ITSecAnalyst's profile picture. CISSP, GCIH, Information Security Professional, Incident Respomse, Athlete, Gamer. #Security,#Infosec, #Hacking, #Technology.

David Andro Rivera

@ITSecAnalyst

CISSP, GCIH, Information Security Professional, Incident Respomse, Athlete, Gamer. #Security,#Infosec, #Hacking, #Technology.

David Andro Rivera đã đăng lại

#MagicRAT is the latest #malware from the well-known #LazarusGroup (a suspected North Korean APT). More on this new threat and Lazarus Group's overall goals here cs.co/6010MM7ng

TalosSecurity's tweet image. #MagicRAT is the latest #malware from the well-known #LazarusGroup (a suspected North Korean APT). More on this new threat and Lazarus Group's overall goals here cs.co/6010MM7ng

David Andro Rivera đã đăng lại

Well this is going to be interesting - has @tiktok_us been breached?

Tweet này không còn khả dụng.

David Andro Rivera đã đăng lại

#TikTok has allegedly suffered a data breach 🆘 Now is a good time to turn on 2-step verification if you haven't yet. Here's how you can secure your account: support.tiktok.com/en/safety-hc/a…

FSecure's tweet image. #TikTok has allegedly suffered a data breach 🆘

Now is a good time to turn on 2-step verification if you haven't yet. Here's how you can secure your account: support.tiktok.com/en/safety-hc/a…

David Andro Rivera đã đăng lại

Leaked documents online show the purchase (and documentation of) an $8,000,000 iOS Remote Code Execution 0day exploit

vxunderground's tweet image. Leaked documents online show the purchase (and documentation of) an $8,000,000 iOS Remote Code Execution 0day exploit
vxunderground's tweet image. Leaked documents online show the purchase (and documentation of) an $8,000,000 iOS Remote Code Execution 0day exploit
vxunderground's tweet image. Leaked documents online show the purchase (and documentation of) an $8,000,000 iOS Remote Code Execution 0day exploit

David Andro Rivera đã đăng lại

2022-06-09 (Thursday) - #TA578 #Bumblebee malware infection led to #CobaltStrike activity on 23.82.141[.]226:443 using zupeyico[.]com - IOCs available at: bit.ly/3tuGY9v

Unit42_Intel's tweet image. 2022-06-09 (Thursday) - #TA578 #Bumblebee malware infection led to
#CobaltStrike activity on 23.82.141[.]226:443 using zupeyico[.]com -
IOCs available at:
bit.ly/3tuGY9v

David Andro Rivera đã đăng lại

Here’s my entry for the @nftmakerio art contest: Lost Relic. 🪨 GM Space Frens! 🖖 #NFTCommunity #CNFT #nftart #NFTartists #CardanoNFT #1millionNFTs


David Andro Rivera đã đăng lại

NFT-MAKER FAN ART CONTEST 🏆 Win a @spacebudzNFT 🖼 Get it featured in a collection in the upcoming NFT-MAKER Marketplace! 🗓Deadline: May 4th 🗳 Submit here: forms.gle/ixwBCNPaUPmTL7… 👨‍🎨 Artist: @whanepnft #Cardano #NFTCommunity #1millionNFTs


David Andro Rivera đã đăng lại

Stealer Malware Intelligence Report - Government 1,753,658 credentials of 49K+ government sites have been leaked from users infected with Stealer malware. *The users may include government users or public users of gov public services* TOP 10,000 sites: bit.ly/3sA7f6s

stealthmole_int's tweet image. Stealer Malware Intelligence Report - Government

1,753,658 credentials of 49K+ government sites have been leaked from users infected with Stealer malware.
*The users may include government users or public users of gov public services*

TOP 10,000 sites:
bit.ly/3sA7f6s
stealthmole_int's tweet image. Stealer Malware Intelligence Report - Government

1,753,658 credentials of 49K+ government sites have been leaked from users infected with Stealer malware.
*The users may include government users or public users of gov public services*

TOP 10,000 sites:
bit.ly/3sA7f6s

David Andro Rivera đã đăng lại

a quick mind map where I tried to group all previously shared Lsass cred access detection traces using Windows Logs (via sparce tweets) github.com/sbousseaden/Sl… Example of logs can be found here github.com/sbousseaden/EV…

SBousseaden's tweet image. a quick mind map where I tried to group all previously shared Lsass cred access detection traces using Windows Logs (via sparce tweets)

github.com/sbousseaden/Sl…

Example of logs can be found here 
github.com/sbousseaden/EV…

David Andro Rivera đã đăng lại

Google has so little money that they had to fill this page with ads to the point of only having 1 actual result. One result on the entire page. The rest is ads.

DanielMiessler's tweet image. Google has so little money that they had to fill this page with ads to the point of only having 1 actual result.

One result on the entire page.

The rest is ads.

David Andro Rivera đã đăng lại

New documents for the Okta breach: I have obtained copies of the Mandiant report detailing the embarrassing Sitel/SYKES breach timeline and the methodology of the LAPSUS$ group. 1/N

BillDemirkapi's tweet image. New documents for the Okta breach: I have obtained copies of the Mandiant report detailing the embarrassing Sitel/SYKES breach timeline and the methodology of the LAPSUS$ group. 1/N
BillDemirkapi's tweet image. New documents for the Okta breach: I have obtained copies of the Mandiant report detailing the embarrassing Sitel/SYKES breach timeline and the methodology of the LAPSUS$ group. 1/N

The LAPSUS$ ransomware group has claimed to breach Okta sharing the following images from internal systems.

BillDemirkapi's tweet image. The LAPSUS$ ransomware group has claimed to breach Okta sharing the following images from internal systems.
BillDemirkapi's tweet image. The LAPSUS$ ransomware group has claimed to breach Okta sharing the following images from internal systems.
BillDemirkapi's tweet image. The LAPSUS$ ransomware group has claimed to breach Okta sharing the following images from internal systems.
BillDemirkapi's tweet image. The LAPSUS$ ransomware group has claimed to breach Okta sharing the following images from internal systems.


David Andro Rivera đã đăng lại

Microsoft Security has been tracking criminal actor DEV-0537 (LAPSUS$) targeting organizations with data exfiltration and destructive attacks - including Microsoft. Analysis and guidance in our latest blog: microsoft.com/security/blog/…


David Andro Rivera đã đăng lại

Spent past 2 days reading 14 months worth of leaked chats from the Conti ransomware group (so you don't have to). Today's Part I focuses on the group's internal efforts to evade actions by law enforcement & intel agencies. This is a bottomless gold mine. krebsonsecurity.com/2022/03/conti-…


David Andro Rivera đã đăng lại

VMware issues security patches for multiple high-severity vulnerabilities affecting ESXi, Workstation, Fusion, and Cloud Foundation products. ✅CVE-2021-22040 ✅CVE-2021-22041 ✅CVE-2021-22042 ✅CVE-2021-22043 ✅CVE-2021-22050 ✅CVE-2022-22945 thehackernews.com/2022/02/vmware… #infosec


Loading...

Something went wrong.


Something went wrong.