你可能會喜歡
Defenders, don't forget: you can dictate the field of battle in your network. Force the adversary to use tools uncomfortable to them. Impost cost by knowing your environment better than they can. Just stoked we finally got NetFlow being ingested to Cribl 😤
Brb, joining a cybergang on the off chance they extort the wrong Company and I can turn them in for an easy $20m
"...harshest penalties possible and will not pay the $20 million ransom demand we received. Instead we are establishing a $20 million reward fund for information leading to the arrest and conviction of the criminals responsible for this attack." 😤 coinbase.com/blog/protectin…
Got my first @sansforensics class books in the mail! Anyone have some tips other than copious amounts of black Folgers coffee?
I am happy to share a new resource I recently created called The Ransomware Tool Matrix: 🔗 blog.bushidotoken.net/2024/08/the-ra… #CTI #ThreatHunting #ThreatIntel #Ransomware
Also seeing the domain consectetur[.]xyz associated with this activity as well. Using the 9cantronnfit[.]com WebSocket C2 domain mentioned in the report
Hello everyone, today, we present our team's findings on the phishing campaign behind the recent incident: any.run/cybersecurity-… - 72 Phishing Domains: Pretending to be real companies - Advanced Techniques: Including direct human interaction - Fake Websites:…
operation endgame taps into the raw emotions of those with skin in the cyber crime [cat & mouse] game. love the layers & the signaling in the video. on upcoming reveals: “It sure will be exciting. Maybe not for everyone though. Some results can be found here, others will come to…
I've acquired the bank Routing and Account number being used by a threat actor. Who, if anyone, do I report that information to? Can't tell if FTC, local FBI, or maybe bank. I'm reaching out to the compromised vendor as well
"Top 10 Most Frequently Seen Techniques" - are these techniques widely used or is there a broader understanding in detecting these activities over others
This is pretty much why opsec is much needed in cyber operations. Cyberwar is war.
CLEARED FOR RELEASE: We thwarted an attempted Hamas cyber offensive against Israeli targets. Following our successful cyber defensive operation, we targeted a building where the Hamas cyber operatives work. HamasCyberHQ.exe has been removed.
United States 趨勢
- 1. #socideveloper_com N/A
- 2. ARMY Protect The 8thDaesang 55.1K posts
- 3. #DaesangForJin 52K posts
- 4. #2025MAMAVOTE 88.1K posts
- 5. #lip_bomb_RESCENE N/A
- 6. #ENHYPEN 150K posts
- 7. Black Friday 286K posts
- 8. ilya 19.7K posts
- 9. Ravens 60K posts
- 10. Shane 24.1K posts
- 11. Mnet 190K posts
- 12. Lamar 47.5K posts
- 13. Bengals 53.5K posts
- 14. Third World Countries 34.4K posts
- 15. Mr. President 20.7K posts
- 16. Sarah Beckstrom 241K posts
- 17. Joe Burrow 21.8K posts
- 18. Connor 15.4K posts
- 19. Jungwoo 133K posts
- 20. Hudson 12.1K posts
你可能會喜歡
-
Jay Rey
@Jrey_dev -
john meredith
@muhraydeth -
Ron👑
@StockRon_ -
Michal Romejko
@MichalRomejko -
OptionsZorro
@ZorroTrades -
Garrett (Mr. G.S.D)
@the1gsd -
Edward Dang
@EdwardD99735467 -
Birmeler
@birmeler -
Ansumana Susso
@realoptimist1 -
husna azman
@husnaazman10 -
Jose David Pincha
@josedavidneger -
CptnBruno
@BrunoCptn -
Patient 🧐 Hunters
@imperial_mgmt -
Pavel U
@man_doomer
Something went wrong.
Something went wrong.