derek
@_watcher7
Christian | Head of Rebel Intelligence | Stoop Kid | Security Analyst County Government, TX | watcher
قد يعجبك
Defenders, don't forget: you can dictate the field of battle in your network. Force the adversary to use tools uncomfortable to them. Impost cost by knowing your environment better than they can. Just stoked we finally got NetFlow being ingested to Cribl 😤
Brb, joining a cybergang on the off chance they extort the wrong Company and I can turn them in for an easy $20m
"...harshest penalties possible and will not pay the $20 million ransom demand we received. Instead we are establishing a $20 million reward fund for information leading to the arrest and conviction of the criminals responsible for this attack." 😤 coinbase.com/blog/protectin…
Got my first @sansforensics class books in the mail! Anyone have some tips other than copious amounts of black Folgers coffee?
I am happy to share a new resource I recently created called The Ransomware Tool Matrix: 🔗 blog.bushidotoken.net/2024/08/the-ra… #CTI #ThreatHunting #ThreatIntel #Ransomware
Also seeing the domain consectetur[.]xyz associated with this activity as well. Using the 9cantronnfit[.]com WebSocket C2 domain mentioned in the report
Hello everyone, today, we present our team's findings on the phishing campaign behind the recent incident: any.run/cybersecurity-… - 72 Phishing Domains: Pretending to be real companies - Advanced Techniques: Including direct human interaction - Fake Websites:…
operation endgame taps into the raw emotions of those with skin in the cyber crime [cat & mouse] game. love the layers & the signaling in the video. on upcoming reveals: “It sure will be exciting. Maybe not for everyone though. Some results can be found here, others will come to…
I've acquired the bank Routing and Account number being used by a threat actor. Who, if anyone, do I report that information to? Can't tell if FTC, local FBI, or maybe bank. I'm reaching out to the compromised vendor as well
"Top 10 Most Frequently Seen Techniques" - are these techniques widely used or is there a broader understanding in detecting these activities over others
This is pretty much why opsec is much needed in cyber operations. Cyberwar is war.
CLEARED FOR RELEASE: We thwarted an attempted Hamas cyber offensive against Israeli targets. Following our successful cyber defensive operation, we targeted a building where the Hamas cyber operatives work. HamasCyberHQ.exe has been removed.
United States الاتجاهات
- 1. #socideveloper_com N/A
- 2. #lip_bomb_RESCENE N/A
- 3. ARMY Protect The 8thDaesang 1,952 posts
- 4. #DaesangForJin 40.3K posts
- 5. #2025MAMAVOTE 65K posts
- 6. #ENHYPEN 116K posts
- 7. Black Friday 278K posts
- 8. Ravens 59.6K posts
- 9. ilya 18.8K posts
- 10. Shane 22.8K posts
- 11. Lamar 47K posts
- 12. Bengals 53.2K posts
- 13. Mnet 161K posts
- 14. Third World Countries 31.9K posts
- 15. Sarah Beckstrom 234K posts
- 16. Joe Burrow 21.6K posts
- 17. Connor 15.4K posts
- 18. BNB Chain 8,072 posts
- 19. Zay Flowers 4,277 posts
- 20. Hudson 12.1K posts
قد يعجبك
-
Jay Rey
@Jrey_dev -
john meredith
@muhraydeth -
Ron👑
@StockRon_ -
Michal Romejko
@MichalRomejko -
OptionsZorro
@ZorroTrades -
Garrett (Mr. G.S.D)
@the1gsd -
Edward Dang
@EdwardD99735467 -
Birmeler
@birmeler -
Ansumana Susso
@realoptimist1 -
husna azman
@husnaazman10 -
Jose David Pincha
@josedavidneger -
CptnBruno
@BrunoCptn -
Patient 🧐 Hunters
@imperial_mgmt -
Pavel U
@man_doomer
Something went wrong.
Something went wrong.