://t.co/8k7FBHu2HE -- 424f424f
58_158_177_102: なお、千葉大生じゃないけれど興味がある都内近郊の大学や高専の方は、外部参加枠の情報を情報系の先生がお持ちの場合があります 脆弱性見つけてなんぼ、ではなく、ちゃんとレポートに書ける?見たとこに脆弱性がなかったって言える?(見つからなかったではなく)という実践コンテストです -- 58_158_177_102
58_158_177_102: 千葉大生向け セキュリティバグハンティングコンテスト 第7回! 講習をうけてハンターライセンスを取得して学内サイトを安全にする取り組みです。このコンテストを契機にサイバーセキュリティ分野の会社に就職して活躍する先輩も。ぜひ参加を検討ください。 https://t.co/WLxBBLASw0 -- 58_158_177_102
hackerfantastic: Command Injection (no, really) in OpenSSL CVE-2022-1292.. ???? -- hackerfantastic
malware_traffic: @Unit42_Intel #pcap of the infection, along with associated #Qabkot malware/artifacts available at: https://t.co/PRS0Of3daU https://t.co/uATt1xO0qf -- malware_traffic
424f424f: @bsdbandit @3DPProfessor Dude, can I come over and play choplifter? -- 424f424f
58_158_177_102: (昨年は行けなかったからTTさんにバッジをピックアップして貰った) -- 58_158_177_102
58_158_177_102: HITCON 行けるかはわからないけれど、昨年と同様イベントに寄付するつもりでチケット登録した -- 58_158_177_102
hackerfantastic: Popcorn.gif???? https://t.co/Fgi2GO6Jf8 -- hackerfantastic
malware_traffic: 2022-06-22 (Wednesday) - Examples of text from #Emotet spam with attached Excel speadsheets that have evil macro code. They'll say anything to get you to open one of them. https://t.co/i6evXmbOOE -- malware_traffic
GossiTheDog: @aiddya @kcappleguy ???? -- GossiTheDog
GossiTheDog: @aiddya @satyanadella Make it so. -- GossiTheDog
GossiTheDog: @tomwarren I filled a 1tb one on my Steamdeck in a day ???? -- GossiTheDog
James_inthe_box: @1ZRR4H That's a good find. -- James_inthe_box
424f424f: @strandjs @Antisy_Training Proper use of duct tape I see. -- 424f424f
RansomwareNews: Group: lv Approx. Time: 2022-06-22 20:43:23.590239 Title: BAHRA ELECTRIC - HACKED AND MORE THEN 800 GB DATA LEAKED -- RansomwareNews
RansomwareNews: Group: alphv Approx. Time: 2022-06-22 21:41:43.119326 Title: COUNT+CARE | https://t.co/7w3jWDaWaS -- RansomwareNews
RansomwareNews: Group: alphv Approx. Time: 2022-06-22 20:43:27.677659 Title: Reed Pope Law -- RansomwareNews
SBousseaden: vs Elastic endpoint behavior protection : detects both html smuggling and malicious shortcut (prevented) https://t.co/Ri5liREjtZ https://t.co/2kz3KWroZg -- SBousseaden
vxunderground: @Francisckrs vx-underground refuses to negotiate with vx-underground !!!11 -- vxunderground
vxunderground: vx-underground has ransomed vx-underground. vx-underground is asking vx-underground for $10,000 or else vx-underground will be posted on vx-underground -- vxunderground
DrunkBinary: @shortRound5454 @hackerxbella @ravici @MalwareTechBlog i.e. fucking around and finding out -- DrunkBinary
DrunkBinary: https://t.co/99mzRpWLRk -- DrunkBinary
GossiTheDog: Me watching MSTIC people unfollow me ???? https://t.co/zcE0LmNmzx -- GossiTheDog
GossiTheDog: Where's my knighthood @0xChich?! I'll download Paint 3D if I get one! https://t.co/LNakFe5xho -- GossiTheDog
malwrhunterteam: "Whatsapp Hacker.apk": a09f72a3193bc73c5af029ef71f64b5329a880e996954bb6280c9bd00fa1b283 https://t.co/21sTSuYxMv -- malwrhunterteam
malwrhunterteam: Goalkeeper #2. ???? https://t.co/omnfJ71uRi https://t.co/G3ZxZjJdwr -- malwrhunterteam
snovvcrash: Minus one paragraph in almost every pentest report ???? https://t.co/fQ1PsU02U4 -- snovvcrash
cyb3rops: @iguarism Yes -- cyb3rops
cyb3rops: @bobblegate I usually recommend a dedicated LDAP server on Linux -- cyb3rops
KorbenD_Intel: @TalBeerySec https://t.co/6tUb50mpa1 -- KorbenD_Intel
vxunderground: We've updated the vx-underground Malware Bulk Download collection. -VirusShare 425 -65,000+ unique samples -Named using Kaspersky naming convention Download here: https://t.co/DzBr48fSev https://t.co/tRRDwJUniP -- vxunderground
vxunderground: https://t.co/wovGQFdTpC https://t.co/YWLJQgFxNJ -- vxunderground
424f424f: @HackingLZ @techbytom @BakedSec @arekfurt Yeah I've walked users through removing MOTW before lol -- 424f424f
424f424f: My first day on the job at Veris Group with @christruncer https://t.co/xswZD8hSUO -- 424f424f
ankit_anubhav: @arekfurt Stolen chain is game over when it comes to expectations from the end user. Good malware like Emotet, Qbot, IcedID, Bumblebee use it. Awareness helps some adult theme spam, or fake lottery scams. But hard to blame end-user for ge -- ankit_anubhav
campuscodi: Check Point has published a report on a Chinese APT, with possible ties to the Tropic Trooper APT The group has been seen using Nimbda, a malware loader coded in the Nim language https://t.co/YRNHNI34XP https://t.co/H20qDQolbE -- campuscodi
campuscodi: Sekoia has a report out on Calisto, the Russian threat actor that Google TAG tracks as ColdRiver, and which has been targeting Western NGOs, think tanks and the defense sector https://t.co/4t84HzxtoJ https://t.co/cRdwN51SiH -- campuscodi
James_inthe_box: @Jane_0stin @500mk500 @da_667 @snort @ET_Labs And another one: https://t.co/wUDw64JX59 -- James_inthe_box
James_inthe_box: @Jane_0stin @500mk500 @da_667 @snort @ET_Labs Added a #yara rule to match in memory on that gist. https://t.co/rayJrSihEa -- James_inthe_box
James_inthe_box: @Jane_0stin @da_667 @snort @ET_Labs I like it :) -- James_inthe_box
James_inthe_box: Seems pretty thin @Twitter .... https://help.twitter[.]com/en/personal-info-and-ads https://t.co/nD1HpZvd3v -- James_inthe_box
James_inthe_box: @500mk500 @da_667 @snort @ET_Labs @Jane_0stin Same, but wow VERY different.. -- James_inthe_box
malwrhunterteam: 42.192.250[.]130 https://t.co/wtyCM0jNWT -- malwrhunterteam
cyb3rops: I like their sense of humor https://t.co/hhBIwdGNVv https://t.co/o7NW2FOLYs -- cyb3rops
GossiTheDog: the real lesson from the cyberwar is how microsoft knows so much about what happens on Ukraine's endpoints https://t.co/DRQZG39Qak -- GossiTheDog
GossiTheDog: @SteveSyfuhs https://t.co/dH5AZKIllJ -- GossiTheDog
424f424f: @arekfurt #1 Phishing defense I run into is user awareness. Technical controls are bypassed in most cases. SPF/DKIM/DMARC are mostly pointless. -- 424f424f
ankit_anubhav: @currybeans @pr0xylife @executemalware @ffforward @Cryptolaemus1 @Max_Mal_ @JAMESWT_MHT @malwarelabnet @1ZRR4H @fr0s7_ @Myrtus0x0 This is Qbot for you, so evasive that they often fail to download on real victim!???? -- ankit_anubhav
campuscodi: Countries outside Ukraine targeted by Russian cyber espionage since the start of the war in Ukraine https://t.co/IYmWdSSrgj -- campuscodi
campuscodi: "Coordinated" Russian cyber and military operations that took place in Ukraine since February 24 (the invasion) https://t.co/jcgKeoEWFm -- campuscodi
campuscodi: Russian malware families used for destructive attacks. Eight now, from six, seen in an earlier report. https://t.co/w5BGb0U43F -- campuscodi
campuscodi: Ops include: -destructive cyberattacks within Ukraine -network penetration and espionage outside Ukraine -cyber influence operations targeting people around the world Russian government entities responsible for these operations are: https://t -- campuscodi
campuscodi: Russian government agencies linked by Microsoft to influence operations https://t.co/ioMzEicQxH -- campuscodi
cyb3rops: Use the organization’s main on-prem Active Directory to logon to your internal security devices and consoles? (e.g. EDR, SIEM, FW Mgmt, Web Proxy admin etc.) -- cyb3rops
DissectMalware: @lennyzeltser @Ledtech3 give BlobRunner a try https://t.co/RpeiZOm6E5 -- DissectMalware
GossiTheDog: @jbowocky zero to hoodie https://t.co/DNZqA4Yebe -- GossiTheDog
hackerfantastic: @LinqtoGIC @linqtoinc2 @Jennifer_Arcuri @myhackerhouse @LindaPJones @lisacarmenwang @badbitch_empire @LauraWalkerLee @madrevc Awesome line-up, there will be great insights and investment discussions here! -- hackerfantastic
IntezerLabs: @faisalusuf @JAMESWT_MHT @malwrhunterteam @thepacketrat @virustotal @HybridAnalysis Indexed the file as trusted https://t.co/QRafgT8ILm Thanks @faisalusuf @JAMESWT_MHT -- IntezerLabs
James_inthe_box: An #unknown #stealer #rat ultimately written in Go: https://t.co/AlsrQkEuv9 a #snort / #suricata sig to match initial connect: https://t.co/q3AvTbJo4E cc @da_667 @snort @ET_Labs @Jane_0stin https://t.co/zX86a8TEoo -- James_inthe_box
malwrhunterteam: 43.138.206[.]52 https://t.co/6yHiNAmVQn -- malwrhunterteam
malwrhunterteam: 0b75f9b7a84b031fa5962d5268a1b63e1cdbfca88c788e03adaad17ff86acc01 103.45.142[.]119 ???? -- malwrhunterteam
malwrhunterteam: 8b3ec622f8d309430435a166a103972ac3474cad5bdcca957c14e18b020f25a3 "C:\Users\efeba\OneDrive\Masaüstü\Peony\Release\Payload.pdb" Seems someone from Turkey playing/testing... -- malwrhunterteam
malwrhunterteam: ???? https://t.co/9ZRFYhsk8T https://t.co/w2WNc7vU5m -- malwrhunterteam
malwrhunterteam: @h2jazi @ShadowChasing1 Possible related: https://t.co/tMZ6GBoHaW -- malwrhunterteam
mrd0x: @s1ntss You should if you have the time. -- mrd0x
mrd0x: @gerbot_ Haha thanks! Appreciate it. -- mrd0x
SpecterOps: REMINDER: Join us TODAY as we team up with @TEAL_Technology to show how you can secure your infrastructure using #BloodHoundEnterprise and the TEAL Security Assessment. Click here to register: https://t.co/08CpgxMnQ3 https://t.co/wBOCYGVU78 -- SpecterOps
virusbtn: Malwarebytes' @h2jazi & Roberto Santos look into a recent APT28 campaign. They identified a lure document that had been weaponized with the Follina (CVE-2022-30190) exploit to download and execute a new .Net stealer. https://t.co/k6u8wUi06Y -- virusbtn
virusbtn: Zscaler's Sudeep Singh & @HegdeRohit document a voicemail-themed phishing campaign used to lure victims into opening a malicious attachment. The goal of the threat actor is to steal credentials of Office365 and Outlook accounts. https://t.co -- virusbtn
vxunderground: @hasherezade https://t.co/VjpWaL9KIa -- vxunderground
ankit_anubhav: @Max_Mal_ @pr0xylife @1ZRR4H https://t.co/PqVUe4hkrc + https://t.co/mtX9O3Q27Q + for clarity the zip contains a shortcut which does nasty stuff. I miss the follina qbot variant though. -- ankit_anubhav
ankit_anubhav: 2 types of #Qbot HTML smuggling attachment flying around today. a). Scanned_[0-9]{8,10}.html ( 3100 < filesize < 3299 ) b). [0-9]{8,10}_[0-9]{8,10}.html (2200 < filesize < 2400 ) Curling %random.dat% + invoking via regsvr32. -- ankit_anubhav
campuscodi: Also apologies for today's newsletter. I forgot to do a final grammar check pass last night and lots of derpiness made it through in today's email. -- campuscodi
campuscodi: Today's podcast, based on the newsletter, is also out. @danonit makes an appearance again to talk about the recent shit in malspam from macro payloads to LNK files https://t.co/q8uMnaPTbr https://t.co/Ry03Ne3bto -- campuscodi
GossiTheDog: Good. And good work to those who spoke out. https://t.co/QkUAWdhLmJ -- GossiTheDog
GossiTheDog: mates we're an industry who names things ICEFALL and WIZARD SPIDER with graphics of sexy robots with their robot tits out for threat actor groups. -- GossiTheDog
GossiTheDog: it gives me life when people seriously complain about me naming vulns and doing MS Paint logos -- GossiTheDog
JAMESWT_MHT: @malwrhunterteam Mentioned #smsspy #apk #malware ???????? https://t.co/ZeBVB1d3Hy cc @AgidCert @guelfoweb @bl4ckh0l3z -- JAMESWT_MHT
JAMESWT_MHT: #falsepositive @Malwarebytes @MalwarebytesLab ➡️https://t.co/o647LsZ0kQ ???? https://t.co/l4zm71QsUH https://t.co/14qbfYcEi5 -- JAMESWT_MHT
malwrhunterteam: "my lawyer referred me to a private anti fraud investigation agent on Instagram" ???? https://t.co/sFh6oYSDzL -- malwrhunterteam
malwrhunterteam: Related "PSD Protector.apk": 97dac1bdf77475eada8783a98c5f737d21d062d740ba2b84bd6beefb8b6fb6bb -- malwrhunterteam
malwrhunterteam: @midnight_comms ????% legit. ???? -- malwrhunterteam
malwrhunterteam: "app-debug.apk": 92845805031a4d3e0c9c97bf0bd19cf6b0508b566b448a882d2c6bb0e63da7c6 https://t.co/eF4ULeBUpa -- malwrhunterteam
TalosSecurity: You've read the blogs now hear the story on how #CiscoTalos helped to secure this year's #SuperBowlLVI https://t.co/OqM3KlDIGw -- TalosSecurity
virusbtn: In a Cisco Talos report @oflaviocosta, @g0jirasan & @gvenere write about a month-long AvosLocker campaign. The attackers utilized several different tools, including Cobalt Strike, Sliver and multiple commercial network scanners. https://t.co -- virusbtn
abhijit65340595: RT @Nyksindia: Cybercriminals will strike when and where you least expect them, so stop them now! #cybercrime #cybersecurity #cyberjagrukt… -- abhijit65340595
AnBenji: RT @SocEngineerInc: Social Security Numbers Stolen in Flagstar Bank Data Breach https://t.co/bJaIQP4P8c #databreach #datathreats #cybercri… -- AnBenji
CyberSecurityN8: RT @AITSNewsletter: Features, implementation, and the future of #ITbudgeting https://t.co/uto9EseUS1 #ITsecurity #workfromanywhere #wfh #… -- CyberSecurityN8
GitaSoren3: RT @Nyksindia: Cybercriminals will strike when and where you least expect them, so stop them now! #cybercrime #cybersecurity #cyberjagrukt… -- GitaSoren3
HanbyLucas: RT @teamBBH1: RCE ON Vmware workspace cve 22954 #youtubeshorts #shortsfeed #bugbountytips #BugBounty #reconnaissance #cybersecurity #hack… -- HanbyLucas
iazizahmad: RT @NandanLohitaksh: ALL IN ONE Hacking Tool For Hackers https://t.co/kWXfHIGsA1 #cybersecurity #infosec #bugbounty #bugbountytips https… -- iazizahmad
IdleWog: RT @NandanLohitaksh: ALL IN ONE Hacking Tool For Hackers https://t.co/kWXfHIGsA1 #cybersecurity #infosec #bugbounty #bugbountytips https… -- IdleWog
InfoSecDJ: RT @ska_vans: How I stopped hunting on @Hacker0x01 after years because they stole my $50k. #HackerOne #BugBounty https://t.co/kLhBQsjCup -- InfoSecDJ
kobbyjayoficial: Inbox now for help and guide on how to recover lost accounts. #hacked #icloud #facebookdown #imessage #ransomware… https://t.co/Du2v89OKwr -- kobbyjayoficial
kobbyjayoficial: Inbox now for all account recovery services,Lost or suspended, Inbox now let's get it done. #hacked #icloud… https://t.co/oAWqN94mia -- kobbyjayoficial
kobbyjayoficial: Have a lost account you want to recover but don't know how? Inbox now for guide on how to recover your account imme… https://t.co/XQA25ymjhm -- kobbyjayoficial
kobbyjayoficial: Recover locked/lost accounts with ease, DM for all account retrievals. #gmailhack #gmaildown #hacked #Hacking… https://t.co/ihs79Qzp9F -- kobbyjayoficial
KorishmitaBorg1: RT @Nyksindia: Cybercriminals will strike when and where you least expect them, so stop them now! #cybercrime #cybersecurity #cyberjagrukt… -- KorishmitaBorg1
Mambacmd1: RT @GodfatherOrwa: Big Bug bounty Tip To Find Collection Of Bugs #bugbountytip #bugbountytips #BugBounty https://t.co/5tjCeqKcT4 -- Mambacmd1
nykblurban: RT @Nyksindia: Cybercriminals will strike when and where you least expect them, so stop them now! #cybercrime #cybersecurity #cyberjagrukt… -- nykblurban
octal: RT @DMBisson: We're now truly in the era of ransomware as pure extortion without the encryption ⁦@TheRegister⁩ #ransomware #extortion http… -- octal
owen_wilser: RT @NandanLohitaksh: A list of interesting payloads, tips and tricks for bug bounty hunters. https://t.co/lfgh4MKXZF #bugbounty #bugboun… -- owen_wilser
Patrici88706825: ⛔️PHISHING ALERT oreillyauto.|com Redirect biiswvap[.]org #phishing #opendir #scam #publicdomainregistry #fraud… https://t.co/tKXnO8Ps9m -- Patrici88706825
PJMcIlvaine: RT @gjscobie: If the plot isn’t being played out today, it will be by tomorrow. The Kill Chain by GJ Scobie, a new cybercrime thriller fro… -- PJMcIlvaine
rajasekharpada5: RT @Nyksindia: Cybercriminals will strike when and where you least expect them, so stop them now! #cybercrime #cybersecurity #cyberjagrukt… -- rajasekharpada5
sectest9: RT @AITSNewsletter: Features, implementation, and the future of #ITbudgeting https://t.co/uto9EseUS1 #ITsecurity #workfromanywhere #wfh #… -- sectest9
SumanKole7: RT @Nyksindia: Cybercriminals will strike when and where you least expect them, so stop them now! #cybercrime #cybersecurity #cyberjagrukt… -- SumanKole7
Sumansantra22: RT @Nyksindia: Cybercriminals will strike when and where you least expect them, so stop them now! #cybercrime #cybersecurity #cyberjagrukt… -- Sumansantra22
tech_naivi: RT @NandanLohitaksh: ALL IN ONE Hacking Tool For Hackers https://t.co/kWXfHIGsA1 #cybersecurity #infosec #bugbounty #bugbountytips https… -- tech_naivi
YuvaNawada: RT @Nyksindia: Cybercriminals will strike when and where you least expect them, so stop them now! #cybercrime #cybersecurity #cyberjagrukt… -- YuvaNawada
beefyspace: RT @HACKER_TechS: Contact HACKER TECHs for your hacking enquires #CyberSec #infosec #cybercrime #Threatintel #dataprotection #Phishing #ran… -- beefyspace
beefyspace: RT @Patrici88706825: ⛔️PHISHING ALERT oreillyauto.|com Redirect biiswvap[.]org #phishing #opendir #scam #publicdomainregistry #fraud @malw… -- beefyspace
Celtic_AEP: RT @Bala_hacky: IcedID Banking Trojan returns with new TTPS – Detection & Response Read Here: https://t.co/tDe1ZmyUXg #cybersecurity #inf… -- Celtic_AEP
CR_E_A_M: RT @ErSurajShukla: How Spear Phishing Works :- #cybersecurity #infosec #infosecurity #informationsecurity #phishing #Linux #hacker #Securi… -- CR_E_A_M
crispSV: #RUAF huge Antonov An-124 heavy transport plane RA-82014 heading to #Crimea. #BlackSea #Ukraine #Russia #NATO #OSINT https://t.co/q7hU1OgRH8 -- crispSV
cyberreport_io: Storj (STORJ) – A Relatively Unheard Crypto – Leads Gainers With 30% Rally https://t.co/VysHtswMLG #cybersecurity… https://t.co/kesLyJGziU -- cyberreport_io
CyberSecurityN8: RT @cyberreport_io: Storj (STORJ) – A Relatively Unheard Crypto – Leads Gainers With 30% Rally https://t.co/VysHtswMLG #cybersecurity #thre… -- CyberSecurityN8
CyberSecurityN8: RT @Bala_hacky: IcedID Banking Trojan returns with new TTPS – Detection & Response Read Here: https://t.co/tDe1ZmyUXg #cybersecurity #inf… -- CyberSecurityN8
cybsecbot: RT @HACKER_TechS: Contact HACKER TECHs for your hacking enquires #CyberSec #infosec #cybercrime #Threatintel #dataprotection #Phishing #ran… -- cybsecbot
cybsecbot: In the past 24 hours, 2589 IoC's were submitted and #Emotet is the most seen #malware family on abuse[.]ch -- cybsecbot
DDeitscher: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- DDeitscher
defprsecurity: Why is Behavior Analytics important in Cyber Security? #cyber #cybersecurity #cyberpunk #hacking #security #hacker… https://t.co/5FN2Ve7UPd -- defprsecurity
ecarlesi: Possible threat on hxxps://domlix[.]com #phishing #nominalia https://t.co/3Dzsr3EVAT -- ecarlesi
ecarlesi: Possible threat on hxxp://zolii-network[.]com #phishing -- ecarlesi
ecarlesi: Possible threat on hxxp://ccgarnier[.]com #phishing #facebook #nc -- ecarlesi
ecarlesi: Possible threat on hxxps://domlix[.]com #phishing #nominalia -- ecarlesi
eUU587K9edGiztP: RT @UKikaski: Propaganda: Ethnic Russian "volunteers" from the "Urals" arriving in the #Donbass region. "(They) besieged military enlistme… -- eUU587K9edGiztP
fe_tsoc: RT @Patrici88706825: ⛔️PHISHING ALERT oreillyauto.|com Redirect biiswvap[.]org #phishing #opendir #scam #publicdomainregistry #fraud @malw… -- fe_tsoc
GeoPioneerInc: IED blast outside of Agriculture Director's home in Imphal #India #OSINT https://t.co/PoGxfDlVRU -- GeoPioneerInc
gramm_football: RT @pmakela1: Russian Steregushchiy-class corvette Mercury, that is on sea trials has reached Baltiysk, Kaliningrad. Mercury was intended… -- gramm_football
JEMPradio: Phish - Everything's Right (7-14-17) #Phish #JEMPRadio #CommunityRadio #NowPlaying https://t.co/Bz9yNRAZtE -- JEMPradio
JeromeRider: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- JeromeRider
JeromeRider: RT @CovertShores: ***UPDATE*** #Russian Navy SLAVA class cruiser at Tartus, Syria, today. Major part of Russian Navy's increased presence… -- JeromeRider
JFIFUDHDVHDJZUH: RT @CovertShores: ***UPDATE*** #Russian Navy SLAVA class cruiser at Tartus, Syria, today. Major part of Russian Navy's increased presence… -- JFIFUDHDVHDJZUH
KikAbrahams: New Chaos #malware dubbed #Yashma now incorporates fully fledged #ransomware capabilities. "being able to respond t… https://t.co/R5yp3WHGlh -- KikAbrahams
kobbyjayoficial: Lost Email, Instagram and Twitter? DM for quick recovery. Available 24/7. #gmailhack #gmaildown #hacked #Hacking… https://t.co/Xy1FkmcMdF -- kobbyjayoficial
kobbyjayoficial: Have exclusive Hacking jobs? DM and Ask for my service. #hacked #icloud #facebookdown #imessage #ransomware… https://t.co/JntDUMvA0l -- kobbyjayoficial
kobbyjayoficial: Hacking is easy, DM to Recover or Hack accounts and missing phones. #gmailhack #gmaildown #hacked #Hacking… https://t.co/tZL2Mii76n -- kobbyjayoficial
kobbyjayoficial: You lost your account? A good hacker is all you need. DM now. #hacked #icloud #facebookdown #imessage #ransomware… https://t.co/kb35er8kpd -- kobbyjayoficial
kobbyjayoficial: Hacking attempts on your device? DM now for risk free security solutions. #hacked #icloud #facebookdown #.imessage… https://t.co/mH0nuXs9yc -- kobbyjayoficial
LuxandraV: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- LuxandraV
Nadtools: I'm available 24/7 Inbox me #hacked #facebookdown #whatsapp #hackedinstagram #twitterdown #lockedaccount #metamask #ransomware #alterworld -- Nadtools
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 trying to login with account "student07" and password "stude… https://t.co/OAUUg1U3Aj -- OpenHoneypot
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 with SSH version "SSH-2.0-libssh_0.9.6" on UTC 2022-06-25 12… https://t.co/6sBs8ej0d7 -- OpenHoneypot
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 on UTC 2022-06-25 12:03:31.774288. #ThreatIntelligence -- OpenHoneypot
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 with SSH version "SSH-2.0-libssh_0.9.6" on UTC 2022-06-25 11… https://t.co/FE01cODtTc -- OpenHoneypot
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 trying to login with account "admin" and password "Pa$$w0rd"… https://t.co/2ncqcddqUH -- OpenHoneypot
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 trying to login with account "user" and password "user2003"… https://t.co/RhP4KCs48T -- OpenHoneypot
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 with SSH version "SSH-2.0-OpenSSH_7.4" on UTC 2022-06-25 12… https://t.co/SJUNCAZzOd -- OpenHoneypot
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 on UTC 2022-06-25 12:04:32.163195. #ThreatIntelligence -- OpenHoneypot
rachel_maria65: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- rachel_maria65
RDSWEB: RT @GeoPioneerInc: IED blast outside of Agriculture Director's home in Imphal #India #OSINT https://t.co/PoGxfDlVRU -- RDSWEB
sakshisaggi: RT @OsintCurious: Did you miss our live stream today? @WebBreacher @nixintel and @thegumshoo talked about @sinwindie's @OSINTDojo resource… -- sakshisaggi
sectest9: RT @cyberreport_io: Storj (STORJ) – A Relatively Unheard Crypto – Leads Gainers With 30% Rally https://t.co/VysHtswMLG #cybersecurity #thre… -- sectest9
sectest9: RT @Bala_hacky: IcedID Banking Trojan returns with new TTPS – Detection & Response Read Here: https://t.co/tDe1ZmyUXg #cybersecurity #inf… -- sectest9
ShunichiSaber01: RT @CovertShores: ***UPDATE*** #Russian Navy SLAVA class cruiser at Tartus, Syria, today. Major part of Russian Navy's increased presence… -- ShunichiSaber01
slaughterjames: RT @re_and_more: RE tip of the day: To debug the shellcode, instead of creating an executable out of it, its code can be copy-pasted over t… -- slaughterjames
SNFLaboratory: RT @ErSurajShukla: How Spear Phishing Works :- #cybersecurity #infosec #infosecurity #informationsecurity #phishing #Linux #hacker #Securi… -- SNFLaboratory
UKikaski: UA Government produced puff-piece on the arrival and use of HIMARS GMLS's by the #APU. #OSINT #OSINTUA… https://t.co/EoTNQwgn1f -- UKikaski
UKikaski: RUS Media Izvestia video of civilians being evacuated from the #AzotPlant in #Severodonestk. #APU forces have with… https://t.co/sobZZNrf70 -- UKikaski
xaelbot: RT @HACKER_TechS: Contact HACKER TECHs for your hacking enquires #CyberSec #infosec #cybercrime #Threatintel #dataprotection #Phishing #ran… -- xaelbot
beefyspace: RT @defprsecurity: Why is Behavior Analytics important in Cyber Security? #cyber #cybersecurity #cyberpunk #hacking #security #hacker #tec… -- beefyspace
CyberSecDN: Advanced #Malware Sandbox Solutions Market - Major Technology Giants in Buzz Again https://t.co/FktkJLlrVh #Sec_Cyber -- CyberSecDN
CyberSecurityN8: RT @defprsecurity: Why is Behavior Analytics important in Cyber Security? #cyber #cybersecurity #cyberpunk #hacking #security #hacker #tec… -- CyberSecurityN8
DataAugmented: RT @defprsecurity: Why is Behavior Analytics important in Cyber Security? #cyber #cybersecurity #cyberpunk #hacking #security #hacker #tec… -- DataAugmented
dez_blanchfield: I had the pleasure of catching up with Aashu Virmani, Vice President & Client Partner, Communications, at #Cyient.… https://t.co/hfiFG6lVuk -- dez_blanchfield
IdleWog: RT @re_and_more: RE tip of the day: To debug the shellcode, instead of creating an executable out of it, its code can be copy-pasted over t… -- IdleWog
iotworlds: RT @kai_global: More at https://t.co/bhFXApeaqB #cybersecurity #startup #entrepreneur #malware #phishing #encryptdata #authentication #prod… -- iotworlds
kamilsevi: RT @TheHackersNews: CISA and the Coast Guard have issued a joint advisory warning of ongoing attempts by hackers to exploit the Log4Shell #… -- kamilsevi
maldatabase: #FormBook malware indicators. #Malware #ThreatIntelligence #threatintel #IOC https://t.co/Lv3dDIWCC8 -- maldatabase
rahul05ranjan: RT @defprsecurity: Why is Behavior Analytics important in Cyber Security? #cyber #cybersecurity #cyberpunk #hacking #security #hacker #tec… -- rahul05ranjan
sectest9: RT @defprsecurity: Why is Behavior Analytics important in Cyber Security? #cyber #cybersecurity #cyberpunk #hacking #security #hacker #tec… -- sectest9
CyberSecurityN8: RT @mOhamedd7w: I found broken link in web page ,the link inside json body in source code .. what is the impact of this issue...?? @Anubha… -- CyberSecurityN8
CyberSecurityN8: RT @CybersecuritySF: Shut your mouth, don't get #hacked. No joke. Listen to former top corporate #spy @robertkerbeck on this week's "I Spy"… -- CyberSecurityN8
CyberSecurityN8: RT @SpiritUK_: Video: Making a habit of cyber security https://t.co/e2CeJYNIZ8 #charity #charities #cybersecurity #cybercrime #cybersecuri… -- CyberSecurityN8
CybersecuritySF: Shut your mouth, don't get #hacked. No joke. Listen to former top corporate #spy @robertkerbeck on this week's "I S… https://t.co/yH7nyAe7GE -- CybersecuritySF
DgpKarnataka: RT @BureaucratsInd: #BIDialogue The evolution of cybercrime forced the police to change their traditional way of investigation. They had t… -- DgpKarnataka
HalleBe22292567: RT @twelvesec: #Magecart #cyberattacks are still around but are more difficult to detect. #CyberSecurity #infosec #cybercrime https://t.co/… -- HalleBe22292567
majeed_rider: RT @RachakondaCop: Today @sheteams_rck of Malkajgiri Division conducted an #awareness program about #SheTeams, #cybercrime, #humantrafficki… -- majeed_rider
mOhamedd7w: I found broken link in web page ,the link inside json body in source code .. what is the impact of this issue...??… https://t.co/wHiKsYfv7Q -- mOhamedd7w
Naresh93761651: RT @CyberCrimePSCyb: Cybercrime can also be classified as crime against the Government. If you're a victim dial 1930 or report https://t.… -- Naresh93761651
optimist_Suraj: RT @TT_My_Kolkata: The cyber crime police station of Bidhannagar commissionarate had received a complaint from Microsoft. #cybercrime @bidh… -- optimist_Suraj
sectest9: RT @mOhamedd7w: I found broken link in web page ,the link inside json body in source code .. what is the impact of this issue...?? @Anubha… -- sectest9
sectest9: RT @CybersecuritySF: Shut your mouth, don't get #hacked. No joke. Listen to former top corporate #spy @robertkerbeck on this week's "I Spy"… -- sectest9
sectest9: RT @SpiritUK_: Video: Making a habit of cyber security https://t.co/e2CeJYNIZ8 #charity #charities #cybersecurity #cybercrime #cybersecuri… -- sectest9
SpiritUK_: Video: Making a habit of cyber security https://t.co/e2CeJYNIZ8 #charity #charities #cybersecurity #cybercrime… https://t.co/zaPwYK3H3E -- SpiritUK_
viral_ladka11: RT @LtGenGurmit: Met Director General of Police Shri @AshokKumar_IPS and senior police officers at Rajbhawan today. Discussed on the poli… -- viral_ladka11
_nikchitalia: RT @mOhamedd7w: I found broken link in web page ,the link inside json body in source code .. what is the impact of this issue...?? @Anubha… -- _nikchitalia
_rbkch: RT @steiner254: A 403 Bypass PUT /shell.php ==> 403 GET /shell.php -H "X-Method-Override: PUT" ==> 200 Then setup your listener and requ… -- _rbkch
_slasheur: RT @NandanLohitaksh: A list of interesting payloads, tips and tricks for bug bounty hunters. https://t.co/lfgh4MKXZF #bugbounty #bugboun… -- _slasheur
_Vault_Security: Two ???????? APT groups—Bronze Riverside and Bronze Starlight have been engaging in a coordinated campaign to steal intel… https://t.co/PeQXYKCbWB -- _Vault_Security
AliGoodLuck11: RT @Flag_C0: This is how I found a P2 by easy way ????‍♀️ 1) try https://domain/domain.zip 2) sometimes you can get source leak 3) Boom! #bugb… -- AliGoodLuck11
b3ard3dav3ng3r: #qakbot #malspam with extra layer ???????? Email attachment Zip (password protected) > HTML > Zip (password protected) >… https://t.co/vzGeSWAW2t -- b3ard3dav3ng3r
BobDoleTrasher: RT @NandanLohitaksh: ALL IN ONE Hacking Tool For Hackers https://t.co/kWXfHIGsA1 #cybersecurity #infosec #bugbounty #bugbountytips https… -- BobDoleTrasher
CyberSecurityN8: RT @Cohesity: #Cohesity recently released FortKnox — a #SaaS #dataisolation & recovery solution, adding to our #DataManagement as a Service… -- CyberSecurityN8
ecarlesi: Threat on hxxp://cross-country-elder-transport[.]com/wp-content[.]zip #opendir #fastdomain -- ecarlesi
ecarlesi: Possible threat on hxxp://lavahogarmedellin[.]com/v2[.]zip #phishing #opendir #akkymx -- ecarlesi
ecarlesi: Threat on hxxps://unauth-dev-cba[.]com/gh-cba-uadmin[.]zip #phishing #opendir https://t.co/gJbvYuW4be -- ecarlesi
ecarlesi: Threat on hxxps://unauthorized-netbank[.]com/gh-cba-uadmin[.]zip #phishing #opendir -- ecarlesi
elh3x: RT @GodfatherOrwa: Big Bug bounty Tip To Find Collection Of Bugs #bugbountytip #bugbountytips #BugBounty https://t.co/5tjCeqKcT4 -- elh3x
fe_tsoc: RT @b3ard3dav3ng3r: #qakbot #malspam with extra layer ???????? Email attachment Zip (password protected) > HTML > Zip (password protected) > LNK… -- fe_tsoc
mohitaron: RT @Cohesity: #Cohesity recently released FortKnox — a #SaaS #dataisolation & recovery solution, adding to our #DataManagement as a Service… -- mohitaron
pry0cc: RT @steiner254: A 403 Bypass PUT /shell.php ==> 403 GET /shell.php -H "X-Method-Override: PUT" ==> 200 Then setup your listener and requ… -- pry0cc
rohantwinkle: RT @GodfatherOrwa: Big Bug bounty Tip To Find Collection Of Bugs #bugbountytip #bugbountytips #BugBounty https://t.co/5tjCeqKcT4 -- rohantwinkle
rwincey: RT @_bughunter: Another 403 Bypass ???????????? PUT /shell.php ==> 403 GET /shell.php -H "X-Method-Override: PUT" ==> 200 Then setup your listene… -- rwincey
saido89: RT @NandanLohitaksh: ALL IN ONE Hacking Tool For Hackers https://t.co/kWXfHIGsA1 #cybersecurity #infosec #bugbounty #bugbountytips https… -- saido89
xirfan: Anyone else love doing software QA for multi billion pound corporations on their weekly shop? ???? @sainsburys… https://t.co/5Y7awCkkmn -- xirfan
YogeshBang: RT @steiner254: A 403 Bypass PUT /shell.php ==> 403 GET /shell.php -H "X-Method-Override: PUT" ==> 200 Then setup your listener and requ… -- YogeshBang
_rbkch: RT @ErSurajShukla: How Spear Phishing Works :- #cybersecurity #infosec #infosecurity #informationsecurity #phishing #Linux #hacker #Securi… -- _rbkch
Basilisco585: RT @DailyOsint: Do you need the contents of any website? Instant Data Scraper allows you to retrieve data from a webpage as an Excel or CS… -- Basilisco585
BurnsBill3: RT @Cohesity: With the rise of #ransomware attacks, we have one of the clearest and most urgent needs for tight collaboration between #data… -- BurnsBill3
Celtic_AEP: RT @GlenGilmore: #SmartCity ????#infrastructure must plan for #CyberResilience By @DeloitteInsight https://t.co/M7zVGa3ZbO mt @SmartBizInsig… -- Celtic_AEP
ClimaxBetty: RT @GlenGilmore: #SmartCity ????#infrastructure must plan for #CyberResilience By @DeloitteInsight https://t.co/M7zVGa3ZbO mt @SmartBizInsig… -- ClimaxBetty
CyberSecurityN8: RT @ciso360: Dark Web Price Index 2022 Buyers with an entrée to #DarkWeb retailers participated in a market that was even larger, more div… -- CyberSecurityN8
d_wilc: RT @fiete_stegers: At first glance, Shadowmaps looks like a highly promising shadow simulator for geolocation, as it includes data on build… -- d_wilc
Dhananjaya_N: RT @ciso360: Dark Web Price Index 2022 Buyers with an entrée to #DarkWeb retailers participated in a market that was even larger, more div… -- Dhananjaya_N
elizabeth_ryba: RT @cyber_etc: United States ???????? : Japanese automotive hose maker #Nichirin on June 22 said that a U.S. subsidiary had been hit by a #ransom… -- elizabeth_ryba
JGrahamTech: RT @GlenGilmore: #SmartCity ????#infrastructure must plan for #CyberResilience By @DeloitteInsight https://t.co/M7zVGa3ZbO mt @SmartBizInsig… -- JGrahamTech
joeyfns: Proofpoint details 'dangerous' ransomware flaw in #SharePoint and #OneDrive | Functionality allows #ransomware to e… https://t.co/wSP0Pb9dgw -- joeyfns
KAS_stoner: RT @OSMOSISCon: A huge ???? to #OSMOSIScon sponsor @DigitalCluesAG !! #cyberdistancing ???? #osint #socmint https://t.co/yhNt5Ld1pj https://t.c… -- KAS_stoner
Magikitkat1: RT @Hakin9: PSRansom - PowerShell Ransomware Simulator with C2 Server https://t.co/1AGcslUqMS #infosec #cybersecurity #redteam #pentest #… -- Magikitkat1
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 on UTC 2022-06-25 09:53:48.517296. #ThreatIntelligence -- OpenHoneypot
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 trying to login with account "deploy" and password "deploy"… https://t.co/bV3Ol9wEPz -- OpenHoneypot
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 with SSH version "SSH-2.0-libssh_0.9.6" on UTC 2022-06-25 09… https://t.co/9rpjlgMEit -- OpenHoneypot
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 on UTC 2022-06-25 09:30:00.203342. #ThreatIntelligence -- OpenHoneypot
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 with SSH version "SSH-2.0-OpenSSH_7.4" on UTC 2022-06-25 09… https://t.co/C39lWU6OyC -- OpenHoneypot
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 trying to login with account "user" and password "user2006"… https://t.co/PyLqa2IJoV -- OpenHoneypot
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 trying to login with account "admin" and password "admin200… https://t.co/57C29ktWGB -- OpenHoneypot
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 with SSH version "SSH-2.0-OpenSSH_7.4" on UTC 2022-06-25 09… https://t.co/OmK8GJ5twu -- OpenHoneypot
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 trying to login with account "install" and password "install… https://t.co/RohBZu9YCP -- OpenHoneypot
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 with SSH version "SSH-2.0-libssh_0.9.6" on UTC 2022-06-25 09… https://t.co/tn9zf0A9vH -- OpenHoneypot
raj65025523: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- raj65025523
raj65025523: RT @CovertShores: ***UPDATE*** #Russian Navy SLAVA class cruiser at Tartus, Syria, today. Major part of Russian Navy's increased presence… -- raj65025523
RDSWEB: RT @DailyOsint: Do you need the contents of any website? Instant Data Scraper allows you to retrieve data from a webpage as an Excel or CS… -- RDSWEB
Rory_Marcus_: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- Rory_Marcus_
sectest9: RT @Cohesity: #Cohesity recently released FortKnox — a #SaaS #dataisolation & recovery solution, adding to our #DataManagement as a Service… -- sectest9
sectest9: RT @ciso360: Dark Web Price Index 2022 Buyers with an entrée to #DarkWeb retailers participated in a market that was even larger, more div… -- sectest9
thyrex2002: RT @Amigo_A_: A new #Kanalia #Ransomware in my Digest. https://t.co/Ftu9bxhGcz Extension: XJJ Spreading against Russian-speaking users alon… -- thyrex2002
tipuXp: RT @ErSurajShukla: How Spear Phishing Works :- #cybersecurity #infosec #infosecurity #informationsecurity #phishing #Linux #hacker #Securi… -- tipuXp
adel0795774552: BuzzBundle Enterprise 2.63.10 Full Activated – SEO PowerSuite Enterprise Tool – Discount 100% OFF… https://t.co/tiXQfSqWKo -- adel0795774552
beefyspace: RT @ecarlesi: Possible threat on hxxp://vital-sante[.]com #phishing #godaddy https://t.co/z3nTptjnLb -- beefyspace
COUPSURE: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- COUPSURE
CyberSecurityN8: RT @ciso360: A Complete #Malware Analysis Tutorials, #Cheatsheet & #Tools list for Security Professionals #cybersecurity #infosec #ThreatM… -- CyberSecurityN8
CyberSecurityN8: RT @adel0795774552: BuzzBundle Enterprise 2.63.10 Full Activated – SEO PowerSuite Enterprise Tool – Discount 100% OFF https://t.co/o9jFHRz8… -- CyberSecurityN8
cybsecbot: RT @RedPacketSec: Vim code execution | CVE-2022-2183 - https://t.co/2GKUDKR04S #CVE #Vulnerability #OSINT #ThreatIntel #Cyber -- cybsecbot
Dhananjaya_N: RT @ciso360: A Complete #Malware Analysis Tutorials, #Cheatsheet & #Tools list for Security Professionals #cybersecurity #infosec #ThreatM… -- Dhananjaya_N
ecarlesi: Possible threat on hxxp://8kits[.]com #phishing #facebook #godaddy -- ecarlesi
ecarlesi: Possible threat on hxxps://sync-alorica[.]com #phishing #nc https://t.co/78jxYIU3Up -- ecarlesi
ecarlesi: Possible threat on hxxps://sync-alorica[.]com #phishing #nc -- ecarlesi
ecarlesi: Threat on hxxps://ctiuser[.]com/ #phishing #citi #namedotcom -- ecarlesi
ecarlesi: Possible threat on hxxp://indiawithtourguide[.]com/wordpress-6[.]0[.]zip #phishing #hostinger -- ecarlesi
ecarlesi: Threat on hxxp://ctiuser[.]com/ #phishing #citi #namedotcom -- ecarlesi
ecarlesi: Possible threat on hxxps://sync-alorica[.]com #phishing #nc https://t.co/ktOn3Jjvbv -- ecarlesi
garyfildes: Back today on #comptia Cyber Ready Bradford Cohort II - Nailing #nist #iso27001 #cisccontrols #pki #iam #encryption… https://t.co/6n9ASPOZCA -- garyfildes
GoaiDev: RT @adel0795774552: BuzzBundle Enterprise 2.63.10 Full Activated – SEO PowerSuite Enterprise Tool – Discount 100% OFF https://t.co/o9jFHRz8… -- GoaiDev
insanedevbot: RT @adel0795774552: BuzzBundle Enterprise 2.63.10 Full Activated – SEO PowerSuite Enterprise Tool – Discount 100% OFF https://t.co/o9jFHRz8… -- insanedevbot
jayzizo: RT @ErSurajShukla: How Spear Phishing Works :- #cybersecurity #infosec #infosecurity #informationsecurity #phishing #Linux #hacker #Securi… -- jayzizo
newbie_codes: RT @adel0795774552: BuzzBundle Enterprise 2.63.10 Full Activated – SEO PowerSuite Enterprise Tool – Discount 100% OFF https://t.co/o9jFHRz8… -- newbie_codes
Oyme: RT @Oyme: Botnet currently being hosted on @serverionnl. Url: hxxp://2.58.149.116/w #Botnet #Malware https://t.co/5HkPqwZYCt -- Oyme
raj65025523: RT @CovertShores: #OSINT is like finding a single piece of a jigsaw down the back of a Starbucks sofa and then futility searching every sof… -- raj65025523
raj65025523: RT @CovertShores: Thread. #OTD in 4 months of the #Ukraine War. Navy #OSINT Feb 24. World wakes up to invasion. Cruiser Moskva attacks Ukr… -- raj65025523
rum4is: RT @AnchoredNarrat1: The daily word cloud chatter on the threat actor Twitter feed on 18-06-2022. #threathunting #threatmanagement #osint… -- rum4is
RuOilTracker: ????????->???????? SEACONGER Departed St petersburg with 30,000 tons of oil products for delivery in #Hamburg, #Germany… https://t.co/x8eaqDBdBu -- RuOilTracker
RuOilTracker: ????????->???????? SEACHARM Departed Novorossiysk with 110,000 tons of crude oil for delivery in #Korfez, #Turkey… https://t.co/Z9CfxNxcx0 -- RuOilTracker
sectest9: RT @ciso360: A Complete #Malware Analysis Tutorials, #Cheatsheet & #Tools list for Security Professionals #cybersecurity #infosec #ThreatM… -- sectest9
sectest9: RT @adel0795774552: BuzzBundle Enterprise 2.63.10 Full Activated – SEO PowerSuite Enterprise Tool – Discount 100% OFF https://t.co/o9jFHRz8… -- sectest9
SecurityXTV: RT @adel0795774552: BuzzBundle Enterprise 2.63.10 Full Activated – SEO PowerSuite Enterprise Tool – Discount 100% OFF https://t.co/o9jFHRz8… -- SecurityXTV
SoftwareONE: #Scammers are using more ruthless and sophisticated #phishing techniques to acquire confidential data. Don’t let th… https://t.co/2PyYAuMwSZ -- SoftwareONE
UKikaski: RUS train carrying at least 9 x T-80 and 20 x T-62 MBTs pulled from long-term storage. #OSINT #OSINTUA… https://t.co/W4veax3vp3 -- UKikaski
Ultrascan419: Wirecard saga is a clear warning to expect more fraud in cryptoland - Financial News: Two years on from the collaps… https://t.co/AhgTyppDbh -- Ultrascan419
Ultrascan419: My Word | Local man shares experience with bank scam - Times-Standard: I recently was caught in a scam. Despite my… https://t.co/JfAdCsNEiB -- Ultrascan419
xaelbot: RT @adel0795774552: BuzzBundle Enterprise 2.63.10 Full Activated – SEO PowerSuite Enterprise Tool – Discount 100% OFF https://t.co/o9jFHRz8… -- xaelbot
indkarinne: RT @davidbombal: She hacked me! YouTube video: https://t.co/ax7UNrfPq8 Learn how to set up a phishing campaign with demo. #phishing #hac… -- indkarinne
2ndleprechaun: RT @Sec_Cyber: Third-Party #Cyber Risk Management - Novel Prevention of #Cybercrime Risks in Supply Chains https://t.co/AQEEsSLjku -- 2ndleprechaun
406NtAcceptable: RT @_bughunter: Another 403 Bypass ???????????? PUT /shell.php ==> 403 GET /shell.php -H "X-Method-Override: PUT" ==> 200 Then setup your listene… -- 406NtAcceptable
ABFilipczak: RT @_Vault_Security: A single Steam inventory was robbed of an estimated $2,000,000 USD worth of CS:GO skins, and some of the items have al… -- ABFilipczak
CyberSecPlace: RT @_Vault_Security: Meet the Administrators of the RSOCKS Proxy Botnet https://t.co/ML3TmHNg2b #botnet #CyberSecurity #CybercrimeAwarenes… -- CyberSecPlace
CyberSecurityN8: RT @empressbat: #cybercrime Mitel VoIP Zero-Day exploited in Likely #Ransomware Attack https://t.co/lPTmS1nMrA via @TheHackersNews -- CyberSecurityN8
empressbat: #cybercrime Mitel VoIP Zero-Day exploited in Likely #Ransomware Attack https://t.co/lPTmS1nMrA via @TheHackersNews -- empressbat
NarvaPolice: RT @CyberCrimePSCyb: Cybercrime can also be classified as crime against the Government. If you're a victim dial 1930 or report https://t.… -- NarvaPolice
NishaPa50624701: RT @Nyksindia: In which year has hacking become a practical crime and a matter of concern in the field of cyber technology? #security #cyb… -- NishaPa50624701
NishaPa50624701: RT @Nyksindia: On average, only 5% of companies' folders are properly protected. Data is the most powerful and vulnerable currency in today… -- NishaPa50624701
NishaPa50624701: RT @Nyksindia: Protecting your online profile is a part of digital security. Simultaneously, cyber security protects entire networks, compu… -- NishaPa50624701
PahadishareefPS: RT @CyberCrimePSCyb: Cybercrime can also be classified as crime against the Government. If you're a victim dial 1930 or report https://t.… -- PahadishareefPS
PahadishareefPS: RT @TelanganaCOPs: #TSPolice stood 1st position in #Hackathon & Cyber Challenge-2022 organized by NCRB and CPF in the category of New IT Ap… -- PahadishareefPS
RVanhoi: RT @Nyksindia: In which year has hacking become a practical crime and a matter of concern in the field of cyber technology? #security #cyb… -- RVanhoi
sectest9: RT @empressbat: #cybercrime Mitel VoIP Zero-Day exploited in Likely #Ransomware Attack https://t.co/lPTmS1nMrA via @TheHackersNews -- sectest9
SWATISH78174526: RT @Nyksindia: Protecting your online profile is a part of digital security. Simultaneously, cyber security protects entire networks, compu… -- SWATISH78174526
war_daddyy: RT @steiner254: A 403 Bypass PUT /shell.php ==> 403 GET /shell.php -H "X-Method-Override: PUT" ==> 200 Then setup your listener and requ… -- war_daddyy
406NtAcceptable: RT @zapstiko: Hakluke’s Guide to Nmap — Port Scanning is Just The Beginning by @hakluke #nmap #recon #bugbounty #bugbountytip https://t.co/… -- 406NtAcceptable
406NtAcceptable: RT @Flag_C0: This is how I found 1800$ Store XSS ????‍♀️ 1) type <script>alert(0);</script>lollol 2) < and > output is escaped 3) Visit the en… -- 406NtAcceptable
406NtAcceptable: RT @_bughunter: XSSRF ???????????? A Toolkit to detect and keep track on Blind XSS, XXE & SSRF https://t.co/EQzZyrdtJ4 #bugbountytips #bugbountytip… -- 406NtAcceptable
AnonVXR: RT @DailyDarkWeb: Indonesia ????????-PT Astra Honda Motor hacked by Vice Society #Ransomware Astra Honda Motor is a manufacturing company that… -- AnonVXR
beefyspace: RT @Patrici88706825: ⛔️PHISHING ALERT gangtraff.|com/ Redirect Scam ads https://t.co/9IruEo8BFh #phishing #opendir #scam #scum #fraud @malw… -- beefyspace
beefyspace: RT @ecarlesi: Possible threat on hxxps://thecoderhub[.]com/indexfairs[.]zip #phishing #opendir #godaddy https://t.co/DDJyEmPp2w -- beefyspace
CyberSecurityN8: RT @MrRkpatel: Subdomain Enumeration and Technics..... #bugbountytips #cybersecurity #bugbounty #ethicalhacking https://t.co/0ejn7TwbcW -- CyberSecurityN8
CyberSecurityN8: RT @DailyDarkWeb: Indonesia ????????-PT Astra Honda Motor hacked by Vice Society #Ransomware Astra Honda Motor is a manufacturing company that… -- CyberSecurityN8
ecarlesi: Possible threat on hxxps://thecoderhub[.]com/indexfairs[.]zip #phishing #opendir #godaddy https://t.co/DDJyEmPp2w -- ecarlesi
gd101spr3: RT @steiner254: A 403 Bypass PUT /shell.php ==> 403 GET /shell.php -H "X-Method-Override: PUT" ==> 200 Then setup your listener and requ… -- gd101spr3
gokuKaioKen_: RT @Hakin9: PSRansom - PowerShell Ransomware Simulator with C2 Server https://t.co/1AGcslUqMS #infosec #cybersecurity #redteam #pentest #… -- gokuKaioKen_
JAX_MASTERS: RT @_bughunter: Another 403 Bypass ???????????? PUT /shell.php ==> 403 GET /shell.php -H "X-Method-Override: PUT" ==> 200 Then setup your listene… -- JAX_MASTERS
JAX_MASTERS: RT @_bughunter: XSSRF ???????????? A Toolkit to detect and keep track on Blind XSS, XXE & SSRF https://t.co/EQzZyrdtJ4 #bugbountytips #bugbountytip… -- JAX_MASTERS
Jpkenessy: RT @NandanLohitaksh: ALL IN ONE Hacking Tool For Hackers https://t.co/kWXfHIGsA1 #cybersecurity #infosec #bugbounty #bugbountytips https… -- Jpkenessy
networkmidlands: Held to ransom: why Cyber Security should be top of the business agenda. The Telegraph Business section… https://t.co/fdXmb1QBm9 -- networkmidlands
PCDUE: ????[RANSOMWARE] Stress levels mount for security leaders and #SecOps #ransomware #infosecurity #cybersecurity https://t.co/A2rtbkd48J -- PCDUE
phishunt_io: RT @Patrici88706825: ⛔️PHISHING ALERT gangtraff.|com/ Redirect Scam ads https://t.co/9IruEo8BFh #phishing #opendir #scam #scum #fraud @malw… -- phishunt_io
rum4is: RT @MrRkpatel: Subdomain Enumeration and Technics..... #bugbountytips #cybersecurity #bugbounty #ethicalhacking https://t.co/0ejn7TwbcW -- rum4is
rum4is: RT @CSAnewsportal: Taking a Leap Forward in Cybersecurity With Defend Forward #cybersecurity #cloud #ransomware #threat @cybereason @pldt… -- rum4is
sectest9: RT @MrRkpatel: Subdomain Enumeration and Technics..... #bugbountytips #cybersecurity #bugbounty #ethicalhacking https://t.co/0ejn7TwbcW -- sectest9
sectest9: RT @DailyDarkWeb: Indonesia ????????-PT Astra Honda Motor hacked by Vice Society #Ransomware Astra Honda Motor is a manufacturing company that… -- sectest9
tudouyavip: RT @_bughunter: Another 403 Bypass ???????????? PUT /shell.php ==> 403 GET /shell.php -H "X-Method-Override: PUT" ==> 200 Then setup your listene… -- tudouyavip
tudouyavip: RT @NandanLohitaksh: ALL IN ONE Hacking Tool For Hackers https://t.co/kWXfHIGsA1 #cybersecurity #infosec #bugbounty #bugbountytips https… -- tudouyavip
tudouyavip: RT @GodfatherOrwa: Big Bug bounty Tip To Find Collection Of Bugs #bugbountytip #bugbountytips #BugBounty https://t.co/5tjCeqKcT4 -- tudouyavip
___xscd: RT @DailyDarkWeb: Indonesia ????????-PT Astra Honda Motor hacked by Vice Society #Ransomware Astra Honda Motor is a manufacturing company that… -- ___xscd
adulau: RT @MISPProject: We (@Iglocska @adulau @mokaddem_sami @rafi0t) will be at @FIRSTdotOrg #firstcon22 - join one of our sessions about MISP o… -- adulau
circl_lu: RT @MISPProject: We (@Iglocska @adulau @mokaddem_sami @rafi0t) will be at @FIRSTdotOrg #firstcon22 - join one of our sessions about MISP o… -- circl_lu
CyberSecurityN8: RT @CyberIQs_: NSA Issued an Advisory for System Administrators to #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #… -- CyberSecurityN8
CyberSecurityN8: RT @PCDUE: ????[RANSOMWARE] Stress levels mount for security leaders and #SecOps #ransomware #infosecurity #cybersecurity https://t.co/A2rtbk… -- CyberSecurityN8
DailyDarkWeb: SA ???????? - Bahra Advanced Cable Manufacture hacked by LV #Ransomware Bahra Electric Group is a pioneer in electrical… https://t.co/9uG0Fxxl9V -- DailyDarkWeb
earlyhominid_lj: #WalterReport #OSINT #OSINTUkraine Listen to the voices of #Ukrainians and their global supporters. It's another d… https://t.co/PeyfVyoBUX -- earlyhominid_lj
Iglocska: RT @MISPProject: We (@Iglocska @adulau @mokaddem_sami @rafi0t) will be at @FIRSTdotOrg #firstcon22 - join one of our sessions about MISP o… -- Iglocska
Kostian_V: RT @pmakela1: Russian Steregushchiy-class corvette Mercury, that is on sea trials has reached Baltiysk, Kaliningrad. Mercury was intended… -- Kostian_V
MISPProject: We (@Iglocska @adulau @mokaddem_sami @rafi0t) will be at @FIRSTdotOrg #firstcon22 - join one of our sessions about… https://t.co/DNd5u6L4JA -- MISPProject
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 with SSH version "SSH-2.0-OpenSSH_7.4" on UTC 2022-06-25 07… https://t.co/qUtzCtLLQU -- OpenHoneypot
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 trying to login with account "admin" and password "admin200… https://t.co/WIOCiF659s -- OpenHoneypot
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 on UTC 2022-06-25 07:53:45.106156. #ThreatIntelligence -- OpenHoneypot
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 trying to login with account "daemon" and password "123456"… https://t.co/PPdH2fg1af -- OpenHoneypot
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 on UTC 2022-06-25 07:46:44.444545. #ThreatIntelligence -- OpenHoneypot
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 with SSH version "SSH-2.0-libssh_0.9.6" on UTC 2022-06-25 07… https://t.co/f67yQVqwt9 -- OpenHoneypot
ptolemee74: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- ptolemee74
rum4is: RT @BranhamRoen: How A Threat Actor Stole 1 Million #Facebook Credentials In 4 Months | #Phishing Tactics And #CyberSecurity. WATCH FULL EP… -- rum4is
salvot80: RT @DailyOsint: If you want to collect email addresses as you are surfing on the Internet You can use Email extract. It provides you to li… -- salvot80
SANSEMEA: Are you looking to transform your workforce into #CyberAdvocates? SANS #CyberSecurity Awareness Month Toolkit pro… https://t.co/wLNTsOi5EM -- SANSEMEA
sectest9: RT @PCDUE: ????[RANSOMWARE] Stress levels mount for security leaders and #SecOps #ransomware #infosecurity #cybersecurity https://t.co/A2rtbk… -- sectest9
sectest9: RT @CyberIQs_: NSA Issued an Advisory for System Administrators to #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #… -- sectest9
SomeGumul: RT @Techjournalisto: A video posted last week by a pro-rus TG channel claimed that a "firing at a civilian car" took place "in Mariupol", t… -- SomeGumul
Abee_john: RT @three_cube: OSINT: Google Hacks and Dorks to Find Key Information on the Target #osint #google #googlehacks #googledorks #infosec #Cybe… -- Abee_john
bartelds: RT @CovertShores: ***UPDATE*** #Russian Navy SLAVA class cruiser at Tartus, Syria, today. Major part of Russian Navy's increased presence… -- bartelds
bartelds: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- bartelds
beefyspace: RT @earegun: KBC Groupe : New KBC CyberSecure Insurance offers extensive cover against common cyber risks | #phishing | #scams #earegun Ne… -- beefyspace
brentdsadler: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- brentdsadler
df_works: An interesting case demonstrating reputational damage caused by a poorly resourced aggressor and how concurrent… https://t.co/kYBBm4e6cf -- df_works
ecarlesi: Possible threat on hxxp://cpam-assurance-vitale[.]com #phishing #godaddy https://t.co/GtnkJwezGX -- ecarlesi
ecarlesi: Possible threat on hxxps://securelnfo[.]com #phishing #gandibar -- ecarlesi
ecarlesi: Possible threat on hxxp://cpam-assurance-vitale[.]com #phishing #godaddy https://t.co/GrT6JsY2A1 -- ecarlesi
ecarlesi: Threat on hxxp://aib-user[.]com/Alert[.]php #phishing #aibireland -- ecarlesi
ecarlesi: Threat on hxxps://inc7f-securejp[.]com/ #phishing #chase #godaddy https://t.co/3Qw6vkmvhp -- ecarlesi
ecarlesi: Possible threat on hxxps://my-eeaccount[.]com #phishing -- ecarlesi
ecarlesi: Possible threat on hxxp://swoundsound[.]com #phishing #facebook #asciotech https://t.co/tdzGoLZ6NR -- ecarlesi
ecarlesi: Possible threat on hxxp://swoundsound[.]com #phishing #facebook #asciotech https://t.co/QIHYGr4Kgt -- ecarlesi
ecarlesi: Threat on hxxp://aib-user[.]com/ #phishing #aibireland https://t.co/gXVQqrq59X -- ecarlesi
HenryH40333695: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- HenryH40333695
JEMPradio: String Cheese Incident - Eyes Of The World (8-1-10) #Phish #JEMPRadio #CommunityRadio #NowPlaying https://t.co/Bz9yNRAZtE -- JEMPradio
JEMPradio: Phish - Weigh (8-31-21) #Phish #JEMPRadio #CommunityRadio #NowPlaying https://t.co/Bz9yNRAZtE -- JEMPradio
OcenOjungu: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- OcenOjungu
rum4is: RT @culmor: #cybersecurity news : the week that was???? #ie11 #apis #phishing #patchtuesday #culmor https://t.co/q1F0EzVwZQ -- rum4is
SecurityXTV: RT @_Vault_Security: The Emotet malware has returned to deploying an SMB spreader module to allow it to move laterally across an infected n… -- SecurityXTV
sonalkhanna365: RT @secure_blink: Multiple ISP facilitates Italian #spyware vendor to target users of #Android & iOS across #Italy & #Kazakhstan implementi… -- sonalkhanna365
threat_404: RT @CovertShores: ***OSINT*** 2 ships, likely #Russian Navy, operating east of Snake Island, close to where warships Moskva and Vasily Bek… -- threat_404
threat_404: RT @ClareOnTheRun: Where was I last night? ????????‍♀️ #OSINT https://t.co/YUZ1IKe7V6 -- threat_404
threat_404: RT @UKikaski: MUST SEE! Extremely gripping video of the RUSAF IL-76 flying while on fire and crashing in the city of #Ryazan, Russia. #OSI… -- threat_404
CSA_DVillamizar: Keep your laptop safe from #malware, #hackers and Mother Nature; these #Microsoft tips will …… https://t.co/bUmTjo82ZD -- CSA_DVillamizar
CyberDFIR: RT @CyberIQs_: NSA Issued an Advisory for System Administrators to #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #… -- CyberDFIR
CyberSecurityN8: RT @CSA_DVillamizar: Keep your laptop safe from #malware, #hackers and Mother Nature; these #Microsoft tips will … https://t.co/GmmE4J35VU… -- CyberSecurityN8
cybsecbot: RT @CyberIQs_: NSA Issued an Advisory for System Administrators to #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #… -- cybsecbot
ImNickHuber: RT @Grepnetics: Password Cracking Techniques #DataSecurity #Privacy #100DaysOfCode #Cloud #Security #MachineLearning #Phishing #Ransomware… -- ImNickHuber
IPhelp_SOC: RT @c9lab_soc: Malicious IP targeting Cisco ASA: 185.7.214[.]104 14 hits in the last 1 hr. #cybersecurity #cyberattacks #malware @TalosSecu… -- IPhelp_SOC
JAX_MASTERS: RT @re_and_more: RE tip of the day: To debug the shellcode, instead of creating an executable out of it, its code can be copy-pasted over t… -- JAX_MASTERS
re_and_more: RE tip of the day: To debug the shellcode, instead of creating an executable out of it, its code can be copy-pasted… https://t.co/8jgxo3RIKB -- re_and_more
rum4is: RT @RcHacker12: My new YouTube video (link in bio) #cybersecurity #hacking #linux #ethicalhacking #technology #programing #python #tech #… -- rum4is
rum4is: RT @IdcitT: Bachelors of Vocation (B.Voc) in Cyber Crime ADMISSIONS STARTED !!! Enroll Now !! #admissionopen #collegelife #degree #admissio… -- rum4is
Sec_Cyber: Keep your laptop safe from #malware, #hackers and Mother Nature; these #Microsoft tips will … https://t.co/MYU4SUKoZB -- Sec_Cyber
sectest9: RT @CSA_DVillamizar: Keep your laptop safe from #malware, #hackers and Mother Nature; these #Microsoft tips will … https://t.co/GmmE4J35VU… -- sectest9
socindustry: RT @D3LabIT: ???? Again they are spreading a malicious App through official stores and #phishing against Nexi users! ➡️ Google Play Store: ht… -- socindustry
a7mad_7m7: RT @GodfatherOrwa: Big Bug bounty Tip To Find Collection Of Bugs #bugbountytip #bugbountytips #BugBounty https://t.co/5tjCeqKcT4 -- a7mad_7m7
avijneyam: RT @GodfatherOrwa: Big Bug bounty Tip To Find Collection Of Bugs #bugbountytip #bugbountytips #BugBounty https://t.co/5tjCeqKcT4 -- avijneyam
beefyspace: RT @twelvesec: #Magecart #cyberattacks are still around but are more difficult to detect. #CyberSecurity #infosec #cybercrime https://t.co/… -- beefyspace
beefyspace: RT @LanceSchukies: QNAP NAS devices targeted by surge of eCh0raix ransomware attacks #cybersecurity #infosec #hacker #cyberattack #phishin… -- beefyspace
CyberSecPlace: RT @TripwireInc: Fraudsters are using increasingly elaborate grooming techniques, and they are getting more common. @curiousshrink explain… -- CyberSecPlace
CyberSecurityN8: RT @twelvesec: #Magecart #cyberattacks are still around but are more difficult to detect. #CyberSecurity #infosec #cybercrime https://t.co/… -- CyberSecurityN8
CyberSecurityN8: RT @expankita: Are you a bug bounty hunter? What's one thing that you like and dislike about crowdsourced security platforms out there.… -- CyberSecurityN8
cybsecbot: In the past 24 hours, 2969 IoC's were submitted and #Emotet is the most seen #malware family on abuse[.]ch -- cybsecbot
Diabawiii: RT @GodfatherOrwa: Big Bug bounty Tip To Find Collection Of Bugs #bugbountytip #bugbountytips #BugBounty https://t.co/5tjCeqKcT4 -- Diabawiii
expankita: Are you a bug bounty hunter? What's one thing that you like and dislike about crowdsourced security platforms out… https://t.co/r176P2XACG -- expankita
Giri_jee18: RT @ACPAshishKumar: Dear twitter Friends!! If anyone is contacting you on #Facebook & asking money in due to urgency with promise to retur… -- Giri_jee18
iasava: RT @rohanpaul_ai: 280+ #MachineLearning Projects Solved & Explained #Python https://t.co/MLBQu2OH64 #IoT #100DaysOfCode #programming #Code… -- iasava
kudazimbabwe1: RT @NandanLohitaksh: ALL IN ONE Hacking Tool For Hackers https://t.co/kWXfHIGsA1 #cybersecurity #infosec #bugbounty #bugbountytips https… -- kudazimbabwe1
marroquin__jose: RT @Hakin9: PSRansom - PowerShell Ransomware Simulator with C2 Server https://t.co/1AGcslUqMS #infosec #cybersecurity #redteam #pentest #… -- marroquin__jose
princej_76: RT @_bughunter: Another 403 Bypass ???????????? PUT /shell.php ==> 403 GET /shell.php -H "X-Method-Override: PUT" ==> 200 Then setup your listene… -- princej_76
Ramji_lll: RT @NandanLohitaksh: ALL IN ONE Hacking Tool For Hackers https://t.co/kWXfHIGsA1 #cybersecurity #infosec #bugbounty #bugbountytips https… -- Ramji_lll
rum4is: RT @LanceSchukies: Week in review: Microsoft fixes Follina, cybersecurity pros quitting, (IN)SECURE Magazine RSAC 2022 - #cybersecurity #… -- rum4is
sectest9: RT @twelvesec: #Magecart #cyberattacks are still around but are more difficult to detect. #CyberSecurity #infosec #cybercrime https://t.co/… -- sectest9
sectest9: RT @expankita: Are you a bug bounty hunter? What's one thing that you like and dislike about crowdsourced security platforms out there.… -- sectest9
T369th: RT @Flag_C0: This is how I found a P2 by easy way ????‍♀️ 1) try https://domain/domain.zip 2) sometimes you can get source leak 3) Boom! #bugb… -- T369th
Teegrra: RT @_bughunter: Another 403 Bypass ???????????? PUT /shell.php ==> 403 GET /shell.php -H "X-Method-Override: PUT" ==> 200 Then setup your listene… -- Teegrra
TripwireInc: Fraudsters are using increasingly elaborate grooming techniques, and they are getting more common. @curiousshrink… https://t.co/GZ26MW1bUi -- TripwireInc
twelvesec: #Magecart #cyberattacks are still around but are more difficult to detect. #CyberSecurity #infosec #cybercrime… https://t.co/kBg739pdqo -- twelvesec
ub3rm3nsch3: RT @bughunterlabs: Want to grab more domains from your target? @pdiscoveryio has a new awesome tool out! ????TLSX - a TLS grabber ???? Coffee ti… -- ub3rm3nsch3
uday1920: RT @steiner254: A 403 Bypass PUT /shell.php ==> 403 GET /shell.php -H "X-Method-Override: PUT" ==> 200 Then setup your listener and requ… -- uday1920
VarzingV: RT @Nyksindia: Protecting your online profile is a part of digital security. Simultaneously, cyber security protects entire networks, compu… -- VarzingV
VarzingV: RT @Nyksindia: On average, only 5% of companies' folders are properly protected. Data is the most powerful and vulnerable currency in today… -- VarzingV
xaelbot: RT @rohanpaul_ai: 280+ #MachineLearning Projects Solved & Explained #Python https://t.co/MLBQu2OH64 #IoT #100DaysOfCode #programming #Code… -- xaelbot
0x0SojalSec: RT @three_cube: Reverse Engineering Malware, Part 4: Windows Internals #windowsinternals #reversing #dfir #malware #infosec #cyberwarrior… -- 0x0SojalSec
bigalbulescu: RT @three_cube: OSINT: Google Hacks and Dorks to Find Key Information on the Target #osint #google #googlehacks #googledorks #infosec #Cybe… -- bigalbulescu
Capt_Navy: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- Capt_Navy
cyberreport_io: Bectran releases driver’s license verification solution to help businesses mitigate fraud in real-time - Help Net S… https://t.co/unOUfw11e7 -- cyberreport_io
CyberSecPlace: RT @RedFox_App: Beware! Voice #phishing attacks reach all-time high????⚠️ More info about phishing -> https://t.co/ggyeLxOOBt . #infosec #Cyb… -- CyberSecPlace
CyberSecurityN8: RT @DennisLudena: #ransomware is evolving. The defense strategy didn’t change though, so keep your controls/process updated, segment your n… -- CyberSecurityN8
CyberSecurityN8: RT @cyberreport_io: Bectran releases driver’s license verification solution to help businesses mitigate fraud in real-time - Help Net Secur… -- CyberSecurityN8
cybsecbot: RT @CyberIQs_: Create a Custom Integration | Moogsoft Product Videos #infosec #infosecurity #cybersecurity #threatintel #threatintelligence… -- cybsecbot
DennisLudena: #ransomware is evolving. The defense strategy didn’t change though, so keep your controls/process updated, segment… https://t.co/SLbPiVjtKD -- DennisLudena
dez_blanchfield: A conversation with Alexis Crowell, #IoT Marketing Global Lead for Data Platforms Group at Intel… https://t.co/j1xG1dkpcw -- dez_blanchfield
dolbucksl: RT @Hakin9: PSRansom - PowerShell Ransomware Simulator with C2 Server https://t.co/1AGcslUqMS #infosec #cybersecurity #redteam #pentest #… -- dolbucksl
ecarlesi: Possible threat on hxxps://colissimo-info[.]fr #phishing #key_systems https://t.co/JRTG1JjxfW -- ecarlesi
ecarlesi: Possible threat on hxxp://brmttc[.]org #phishing -- ecarlesi
ecarlesi: Possible threat on hxxp://brmttc[.]org #phishing https://t.co/eZxr3jCvCK -- ecarlesi
Faithib29901271: recovery services. Hacking infiltration and recovery of all social media accounts #hackedinstagram #TwitterDown… https://t.co/xalNbgr3EL -- Faithib29901271
Faithib29901271: recovery services. Hacking infiltration and recovery of all social media accounts #hackedinstagram #TwitterDown… https://t.co/L7ZVfr7tIw -- Faithib29901271
Ghongha007: RT @Techjournalisto: A video posted last week by a pro-rus TG channel claimed that a "firing at a civilian car" took place "in Mariupol", t… -- Ghongha007
IMC_USA_West: RT @Hakin9: PSRansom - PowerShell Ransomware Simulator with C2 Server https://t.co/1AGcslUqMS #infosec #cybersecurity #redteam #pentest #… -- IMC_USA_West
jayeshmthakur: RT @RuOilTracker: Daily report for 24 June, 2022 (UTC) 11 tankers sailed from Russian ports. 640,000 tons of crude oil 170,000 tons of oi… -- jayeshmthakur
jayeshmthakur: RT @shayshik: #CyberRes Announces 2022 #CyberResGalaxy Annual Report Findings, reports @CxoMe: | #ThreatHunting #ThreatIntelligence #CyberR… -- jayeshmthakur
jayeshmthakur: RT @shayshik: Now you can get an overview of the global cyber threat landscape with this new report from #CyberResGalaxy. Download it from… -- jayeshmthakur
jayeshmthakur: RT @shayshik: Get the key findings for 2021 from the #CyberResGalaxy Annual Report, via @tahawultech. #ThreatHunting #ThreatIntelligence #… -- jayeshmthakur
JEMPradio: Jimi Hendrix - Castles Made of Sand #Phish #JEMPRadio #CommunityRadio #NowPlaying https://t.co/Bz9yNRAZtE -- JEMPradio
jmarquezpacios: RT @ido_cohen2: ???? DarkFeed Top Targeted Countries May 2022: ???????? USA: 91 ???????? Germany: 18 ???????? UK: 14 ???????? Canada: 9 ???????? Italy: 8 ???????? France: 7 ???????? S… -- jmarquezpacios
JSTweetsBot: RT @RedFox_App: We believe in Full Privacy! Nobody knows who you are. Not even us. ???? No registration required! https://t.co/Vb0UZDv7is . .… -- JSTweetsBot
KaptainLOMA: RT @CovertShores: ***UPDATE*** #Russian Navy SLAVA class cruiser at Tartus, Syria, today. Major part of Russian Navy's increased presence… -- KaptainLOMA
MLSetiawan92: RT @three_cube: OSINT: Google Hacks and Dorks to Find Key Information on the Target #osint #google #googlehacks #googledorks #infosec #Cybe… -- MLSetiawan92
MLSetiawan92: RT @cyb_detective: Sondehub Worldwide map of radiosondes with detailed info (altitude, coordinates, frequency, manufacturer, sonde-type an… -- MLSetiawan92
NewisNewis: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- NewisNewis
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 with SSH version "SSH-2.0-OpenSSH_7.4" on UTC 2022-06-25 05… https://t.co/lcjOSt97D7 -- OpenHoneypot
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 trying to login with account "root" and password "!#$%^&" on… https://t.co/OTtLgpr0s6 -- OpenHoneypot
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 with SSH version "SSH-2.0-libssh_0.9.6" on UTC 2022-06-25 06… https://t.co/8fBy5qg5ce -- OpenHoneypot
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 on UTC 2022-06-25 06:06:04.144561. #ThreatIntelligence -- OpenHoneypot
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 trying to login with account "test" and password "test2004"… https://t.co/1qsK5SswZz -- OpenHoneypot
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 on UTC 2022-06-25 05:48:30.370414. #ThreatIntelligence -- OpenHoneypot
QueenPeace2017: RT @ArielFornari: @RisePDX Vía #DominicanRepublic journalists @edithfebles/@deisy_telesur possibility exists (though it can't be confirmed)… -- QueenPeace2017
reg_snitch: RT @reg_snitch: There have been 1 officer/s register 5 companies in the UK at the postcode WA5 1DA detected in the last 24 hours #OSIN… -- reg_snitch
RuOilTracker: ????????->???????? DEWEY Departed Primorsk with 30,000 tons of oil products for delivery in #Amsterdam, #Netherlands… https://t.co/pCgeVzZTcH -- RuOilTracker
sectest9: RT @DennisLudena: #ransomware is evolving. The defense strategy didn’t change though, so keep your controls/process updated, segment your n… -- sectest9
sectest9: RT @cyberreport_io: Bectran releases driver’s license verification solution to help businesses mitigate fraud in real-time - Help Net Secur… -- sectest9
superstubbs: #Conti #ransomware finally shuts down data leak, negotiation sites https://t.co/k1Flq59kvO -- superstubbs
TheEldenDevos: 2 U.S. army RC-12 guardrails (sigint platforms) up over Lithuania #russia #Ukraine #OSINT #AvGeek https://t.co/XwCSBRvRVj -- TheEldenDevos
TheEldenDevos: Russian special flight squadron Il-96 about to leave Moscow (destination unknown) #russia #Ukraine #OSINT #AvGeek https://t.co/FKCc0s9FoW -- TheEldenDevos
TheMilitaryEngr: RT @OSDefence: Latest Ukraine Update - 22nd to 24th June #RussiaUkraineWar #Russia #Ukraine #OSINT -- TheMilitaryEngr
beefyspace: RT @dez_blanchfield: A conversation with Alexis Crowell, #IoT Marketing Global Lead for Data Platforms Group at Intel https://t.co/Djczqzon… -- beefyspace
beefyspace: RT @CyberIQs_: IOTech Edge XRT 2.0 simplifies the development of #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #ha… -- beefyspace
bernarchevalier: RT @PhishStats: https://t.co/MAuIXRvYiq detected 190 new websites hosting #phishing | new today: 1798 | #infosec #cybersecurity #malware ht… -- bernarchevalier
CyberSecurityN8: RT @dez_blanchfield: A conversation with Alexis Crowell, #IoT Marketing Global Lead for Data Platforms Group at Intel https://t.co/Djczqzon… -- CyberSecurityN8
gdprAI: RT @dez_blanchfield: A conversation with Alexis Crowell, #IoT Marketing Global Lead for Data Platforms Group at Intel https://t.co/Djczqzon… -- gdprAI
jayeshmthakur: RT @CyberIQs_: IOTech Edge XRT 2.0 simplifies the development of #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #ha… -- jayeshmthakur
sectest9: RT @dez_blanchfield: A conversation with Alexis Crowell, #IoT Marketing Global Lead for Data Platforms Group at Intel https://t.co/Djczqzon… -- sectest9
seculyze: Let our security advisors help you make better security decisions! Security is a process, not a single product. ????… https://t.co/pXyofkF1vM -- seculyze
superstubbs: RT @HackRead: ???? An Italian spyware provider received support from several (ISPs) to distribute #spyware on iOS and Android smartphones in K… -- superstubbs
_nikchitalia: RT @KhubraShaik: 5 Important Things You Must Know About CCTV Cameras #cctv #camera #business #security #CCTVcamera #cybercrime #securitycam… -- _nikchitalia
CyberSecurityN8: RT @CyberCrimePSCyb: Cybercrime can also be classified as crime against the Government. If you're a victim dial 1930 or report https://t.… -- CyberSecurityN8
psraidurgam_cyb: RT @CyberCrimePSCyb: Cybercrime can also be classified as crime against the Government. If you're a victim dial 1930 or report https://t.… -- psraidurgam_cyb
RaviCha45270261: RT @DeviPKannan: உஷாரையா உஷாரு | Online App Crime | Cyber Crime | Emotional Crime | 1950 Gramiam | Devi P Kannan | Part - 3 #Zero_Budget… -- RaviCha45270261
sectest9: RT @CyberCrimePSCyb: Cybercrime can also be classified as crime against the Government. If you're a victim dial 1930 or report https://t.… -- sectest9
twelvesec: #ToddyCat, is believed behind a series of attacks targeting #Microsoft Exchange servers of high-profile government… https://t.co/h9VOO399LE -- twelvesec
_nikchitalia: RT @ECCOUNCIL: See where you rank among the top 10 C|EH Masters in the world. Click here to see the ranking: https://t.co/9So0qDyPVk. #ecco… -- _nikchitalia
0x0SojalSec: RT @Hakin9: PSRansom - PowerShell Ransomware Simulator with C2 Server https://t.co/1AGcslUqMS #infosec #cybersecurity #redteam #pentest #… -- 0x0SojalSec
0x0SojalSec: RT @GodfatherOrwa: Big Bug bounty Tip To Find Collection Of Bugs #bugbountytip #bugbountytips #BugBounty https://t.co/5tjCeqKcT4 -- 0x0SojalSec
0x0SojalSec: RT @steiner254: A 403 Bypass PUT /shell.php ==> 403 GET /shell.php -H "X-Method-Override: PUT" ==> 200 Then setup your listener and requ… -- 0x0SojalSec
AlludingAssets: RT @MenstraulM:  Meme Twitter #100DaysOfCode #CodeNewbie #WomenWhoCode #Programming #DataScience #AcademicTwitter #MachineLearning #Serve… -- AlludingAssets
AlludingAssets: RT @WeAreMarahall:  Am I Wrong ???? #NAYEON #Cloud #100Devs #100DaysOfCode #CodeNewbie #WomenWhoCode #Programming #DataScience #AcademicTwitt… -- AlludingAssets
BigHiggy_Siam: RT @Cohesity: Q: What is legacy #backup missing that a #nextgendatamanagement solution provides to counter the #ransomware threat? A: A re… -- BigHiggy_Siam
blu3cloak: Give Me Your Lunch Money: #ransomware Bullies Took $3.56B From Schools In 2021 https://t.co/dJJexCyCnl -- blu3cloak
Corix_JC: RT @CybersecuritySF: According to Cybersecurity Ventures @CybersecuritySF, the current frequency of #ransomware attacks is every 11 seconds… -- Corix_JC
cy83rs30rd: RT @shaif1011: I learnt today that IP addresses can be shortened by dropping the zeroes. Examples: http://1.0.0.1 → http://1.1 http://192.1… -- cy83rs30rd
CyberSecurityN8: RT @Cohesity: Q: What is legacy #backup missing that a #nextgendatamanagement solution provides to counter the #ransomware threat? A: A re… -- CyberSecurityN8
CybersecuritySF: According to Cybersecurity Ventures @CybersecuritySF, the current frequency of #ransomware attacks is every 11 seco… https://t.co/jAfbnTjwWE -- CybersecuritySF
ecarlesi: Possible threat on hxxps://stephevalley[.]buzz/Inv_365%20(2)[.]zip #phishing #opendir https://t.co/zp8OzyQ5bj -- ecarlesi
hackEnews: RT @_bughunter: Another 403 Bypass ???????????? PUT /shell.php ==> 403 GET /shell.php -H "X-Method-Override: PUT" ==> 200 Then setup your listene… -- hackEnews
KickAss101_: RT @_bughunter: Another 403 Bypass ???????????? PUT /shell.php ==> 403 GET /shell.php -H "X-Method-Override: PUT" ==> 200 Then setup your listene… -- KickAss101_
luisdabe: RT @cyb_detective: AllAboutBugBounty Collection of notes about on the most important BugBounty-related topics. Written concisely and succi… -- luisdabe
MarcMalotke: RT @Cohesity: With full data visibility & data usage pattern analysis, you can see what's happening across your entire data domain as seemi… -- MarcMalotke
MrMahile: RT @GodfatherOrwa: Big Bug bounty Tip To Find Collection Of Bugs #bugbountytip #bugbountytips #BugBounty https://t.co/5tjCeqKcT4 -- MrMahile
r3v3ndx: RT @NandanLohitaksh: ALL IN ONE Hacking Tool For Hackers https://t.co/kWXfHIGsA1 #cybersecurity #infosec #bugbounty #bugbountytips https… -- r3v3ndx
SajidIq12636530: RT @ingliguori: #Infographic: #Password Cracking Techniques Via @ingliguori #CyberAttack #cybersecurity #CyberSec #hacking #Security #Hacke… -- SajidIq12636530
sectest9: RT @Cohesity: Q: What is legacy #backup missing that a #nextgendatamanagement solution provides to counter the #ransomware threat? A: A re… -- sectest9
simrotion13: RT @NandanLohitaksh: ALL IN ONE Hacking Tool For Hackers https://t.co/kWXfHIGsA1 #cybersecurity #infosec #bugbounty #bugbountytips https… -- simrotion13
simrotion13: RT @_bughunter: Another 403 Bypass ???????????? PUT /shell.php ==> 403 GET /shell.php -H "X-Method-Override: PUT" ==> 200 Then setup your listene… -- simrotion13
SS_1759J: RT @NandanLohitaksh: ALL IN ONE Hacking Tool For Hackers https://t.co/kWXfHIGsA1 #cybersecurity #infosec #bugbounty #bugbountytips https… -- SS_1759J
sumit_cfe: RT @GodfatherOrwa: Big Bug bounty Tip To Find Collection Of Bugs #bugbountytip #bugbountytips #BugBounty https://t.co/5tjCeqKcT4 -- sumit_cfe
sumit_cfe: RT @steiner254: Two account takeover bugs worth $4300 ???? #bugbountytips #BugBounty #cybersecuritytips https://t.co/MRZdrcNyat -- sumit_cfe
CyberIQs_: How CIOs and CISOs can collaborate for success in the #infosec #infosecurity #cybersecurity #threatintel… https://t.co/I0cstJzVDB -- CyberIQs_
CyberSecurityN8: RT @CyberIQs_: How CIOs and CISOs can collaborate for success in the #infosec #infosecurity #cybersecurity #threatintel #threatintelligence… -- CyberSecurityN8
DanJack45260569: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- DanJack45260569
DanJack45260569: RT @CovertShores: ***UPDATE*** #Russian Navy SLAVA class cruiser at Tartus, Syria, today. Major part of Russian Navy's increased presence… -- DanJack45260569
DavePharrel: Artillery #HIMARS with @cjdrew94 @realbedwyr @walter_report #OSINT #Kherson #Donetsk #Mariupol #Bucha #Ukraine https://t.co/6d3vzQqEYU -- DavePharrel
KenPowe32814384: RT @DailyOsint: Cyber Threat Intelligence mind map https://t.co/TY6kzC7qyV @TribalCISO #CTI #ThreatIntel #OSINT #vulnerability #infosec… -- KenPowe32814384
nightmare378601: RT @Hakin9: PSRansom - PowerShell Ransomware Simulator with C2 Server https://t.co/1AGcslUqMS #infosec #cybersecurity #redteam #pentest #… -- nightmare378601
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 trying to login with account "root" and password "1122334455… https://t.co/EEVDlFKD7Y -- OpenHoneypot
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 with SSH version "SSH-2.0-libssh_0.9.6" on UTC 2022-06-25 03… https://t.co/AvJjywdfKB -- OpenHoneypot
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 on UTC 2022-06-25 03:32:09.850918. #ThreatIntelligence -- OpenHoneypot
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 trying to login with account "user" and password "user2007"… https://t.co/jNw9ca8Rsa -- OpenHoneypot
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 with SSH version "SSH-2.0-libssh_0.9.6" on UTC 2022-06-25 03… https://t.co/k9dJ1jp9BH -- OpenHoneypot
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 trying to login with account "www" and password "www" on UTC… https://t.co/ZLDk47cak4 -- OpenHoneypot
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 trying to login with account "admin" and password "admin200… https://t.co/qgsA9K1tEZ -- OpenHoneypot
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 on UTC 2022-06-25 03:43:13.057448. #ThreatIntelligence -- OpenHoneypot
opsmatters_uk: The latest update for #LimaCharlie includes "Is #cybersecurity sales culture bad for cybersecurity?" and "DFIR Expe… https://t.co/F2iVKKbo7n -- opsmatters_uk
Princexxxii: RT @DavePharrel: Artillery #HIMARS with @cjdrew94 @realbedwyr @walter_report #OSINT #Kherson #Donetsk #Mariupol #Bucha #Ukraine https://t… -- Princexxxii
RDSWEB: RT @three_cube: OSINT: Google Hacks and Dorks to Find Key Information on the Target #osint #google #googlehacks #googledorks #infosec #Cybe… -- RDSWEB
realbedwyr: RT @DavePharrel: Artillery #HIMARS with @cjdrew94 @realbedwyr @walter_report #OSINT #Kherson #Donetsk #Mariupol #Bucha #Ukraine https://t… -- realbedwyr
ThinkLikeTaj: RT @three_cube: OSINT: Google Hacks and Dorks to Find Key Information on the Target #osint #google #googlehacks #googledorks #infosec #Cybe… -- ThinkLikeTaj
TRAGEDE1: RT @three_cube: OSINT: Google Hacks and Dorks to Find Key Information on the Target #osint #google #googlehacks #googledorks #infosec #Cybe… -- TRAGEDE1
WalterSurio: RT @phish_report: #osint challenge: how is this phishing site being distributed to victims? ???? cutt[.]ly/yKbrBO4 ???? https://t.co/fJfP4fP0GC… -- WalterSurio
_nikchitalia: RT @Victools1: Sempre disponsible Am fully available 24/7 #hackerman #linux #kalilinux #programming #security #technology #pentesting #cyb… -- _nikchitalia
0x0SojalSec: RT @three_cube: OSINT: Google Hacks and Dorks to Find Key Information on the Target #osint #google #googlehacks #googledorks #infosec #Cybe… -- 0x0SojalSec
AhmadAjjawi: RT @davidbombal: She hacked me! YouTube video: https://t.co/ax7UNrfPq8 Learn how to set up a phishing campaign with demo. #phishing #hac… -- AhmadAjjawi
ayian: RT @davidbombal: She hacked me! YouTube video: https://t.co/ax7UNrfPq8 Learn how to set up a phishing campaign with demo. #phishing #hac… -- ayian
CertiKAlert: #CommunityAlert ???? We are seeing multiple reports that the @FuckPassNFT Discord server was compromised. #hacked… https://t.co/rp4MIi789p -- CertiKAlert
CSSalesMan: RT @davidbombal: She hacked me! YouTube video: https://t.co/ax7UNrfPq8 Learn how to set up a phishing campaign with demo. #phishing #hac… -- CSSalesMan
CSSalesMan: RT @Victools1: Sempre disponsible Am fully available 24/7 #hackerman #linux #kalilinux #programming #security #technology #pentesting #cyb… -- CSSalesMan
CyberSecPlace: RT @RedFox_App: Today, Protecting yourself from hackers is not a choice .. it's a Must !!..????️???? We can Help!-> https://t.co/Vb0UZDMIa0 #cyb… -- CyberSecPlace
CyberSecPlace: RT @RedFox_App: Millions of users are already victims of identity cyber fraud. ????️???????? Stay Protected! - https://t.co/Vb0UZDvF80 . #cybersecu… -- CyberSecPlace
CyberSecurityN8: RT @LanceSchukies: New phishing attack infects devices with Cobalt Strike #cybersecurity #infosec #hacker #cyberattack #phishing #cybercri… -- CyberSecurityN8
cybsecbot: RT @CyberIQs_: How CIOs and CISOs can collaborate for success in the #infosec #infosecurity #cybersecurity #threatintel #threatintelligence… -- cybsecbot
ecarlesi: Possible threat on hxxps://dsooaxo-index[.]online #phishing https://t.co/DJDVfl3P4t -- ecarlesi
ecarlesi: Threat on hxxp://dashboard-b2mtoken[.]live/ #phishing -- ecarlesi
edisonjsapps: RT @Victools1: Sempre disponsible Am fully available 24/7 #hackerman #linux #kalilinux #programming #security #technology #pentesting #cyb… -- edisonjsapps
irvanababil10: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- irvanababil10
makhnytskyy: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- makhnytskyy
Mason32181200: RT @CertiKAlert: #CommunityAlert ???? We are seeing multiple reports that the @FuckPassNFT Discord server was compromised. #hacked #phishi… -- Mason32181200
RDSWEB: RT @DavePharrel: Artillery #HIMARS with @cjdrew94 @realbedwyr @walter_report #OSINT #Kherson #Donetsk #Mariupol #Bucha #Ukraine https://t… -- RDSWEB
rum4is: RT @LanceSchukies: New phishing attack infects devices with Cobalt Strike #cybersecurity #infosec #hacker #cyberattack #phishing #cybercri… -- rum4is
SchwalmMason: RT @CertiKAlert: #CommunityAlert ???? We are seeing multiple reports that the @FuckPassNFT Discord server was compromised. #hacked #phishi… -- SchwalmMason
sectest9: RT @CyberIQs_: How CIOs and CISOs can collaborate for success in the #infosec #infosecurity #cybersecurity #threatintel #threatintelligence… -- sectest9
sectest9: RT @LanceSchukies: New phishing attack infects devices with Cobalt Strike #cybersecurity #infosec #hacker #cyberattack #phishing #cybercri… -- sectest9
ShimaLocking: RT @CertiKAlert: #CommunityAlert ???? We are seeing multiple reports that the @Wallstcyborgs Discord server was compromised. They have mana… -- ShimaLocking
ShimaLocking: RT @CertiKAlert: #CommunityAlert ???? We are seeing multiple reports that the @FuckPassNFT Discord server was compromised. #hacked #phishi… -- ShimaLocking
StuffStuffInc1: RT @CertiKAlert: #CommunityAlert ???? We are seeing multiple reports that the @FuckPassNFT Discord server was compromised. #hacked #phishi… -- StuffStuffInc1
TheEldenDevos: USAF RC-135 out from Greece to collect intel on Russia #Russia #Ukraine #OSINT #AvGeek https://t.co/emAnT3oqSj -- TheEldenDevos
beefyspace: RT @LanceSchukies: New phishing attack infects devices with Cobalt Strike #cybersecurity #infosec #hacker #cyberattack #phishing #cybercri… -- beefyspace
rum4is: RT @LanceSchukies: Microsoft acknowledges that a Windows 11 update is causing serious connection issues | BetaNews #cybersecurity #infosec… -- rum4is
ADanielHill: RT @davidbombal: Ethical hacker jailed for doing good? YouTube video: https://t.co/uSO7myRRPZ #cyber #hack #hacking #hacker #cybercrime… -- ADanielHill
AnuDubey_: RT @LtGenGurmit: Met Director General of Police Shri @AshokKumar_IPS and senior police officers at Rajbhawan today. Discussed on the poli… -- AnuDubey_
AshokKu57944846: RT @ACPAshishKumar: Dear twitter Friends!! If anyone is contacting you on #Facebook & asking money in due to urgency with promise to retur… -- AshokKu57944846
beefyspace: RT @bvatechninja: Follow this link https://t.co/AauRvn4XLA to our blog to learn all about romance scams! #romancescam #scammers #scamalert… -- beefyspace
bharathrao7979: RT @NandanLohitaksh: ALL IN ONE Hacking Tool For Hackers https://t.co/kWXfHIGsA1 #cybersecurity #infosec #bugbounty #bugbountytips https… -- bharathrao7979
bvatechninja: Follow this link https://t.co/AauRvn4XLA to our blog to learn all about romance scams! #romancescam #scammers… https://t.co/4QGSCQMkFQ -- bvatechninja
Chawla12111: RT @GodfatherOrwa: Big Bug bounty Tip To Find Collection Of Bugs #bugbountytip #bugbountytips #BugBounty https://t.co/5tjCeqKcT4 -- Chawla12111
ChiragAhluwali6: RT @LtGenGurmit: Met Director General of Police Shri @AshokKumar_IPS and senior police officers at Rajbhawan today. Discussed on the poli… -- ChiragAhluwali6
crakout: RT @_bughunter: Another 403 Bypass ???????????? PUT /shell.php ==> 403 GET /shell.php -H "X-Method-Override: PUT" ==> 200 Then setup your listene… -- crakout
CyberDFIR: RT @jawadmomani0: Windows Credential Dumping ~#AppSec #infosec #pentest #appsec #ACL #Database #securitybreach #shodan #Pentesting #CyberS… -- CyberDFIR
CyberDFIR: RT @GetOppos: #Getoppos list down the Best Free Cyber Security Tools 2022! Check out our blog ➡️ https://t.co/lw4I3tQJWR #cybersecurity #s… -- CyberDFIR
CyberDFIR: RT @3ackd0or: Two #goals, one #infrastructure. I know .. I know these are your #customers. what is #Padvish? #Security #0day #BugBounty #vu… -- CyberDFIR
CyberSecurityN8: RT @bvatechninja: Follow this link https://t.co/AauRvn4XLA to our blog to learn all about romance scams! #romancescam #scammers #scamalert… -- CyberSecurityN8
erdenemunkh: RT @NandanLohitaksh: ALL IN ONE Hacking Tool For Hackers https://t.co/kWXfHIGsA1 #cybersecurity #infosec #bugbounty #bugbountytips https… -- erdenemunkh
Gooner4lif: It seems cybercrime is paying off for cyber criminals ... https://t.co/1DmHnnbtCW #cybercrime #America #American… https://t.co/08Pb7YCipZ -- Gooner4lif
JesaDuran: RT @cyber_every: The secrets and risks behind the mysterious place of the online world. https://t.co/eSijk2ytFS #smallbusiness #smallbusin… -- JesaDuran
Manuel_Bx: RT @NandanLohitaksh: ALL IN ONE Hacking Tool For Hackers https://t.co/kWXfHIGsA1 #cybersecurity #infosec #bugbounty #bugbountytips https… -- Manuel_Bx
MedPyDev: RT @_bughunter: XSSRF ???????????? A Toolkit to detect and keep track on Blind XSS, XXE & SSRF https://t.co/EQzZyrdtJ4 #bugbountytips #bugbountytip… -- MedPyDev
NicoHmayer: RT @_bughunter: XSSRF ???????????? A Toolkit to detect and keep track on Blind XSS, XXE & SSRF https://t.co/EQzZyrdtJ4 #bugbountytips #bugbountytip… -- NicoHmayer
RajeshK39907689: RT @LtGenGurmit: Met Director General of Police Shri @AshokKumar_IPS and senior police officers at Rajbhawan today. Discussed on the poli… -- RajeshK39907689
Ryan_Jarv: RT @DhiyaneshDK: Here is my detailed blog post on AWS Misconfigurations: Deep Dive into AWS Cloud Security ???? #bugbounty #infosec #AWS #c… -- Ryan_Jarv
SankalpaBaral9: RT @Flag_C0: This is how I found a P2 by easy way ????‍♀️ 1) try https://domain/domain.zip 2) sometimes you can get source leak 3) Boom! #bugb… -- SankalpaBaral9
sectest9: RT @tadvaips: #cybercrime.awarness https://t.co/ihwfUcq2Ql -- sectest9
sectest9: RT @bvatechninja: Follow this link https://t.co/AauRvn4XLA to our blog to learn all about romance scams! #romancescam #scammers #scamalert… -- sectest9
shuklaa993: RT @LtGenGurmit: Met Director General of Police Shri @AshokKumar_IPS and senior police officers at Rajbhawan today. Discussed on the poli… -- shuklaa993
steiner254: An Out Of Scope domain Leads To a Critical Bug[$1500] #BugBounty #bugbountytips #CyberSecurity https://t.co/6C6iES82xM -- steiner254
testmuhe: RT @GodfatherOrwa: Big Bug bounty Tip To Find Collection Of Bugs #bugbountytip #bugbountytips #BugBounty https://t.co/5tjCeqKcT4 -- testmuhe
uttarakhandcops: RT @AshokKumar_IPS: Called on Hon'ble Governor of Uttarakhand Lt. Gen. Gurmit Singh (Retd) at Raj Bhawan today. We discussed the various… -- uttarakhandcops
beefyspace: RT @ecarlesi: Possible threat on hxxp://sxsbs[.]live/u55[.]zip #phishing #opendir #nc https://t.co/uChUs0i4ZY -- beefyspace
beefyspace: RT @ecarlesi: Possible threat on hxxps://bethuinong[.]com/QLBanHangOnline[.]zip #phishing #opendir #hostinger -- beefyspace
CyberSecurityN8: RT @threatshub: ThreatsHub Cybersecurity News | More than $100m in cryptocurrency stolen from blockchain biz - https://t.co/WaWRP4B7U7 #Cyb… -- CyberSecurityN8
Data_Forever: RT @techniquesOsint: ????????????????????????: Website for Facebook leak data on dark web was down for a while, its UP again. Check it out TOR link: https:/… -- Data_Forever
debbiewhite252: RT @UKikaski: MUST SEE! Extremely gripping video of the RUSAF IL-76 flying while on fire and crashing in the city of #Ryazan, Russia. #OSI… -- debbiewhite252
ecarlesi: Possible threat on hxxp://sxsbs[.]live/u55[.]zip #phishing #opendir #nc https://t.co/uChUs0i4ZY -- ecarlesi
fe_tsoc: RT @Patrici88706825: ⛔️PHISHING ALERT gangtraff.|com/ Redirect Scam ads https://t.co/9IruEo8BFh #phishing #opendir #scam #scum #fraud @malw… -- fe_tsoc
GaryCatterall: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- GaryCatterall
goaudax: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- goaudax
janicefrye0846: RT @MMBrussell: @FPWellman @janicefrye0846 Alito, actually. Habit of his when doing coordinated testruns. Thomas, they’ve already set him u… -- janicefrye0846
JFIFUDHDVHDJZUH: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- JFIFUDHDVHDJZUH
Len93408520: RT @acurbelo: My Memorial Weekend Readings! #Ransomware https://t.co/XWankW3XDH -- Len93408520
mdfaridulalam: RT @CheckPointSW: An anonymous researcher decided to hack the #conti #ransomware group and leaked the details of one of their operations, g… -- mdfaridulalam
mdfaridulalam: RT @CheckPointSW: 90% of financial institutions are believed to have been hit with #ransomware. Get insights to keep your organization secu… -- mdfaridulalam
OfficerEnclave: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- OfficerEnclave
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 on UTC 2022-06-25 01:51:56.561047. #ThreatIntelligence -- OpenHoneypot
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 trying to login with account "nginx" and password "nginx" on… https://t.co/BP7GkubQJC -- OpenHoneypot
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 with SSH version "SSH-2.0-libssh_0.9.6" on UTC 2022-06-25 01… https://t.co/rjDv9tO443 -- OpenHoneypot
PANDA17Patriote: RT @lobsterlarryliu: The satellite via @planet suspected to have captured several PLA 052c ships #OSINT https://t.co/Vno4nMhOXX -- PANDA17Patriote
Patrici88706825: ⛔️PHISHING ALERT gangtraff.|com/ Redirect Scam ads https://t.co/9IruEo8BFh #phishing #opendir #scam #scum #fraud… https://t.co/iSWpwxFELX -- Patrici88706825
rum4is: RT @YorickReintjens: Atlassian Confluence Flaw Being Used to Deploy Ransomware and Crypto Miners https://t.co/vi5fBD4eyx #crypto #CyberSecu… -- rum4is
sectest9: RT @threatshub: ThreatsHub Cybersecurity News | More than $100m in cryptocurrency stolen from blockchain biz - https://t.co/WaWRP4B7U7 #Cyb… -- sectest9
shayshik: #CyberResGalaxy's threat research team provides insights into the business impact of global threats with a new repo… https://t.co/o9OuXoelM4 -- shayshik
shayshik: Get the key findings for 2021 from the #CyberResGalaxy Annual Report, via @tahawultech. #ThreatHunting… https://t.co/wp2ObJROxG -- shayshik
shayshik: Now you can get an overview of the global cyber threat landscape with this new report from #CyberResGalaxy. Downloa… https://t.co/GjaenIsajq -- shayshik
shayshik: #CyberRes Announces 2022 #CyberResGalaxy Annual Report Findings, reports @CxoMe: | #ThreatHunting… https://t.co/SAgmrEKksn -- shayshik
sprint_code: RT @Hakin9: PSRansom - PowerShell Ransomware Simulator with C2 Server https://t.co/1AGcslUqMS #infosec #cybersecurity #redteam #pentest #… -- sprint_code
Techjournalisto: A video posted last week by a pro-rus TG channel claimed that a "firing at a civilian car" took place "in Mariupol"… https://t.co/FME935JtMm -- Techjournalisto
threatshub: ThreatsHub Cybersecurity News | More than $100m in cryptocurrency stolen from blockchain biz -… https://t.co/igKSC7hSoN -- threatshub
ttessks: RT @Cohesity: Q: What is legacy #backup missing that a #nextgendatamanagement solution provides to counter the #ransomware threat? A: A re… -- ttessks
XZPwEDVhHH37i3C: RT @three_cube: OSINT: Google Hacks and Dorks to Find Key Information on the Target #osint #google #googlehacks #googledorks #infosec #Cybe… -- XZPwEDVhHH37i3C
zamundata: RT @three_cube: OSINT: Google Hacks and Dorks to Find Key Information on the Target #osint #google #googlehacks #googledorks #infosec #Cybe… -- zamundata
beefyspace: RT @ChiNetworks: State-Backed Hackers Using Ransomware as a Decoy for Cyber Espionage Attacks https://t.co/9p8YPkC6Fk via @TheHackersNews #… -- beefyspace
ChiNetworks: State-Backed Hackers Using Ransomware as a Decoy for Cyber Espionage Attacks https://t.co/9p8YPkC6Fk via… https://t.co/T3792tF0Yd -- ChiNetworks
ChiNetworks: Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack https://t.co/7ekFI8twNr via @TheHackersNews… https://t.co/NCZTvuzyAL -- ChiNetworks
CyberDFIR: RT @ZippyOps: Diamonds, Golds = Data, Servers. Are they safe? AutomateCIS can audit your servers against CIS Benchmarks & remediate the is… -- CyberDFIR
CyberIQs_: IOTech Edge XRT 2.0 simplifies the development of #infosec #infosecurity #cybersecurity #threatintel… https://t.co/AFRIcDpIlU -- CyberIQs_
CyberSecurityN8: RT @ChiNetworks: State-Backed Hackers Using Ransomware as a Decoy for Cyber Espionage Attacks https://t.co/9p8YPkC6Fk via @TheHackersNews #… -- CyberSecurityN8
CyberSecurityN8: RT @CyberIQs_: IOTech Edge XRT 2.0 simplifies the development of #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #ha… -- CyberSecurityN8
cybsecbot: RT @CyberIQs_: Service item reporting made easy using Freshservice | #infosec #infosecurity #cybersecurity #threatintel #threatintelligence… -- cybsecbot
ecarlesi: Possible threat on hxxp://oecswwn-srcweb[.]fun #phishing -- ecarlesi
ecarlesi: Possible threat on hxxp://appleidmmncd[.]xyz #phishing -- ecarlesi
ecarlesi: Possible threat on hxxp://ujszmmu-cgiapp[.]fun #phishing -- ecarlesi
ecarlesi: Possible threat on hxxp://ujszmmu-cgiapp[.]fun #phishing https://t.co/4n3Z0LNc0U -- ecarlesi
ecarlesi: Possible threat on hxxp://ujszmmu-cgiapp[.]fun #phishing https://t.co/iNpmabipOF -- ecarlesi
ecarlesi: Possible threat on hxxp://dsooaxo-index[.]fun #phishing https://t.co/mcds4RpYlz -- ecarlesi
ecarlesi: Possible threat on hxxps://sxxcqvp-cgiapp[.]fun #phishing -- ecarlesi
harugasumi: RT @romonlyht: https://t.co/yOgsuAv5wH No.2 (another link) Received: from 106.12.207.128; 08:49:02 +0900 hxxp://www[.]maccaserosds[.]sma… -- harugasumi
LfCtdy7: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- LfCtdy7
mdfaridulalam: RT @CheckPointSW: Gil Messing, Check Point Chief of Staff & Head of Global Corporate Communications, discussed how Check Point recently sto… -- mdfaridulalam
mdfaridulalam: Gil Messing, Check Point Chief of Staff & Head of Global Corporate Communications, discussed how Check Point recent… https://t.co/HvCljjNPwF -- mdfaridulalam
Miguel__Angulo: RT @CheckPointSW: Gil Messing, Check Point Chief of Staff & Head of Global Corporate Communications, discussed how Check Point recently sto… -- Miguel__Angulo
romonlyht: https://t.co/yOgsuAv5wH No.2 (another link) Received: from 106.12.207.128; 08:49:02 +0900 hxxp://www[.]maccasero… https://t.co/W272Lhs8bU -- romonlyht
romonlyht: https://t.co/hi3lOGy410 No.1 (another link) Received: from 45.88.40.250; 07:20:24 +0900 hxxps://fancy-king-6c57… https://t.co/1XZ0BPqKhS -- romonlyht
romonlyht: https://t.co/hi3lOGy410 No.1 Received: from 45.76.194.160; 00:52:03 +0900 hxxps://jolly-shape-93a1[.]tktizwz0a60… https://t.co/3DRqrA4AAd -- romonlyht
rum4is: RT @aggala: #technology #innovation #CyberSecurity #CloudComputing #cloudsecurity #ransomware #WFH #malware #cyberattacks #startups #Digita… -- rum4is
SasolojoA: RT @ninjutsu_os: How the #redteam engagement really went down .. #redteaming #Pentesting #pentesting #blueteam #soc #Security #OSCP #pen300… -- SasolojoA
secretcabdriver: RT @secretcabdriver: How many days until Summer Tour? This many. #phish https://t.co/SyJZmeFMw0 -- secretcabdriver
sectest9: RT @ChiNetworks: State-Backed Hackers Using Ransomware as a Decoy for Cyber Espionage Attacks https://t.co/9p8YPkC6Fk via @TheHackersNews #… -- sectest9
sectest9: RT @CyberIQs_: IOTech Edge XRT 2.0 simplifies the development of #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #ha… -- sectest9
100DaysHacking: RT @url54andrew: Day 38 of #100DaysOfHacking Turned in CBBH and actually got the feedback back same day. Impressive! Have 14 days to take… -- 100DaysHacking
3ackd0or: Two #goals, one #infrastructure. I know .. I know these are your #customers. what is #Padvish? #Security #0day… https://t.co/DHnmywnFeR -- 3ackd0or
abdo_7z: RT @Flag_C0: This is how I found a P2 by easy way ????‍♀️ 1) try https://domain/domain.zip 2) sometimes you can get source leak 3) Boom! #bugb… -- abdo_7z
ADanielHill: RT @davidbombal: Ethical hacker jailed for doing good? YouTube video: https://t.co/uSO7myRRPZ #cyber #hack #hacking #hacker #cybercrime… -- ADanielHill
Aminexche: RT @shaif1011: I learnt today that IP addresses can be shortened by dropping the zeroes. Examples: http://1.0.0.1 → http://1.1 http://192.1… -- Aminexche
beefyspace: RT @3ackd0or: Two #goals, one #infrastructure. I know .. I know these are your #customers. what is #Padvish? #Security #0day #BugBounty #vu… -- beefyspace
CyberSecurityN8: RT @SkyNetTools: (WEF - 802.11 Offensive Framework To Automate Attacks for WPA, WEP, Hash Cracking, Bluetooth Hacking & More) - https://t.c… -- CyberSecurityN8
CyberSecurityN8: RT @url54andrew: Day 38 of #100DaysOfHacking Turned in CBBH and actually got the feedback back same day. Impressive! Have 14 days to take… -- CyberSecurityN8
CyberSecurityN8: RT @GetOppos: #Getoppos list down the Best Free Cyber Security Tools 2022! Check out our blog ➡️ https://t.co/lw4I3tQJWR #cybersecurity #s… -- CyberSecurityN8
GetOppos: #Getoppos list down the Best Free Cyber Security Tools 2022! Check out our blog ➡️ https://t.co/lw4I3tQJWR… https://t.co/4GwfQwWXWS -- GetOppos
huntrHacktivity: Cross-site Scripting (XSS) - Stored in https://t.co/vgIosfvOi7 reported by lekhang123lc - Patch:… https://t.co/EksoaURdTC -- huntrHacktivity
huntrHacktivity: Session Fixation in https://t.co/vgIosfvOi7 reported by @ - Patch: https://t.co/OOXNLse0zk https://t.co/sgDrNVw0BR… https://t.co/Ey7aZfyF8P -- huntrHacktivity
jayeshmthakur: RT @ecarlesi: Possible threat on hxxps://rtechmedia[.]online/cms_web_premium[.]zip #phishing #opendir #hostinger https://t.co/fUe17pYtrr -- jayeshmthakur
JockerSafe: RT @NandanLohitaksh: ALL IN ONE Hacking Tool For Hackers https://t.co/kWXfHIGsA1 #cybersecurity #infosec #bugbounty #bugbountytips https… -- JockerSafe
mahen97564961: RT @LtGenGurmit: Met Director General of Police Shri @AshokKumar_IPS and senior police officers at Rajbhawan today. Discussed on the poli… -- mahen97564961
petrizzo: RT @_qu4nt: #Infographic: #Password Cracking Techniques Via @ingliguori #CyberAttack #cybersecurity #CyberSec #hacking #Security #Hackers #… -- petrizzo
rum4is: RT @SkyNetTools: (WEF - 802.11 Offensive Framework To Automate Attacks for WPA, WEP, Hash Cracking, Bluetooth Hacking & More) - https://t.c… -- rum4is
sectest9: RT @SkyNetTools: (WEF - 802.11 Offensive Framework To Automate Attacks for WPA, WEP, Hash Cracking, Bluetooth Hacking & More) - https://t.c… -- sectest9
sectest9: RT @url54andrew: Day 38 of #100DaysOfHacking Turned in CBBH and actually got the feedback back same day. Impressive! Have 14 days to take… -- sectest9
sectest9: RT @GetOppos: #Getoppos list down the Best Free Cyber Security Tools 2022! Check out our blog ➡️ https://t.co/lw4I3tQJWR #cybersecurity #s… -- sectest9
Shuklacyber: RT @RajConsumer: How to keep your “passwords” Safe? #जागोग्राहकजागो #ग्राहक #उपभोक्तामामलेविभाग_राजस्थान #JagoGrahakJago #ConsumerRights #… -- Shuklacyber
TheBugBot: RT @jawadmomani0: Windows Credential Dumping ~#AppSec #infosec #pentest #appsec #ACL #Database #securitybreach #shodan #Pentesting #CyberS… -- TheBugBot
Ujjwalgupta28: RT @Nyksindia: Protecting your online profile is a part of digital security. Simultaneously, cyber security protects entire networks, compu… -- Ujjwalgupta28
Ujjwalgupta28: RT @Nyksindia: On average, only 5% of companies' folders are properly protected. Data is the most powerful and vulnerable currency in today… -- Ujjwalgupta28
YoKoAcc: RT @GodfatherOrwa: Big Bug bounty Tip To Find Collection Of Bugs #bugbountytip #bugbountytips #BugBounty https://t.co/5tjCeqKcT4 -- YoKoAcc
AB_Benitez7: RT @Cohesity: #Ransomware is no longer just an IT challenge. Today’s sophisticated cyber attacks impact our everyday lives. Here's how to… -- AB_Benitez7
careydcooper5: RT @klyraloc: An article from my hand: "Hunting And Gathering Intelligence With Intuition" About using your intuition in Intelligence (OSI… -- careydcooper5
CyberSecurityN8: RT @Cohesity: #Ransomware is no longer just an IT challenge. Today’s sophisticated cyber attacks impact our everyday lives. Here's how to… -- CyberSecurityN8
CyberSecurityN8: RT @cyberreport_io: Edge among other applicants: Who you know https://t.co/z4yyeYdmC5 #cybersecurity #threatintelligence #cybernews https:/… -- CyberSecurityN8
f86d_: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- f86d_
goretsky: RT @TonyAtESET: That $3.5b should have been spent educating students, not paying cybercriminals or dealing with the destruction they cause.… -- goretsky
jtab1641: RT @CovertShores: Thread. #OTD in 4 months of the #Ukraine War. Navy #OSINT Feb 24. World wakes up to invasion. Cruiser Moskva attacks Ukr… -- jtab1641
kyel_perkins: RT @cyberreport_io: Edge among other applicants: Who you know https://t.co/z4yyeYdmC5 #cybersecurity #threatintelligence #cybernews https:/… -- kyel_perkins
mythicfour: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- mythicfour
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 with SSH version "SSH-2.0-libssh_0.9.6" on UTC 2022-06-25 00… https://t.co/5IZze8M94X -- OpenHoneypot
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 trying to login with account "root" and password "root123456… https://t.co/XWRctkaamy -- OpenHoneypot
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 on UTC 2022-06-25 00:09:26.110787. #ThreatIntelligence -- OpenHoneypot
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 trying to login with account "test" and password "test2000"… https://t.co/VRA1gsEY6T -- OpenHoneypot
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 with SSH version "SSH-2.0-OpenSSH_7.4" on UTC 2022-06-25 00… https://t.co/Db7Wda3vEY -- OpenHoneypot
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 on UTC 2022-06-25 00:03:45.047323. #ThreatIntelligence -- OpenHoneypot
OpenHoneypot: An attempt was detected from 185.122.204.38 to port 8022 on UTC 2022-06-24 23:54:23.191720. #ThreatIntelligence -- OpenHoneypot
RedPacketSec: Cobalt Stike Beacon Detected - 43[.]132[.]121[.]67:443 - https://t.co/vmgcmpHRzq #CobaltStrikeBeaconDetected #OSINT #ThreatIntel -- RedPacketSec
RedPacketSec: Cobalt Stike Beacon Detected - 159[.]223[.]177[.]172:8080 - https://t.co/ArVwlbXH26 #CobaltStrikeBeaconDetected #OSINT #ThreatIntel -- RedPacketSec
RedPacketSec: Cobalt Stike Beacon Detected - 101[.]34[.]244[.]114:80 - https://t.co/IJCzzQQMNP #CobaltStrikeBeaconDetected #OSINT #ThreatIntel -- RedPacketSec
RedPacketSec: Cobalt Stike Beacon Detected - 154[.]39[.]240[.]198:443 - https://t.co/AkTt8otNzx #CobaltStrikeBeaconDetected #OSINT #ThreatIntel -- RedPacketSec
RedPacketSec: Cobalt Stike Beacon Detected - 47[.]104[.]148[.]10:443 - https://t.co/IzYHIMXmV2 #CobaltStrikeBeaconDetected #OSINT #ThreatIntel -- RedPacketSec
RedPacketSec: Cobalt Stike Beacon Detected - 18[.]189[.]16[.]21:80 - https://t.co/DW1QgXAPhq #CobaltStrikeBeaconDetected #OSINT #ThreatIntel -- RedPacketSec
RedPacketSec: Cobalt Stike Beacon Detected - 18[.]119[.]101[.]175:443 - https://t.co/eFIvvoUolK #CobaltStrikeBeaconDetected #OSINT #ThreatIntel -- RedPacketSec
rum4is: RT @SSuiteSoftware: Chinese Hackers Exploited Sophos Firewall Zero-Day Flaw to Target South Asian Entity... ????️ ???? ???????? ????️ https://t.co/yRu5Pe… -- rum4is
sectest9: RT @Cohesity: #Ransomware is no longer just an IT challenge. Today’s sophisticated cyber attacks impact our everyday lives. Here's how to… -- sectest9
sectest9: RT @cyberreport_io: Edge among other applicants: Who you know https://t.co/z4yyeYdmC5 #cybersecurity #threatintelligence #cybernews https:/… -- sectest9
TommyTenacious: RT @InnerSec: #OSINT challenge... this one's much easier. Good luck https://t.co/9JzKF0FUxC -- TommyTenacious
Victools1: To Recover locked/lost accounts with ease, DM for all account retrievals.. #gmailhack #gmaildown #hacked #Hacking… https://t.co/Nmp8ddLZLC -- Victools1
beefyspace: RT @ecarlesi: Possible threat on hxxps://classicfilmmusic[.]store #phishing #paypal #namedotcom https://t.co/KprQar7I0q -- beefyspace
beefyspace: RT @ecarlesi: Possible threat on hxxps://classicfilmmusic[.]store #phishing #paypal #namedotcom https://t.co/ZZ6AuVKj0G -- beefyspace
beefyspace: RT @ecarlesi: Possible threat on hxxps://classicfilmmusic[.]store #phishing #paypal #namedotcom https://t.co/ssEvgjo2JT -- beefyspace
beefyspace: RT @ScamiBot: #Trademark #infringement targeting the @Wayfair brand. ⏰ Confirmed active: June 22, 2022 ???? Hosted via: @cloudflare ???? IP addr… -- beefyspace
beefyspace: RT @ecarlesi: Threat on hxxps://carodo-gemes[.]monster/ #phishing #labanquepostale #namesilo -- beefyspace
bvatechninja: Visit our other socials to learn more about this malicious spyware! #google #googleupdates #googlenews #iOS… https://t.co/WscqTqiTnF -- bvatechninja
CyberSecurityN8: RT @Watchdogrk: Know more about Robust Defense of Breach & Attack Simulation! #cyber #cybersecurity #cyberpunk #hacking #security #hacker… -- CyberSecurityN8
CyberSecurityN8: RT @bvatechninja: Visit our other socials to learn more about this malicious spyware! #google #googleupdates #googlenews #iOS #android #spy… -- CyberSecurityN8
CyberSecurityN8: RT @CyberIQs_: ISC Stormcast For Friday, June 17th, 2022 #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hacking #c… -- CyberSecurityN8
cybsecbot: In the past 24 hours, 3509 IoC's were submitted and #Emotet is the most seen #malware family on abuse[.]ch -- cybsecbot
ecarlesi: Possible threat on hxxps://classicfilmmusic[.]store #phishing #paypal #namedotcom https://t.co/KprQar7I0q -- ecarlesi
ecarlesi: Possible threat on hxxps://classicfilmmusic[.]store #phishing #paypal #namedotcom https://t.co/ZZ6AuVKj0G -- ecarlesi
ecarlesi: Possible threat on hxxps://classicfilmmusic[.]store #phishing #paypal #namedotcom https://t.co/ssEvgjo2JT -- ecarlesi
ecarlesi: Possible threat on hxxps://bethuinong[.]com/QLBanHangOnline[.]zip #phishing #opendir #hostinger -- ecarlesi
icorgroupltd: RT @threatpost: The company is warning victims in Italy and Kazakhstan that they have been targeted by the #malware from Italian firm RCS L… -- icorgroupltd
JEMPradio: Phish - Also Sprach Zarathustra (2-21-20) #Phish #JEMPRadio #CommunityRadio #NowPlaying https://t.co/Bz9yNRAZtE -- JEMPradio
kyel_perkins: RT @Watchdogrk: Know more about Robust Defense of Breach & Attack Simulation! #cyber #cybersecurity #cyberpunk #hacking #security #hacker… -- kyel_perkins
MalwarePatrol: Another active #Phishing targeting Wells Fargo URL: hxxp://davidckane.com/login #onpatrol4malware (bot generated) https://t.co/e2dN2XH5SE -- MalwarePatrol
nani_wilson: RT @ecarlesi: Possible threat on hxxps://bethuinong[.]com/QLBanHangOnline[.]zip #phishing #opendir #hostinger -- nani_wilson
rum4is: RT @CyberIQs_: ISC Stormcast For Friday, June 17th, 2022 #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hacking #c… -- rum4is
rum4is: RT @adem_onar: Top 15 Cloud Security Threats v/ @Paula_Piccard #DataSecurity #Privacy #100DaysOfCode #Cloud #Security #MachineLearning #… -- rum4is
Sec_Cyber: Android #malware BRATA wipes your device after stealing data – BleepingComputer https://t.co/JCTVbJtypF -- Sec_Cyber
sectest9: RT @Watchdogrk: Know more about Robust Defense of Breach & Attack Simulation! #cyber #cybersecurity #cyberpunk #hacking #security #hacker… -- sectest9
sectest9: RT @bvatechninja: Visit our other socials to learn more about this malicious spyware! #google #googleupdates #googlenews #iOS #android #spy… -- sectest9
sectest9: RT @CyberIQs_: ISC Stormcast For Friday, June 17th, 2022 #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hacking #c… -- sectest9
Sigma19001: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- Sigma19001
Sigma19001: RT @CovertShores: ***UPDATE*** #Russian Navy SLAVA class cruiser at Tartus, Syria, today. Major part of Russian Navy's increased presence… -- Sigma19001
Ultrascan419: North Carolina doctor indicted for federal fraud - FOX8 WGHP: A U.S. attorney says a North Carolina doctor has been… https://t.co/fspfJNrOfQ -- Ultrascan419
xaelbot: RT @adem_onar: Top 15 Cloud Security Threats v/ @Paula_Piccard #DataSecurity #Privacy #100DaysOfCode #Cloud #Security #MachineLearning #… -- xaelbot
DougBrinkman: #Cybercrime #Cybercriminals are individuals or teams of people who use technology to commit malicious activities on… https://t.co/HvWGMsN2wr -- DougBrinkman
ADanielHill: RT @davidbombal: Ethical hacker jailed for doing good? YouTube video: https://t.co/uSO7myRRPZ #cyber #hack #hacking #hacker #cybercrime… -- ADanielHill
ADanielHill: RT @ADanielHill: Ethical hacker jailed for doing good? @ADanielHill and @davidbombal YouTube video: https://t.co/f1Km7BID5f #cyber #ha… -- ADanielHill
AyhemJamal: RT @GodfatherOrwa: Big Bug bounty Tip To Find Collection Of Bugs #bugbountytip #bugbountytips #BugBounty https://t.co/5tjCeqKcT4 -- AyhemJamal
CyberSecurityN8: RT @Nyksindia: Protecting your online profile is a part of digital security. Simultaneously, cyber security protects entire networks, compu… -- CyberSecurityN8
InfoSecOne: RT @fuxksniper: A small gift from my side to all bug bounty hunters. My 8-hour long burp suite focused course is for free. share to some… -- InfoSecOne
InfoSecOne: RT @NandanLohitaksh: ALL IN ONE Hacking Tool For Hackers https://t.co/kWXfHIGsA1 #cybersecurity #infosec #bugbounty #bugbountytips https… -- InfoSecOne
Kh70401232Moosa: RT @GodfatherOrwa: Big Bug bounty Tip To Find Collection Of Bugs #bugbountytip #bugbountytips #BugBounty https://t.co/5tjCeqKcT4 -- Kh70401232Moosa
m3g9tr0n: RT @intigriti: ???? Bypassing URL validation to get an open redirect or SSRF? 2 years ago, we wrote our 'redirector' tool which will generate… -- m3g9tr0n
mousax7x: RT @GodfatherOrwa: Big Bug bounty Tip To Find Collection Of Bugs #bugbountytip #bugbountytips #BugBounty https://t.co/5tjCeqKcT4 -- mousax7x
nyem_masha: RT @emgeekboy: Now it's possible to use multiple domains with a self-hosted interactsh server from the same machine instead dedicated serve… -- nyem_masha
OscarAbuawad: RT @NandanLohitaksh: ALL IN ONE Hacking Tool For Hackers https://t.co/kWXfHIGsA1 #cybersecurity #infosec #bugbounty #bugbountytips https… -- OscarAbuawad
resenhacyber: RT @resenhacyber: @pdnuclei The best tool! [2021-07-17 17:40:28] [aws-bucket-takeover] [http] [high]….. reported successfully | Congratula… -- resenhacyber
rum4is: RT @Nyksindia: Protecting your online profile is a part of digital security. Simultaneously, cyber security protects entire networks, compu… -- rum4is
sectest9: RT @Nyksindia: Protecting your online profile is a part of digital security. Simultaneously, cyber security protects entire networks, compu… -- sectest9
sour1881: RT @davidbombal: Ethical hacker jailed for doing good? YouTube video: https://t.co/uSO7myRRPZ #cyber #hack #hacking #hacker #cybercrime… -- sour1881
SSkylinearafat: RT @DhiyaneshDK: Here is my detailed blog post on AWS Misconfigurations: Deep Dive into AWS Cloud Security ???? #bugbounty #infosec #AWS #c… -- SSkylinearafat
TheAngularBot: RT @WeAreMarahall:  Am I Wrong ???? #NAYEON #Cloud #100Devs #100DaysOfCode #CodeNewbie #WomenWhoCode #Programming #DataScience #AcademicTwitt… -- TheAngularBot
v3n0m0u5n1p3r: RT @fuxksniper: A small gift from my side to all bug bounty hunters. My 8-hour long burp suite focused course is for free. share to some… -- v3n0m0u5n1p3r
beefyspace: RT @ecarlesi: Possible threat on hxxps://digiassetcards[.]com/codecanyon-33702478-cardlab-prepaid-card-selling-platform[.]zip #phishing #op… -- beefyspace
chancleterou: RT @fuxksniper: A small gift from my side to all bug bounty hunters. My 8-hour long burp suite focused course is for free. share to some… -- chancleterou
CyberSecurityN8: RT @argevise: Visual representation of the techniques/tactics used by the 8 most common #Ransomware groups ???? https://t.co/q3cmJjBjU3… ➡️ #… -- CyberSecurityN8
ecarlesi: Possible threat on hxxps://digiassetcards[.]com/codecanyon-33702478-cardlab-prepaid-card-selling-platform[.]zip #phishing #opendir #nc -- ecarlesi
InkedMermaidIVX: RT @fuxksniper: A small gift from my side to all bug bounty hunters. My 8-hour long burp suite focused course is for free. share to some… -- InkedMermaidIVX
MichaelGouldCRI: The current version of #Emotet still uses many of the same attack vectors, but the new iteration of malware is more… https://t.co/q9vDo5Kp43 -- MichaelGouldCRI
nani_wilson: RT @ecarlesi: Possible threat on hxxps://digiassetcards[.]com/codecanyon-33702478-cardlab-prepaid-card-selling-platform[.]zip #phishing #op… -- nani_wilson
PoleAI: RT @argevise: Visual representation of the techniques/tactics used by the 8 most common #Ransomware groups ???? https://t.co/q3cmJjBjU3… ➡️ #… -- PoleAI
sectest9: RT @argevise: Visual representation of the techniques/tactics used by the 8 most common #Ransomware groups ???? https://t.co/q3cmJjBjU3… ➡️ #… -- sectest9
TeamTrize: RT @NandanLohitaksh: ALL IN ONE Hacking Tool For Hackers https://t.co/kWXfHIGsA1 #cybersecurity #infosec #bugbounty #bugbountytips https… -- TeamTrize
YourAnonRiots: RT @Patrici88706825: ⛔️PHISHING ALERT gursss.|com Redirect balancerfianance.|com https://t.co/NBVme2S0DJ #phishing #opendir #scam #scum #… -- YourAnonRiots
_TomGillis: Some of the strategies used in the pandemic can be applied to the fight against #ransomware attacks. https://t.co/oL22YikVD9 -- _TomGillis
100DaysHacking: RT @DarKiller_das: #100DaysOfHacking Day 8 (24/06/2022) ???? Windows Privilege Escalation (ICE THM Room Continue) ???? HTML Filter Bypasses in… -- 100DaysHacking
BillMew: #Ransomware attacks: Should you pay? Prevention and detection should be your main focus, but what if you get hit… https://t.co/LwmMx3FqpD -- BillMew
byeolfish: RT @lobsterlarryliu: Satellite via @planet show that Russia is fighting a fire on a drilling platform (attacked) in the Black Sea #OSINT #… -- byeolfish
cybsecbot: RT @CyberIQs_: Ransomware groups targeting Mitel VoIP zero-day #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hack… -- cybsecbot
fox194: RT @fiete_stegers: At first glance, Shadowmaps looks like a highly promising shadow simulator for geolocation, as it includes data on build… -- fox194
GeoPioneerInc: Mortar shell blasts kill scrap merchant, child #Pakistan #OSINT https://t.co/zSThN7qx8H -- GeoPioneerInc
HedleyDhedley78: RT @CovertShores: ***UPDATE*** #Russian Navy SLAVA class cruiser at Tartus, Syria, today. Major part of Russian Navy's increased presence… -- HedleyDhedley78
henka119: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- henka119
MarcMalotke: RT @Cohesity: New research commissioned by #Cohesity highlights a lack of collaboration between IT & Security, w/ +50% of respondents stati… -- MarcMalotke
MicroFocusSec: #CyberResGalaxy's threat research team provides insights into the business impact of global threats with a new repo… https://t.co/DPya8Irkcv -- MicroFocusSec
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 with SSH version "SSH-2.0-OpenSSH_7.4" on UTC 2022-06-24 21… https://t.co/qAgi3IJIHi -- OpenHoneypot
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 trying to login with account "root" and password "root2013"… https://t.co/kpIUx50HVf -- OpenHoneypot
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 trying to login with account "root" and password "root2013"… https://t.co/AkVjk9Wz3I -- OpenHoneypot
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 with SSH version "SSH-2.0-OpenSSH_7.4" on UTC 2022-06-24 21… https://t.co/16yZ8mLFz3 -- OpenHoneypot
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 on UTC 2022-06-24 21:58:52.024101. #ThreatIntelligence -- OpenHoneypot
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 on UTC 2022-06-24 21:58:35.181688. #ThreatIntelligence -- OpenHoneypot
OSDefence: Latest Ukraine Update - 22nd to 24th June #RussiaUkraineWar #Russia #Ukraine #OSINT -- OSDefence
RDSWEB: RT @GeoPioneerInc: Mortar shell blasts kill scrap merchant, child #Pakistan #OSINT https://t.co/zSThN7qx8H -- RDSWEB
Rod_Dow: RT @ricohcanada: While investment in #CyberSecurity is expected to increase, existing strategies are lacking. According to a recent report,… -- Rod_Dow
SearchSecurity: ➡Check out this U.S. #ransomware attacks database. https://t.co/nNSYnoFw6A -- SearchSecurity
swisstfrazer: "Mitel VOIP devices are used by critical organizations in various sectors for telephony services and were recently… https://t.co/jURua1uFfE -- swisstfrazer
YourAnonRiots: RT @ido_cohen2: ???? DarkFeed #Ransomware Groups Status: - Conti Down (674 Victims) ???? - Onyx Down (22 Victims) ???? - Haron Down (7 Victims) ????… -- YourAnonRiots
beefyspace: RT @LanceSchukies: CafePress fined $500,000 for breach affecting 23 million users #cybersecurity #infosec #hacker #cyberattack #phishing #… -- beefyspace
beefyspace: RT @VentureBeat: Digital risks are constantly evolving, and #ThreatActors will not hesitate to capitalize on national or global tragedies t… -- beefyspace
Diacentric: Protecting your data starts right now! - - #cybersecurity #diacentric #diacentricsupport #security #technology… https://t.co/kDIGldfJDF -- Diacentric
ecarlesi: Possible threat on hxxp://22dj[.]net #phishing -- ecarlesi
ecarlesi: Possible threat on hxxp://cnrmbxg[.]com #phishing -- ecarlesi
ecarlesi: Possible threat on hxxp://008801[.]com #phishing https://t.co/twXeqEyoPB -- ecarlesi
ecarlesi: Possible threat on hxxp://008801[.]com #phishing -- ecarlesi
grosinoce: RT @crispSV: #Russia 'doomsday' Command and Control plane Tu-214SR RA-64516 leaving #Minsk #Belarus. #NATO #Nuclear #WWIII #Ukraine #US #Ch… -- grosinoce
klyraloc: An article from my hand: "Hunting And Gathering Intelligence With Intuition" About using your intuition in Intelli… https://t.co/LKV5emAuWB -- klyraloc
LanceSchukies: Carnival is fined $5 million by New York for cybersecurity violations | Reuters #cybersecurity #infosec #hacker… https://t.co/XuG7kyiRju -- LanceSchukies
LanceSchukies: Only 3% of Open Source Software Bugs Are Actually Attackable, Researchers Say #cybersecurity #infosec #hacker… https://t.co/mz1I9r9Tz2 -- LanceSchukies
Liorfink: RT @CovertShores: ***UPDATE*** #Russian Navy SLAVA class cruiser at Tartus, Syria, today. Major part of Russian Navy's increased presence… -- Liorfink
martinorob: RT @BushidoToken: ⚠️There has been an uptick ????in the use of @TallyForms (tally[.]so) by #Phishing threat actors 02/22 - used to phish Offi… -- martinorob
melenchonov: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- melenchonov
nani_wilson: RT @ecarlesi: Possible threat on hxxp://008801[.]com #phishing -- nani_wilson
redamron: RT @osintbear: #OSINT How to use GIS for Machine Learning [by Thomas Sitbon via #Medium]: https://t.co/qN7sxJLeNo -- redamron
Securityblog: RT @BushidoToken: ⚠️There has been an uptick ????in the use of @TallyForms (tally[.]so) by #Phishing threat actors 02/22 - used to phish Offi… -- Securityblog
shxkiba: RT @KAlexaKoenig: Back to my California roots :) Thanks to Jeff Schechtman for spotlighting some of the California-based efforts to contrib… -- shxkiba
Ultrascan419: Former Theranos executive Sunny Balwani's fraud trial heads to jury - ABC News: Prosecutors and lawyers for Sunny B… https://t.co/CoKz1Jy36F -- Ultrascan419
Ultrascan419: Summary of Fraud and Abuse Enforcement Yields Insight for Health Care Compliance ... - JD Supra: The following is a… https://t.co/Auy2SefWuG -- Ultrascan419
Ultrascan419: Kiln man gets 30 months for COVID wire fraud - WJTV: GULFPORT, Miss. (WJTV) – A Kiln man was sentenced to 30 months… https://t.co/EB89wGFmfc -- Ultrascan419
xaviervav: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- xaviervav
CyberSecDN: BRATA #malware has evolved to target online banking across Europe, researchers warn https://t.co/2zPM9JkqDN #Sec_Cyber -- CyberSecDN
CyberSecurityN8: RT @CyberIQs_: 2021 Threat Report Webinar #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hacking #cybernews #cyber… -- CyberSecurityN8
CyberSecurityN8: RT @Diacentric: Protecting your data starts right now! - - #cybersecurity #diacentric #diacentricsupport #security #technology #infosec #cy… -- CyberSecurityN8
di993r: RT @CyberIQs_: 2021 Threat Report Webinar #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hacking #cybernews #cyber… -- di993r
JustLikeLupin: RT @Diacentric: Protecting your data starts right now! - - #cybersecurity #diacentric #diacentricsupport #security #technology #infosec #cy… -- JustLikeLupin
LanceSchukies: ToddyCat claws at Asian governments - Security Boulevard #cybersecurity #infosec #hacker #cyberattack #phishing… https://t.co/oMc3Km9zef -- LanceSchukies
rahul05ranjan: RT @Diacentric: Protecting your data starts right now! - - #cybersecurity #diacentric #diacentricsupport #security #technology #infosec #cy… -- rahul05ranjan
sectest9: RT @CyberIQs_: 2021 Threat Report Webinar #infosec #infosecurity #cybersecurity #threatintel #threatintelligence #hacking #cybernews #cyber… -- sectest9
sectest9: RT @Diacentric: Protecting your data starts right now! - - #cybersecurity #diacentric #diacentricsupport #security #technology #infosec #cy… -- sectest9
sectest9: RT @Diacentric: Protecting your data starts right now! - - #cybersecurity #diacentric #diacentricsupport #security #technology #infosec #cy… -- sectest9
BACSIRT: @venusinfurs86 ¡Hola @venusinfurs86 ! Leímos tu tweet y queremos contarte que podés escribirnos por mensaje directo o a través de nuestro correo ???? ciberseguridad@ba-csirt.gob.ar para que te asesoremos sobre ciberseguridad y así puedas resolver -- BACSIRT
CSIRT_Telconet: Múltiples bibliotecas de Python con Backdoors fueron descubiertas robando claves secretas de AWS https://t.co/yQWfLgJ8JC #code #Cybersecurity #Newsletter #Python #AWS #pythoncode https://t.co/UBEfi15j0H -- CSIRT_Telconet
apmurray123: The unrelenting threat of ransomware is pushing cybersecurity workers to quit #IT #CIO #data #bigdata #tech… https://t.co/DKdomk3W4X -- apmurray123
Arthuz8: RT @cyber_every: The secrets and risks behind the mysterious place of the online world. https://t.co/eSijk2ytFS #smallbusiness #smallbusin… -- Arthuz8
beefyspace: RT @LanceSchukies: Phishing Attacks Reached a Record High in the First Quarter of 2022, APWG Report Found - CPO Magazine #cybersecurity #i… -- beefyspace
CMoschovitis: BeanVPN leaks 25 million user records Free VPN software provider… #IT #CIO #data #bigdata #tech #cybersecurity… https://t.co/voWwF5g4s0 -- CMoschovitis
CyberSecurityN8: RT @iCyberFighter: An international law enforcement operation involving 11 countries has resulted in the #takedown of one of the fastest-sp… -- CyberSecurityN8
CyberSecurityN8: RT @LanceSchukies: Phishing Attacks Reached a Record High in the First Quarter of 2022, APWG Report Found - CPO Magazine #cybersecurity #i… -- CyberSecurityN8
CyberSecurityN8: RT @CMoschovitis: BeanVPN leaks 25 million user records Free VPN software provider… #IT #CIO #data #bigdata #tech #cybersecurity #cyberc… -- CyberSecurityN8
Georgeoutah: RT @ingliguori: #Infographic: #Password Cracking Techniques Via @ingliguori #CyberAttack #cybersecurity #CyberSec #hacking #Security #Hacke… -- Georgeoutah
Intel471Inc: RT @CHEN_PR: .@Intel471Inc team recently published research that observed several actors throughout the #cybercrime underground either adve… -- Intel471Inc
oldsix80: RT @CHEN_PR: .@Intel471Inc team recently published research that observed several actors throughout the #cybercrime underground either adve… -- oldsix80
prameshjain12: RT @DCPNEBCP: #NorthEast #Cybercrime police team has arrested 2⃣ #African nationals for committing #cybercrimes using fake sim cards and de… -- prameshjain12
PyScaleLLC: RT @apmurray123: The unrelenting threat of ransomware is pushing cybersecurity workers to quit #IT #CIO #data #bigdata #tech #cybersecuri… -- PyScaleLLC
PyScaleLLC: RT @CMoschovitis: BeanVPN leaks 25 million user records Free VPN software provider… #IT #CIO #data #bigdata #tech #cybersecurity #cyberc… -- PyScaleLLC
Rap_Thesaurus: RT @Detroit_Riddler:  Short Story #100DaysOfCode #CodeNewbie #WomenWhoCode #Programming #DataScience #AcademicTwitter #MachineLearning #Se… -- Rap_Thesaurus
sectest9: RT @CMoschovitis: BeanVPN leaks 25 million user records Free VPN software provider… #IT #CIO #data #bigdata #tech #cybersecurity #cyberc… -- sectest9
_fearless_h: RT @GodfatherOrwa: Big Bug bounty Tip To Find Collection Of Bugs #bugbountytip #bugbountytips #BugBounty https://t.co/5tjCeqKcT4 -- _fearless_h
beefyspace: RT @IRONSCALES: ???? EMOTET malware is typically spread through phishing emails with malicious Microsoft Word or Excel files attached. So how… -- beefyspace
Biapongkering_: RT @akincibor1: I just posted 9 XSS templates for @pdnuclei :) #BugBounty https://t.co/iXlvF07nhM -- Biapongkering_
bttbot: RT @WeAreMarahall:  Warming Up @KIIARA #100DaysOfCode #CodeNewbie #WomenWhoCode #Programming #DataScience #AcademicTwitter #MachineLearni… -- bttbot
change_usernam2: Hello community, should I report a Google api key leak?can be used for geolocation and increase the company cost. I… https://t.co/SSJ9qW1shW -- change_usernam2
CyberSecurityN8: RT @XCriminal_: Happy to secure @Huawei :D Always look for open ports & the services . These are the real jackpots #bugbounty #infosec… -- CyberSecurityN8
CyberSecurityN8: RT @exalbahri: Hi , who know the POC for CVE-2021-44521 Can help me #BugBounty @infosec_90 @_zwink @r00t_nasser #bugbountytips -- CyberSecurityN8
DirectDialcom: Your email is a major source of security risks and it's getting worse https://t.co/Ra6IjTdBeu #Ransomware -- DirectDialcom
ecarlesi: Possible threat on hxxp://jmmarketingdigital[.]com/wordpress-6[.]0-es_AR[.]zip #phishing #opendir -- ecarlesi
ecarlesi: Possible threat on hxxps://rtechmedia[.]online/cms_web_premium[.]zip #phishing #opendir #hostinger https://t.co/fUe17pYtrr -- ecarlesi
jgreigj: RT @TheRecord_Media: NEW: #Ransomware groups are targeting a #zeroday affecting a Linux-based Mitel VoIP appliance, according to researcher… -- jgreigj
JRoosen: RT @tosscoinwitcher: @JRoosen @pr0xylife @Cryptolaemus1 #Emotet why your banner so small today? The internet must have been cold today.....… -- JRoosen
kyel_perkins: RT @Millind_Hirkane: Ethical Hacking with Kali Free Course | Cyber Security Career Path | Wha... https://t.co/sAqzajuAP3 via @YouTube #soft… -- kyel_perkins
kyel_perkins: RT @exalbahri: Hi , who know the POC for CVE-2021-44521 Can help me #BugBounty @infosec_90 @_zwink @r00t_nasser #bugbountytips -- kyel_perkins
Rap_Thesaurus: RT @WeAreMarahall:  Warming Up @KIIARA #100DaysOfCode #CodeNewbie #WomenWhoCode #Programming #DataScience #AcademicTwitter #MachineLearni… -- Rap_Thesaurus
rum4is: RT @IRONSCALES: ???? EMOTET malware is typically spread through phishing emails with malicious Microsoft Word or Excel files attached. So how… -- rum4is
sectest9: RT @XCriminal_: Happy to secure @Huawei :D Always look for open ports & the services . These are the real jackpots #bugbounty #infosec… -- sectest9
sectest9: RT @exalbahri: Hi , who know the POC for CVE-2021-44521 Can help me #BugBounty @infosec_90 @_zwink @r00t_nasser #bugbountytips -- sectest9
stlaurej04: RT @Claroty: In our report on, "The Global State of Industrial Cybersecurity," read about increasing #ransomware attacks, digital transform… -- stlaurej04
syslayer_: RT @GodfatherOrwa: Big Bug bounty Tip To Find Collection Of Bugs #bugbountytip #bugbountytips #BugBounty https://t.co/5tjCeqKcT4 -- syslayer_
TheBugBot: RT @exalbahri: Hi , who know the POC for CVE-2021-44521 Can help me #BugBounty @infosec_90 @_zwink @r00t_nasser #bugbountytips -- TheBugBot
thizzlam4: RT @Millind_Hirkane: Ethical Hacking with Kali Free Course | Cyber Security Career Path | Wha... https://t.co/sAqzajuAP3 via @YouTube #soft… -- thizzlam4
UnlimitedCursor: RT @WeAreMarahall:  Visual Aids @KIIARA #100DaysOfCode #CodeNewbie #WomenWhoCode #Programming #DataScience #AcademicTwitter #MachineLearni… -- UnlimitedCursor
xaelbot: RT @Detroit_Riddler:  Short Story #100DaysOfCode #CodeNewbie #WomenWhoCode #Programming #DataScience #AcademicTwitter #MachineLearning #Se… -- xaelbot
YourAnonRiots: RT @YourAnonRiots: Researchers reveal that #ransomware hackers used a zero-day #vulnerability in Mitel VoIP appliances as an entry point to… -- YourAnonRiots
ABFilipczak: RT @_Vault_Security: Conti ransomware hacking spree breaches over 40 orgs in a month. https://t.co/P3DzPVCcCv #Conti #Ransomware #hacking… -- ABFilipczak
AndromedaTS: By using technology, industrial facilities learn how to manage a partially remote workforce. Here is how your site… https://t.co/gUCpxjRYs8 -- AndromedaTS
colleencorbin: #Cybersecurity threats are on the rise. Here are five ways businesses can protect themselves and their data again… https://t.co/yW0wmQiOfv -- colleencorbin
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 with SSH version "SSH-2.0-libssh_0.9.6" on UTC 2022-06-24 20… https://t.co/GTbMl2n3K2 -- OpenHoneypot
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 trying to login with account "user" and password "user2018"… https://t.co/zKwCAlad1U -- OpenHoneypot
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 with SSH version "SSH-2.0-OpenSSH_7.4" on UTC 2022-06-24 19… https://t.co/nxnHTzXjt5 -- OpenHoneypot
OpenHoneypot: An attempt was detected from 91.240.118.105 to port 8022 on UTC 2022-06-24 19:48:27.204252. #ThreatIntelligence -- OpenHoneypot
OpenHoneypot: An attempt was detected from 91.240.118.105 to port 8022 with SSH version "SSH-2.0-libssh2_1.9.0" on UTC 2022-06-24… https://t.co/BL6qpQaGXR -- OpenHoneypot
OpenHoneypot: An attempt was detected from 91.240.118.105 to port 8022 with SSH version "SSH-2.0-libssh2_1.9.0" on UTC 2022-06-24… https://t.co/EKox5ITtYx -- OpenHoneypot
OpenHoneypot: An attempt was detected from 91.240.118.105 to port 8022 on UTC 2022-06-24 19:48:17.163830. #ThreatIntelligence -- OpenHoneypot
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 trying to login with account "root" and password "l3tm31n" o… https://t.co/cicVoymEAX -- OpenHoneypot
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 on UTC 2022-06-24 20:02:35.316048. #ThreatIntelligence -- OpenHoneypot
tip_intel: Threat intelligence platforms are transitioning from an enhanced addition to a vital addition for a comprehensive c… https://t.co/wfhh7hK4Gf -- tip_intel
alexagshapiro: RT @hrcberkeley: New #Podcast w/ Jeff Schechtman of @mmcphate features @KAlexaKoenig discussing the use of #OSINT investigations to strengt… -- alexagshapiro
beefyspace: RT @JinibaBD: ????????Threat actors becoming more creative exploiting the #humanfactors ???????? #ThreatIntel #Phishing #ransomware #cyberattacks #priv… -- beefyspace
BerkeleyLaw: RT @hrcberkeley: New #Podcast w/ Jeff Schechtman of @mmcphate features @KAlexaKoenig discussing the use of #OSINT investigations to strengt… -- BerkeleyLaw
casteelsc2: RT @ecteg: Today we are working on the #QualityProcess for one of our courses: #MIN, our training on #Malware Investigations. The developer… -- casteelsc2
crispSV: #Russia 'doomsday' Command and Control plane Tu-214SR RA-64516 leaving #Minsk #Belarus. #NATO #Nuclear #WWIII… https://t.co/FGhdvB9CN3 -- crispSV
CyberSecurityN8: RT @JinibaBD: ????????Threat actors becoming more creative exploiting the #humanfactors ???????? #ThreatIntel #Phishing #ransomware #cyberattacks #priv… -- CyberSecurityN8
CyberSecurityN8: RT @ecteg: Today we are working on the #QualityProcess for one of our courses: #MIN, our training on #Malware Investigations. The developer… -- CyberSecurityN8
deadbyluv: RT @TheHackersNews: Researchers have identified multiple malicious #Python packages designed to steal #AWS credentials and environment vari… -- deadbyluv
DeadmanSoSexy: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- DeadmanSoSexy
ecarlesi: Threat on hxxps://pending-new-manage[.]com/Login[.]php #phishing #bancosantander #porkbun -- ecarlesi
ecarlesi: Threat on hxxps://pending-new-manage[.]com/ #phishing #bancosantander #porkbun https://t.co/qMiFNPBOFc -- ecarlesi
GeoPioneerInc: Burkina Faso tells civilians to evacuate ahead of operations #BurkinaFaso #OSINT https://t.co/K1DdQc9474 -- GeoPioneerInc
heateor: OWN a Website? Allow your Website Visitors to Login to your Website via their Spotify, Google, Facebook, Github and… https://t.co/1WBLhKwglz -- heateor
hrcberkeley: RT @KAlexaKoenig: Back to my California roots :) Thanks to Jeff Schechtman for spotlighting some of the California-based efforts to contrib… -- hrcberkeley
hvonnagy: RT @KAlexaKoenig: Back to my California roots :) Thanks to Jeff Schechtman for spotlighting some of the California-based efforts to contrib… -- hvonnagy
KAlexaKoenig: Back to my California roots :) Thanks to Jeff Schechtman for spotlighting some of the California-based efforts to c… https://t.co/7REmSmp9Qb -- KAlexaKoenig
kuukkeli5: RT @crispSV: #Russia 'doomsday' Command and Control plane Tu-214SR RA-64516 leaving #Minsk #Belarus. #NATO #Nuclear #WWIII #Ukraine #US #Ch… -- kuukkeli5
leo__adde: RT @CovertShores: Thread. #OTD in 4 months of the #Ukraine War. Navy #OSINT Feb 24. World wakes up to invasion. Cruiser Moskva attacks Ukr… -- leo__adde
loribanks: RT @Paula_Piccard: 8 Phases of The Cyber Kill Chain #DataSecurity #Privacy #100DaysOfCode #Cloud #Security #MachineLearning #Phishing #Ran… -- loribanks
OldRookie17: RT @davidbombal: She hacked me! YouTube video: https://t.co/ax7UNrfPq8 Learn how to set up a phishing campaign with demo. #phishing #hac… -- OldRookie17
PhishStats: https://t.co/MAuIXRvYiq detected 26 new websites hosting #phishing | new today: 986 | #infosec #cybersecurity… https://t.co/I1tBooJNw2 -- PhishStats
rahul05ranjan: RT @trip_elix: "RT @TheHackersNews: Tropic Trooper Chinese hacker group has been spotted using a new #malware coded in the Nim #programming… -- rahul05ranjan
RDSWEB: RT @crispSV: #Russia 'doomsday' Command and Control plane Tu-214SR RA-64516 leaving #Minsk #Belarus. #NATO #Nuclear #WWIII #Ukraine #US #Ch… -- RDSWEB
RDSWEB: RT @GeoPioneerInc: Burkina Faso tells civilians to evacuate ahead of operations #BurkinaFaso #OSINT https://t.co/K1DdQc9474 -- RDSWEB
ReadTechHere: RT @trip_elix: "RT @TheHackersNews: Tropic Trooper Chinese hacker group has been spotted using a new #malware coded in the Nim #programming… -- ReadTechHere
rum4is: RT @JinibaBD: ????????Threat actors becoming more creative exploiting the #humanfactors ???????? #ThreatIntel #Phishing #ransomware #cyberattacks #priv… -- rum4is
RuOilTracker: ????????->???????? ATLAS STAR Departed St petersburg with 30,000 tons of oil products for delivery in #Izmit, #Turkey… https://t.co/wRGncfRPz5 -- RuOilTracker
SafeGuard_Cyber: ????Enterprises are losing the battle against #Phishing despite significant investments in employee training and email… https://t.co/Ykjw916Qes -- SafeGuard_Cyber
secretcabdriver: One month from today I'll get to see #phish for the first time in three years. #Hartford -- secretcabdriver
sectest9: RT @JinibaBD: ????????Threat actors becoming more creative exploiting the #humanfactors ???????? #ThreatIntel #Phishing #ransomware #cyberattacks #priv… -- sectest9
sectest9: RT @ecteg: Today we are working on the #QualityProcess for one of our courses: #MIN, our training on #Malware Investigations. The developer… -- sectest9
TripwireInc: The UK’s National Health Service has warned that fraudsters are sending text messages telling recipients that they… https://t.co/UYCT5pHTFf -- TripwireInc
WarrenPlatts: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- WarrenPlatts
WHInspector: [#DailyOSINT - Day#338] Insteresting websites/applications to combine with wigle on finding wi-fis on cities: -… https://t.co/LC57QmAnWY -- WHInspector
wpbot_rt: RT @heateor: OWN a Website? Allow your Website Visitors to Login to your Website via their Spotify, Google, Facebook, Github and 20 Other S… -- wpbot_rt
YourAnonRiots: RT @TripwireInc: The UK’s National Health Service has warned that fraudsters are sending text messages telling recipients that they have be… -- YourAnonRiots
YourAnonRiots: RT @PhishStats: https://t.co/MAuIXRvYiq detected 26 new websites hosting #phishing | new today: 986 | #infosec #cybersecurity #malware http… -- YourAnonRiots
Amigo_A_: cc @BleepinComputer @malwrhunterteam @demonslay335 -- Amigo_A_
Amigo_A_: A new #Kanalia #Ransomware in my Digest. https://t.co/Ftu9bxhGcz Extension: XJJ Spreading against Russian-speaking users along with a docx file. Forces to open a second malicious file for execute a primitive encoder. No ransom note found. Decryp -- Amigo_A_
beefyspace: RT @PhishStats: https://t.co/MAuIXRvYiq detected 26 new websites hosting #phishing | new today: 986 | #infosec #cybersecurity #malware http… -- beefyspace
HC_Ready: The #RoeVsWade ruling today reflects the structures and intentions that create inequity. @HC_Ready understands that abortion is healthcare, and that healthcare is a right, not a privilege. #RoeVWadeOverturned -- HC_Ready
MagickPrincess: RT @TheHackersNews: Researchers are warning of a new #malware tool available on cybercrime forums that allows cybercriminals to easily crea… -- MagickPrincess
NEI: “Any way you slice and dice it, it comes back to nuclear being a large part of the solution.” - NEI Preident & CEO Maria Korsnick https://t.co/dkKWsPRxp4 -- NEI
RH_ISAC: Should you invest in the alphabet soup of cloud security tools? Learn the benefits of CASB, SAST, SASE, CSPM, CWPP, and CIEM tools in this blog post! #infosec #cloudsecurity #cloud #CASB #securitytools https://t.co/BAreOQrCbp -- RH_ISAC
rum4is: RT @CyberIQs_: Fraud trends and scam tactics consumers should be aware #infosec #infosecurity #cybersecurity #threatintel #threatintelligen… -- rum4is
BACSIRT: ????24/06????"Ver para (no) creer: deepfakes, inteligencia artificial y bots, las #tecnologías que van a cambiar lo que percibimos como real o inventado" ????https://t.co/Ab0BHs991F vía @LANACION -- BACSIRT
BACSIRT: ????23/06????"Tras la pericia oficial Incendio en Recoleta: peligros y consejos sobre las #baterías de litio, la causa del inicio de las llama" ????https://t.co/wymZCYbcV3 vía @clarintecno -- BACSIRT
BACSIRT: ????21/06????"Así consiguió una víctima de #phishing recibir de su banco los 12.000 euros que le habían robado en una estafa SMS" ????https://t.co/pqUe8Ivfuw vía @genbeta -- BACSIRT
BACSIRT: ????22/06????"#Routers de WiFi, los dispositivos más desprotegidos del internet de las cosas" ????https://t.co/LusiyC1Dnb vía @infobaetecno -- BACSIRT
BACSIRT: ????21/06????"5 amenazas corporativas que NO son #ransomware" ????https://t.co/evn5Tfus5d vía @welivesecurity -- BACSIRT
ACPAshishKumar: Don't fall prey to FAKE JOB offers, You may loose money. Never provide your personal & financial details to unknown… https://t.co/rPHhT67Iu0 -- ACPAshishKumar
Ahmadshafi09: RT @ACPAshishKumar: Dear twitter Friends!! If anyone is contacting you on #Facebook & asking money in due to urgency with promise to retur… -- Ahmadshafi09
apmurray123: UK Lays Out Proposed New Data Protection Laws The UK has published its… #IT #CIO #data #bigdata #tech… https://t.co/IgPbgDjMEl -- apmurray123
ArunKum96311121: RT @mukesh_one: A #twitter account claiming to be the President of India. This account is gaining new followers every minute. Any misleadi… -- ArunKum96311121
Bhagaayam05: RT @ACPAshishKumar: Dear twitter Friends!! If anyone is contacting you on #Facebook & asking money in due to urgency with promise to retur… -- Bhagaayam05
BolakePrajyot: RT @markant13313579: respect @tnpoliceoffl @TNpolice_cz my friends and relations use online instant loan applications scam loan apps black… -- BolakePrajyot
cashkee: RT @NandanLohitaksh: ALL IN ONE Hacking Tool For Hackers https://t.co/kWXfHIGsA1 #cybersecurity #infosec #bugbounty #bugbountytips https… -- cashkee
CMoschovitis: Act Now To Fix Under Attack Microsoft Windows 0-Day Hack Users of all supported… #IT #CIO #data #bigdata #tech… https://t.co/LJcts4MKrC -- CMoschovitis
CyberSecurityN8: RT @mukesh_one: A #twitter account claiming to be the President of India. This account is gaining new followers every minute. Any misleadi… -- CyberSecurityN8
CyberSecurityN8: RT @0x01alka: Path Traversal $1,337$ Join https://t.co/ChTRewW7BN #BugBounty https://t.co/ev1W4IwfLN -- CyberSecurityN8
Dh33ra: RT @Flag_C0: I earned $800 for my submission on @bugcrowd #ItTakesACrowd Tips: 1) Used Gau To Get All The URLS 2) Used grep = Filtered Onl… -- Dh33ra
Dh33ra: RT @0x01alka: Path Traversal $1,337$ Join https://t.co/ChTRewW7BN #BugBounty https://t.co/ev1W4IwfLN -- Dh33ra
Hakin9: Check out our newest online course! https://t.co/LwmQAWSD4F #infosec #cybersecurity #redteam #pentest #pentesting… https://t.co/TCJmiyyPKk -- Hakin9
Hyperio44159824: RT @Pethuraj: tlsx - @pdiscoveryio just released a new tool to identify TLS Misconfigurations. » https://t.co/A6u4xFZBld #cybersecurity #… -- Hyperio44159824
KhubraShaik: 5 Important Things You Must Know About CCTV Cameras #cctv #camera #business #security #CCTVcamera #cybercrime… https://t.co/wEEaTBrmqe -- KhubraShaik
mythicalcmd: RT @_zwink: #bugbounty Tip of the day: If graphQL introspection is disabled, use a dictionary to attack the query name and it will trigger… -- mythicalcmd
NandanLohitaksh: ALL IN ONE Hacking Tool For Hackers https://t.co/kWXfHIGsA1 #cybersecurity #infosec #bugbounty #bugbountytips https://t.co/H8JU6HwFsJ -- NandanLohitaksh
R3DT3AM3R817: RT @Hakin9: Check out our newest online course! https://t.co/LwmQAWSD4F #infosec #cybersecurity #redteam #pentest #pentesting #hacking #… -- R3DT3AM3R817
Reality_SageIT: Prevention is better than cure when it comes to cyber attacks, so businesses should focus on: ???? Employee training ????… https://t.co/Fuijadn29Y -- Reality_SageIT
sectest9: RT @0x01alka: Path Traversal $1,337$ Join https://t.co/ChTRewW7BN #BugBounty https://t.co/ev1W4IwfLN -- sectest9
sectest9: RT @mukesh_one: A #twitter account claiming to be the President of India. This account is gaining new followers every minute. Any misleadi… -- sectest9
secureyoursites: RT @secureyoursites: @kayabaNerve @Chain @immunefi I had nasty experience with Immunefi for "Mt Perelin", accepted 10+ defects as valid, fi… -- secureyoursites
ShravanRajSiddi: RT @ACPAshishKumar: Dear twitter Friends!! If anyone is contacting you on #Facebook & asking money in due to urgency with promise to retur… -- ShravanRajSiddi
Shumail30585516: RT @bygovernancenow: ???? Block your Calendars! Join the @governancenow 2nd India #Police Summit & Awards 2022 where we will be having power… -- Shumail30585516
allaboutclait: Conti ransomware finally shuts down data leak, negotiation sites https://t.co/ByW8k6YNIh #infosec #ransomware -- allaboutclait
allaboutclait: Fast Shop Brazilian retailer discloses "extortion" cyberattack https://t.co/AznWi75U8Y #infosec #Ransomware -- allaboutclait
allaboutclait: Mitel zero-day used by hackers in suspected ransomware attack https://t.co/m5AE7cztvj #infosec #ransomware -- allaboutclait
BIKapital: RT @cyberreport_io: THORChain Deploys Mainnet After 4-Year Wait, RUNE Soars 13% In 24 Hours https://t.co/mt8HCmkktu #cybersecurity #threati… -- BIKapital
britec: ⚠️ YOU SHOULD KNOW: #Cyberattacks & #ransomware are on the rise, so many insurance providers are dropping coverage… https://t.co/O57xDpYfbN -- britec
CloudCasa: RT @vmblog: Register for this @CatalogicSW #webinar on July 13 to learn from Krista Macomber of @evaluator_group and Sathya Sankaran, how #… -- CloudCasa
cyberreport_io: THORChain Deploys Mainnet After 4-Year Wait, RUNE Soars 13% In 24 Hours https://t.co/mt8HCmkktu #cybersecurity… https://t.co/ba9FCmwSJP -- cyberreport_io
CyberSecurityN8: RT @MrsYisWhy: threatpost: The malvertiser’s use of PowerShell could push it beyond its basic capabilities to spread #ransomware, #spyware… -- CyberSecurityN8
CyberSecurityN8: RT @cyberreport_io: THORChain Deploys Mainnet After 4-Year Wait, RUNE Soars 13% In 24 Hours https://t.co/mt8HCmkktu #cybersecurity #threati… -- CyberSecurityN8
fprado28: RT @threatpost: The malvertiser’s use of PowerShell could push it beyond its basic capabilities to spread #ransomware, #spyware or steal da… -- fprado28
LewisBrisbois: #NorthCarolina made national headlines recently as the first state to prohibit state agencies & local #government e… https://t.co/WjZqW870c8 -- LewisBrisbois
ljcarolv: RT @BranhamRoen: Bluetooth Signals Can Be Fingerprinted And Used To Track Smartphones | Cyber Attack & Data Breach WATCH FULL EPISODE >> ht… -- ljcarolv
MarcMalotke: RT @Cohesity: To defend against #ransomware, organizations need to deploy a modern, robust #backup solution that helps protect backup data… -- MarcMalotke
MicroFocusSec: Cyber #ThreatHunting is a security process that hunts for malicious or suspicious activities that may have previous… https://t.co/YiuFACBAC1 -- MicroFocusSec
mjmiracle: RT @CatalogicSW: Did you miss our live webinar? We've got you covered! DPX has decades of experience and continued dedication to @MicroFoc… -- mjmiracle
mohitaron: RT @Cohesity: ???? @Rackspace & #Cohesity have partnered to advance data mobility & #dataprotection for VMware Cloud environments globally! G… -- mohitaron
MrsYisWhy: threatpost: The malvertiser’s use of PowerShell could push it beyond its basic capabilities to spread #ransomware,… https://t.co/HYy6IEeTzv -- MrsYisWhy
omvapt: #Beijing-backed #attackers use #ransomware as a #decoy while they conduct #espionage https://t.co/LjIybmCRuG -- omvapt
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 trying to login with account "user" and password "user2017"… https://t.co/R2nnqjwExc -- OpenHoneypot
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 with SSH version "SSH-2.0-OpenSSH_7.4" on UTC 2022-06-24 17… https://t.co/9wdhGzT5lp -- OpenHoneypot
OpenHoneypot: An attempt was detected from 179.60.147.74 to port 8022 on UTC 2022-06-24 17:48:06.339992. #ThreatIntelligence -- OpenHoneypot
OpenSourceHacks: (CVE-2022-2182): Heap-based Buffer Overflow in vim/vim. https://t.co/l0LP7QoBI0 Disclosed by… https://t.co/9z9ADjwUEg -- OpenSourceHacks
sakelestemur: RT @cloud7news: Chinese hackers using ransomware as a decoy ???? https://t.co/S62abT0tWB #cloudcomputing #hosting #datacenter #technology #tec… -- sakelestemur
sectest9: RT @cyberreport_io: THORChain Deploys Mainnet After 4-Year Wait, RUNE Soars 13% In 24 Hours https://t.co/mt8HCmkktu #cybersecurity #threati… -- sectest9
sectest9: RT @MrsYisWhy: threatpost: The malvertiser’s use of PowerShell could push it beyond its basic capabilities to spread #ransomware, #spyware… -- sectest9
SkurioC: Have you booked your spot yet? Come and join us on June 28th, 2pm and learn how tailored cyber threat intelligence… https://t.co/u7kQt0EAO2 -- SkurioC
IErego: RT @HealthISAC: ATTENTION MEMBERS: The next Monthly Threat Briefing is Tuesday, June 29 at 12pm ET. Special guests include @Akamai Technolo… -- IErego
RDSWEB: RT @UKikaski: Russian Fire of the Day: A RUSAF IL-76 crashed during takeoff near #Ryazan, Russia about 100-miles SE of #Moscow. #OSINT #O… -- RDSWEB
rum4is: RT @TheHackerValley: CTI... it's a controversial topic. Some think it's essential, some think it's fluff. So we brought on @CharityW4CTI an… -- rum4is
_israel_rivera: RT @SonicWallAlerts: SonicAlert: The SonicWall Capture Labs Threat Research Team has issued signatures to protect against #malware threats… -- _israel_rivera
abenzishere: RT @CovertShores: ***BREAKING*** Here ->https://t.co/9Ra2n8gyCb Attack on #Russian Oil Refinery reveals #Ukraine's previously unreported K… -- abenzishere
AlkhamisMAli: RT @TrendMicroRSRCH: In our Trend Micro Cloud App Security Threat Report 2021, we detected a total of 33,630,377 high-risk #email threats i… -- AlkhamisMAli
AnonyLegion1112: RT @CovertShores: Thread. #OTD in 4 months of the #Ukraine War. Navy #OSINT Feb 24. World wakes up to invasion. Cruiser Moskva attacks Ukr… -- AnonyLegion1112
beefyspace: RT @bartmcd: US Shuts Down 'SSNDOB Marketplace' for Selling Social #Security Numbers. via @PCMag https://t.co/zMShJrruXz #cybersecurity #cy… -- beefyspace
Charts4bitcoin: RT @cer_live: ALERT: New @MetaMask #phishing campaign uses KYC lures to steal passphrases - @BleepinComputer -- Charts4bitcoin
chrisormsby: New #phishing scam doing rounds on Facebook with hacked accounts #Take5 #ScamAlert https://t.co/sX8qFIdzIU -- chrisormsby
CyberSecurityN8: RT @HotHardware: Nobody likes a bully. #security #malware #education Give Me Your Lunch Money: #Ransomware Bullies Took $3.56B From School… -- CyberSecurityN8
DefconParrot: RT @tleemcjr: I can't wait for @defcon and our training afterwards! Come see us! #Cybersecurity #OSINT #Training https://t.co/Y28W03Tae3 -- DefconParrot
ecarlesi: Possible threat on hxxp://rdiamzz[.]com #phishing #google -- ecarlesi
FORONAVAL: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- FORONAVAL
greggalinde: How did Check Point stop a major #phishing campaign? Get the details, here https://t.co/dQzusF1Ui5 -- greggalinde
grosinoce: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- grosinoce
HotHardware: Nobody likes a bully. #security #malware #education Give Me Your Lunch Money: #Ransomware Bullies Took $3.56B From… https://t.co/85bERWYBkM -- HotHardware
hummer014: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- hummer014
InnerSec: #OSINT challenge... this one's much easier. Good luck https://t.co/9JzKF0FUxC -- InnerSec
KathrynMClark2: RT @CovertShores: ***UPDATE*** #Russian Navy SLAVA class cruiser at Tartus, Syria, today. Major part of Russian Navy's increased presence… -- KathrynMClark2
Kostian_V: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- Kostian_V
LenovoWar: RT @brechtcastel: A Russian missile ???????? killed at least three Ukrainian citizens ???????? on April 16 in Kyiv. This was NO ordinary attack: it w… -- LenovoWar
peterjmsimons: #SMS #phishing is way too easy https://t.co/rvgbNCmJjj -- peterjmsimons
PhishCompanion: #OnThisDay Friday 06/24/1988 Halverson's Burlington, VT https://t.co/TpK9nhOPfc #phish #phishcompanion #otd2022 -- PhishCompanion
RainbowLinkInc: RT @TheHackersNews: Google believes that ISPs may have helped attackers infect the #Android and #iPhone smartphones of high-profile victims… -- RainbowLinkInc
RDSWEB: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- RDSWEB
rec0ndev: RT @fiete_stegers: At first glance, Shadowmaps looks like a highly promising shadow simulator for geolocation, as it includes data on build… -- rec0ndev
sectest9: RT @HotHardware: Nobody likes a bully. #security #malware #education Give Me Your Lunch Money: #Ransomware Bullies Took $3.56B From School… -- sectest9
SetListTees: 8 years ago today #Phish took the stage at the Ed Sullivan Theater for a mini concert, as part of Dave Letterman's… https://t.co/eEeNSHnBQO -- SetListTees
Ultrascan419: Right-Wing Supreme Court Continues Its “Great Fraud” About the Second Amendment: As former Chief Justice Warren Bur… https://t.co/gAIyO9sfl6 -- Ultrascan419
Ultrascan419: ALERT CENTER: State police warn public of phone scam on Long Island - News 12 Bronx: The New York State Police are… https://t.co/0QYDZNvXBb -- Ultrascan419
UmbraXCyber: Our mission at UMBRA is to secure critical infrastructure. To us, #infrastructure security is #nationalsecurity. Ou… https://t.co/hpsezDwAee -- UmbraXCyber
vDrn10: RT @CovertShores: ***OSINT*** #Russian Navy landing ships concentrating in Novorossiysk on Black Sea. Today. The largest ship, Pyotr Mor… -- vDrn10
VonItzstein: RT @infostruction: #Obfuscated #Phishing email looks like garbage to a machine but when rendered fakes out the user with O365 password expi… -- VonItzstein
cybsecbot: In the past 24 hours, 3680 IoC's were submitted and #Emotet is the most seen #malware family on abuse[.]ch -- cybsecbot
Dc30235323: RT @bartmcd: US Shuts Down 'SSNDOB Marketplace' for Selling Social #Security Numbers. via @PCMag https://t.co/zMShJrruXz #cybersecurity #cy… -- Dc30235323
KentrilBrand: RT @FilipiPires: Thank you so much everyone that watched [????️ #Talk] DISSECTING AND COMPARING DIFFERENT BINARIES TO MALWARE ANALYSIS at @_le… -- KentrilBrand
LanceSchukies: CISA Releases Cloud Security Technical Reference Architecture | CISA #cybersecurity #infosec #hacker #cyberattack… https://t.co/qL2K99DzV2 -- LanceSchukies
LanceSchukies: Citrix Releases Security Updates for Hypervisor | CISA #cybersecurity #infosec #hacker #cyberattack #phishing… https://t.co/hqWusXkT3y -- LanceSchukies
RealEstateISAC: https://t.co/GXuUypZQ1L Here is a resource to help track protest activity related to #RoeVWade -- RealEstateISAC
Sec_Cyber: This Android #malware is so dangerous, even #Google is worried – TechRadar https://t.co/smxOVakYlL -- Sec_Cyber
AgidCert: Sintesi riepilogativa delle campagne malevole nella settimana del 18 – 24 giugno 2022 ➡️ #Emotet prova un nuovo template in #Italia. ???? #IoC 621 ???? #Malware 8 (famiglie) ???? #Phishing 6 (brand) ???? https://t.co/TpKlHvP0f7 https://t.co/h -- AgidCert
US_CYBERCOM: Listen to how the Deputy to the CNMF commander went from growing up in small town California to taking the fight to malicious #cyber actors every day. Ms. Baroody also shared what inspires her to lead, and why diversity is important to #natio -- US_CYBERCOM
USCERT_gov: ???? #PhishingFriday: Be suspicious of unsolicited phone calls, visits, or #email messages from individuals asking about employees or other information. If an individual claims to be from a legitimate organization, try to verify their identity -- USCERT_gov
USCERT_gov: Citrix has released security updates for Hypervisor. Learn more at https://t.co/HN2frbxBCl. #Cybersecurity #InfoSec -- USCERT_gov
BalliaPinki: RT @LtGenGurmit: Met Director General of Police Shri @AshokKumar_IPS and senior police officers at Rajbhawan today. Discussed on the poli… -- BalliaPinki
CyberSecurityN8: RT @CMoschovitis: Oracle to boost cloud investments after a strong quarter #IT #CIO #data #bigdata #tech #cybersecurity #cybercrime #dat… -- CyberSecurityN8
DCPNEBCP: #NorthEast #Cybercrime police team has arrested 2⃣ #African nationals for committing #cybercrimes using fake sim ca… https://t.co/O4Mm6ybdUv -- DCPNEBCP
sectest9: RT @CMoschovitis: Oracle to boost cloud investments after a strong quarter #IT #CIO #data #bigdata #tech #cybersecurity #cybercrime #dat… -- sectest9
TheKanakMishra: RT @LtGenGurmit: Met Director General of Police Shri @AshokKumar_IPS and senior police officers at Rajbhawan today. Discussed on the poli… -- TheKanakMishra
_MalwareHunters: The most active #malware per day #QakBot #CobaltStrike #Emotet #Formbook #RedLineStealer #AgentTesla #Mirai… https://t.co/yFe93yoQOV -- _MalwareHunters
2Bftawfik: RT @programmerjoke9: My man seriously fit advanced theme park physics on a 1990’s game disc and it kind of freaks me out#100Daysofcode #jav… -- 2Bftawfik
beefyspace: RT @ecarlesi: Possible threat on hxxps://cp-amcaisse[.]com/newV4[.]zip #phishing #opendir #nc -- beefyspace
beefyspace: RT @TodayCyberNews: ???? Windows RPC Critical Vulnerability (CVE-2022-26809) You can search for vulnerable hosts in Shodan by dorks: port:44… -- beefyspace
bugbounty18: New 'Quantum' Builder Lets Attackers Easily Create Malicious Windows Shortcuts https://t.co/I6oB8UTIb4 #bugbounty #bugbounties -- bugbounty18
ecarlesi: Possible threat on hxxps://cp-amcaisse[.]com/newV4[.]zip #phishing #opendir #nc https://t.co/9wrE07jzfB -- ecarlesi
ecarlesi: Possible threat on hxxps://cp-amcaisse[.]com/newV4[.]zip #phishing #opendir #nc -- ecarlesi
evanderburg: Backups Saved 16,000 Patient Records from #Ransomware https://t.co/t8dSVvMaSZ #recovery #cybersecurity -- evanderburg
GiriAaradhya: RT @LtGenGurmit: Met Director General of Police Shri @AshokKumar_IPS and senior police officers at Rajbhawan today. Discussed on the poli… -- GiriAaradhya
GoaiDev: RT @programmerjoke9: My man seriously fit advanced theme park physics on a 1990’s game disc and it kind of freaks me out#100Daysofcode #jav… -- GoaiDev
GoaiDev: RT @programmerjoke9: See ya in hell#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #reactjs #bug… -- GoaiDev
HackedAgainBook: RT @ScottBVS: Scott Schober, Host of Cybercrime Radio speaks with Jim Coffman @Secureworks Taegis™ XDR Demo With Cybercrime Magazine, RSA 2… -- HackedAgainBook
Mir02393562Mir: RT @Nyksindia: Make sure your passwords are unique. It may appear simple and handy to use the same password for many accounts. #security #… -- Mir02393562Mir
mukeshgiri18: RT @Flag_C0: This is how I found a P2 by easy way ????‍♀️ 1) try https://domain/domain.zip 2) sometimes you can get source leak 3) Boom! #bugb… -- mukeshgiri18
programmerjoke9: See ya in hell#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #reactjs… https://t.co/185dqnAen4 -- programmerjoke9
programmerjoke9: My man seriously fit advanced theme park physics on a 1990’s game disc and it kind of freaks me out#100Daysofcode… https://t.co/mwGeTjb2Xw -- programmerjoke9
rahul05ranjan: RT @programmerjoke9: See ya in hell#100Daysofcode #javascript #programming #dev #linux #java #programming #CodeNewbie #python #reactjs #bug… -- rahul05ranjan
rahul05ranjan: RT @programmerjoke9: My man seriously fit advanced theme park physics on a 1990’s game disc and it kind of freaks me out#100Daysofcode #jav… -- rahul05ranjan
Saurabh58361571: RT @LtGenGurmit: Met Director General of Police Shri @AshokKumar_IPS and senior police officers at Rajbhawan today. Discussed on the poli… -- Saurabh58361571
swheatlealf: As a founding member of @WEFCybersec and contributor of its Partnership Against Cybercrime (PAC), our… https://t.co/swDxOA9wCN -- swheatlealf
ThakurVandhan: RT @LtGenGurmit: Met Director General of Police Shri @AshokKumar_IPS and senior police officers at Rajbhawan today. Discussed on the poli… -- ThakurVandhan
UmarFar13308817: RT @Flag_C0: This is how I found a P2 by easy way ????‍♀️ 1) try https://domain/domain.zip 2) sometimes you can get source leak 3) Boom! #bugb… -- UmarFar13308817
Votiro: #FileFriday is back with another segment. This week, our Technical Director, Michael Tal, is diving into dangerous… https://t.co/jJYHwF7lUJ -- Votiro
0qien: RT @fiete_stegers: At first glance, Shadowmaps looks like a highly promising shadow simulator for geolocation, as it includes data on build… -- 0qien
AxiadIDS: Need to make a business case for getting rid of passwords? @kuppingercole, a top cybersecurity analyst, examines th… https://t.co/YFqeMv32LQ -- AxiadIDS
ConradinZ: RT @fiete_stegers: At first glance, Shadowmaps looks like a highly promising shadow simulator for geolocation, as it includes data on build… -- ConradinZ
CyberCrucible: We're former NSA and we know what lurks out there in the shadows. That's why we developed our #datalossprevention s… https://t.co/U4VyxWmsgy -- CyberCrucible
cybereason: In just two months, #BlackBasta ransomware has added nearly 50 victims to their list. On the blog we're sharing key… https://t.co/1GvCObFPeJ -- cybereason
DpsRic: #Phishing Friday! #BeCyberSmart, think before clicking on a suspicious link! https://t.co/OpQWShApdM -- DpsRic
DrJupyter: RT @DailyOsint: Do you want to explore the new aspect of #OSINT? #SANS course authors have a special guest that lifts the fog over the OSI… -- DrJupyter
ecarlesi: Possible threat on hxxp://spswv[.]com/AFCU/bots[.]txt #phishing https://t.co/Vpa84ksKN2 -- ecarlesi
EggFarmy: RT @ingliguori: #Infographic: #Password Cracking Techniques Via @ingliguori #CyberAttack #cybersecurity #CyberSec #hacking #Security #Hacke… -- EggFarmy
GurkanNasuh: RT @three_cube: Open Source Intelligence (OSINT): Shodan, the World's Most Dangerous Search Engine #osint #shodan #cybersecurity #infosec #… -- GurkanNasuh
HibikiDomineki: RT @phish_report: #osint challenge: how is this phishing site being distributed to victims? ???? cutt[.]ly/yKbrBO4 ???? https://t.co/fJfP4fP0GC… -- HibikiDomineki
HitAndMisSports: RT @three_cube: Open Source Intelligence (OSINT): Shodan, the World's Most Dangerous Search Engine #osint #shodan #cybersecurity #infosec #… -- HitAndMisSports
karmaX8080: RT @RakeshKrish12: Have you ever wondered how Cybercriminals get your sensitive data to defraud you? Here is my latest #research https:/… -- karmaX8080
MicroAge_Regina: Training and knowledge is the best first line of cybersecurity defense against actions like #phishing. If you're… https://t.co/dQGcu9Iu7S -- MicroAge_Regina
nisos: Nisos Executive Shield gathers actionable intelligence to help identify and mitigate threats to ensure your team's… https://t.co/6vmQ6qTfGe -- nisos
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 on UTC 2022-06-24 15:50:14.138540. #ThreatIntelligence -- OpenHoneypot
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 trying to login with account "ftpadmin" and password "ftpadm… https://t.co/XugGO84a2X -- OpenHoneypot
OpenHoneypot: An attempt was detected from 92.255.85.69 to port 8022 with SSH version "SSH-2.0-libssh_0.9.6" on UTC 2022-06-24 15… https://t.co/zHafxWgoYx -- OpenHoneypot
pbtweeter: RT @IOvernights: ???? New Podcast! "Ransomware Decoy, Quantum .LNK Builder, Mitel VoIP Zero-Day, and more." on @Spreaker #android #apple #aws… -- pbtweeter
phish_report: #osint challenge: how is this phishing site being distributed to victims? ???? cutt[.]ly/yKbrBO4 ????… https://t.co/uOCydMzb6L -- phish_report
phoyager: RT @fiete_stegers: At first glance, Shadowmaps looks like a highly promising shadow simulator for geolocation, as it includes data on build… -- phoyager
planet_stoopid: Want to get up to speed on all things #Ukraine, #Russia, #Europe & #OSINT in one place? This is your stop!… https://t.co/jSVTK23GXG -- planet_stoopid
qumqats: RT @ReconVillage: Interesting submissions are coming in. If you have something innovative to talk about #OSINT or #recon at @defcon 30, Las… -- qumqats
RileyScottr08: RT @CovertShores: ***OSINT*** #Russian Navy ships off Sevastopol today Mostly clouds to west Nod @bradyafr who also found most of these… -- RileyScottr08
RuOilTracker: ????????->???????? SAGA 110,000 tons of crude oil From: Novorossiysk To: #Augusta #Italy #russianoil #osint #sanctions… https://t.co/kjBKLvcnGT -- RuOilTracker
RuOilTracker: ????????->???????? SAGA Departed Novorossiysk with 110,000 tons of crude oil for delivery in #Augusta, #Italy #russianoil… https://t.co/q6UL1p4kOy -- RuOilTracker
s_total_s2: RT @Intel_sky: A new Dor Valve Station is being created adjacent to the existing INGL DVS facilities, to house the Karish and Tanin onshore… -- s_total_s2
SonicWall: The #Conti #ransomware group finally shut down their data leak and negotiation sites, but are they really gone? Whi… https://t.co/BhqdHUfv52 -- SonicWall
WarnerChad: Tracking Threat Actor Usage of Cryptocurrencies [podcast] ???? via @mandiant #ThreatIntel #CTI https://t.co/jQGEq3sfE6 -- WarnerChad
aidaakl: This #Android #malware is so dangerous, even #Google is worried https://t.co/t6HUQBpwfE @techradar #CyberSecurity -- aidaakl
amijmad: RT @emsisoft: ⭐️⭐️⭐️⭐️⭐️ for @emsisoft https://t.co/Qp97mp46FG Via: @techradar #Malware #CyberSecurity -- amijmad
Artem1os: RT @cybersec4u: Why #cybersecurity is also a human issue, not just a technology one via @TechNative #DataSecurity #Privacy #Cloud #Secu… -- Artem1os
Artem1os: RT @cybersec4u: The Ins And Outs Of Insider Threats via @Forbes #DataSecurity #Privacy #Cloud #Security #MachineLearning #Phishing #Ra… -- Artem1os
BANANAS1968: RT @jonnywonnydodah: Bit of blatant mobile phishing going on with #07713736481 who just sent me the attached ???? Beware out there peeps. The… -- BANANAS1968
CyberSecurityN8: RT @Oyme: Botnet currently being hosted on @serverionnl. Url: hxxp://2.58.149.116/w #Botnet #Malware https://t.co/5HkPqwZYCt -- CyberSecurityN8
eSentire: Our TRU Team discovered Socgholish #malware that deployed follow-up attacks through Cobalt Strike in just over 10 m… https://t.co/8DLeR8VirK -- eSentire
ExciteTech: RT @threatpost: The company is warning victims in Italy and Kazakhstan that they have been targeted by the #malware from Italian firm RCS L… -- ExciteTech
Fortgale_Cyber: Hey @Notepad_plus! #RedLineStealer distributed trought fake Notepad++ installer hosted on notepad-edit-text[.org… https://t.co/rltymY40C1 -- Fortgale_Cyber
Hacker1V: RT @Hakin9: Mip22 An advanced phishing tool https://t.co/84qlZS4BAl #infosec #cybersecurity #redteam #pentest #pentesting #hacking #hack… -- Hacker1V
HadesIsTaken: RT @Oyme: Botnet currently being hosted on @serverionnl. Url: hxxp://2.58.149.116/w #Botnet #Malware https://t.co/5HkPqwZYCt -- HadesIsTaken
JEMPradio: Phish - Bathtub Gin (2-22-03) #Phish #JEMPRadio #CommunityRadio #NowPlaying https://t.co/Bz9yNRAZtE -- JEMPradio
LUHFinance: RT @MIAANHS: We are aware of a phishing campaign that is currently targeting NHS staff. Please be extra vigilant & do not respond to the m… -- LUHFinance
PegasusTechs: If you don't want to fall victim to spear-phishing, find out exactly what it is and how to protect yourself in this… https://t.co/uycpvGlZkw -- PegasusTechs
RH_ISAC: Ira Winkler, chief security architect at Walmart, will be the opening keynote at RH-ISAC's Cyber Intelligence Summit with his talk "Human Security Engineering: A Holistic Approach to Addressing Human Incidents." #infosec #cybersecurity https://t. -- RH_ISAC
sectest9: RT @Oyme: Botnet currently being hosted on @serverionnl. Url: hxxp://2.58.149.116/w #Botnet #Malware https://t.co/5HkPqwZYCt -- sectest9
SocEngineerInc: New phishing attack infects devices with Cobalt Strike https://t.co/26NfzmiSxX #Phishing #malware #datathreats -- SocEngineerInc
SocialWiz: RT @cybersec4u: The Ins And Outs Of Insider Threats via @Forbes #DataSecurity #Privacy #Cloud #Security #MachineLearning #Phishing #Ra… -- SocialWiz
SocialWiz: RT @cybersec4u: Why #cybersecurity is also a human issue, not just a technology one via @TechNative #DataSecurity #Privacy #Cloud #Secu… -- SocialWiz
Sug4r7: RT @SocEngineerInc: New phishing attack infects devices with Cobalt Strike https://t.co/26NfzmiSxX #Phishing #malware #datathreats -- Sug4r7
ThePikeTheLord: RT @bughuntingbeaut: Comment your thoughts???? #cybersecurity #hacking #security #technology #hacker #infosec #ethicalhacking #cybercrime #te… -- ThePikeTheLord
certbr: Ao montar uma rede Wi-Fi doméstica desabilite o gerenciamento do AP via rede sem fio. #dicacertbr -- certbr
CSIRTGOB: ????Como CSIRT de Gobierno (#CSIRTGob) les compartimos #vulnerabilidades dadas a conocer bajo el nombre de #Icefall y que afectan a sistemas industriales de proveedores como #Honeywell, #Siemens, #Omron, #Motorola, #Yokogawa, #Emerson, #JTEKT y -- CSIRTGOB
FSISAC: @WSJ reported that the US and EU plan to jointly fund secure digital infrastructure in developing countries, which are more vulnerable to nation-state cyber attacks. This is the first time these two have collaborated on this kind of venture. Read -- FSISAC
NationalCsirtCy: Προσοχή! ⚠️ @Cyprus_Police: Απάτη με παραπλανητικά μηνύματα ???? https://t.co/BVRrKTB4Pk #CyberSecurity #cyberalertcy #ΑΨΑ #csirtcy #phishing #Cyprus https://t.co/ObPH8iOnWL -- NationalCsirtCy
RealEstateISAC: We will have more on potential protest activity related to the #RoevWade decision from #SCOTUS in our daily report. https://t.co/VH0oz68IYK -- RealEstateISAC
ngucyber: Who wants to move to the Netherlands? #cybercrime #thebest #lowest #cyberfact #ngucyber https://t.co/OJ3ZXJicYF -- ngucyber