Twitter | Search | |
Raj Samani
Chief Scientist | Chief Innovation Officer | Co-author of & CSA Guide to Cloud | Advisor on Internet Security
8,326
Tweets
579
Following
9,646
Followers
Tweets
Raj Samani 3h
"as of July 2 - six weeks after news of BlueKeep first broke - about 805,665 Windows devices online remain vulnerable, which represents only a 17 percent drop since May 31."
Reply Retweet Like
Raj Samani retweeted
Mathew J Schwartz 3h
Despite persistent BlueKeep warnings, many organizations fail to patch << Thx for the analysis herein
Reply Retweet Like
Raj Samani 22h
"Microsoft detected attacks targeting the 2016 U.S. presidential election and the last French presidential election, with U.S. senatorial candidates also being under siege in 2018"
Reply Retweet Like
Raj Samani Jul 18
Massive increase in demands - "In Q2 of 2019, the average ransom payment increased by 184% to $36,295, as compared to $12,762 in Q1 of 2019" H/T
Reply Retweet Like
Raj Samani Jul 17
Replying to @HuyKh4 @panther_modern
<blushes> Thank you Huy
Reply Retweet Like
Raj Samani Jul 17
Sadly also a recurring event - but something initiatives such as and the great work by via prevent initiatives will start to change that.
Reply Retweet Like
Raj Samani Jul 17
Replying to @HuyKh4 @panther_modern
Not sure the debate is that simple - understanding the subject matter is important but knowing every possible technical detail unrealistic. As long as the CISO has a strong team (internal and external) - 'technical' knowledge is probably preferable. Good people mandatory.
Reply Retweet Like
Raj Samani Jul 17
Replying to @marknca
Thanks Mark 👍🏻👍🏻
Reply Retweet Like
Raj Samani Jul 17
"We were able to link different nicknames used by the actor on several forums across a timespan of many years. Piecing it together, Rubella showed a classic growth pattern of an aspiring " h/T
Reply Retweet Like
Raj Samani retweeted
John Fokker Jul 16
Breaking News: McAfee ATR helped unmask the suspected actor behind the Rubella and Dryad Marco Builder. Take a look at the details and insight that proved crucial in the police investigation.
Reply Retweet Like
Raj Samani Jul 16
There are "striking similarities between DoppelPaymer's payment portal and the original one for BitPaymer. One striking hint linking the two ransomware threats is the "Bit paymer" title at the top of the page"
Reply Retweet Like
Raj Samani retweeted
SecurityGuill 🌐 Jul 15
Bug Bounty programs are increasingly used by organizations to test their products 🔐🛡️ I made an that presents this concept 📖 ⬇️⬇️⬇️⬇️⬇️ Follow 🌐 for more about
Reply Retweet Like
Raj Samani Jul 15
Hi Phil. Not sure I entirely understand the question. Feel free to DM and I’ll happily clarify.
Reply Retweet Like
Raj Samani Jul 15
kit from 16Shop blocks certain IP addresses from accessing the website. This blacklist contains IPs of security companies, including McAfee. The blacklisting prevents malware researchers from accessing the phishing sites"
Reply Retweet Like
Raj Samani Jul 13
"16Shop makes it easy for anyone to craft an email that looks like it comes from a major tech company, with PDF attached" Our latest research details updates to the kit now targeting Amazon customers
Reply Retweet Like
Raj Samani retweeted
SecurityGuill 🌐 Jul 12
You've probably heard of Tor, the browser that gives you some anonymity on the 👨‍💻 Tor is also used to go on the Darknet 🏴 I made an that presents Tor 📖🌐 Follow for more about
Reply Retweet Like
Raj Samani Jul 12
Thank you again Guillaume :-)
Reply Retweet Like
Raj Samani retweeted
Jay Kelley Jul 12
Just in time for : researchers share details of kit designed to target customers...
Reply Retweet Like
Raj Samani Jul 12
Very true - but we have to make it harder for the bad guys. Great work
Reply Retweet Like
Raj Samani Jul 12
Excellent work by explaining what a attack is
Reply Retweet Like