Twitter | Search | |
Search Refresh
Alexandre Borges Aug 12
(PDF Slides) My presentation at DEF CON 27 follow... .NET Malware Threat: Internals and Reversing:
Reply Retweet Like
Bad Packets Report Aug 19
New malware payload detected: http://185.244.25.219/jaws.sh http://185.244.25.219/arm7 Type: Mirai-like Exploit attempt source IP: 185.244.25.219 (KV Solutions 🇳🇱 AS60355) Recon scan type: ZMap
Reply Retweet Like
Neil Fox 16h
Honeynet up and running including Dionaea sensor which is pulling samples. Me now walking to the car after a productive day:
Reply Retweet Like
Marf Aug 14
You say , I say block that
Reply Retweet Like
marc ochsenmeier Aug 13
Practical Malware Analysis Essentials for Incident Responders - with a nice presentation of for Initial Assessment
Reply Retweet Like
Brad Aug 12
2019-08-12 - Can anyone tell me what family of this is? It has some distinct traffic. It was a payload from earlier today. - - -
Reply Retweet Like
StDoms Threat Intel 23h
4fa3d4aeef2745e85ad4deaf3e12e5500c022c7e094dbc0c2d3276e36f4e8936 SHA256, new detected by Wildfire, file type Shell Script
Reply Retweet Like
AT&T Cybersecurity 11h
Malspam campaign targets utility sector with the Adwind Remote Access Trojan . Details here:
Reply Retweet Like
HackerPom Aug 18
New data sources and aggregation available to customers by request! Visit for details! Software Vulnerabilities in the Boeing 787 - Schneier on Security
Reply Retweet Like
sudo rm -rf /DiagonalCiso Aug 19
For the I'll give you the lists that I use, including and blocking. Please beware that this will also kill Facebook on your network (you can exclude them if you're a pussy :-) )
Reply Retweet Like
Garrick Yeehaw Chang 15h
The team at recently discovered a new version of the trojan that is being shared through malicious Word documents. Learn more: via
Reply Retweet Like
jessica brown 20h
How to remove NUKSUS ransomware and recover encrypted files
Reply Retweet Like
Adaptive Office 13h
The 4 Scariest Types of ! There are many flavors of malware, from run-of-the-mill to sophisticated state-sponsored cyberweapons designed to carry out a very specific goal. To LEARN MORE, Click Here...
Reply Retweet Like

Related searches

#cybersecurity · #bugbountytips · #hacking · #infosec · #ah2019
Chris P Bacon Aug 14
Low detection malicious .zip file Source IP: 198.46.134[dot]129 Sender: p[dot]arapoglou@anats[dot]gr Subject Re: PLUNGER FOR NEW ORDER 2019 Filename: Order.rar Hash: 656a8da039dc1cf84cacf161361f1d1db27a220f5b9dd322759fd8bf91ff50a6
Reply Retweet Like
CCSI 8h
Psychological Tricks of the Malware Trade via
Reply Retweet Like
Blue Cloak Aug 15
Dangerous New Android Trojan Hides From Researchers And Taunts Them On Twitter
Reply Retweet Like
Warwick_Ashford 18h
remains the top threat, with ransomware still considered to be the top malware threat and lack of budget the biggest obstacle to defence, a study shows via
Reply Retweet Like
PhishFindR 6h
Reply Retweet Like
Anomali Aug 19
A newly discovered Android malware, dubbed “Cerberus,” is being offered for rent on underground forums after its creators claim that the was operating in the wild for two years, according to researchers.
Reply Retweet Like
Mohammed Umar sheriff Aug 15
Replying to @eshagupta2811
Still signs of present.loading is slow.
Reply Retweet Like