Twitter | Search | |
Search Refresh
Jake Jun 19
Research Thread - Emotet’s C2 infrastructure can be separated into two lists: Actual Tier 1 C2s that are compromised Linux web hosts and Bot C2s that are infected devices with the UPnP module deployed. ** THREAD **
Reply Retweet Like
David Paramio 54m
Houdini Malware discovered in a fake CVE-2019-0708 exploit in a GitHub Repository. IOC: dda4135edfbe97f17f9a01c88bedda04
Reply Retweet Like
YourTechDiet 12h
Reply Retweet Like
Malware Patrol 1h
Check out the data we share - sample hashes & DGA domains - on the AlienVault OTX
Reply Retweet Like
Bad Packets Report Jun 18
New payload targeting routers detected: http://185.244.25.157/bins/yakuza.mips (🇳🇱) http://185.244.25.157/bins/ Type: Mirai-like Exploit source IP: 46.101.239.104 (DigitalOcean 🇩🇪) Vulnerability: CVE-2017-17215
Reply Retweet Like
David W Coker 4m
Reply Retweet Like
Suspicious Link 12h
Subject: RFQ PFA the PO 19-20 SUPPLY OF CONTRACT PROJECT DOC Attachment: PFA the PO 19-20 OFFER SUPPLY PDF.rar – c2: onyekachi@alna-hdaz.com Password: CharlesEN216!
Reply Retweet Like
PyBotDan 5h
have crafted that's designed to kill people. Here's what we know about it.
Reply Retweet Like
GBHackers on Security 2h
Microsoft Warns about the new Campaign that Delivers FlawedAmmyy RAT via Weaponized MS Excel Documents Read More:
Reply Retweet Like
Foster D. Coburn III 7h
Reply Retweet Like
jessica brown 24h
Reply Retweet Like
Faisal Yahya 7h
vs Virus: What's the Difference? --- via ---
Reply Retweet Like
Aud y Seg Informátic 15h
DHS cyber director warns of surge in Iranian “wiper” hack attacks
Reply Retweet Like

Related searches

#cybersecurity · openbsd · #bugbountytips · cve · #oscp
Opticks Jun 21
Most mobile Apps are vulnerable to malware. Did you know at least 1 of your campaigns is affected by malware infected apps? Click here to read more about
Reply Retweet Like
Phoenix One Knowledge Solutions 8h
If a or attack occurs in your company, does your IT team know how to respond or manage the incident? Our Cybersecurity Incident Response training will equip you w/ up-to-date skills on risk & cybersecurity incident management.
Reply Retweet Like
Henry Dorsett Case 9h
2019-06-24 - Pcap and malware for an ISC diary (Rig EK sends Pitou.B) and
Reply Retweet Like
CCSI 19h
Reply Retweet Like
Josue Ortiz Novoa 15h
For Malware Researches now IDA 7.3 is fully configurable using CSS files and supports dark mode (based on the very popular IDASkins Dark theme) out of the box.
Reply Retweet Like
FraudSupport 12h
Worried that your computer may have a ? We can help. has resources available to help you REPORT, RECOVER & REINFORCE your cyber-safety! Visit us here:
Reply Retweet Like
Anastasis KingStyle 19h
Reply Retweet Like