derek
@_watcher7
Christian | Head of Rebel Intelligence | Stoop Kid | Security Analyst County Government, TX | watcher
You might like
Defenders, don't forget: you can dictate the field of battle in your network. Force the adversary to use tools uncomfortable to them. Impost cost by knowing your environment better than they can. Just stoked we finally got NetFlow being ingested to Cribl 😤
Brb, joining a cybergang on the off chance they extort the wrong Company and I can turn them in for an easy $20m
"...harshest penalties possible and will not pay the $20 million ransom demand we received. Instead we are establishing a $20 million reward fund for information leading to the arrest and conviction of the criminals responsible for this attack." 😤 coinbase.com/blog/protectin…
Got my first @sansforensics class books in the mail! Anyone have some tips other than copious amounts of black Folgers coffee?
I am happy to share a new resource I recently created called The Ransomware Tool Matrix: 🔗 blog.bushidotoken.net/2024/08/the-ra… #CTI #ThreatHunting #ThreatIntel #Ransomware
Also seeing the domain consectetur[.]xyz associated with this activity as well. Using the 9cantronnfit[.]com WebSocket C2 domain mentioned in the report
Hello everyone, today, we present our team's findings on the phishing campaign behind the recent incident: any.run/cybersecurity-… - 72 Phishing Domains: Pretending to be real companies - Advanced Techniques: Including direct human interaction - Fake Websites:…
operation endgame taps into the raw emotions of those with skin in the cyber crime [cat & mouse] game. love the layers & the signaling in the video. on upcoming reveals: “It sure will be exciting. Maybe not for everyone though. Some results can be found here, others will come to…
I've acquired the bank Routing and Account number being used by a threat actor. Who, if anyone, do I report that information to? Can't tell if FTC, local FBI, or maybe bank. I'm reaching out to the compromised vendor as well
"Top 10 Most Frequently Seen Techniques" - are these techniques widely used or is there a broader understanding in detecting these activities over others
This is pretty much why opsec is much needed in cyber operations. Cyberwar is war.
CLEARED FOR RELEASE: We thwarted an attempted Hamas cyber offensive against Israeli targets. Following our successful cyber defensive operation, we targeted a building where the Hamas cyber operatives work. HamasCyberHQ.exe has been removed.
United States Trends
- 1. Michigan 130K posts
- 2. Ohio State 51.1K posts
- 3. Underwood 7,538 posts
- 4. Ryan Day 6,691 posts
- 5. #GoBucks 9,963 posts
- 6. Stoops 4,991 posts
- 7. Sherrone Moore 2,514 posts
- 8. Julian Sayin 4,798 posts
- 9. #TheGame 4,553 posts
- 10. Clemson 7,442 posts
- 11. #GoBlue 9,487 posts
- 12. Jeremiah Smith 8,399 posts
- 13. Bo Jackson 2,467 posts
- 14. Fortnite 206K posts
- 15. Vicario 3,801 posts
- 16. Brutus 16.3K posts
- 17. Kentucky 20.9K posts
- 18. Beamer 1,533 posts
- 19. Mr. Brightside N/A
- 20. Malachi Toney 3,275 posts
You might like
-
Jay Rey
@Jrey_dev -
john meredith
@muhraydeth -
Ron👑
@StockRon_ -
Michal Romejko
@MichalRomejko -
OptionsZorro
@ZorroTrades -
Garrett (Mr. G.S.D)
@the1gsd -
Edward Dang
@EdwardD99735467 -
Birmeler
@birmeler -
Ansumana Susso
@realoptimist1 -
husna azman
@husnaazman10 -
Jose David Pincha
@josedavidneger -
CptnBruno
@BrunoCptn -
Patient 🧐 Hunters
@imperial_mgmt -
Pavel U
@man_doomer
Something went wrong.
Something went wrong.