cyb5r3Gene's profile picture. 🎓 PhD  | From Cyber Sentinel to Visionary Security Leader | Cyber Defender aka. #BlueTeamer 🛡️ proudly from 🇳🇴

Cyb5r3 Gene

@cyb5r3Gene

🎓 PhD | From Cyber Sentinel to Visionary Security Leader | Cyber Defender aka. #BlueTeamer 🛡️ proudly from 🇳🇴

Cyb5r3 Gene 已轉發

Relay still work, without my kimono dev board :') > github.com/gentilkiwi/kes… Feel free to improve and adapt, especially the ESP-NOW part :')

gentilkiwi's tweet image. Relay still work, without my kimono dev board :')

> github.com/gentilkiwi/kes…

Feel free to improve and adapt, especially the ESP-NOW part :')
gentilkiwi's tweet image. Relay still work, without my kimono dev board :')

> github.com/gentilkiwi/kes…

Feel free to improve and adapt, especially the ESP-NOW part :')
gentilkiwi's tweet image. Relay still work, without my kimono dev board :')

> github.com/gentilkiwi/kes…

Feel free to improve and adapt, especially the ESP-NOW part :')

I published my part of code allowing to relay some NFC-A between 2x ESP32 with PN532 thanks to ESP-NOW. Not a bad protocol, but latency can be challenging (as some anti relay countermeasures are playing around hundreds of microseconds) github.com/gentilkiwi/kes…



Cyb5r3 Gene 已轉發

"JandiInstaller.dmg": a5255d7a4f7fb67a0682d1827cfba80c3e296b23b4ef450beea832c1292e12d8 🤷‍♂️

malwrhunterteam's tweet image. "JandiInstaller.dmg": a5255d7a4f7fb67a0682d1827cfba80c3e296b23b4ef450beea832c1292e12d8
🤷‍♂️

Cyb5r3 Gene 已轉發

Trying to apply the new 23H2 #Intune Baseline and using a non-English OS? You'll probably break the ability to log into devices because the group names are localised. @IntuneSuppTeam These need changing to the equivalent well-known SID or a lot of devices are gonna go pop.

SkipToEndpoint's tweet image. Trying to apply the new 23H2 #Intune Baseline and using a non-English OS? You'll probably break the ability to log into devices because the group names are localised.
@IntuneSuppTeam These need changing to the equivalent well-known SID or a lot of devices are gonna go pop.
SkipToEndpoint's tweet image. Trying to apply the new 23H2 #Intune Baseline and using a non-English OS? You'll probably break the ability to log into devices because the group names are localised.
@IntuneSuppTeam These need changing to the equivalent well-known SID or a lot of devices are gonna go pop.

Cyb5r3 Gene 已轉發

🇳🇴 Alleged Data Breach of Tibber Exposes 243,000 Customer Records A threat actor known as 888 claims to have breached Tibber, a Norwegian company specializing in smart, renewable electricity solutions. The breach reportedly occurred in November 2024, resulting in the leak of…

MonThreat's tweet image. 🇳🇴 Alleged Data Breach of Tibber Exposes 243,000 Customer Records

A threat actor known as 888 claims to have breached Tibber, a Norwegian company specializing in smart, renewable electricity solutions. The breach reportedly occurred in November 2024, resulting in the leak of…

Cyb5r3 Gene 已轉發

Phishing with Progressive Web Apps: mrd0x.com/progressive-we… More fake URL bars :)

mrd0x's tweet image. Phishing with Progressive Web Apps: mrd0x.com/progressive-we…

More fake URL bars :)

Cyb5r3 Gene 已轉發

There were 52 active RaaS and RaaS-related groups during the second half of 2023, a 15.6% increase from the first six months. The full details in our #ransomware report: ⬇️ research.trendmicro.com/RansomwareIn2H…

TrendMicroRSRCH's tweet image. There were 52 active RaaS and RaaS-related groups during the second half of 2023, a 15.6% increase from the first six months. 

The full details in our #ransomware report: ⬇️ research.trendmicro.com/RansomwareIn2H…

Cyb5r3 Gene 已轉發

Twitter AI is amazing. It took our satirical post about 'Stuxnet 2.0' and some mention of 'templates' into a serious trending post about cyberwarfare.

vxunderground's tweet image. Twitter AI is amazing. It took our satirical post about 'Stuxnet 2.0' and some mention of 'templates' into a serious trending post about cyberwarfare.

Cyb5r3 Gene 已轉發

⚠️ Qlik Sense Users, Patch Now! Adversary Tactics: - Initial Access: CVE-2023-412662, CVE-2023-412653 - RMMs: ManageEngine UEMS, Zoho Assist, DWAgent - Lateral Mov: RDP & PuTTY Link8 - Exfil: WizTree & Rclone - Impact: Cactus Ransomware @Northwave_Sec northwave-cybersecurity.com/whitepapers-ar…


Cyb5r3 Gene 已轉發

MS-DOS comments 🔥🔥🔥

vxunderground's tweet image. MS-DOS comments 🔥🔥🔥

Cyb5r3 Gene 已轉發

Attention: we are sharing a one-off special report on Cactus ransomware group campaign targeting Qlik Sense (data viz & business intelligence tool): shadowserver.org/what-we-do/net… 2894 IPs found vulnerable to CVE-2023-48365 91 IPs found compromised by Cactus ransomware group

Shadowserver's tweet image. Attention: we are sharing a one-off special report on Cactus ransomware group campaign targeting Qlik Sense (data viz & business intelligence tool): shadowserver.org/what-we-do/net…

2894 IPs found vulnerable to CVE-2023-48365

91 IPs found compromised by Cactus ransomware group
Shadowserver's tweet image. Attention: we are sharing a one-off special report on Cactus ransomware group campaign targeting Qlik Sense (data viz & business intelligence tool): shadowserver.org/what-we-do/net…

2894 IPs found vulnerable to CVE-2023-48365

91 IPs found compromised by Cactus ransomware group

Cyb5r3 Gene 已轉發

When I look at this table, the first thing I see is that size matters more I reckon users prefer being told: „use a password with at least 10 letters“ instead of „use at least 8 characters, lower and upper case letters, numbers and symbols“ hivesystems.com/blog/are-your-…

cyb3rops's tweet image. When I look at this table, the first thing I see is that size matters more 

I reckon users prefer being told: „use a password with at least 10 letters“ instead of „use at least 8 characters, lower and upper case letters, numbers and symbols“

hivesystems.com/blog/are-your-…

Cyb5r3 Gene 已轉發

The #MITRE Corporation, a non-profit overseeing federally funded research, was breached by nation-state hackers in January through two zero-day vulnerabilities in products from IT vendor #Ivanti. therecord.media/mitre-breached…


Cyb5r3 Gene 已轉發

In support of the DoD’s Zero Trust Strategy, we're releasing activity-level guidance on how to use Microsoft cloud services to implement Zero Trust within the DoD and DIB. Read on: msft.it/6014YB4Oo #ZeroTrust

microsoft.com

New Microsoft guidance for the DoD Zero Trust Strategy | Microsoft Security Blog

We are excited to announce new guidance for implementing the Department of Defense Zero Trust Strategy with Microsoft cloud services.


Cyb5r3 Gene 已轉發

It’s Sunday 07:03 am and I decided to read @Volexity‘s article on UTA0218‘s post exploitation activity (PaloAlto CVE-2024-3400). I saw that a generic rule of mine detected the new UPSTYLE backdoor when it was uploaded to VT yesterday (while no one else had detections for it) and…

cyb3rops's tweet image. It’s Sunday 07:03 am and I decided to read @Volexity‘s article on UTA0218‘s post exploitation activity (PaloAlto CVE-2024-3400). 
I saw that a generic rule of mine detected the new UPSTYLE backdoor when it was uploaded to VT yesterday (while no one else had detections for it) and…
cyb3rops's tweet image. It’s Sunday 07:03 am and I decided to read @Volexity‘s article on UTA0218‘s post exploitation activity (PaloAlto CVE-2024-3400). 
I saw that a generic rule of mine detected the new UPSTYLE backdoor when it was uploaded to VT yesterday (while no one else had detections for it) and…
cyb3rops's tweet image. It’s Sunday 07:03 am and I decided to read @Volexity‘s article on UTA0218‘s post exploitation activity (PaloAlto CVE-2024-3400). 
I saw that a generic rule of mine detected the new UPSTYLE backdoor when it was uploaded to VT yesterday (while no one else had detections for it) and…
cyb3rops's tweet image. It’s Sunday 07:03 am and I decided to read @Volexity‘s article on UTA0218‘s post exploitation activity (PaloAlto CVE-2024-3400). 
I saw that a generic rule of mine detected the new UPSTYLE backdoor when it was uploaded to VT yesterday (while no one else had detections for it) and…

Our latest blog post details @Volexity's identification & incident response associated with the Palo Alto Networks GlobalProtect #0day vuln, assigned CVE-2024-3400, that the team found being exploited in the wild. Read more here: volexity.com/blog/2024/04/1… #DFIR #ThreatIntel



Cyb5r3 Gene 已轉發

XZ backdoor story – Initial analysis. Unlike other supply chain attacks we have seen in Node.js, PyPI, FDroid, and the Linux Kernel that mostly consisted of atomic malicious patches, fake packages and typosquatted package names, this incident was a multi-stage operation that…

e_kaspersky's tweet image. XZ backdoor story – Initial analysis.

Unlike other supply chain attacks we have seen in Node.js, PyPI, FDroid, and the Linux Kernel that mostly consisted of atomic malicious patches, fake packages and typosquatted package names, this incident was a multi-stage operation that…

Cyb5r3 Gene 已轉發

Our team at @Volexity has identified a new 0day exploited in the wild. This time we caught a threat actor using an unauthenticated RCE in Palo Alto Networks GlobalProtect. It has been assigned CVE-2024-3400 and is covered in this @PaloAltoNtwks advisory security.paloaltonetworks.com/CVE-2024-3400


Cyb5r3 Gene 已轉發

High interest in #LockBit 4.0 now that LockBit has resumed operations after its Feb 2024 disruption. Like others, we've found possible imposters on #VirusTotal identifying as Lockbit 4.0. A list of five SHA256 hashes is available at: bit.ly/3wAbxPB #Unit42ThreatIntel

Unit42_Intel's tweet image. High interest in #LockBit 4.0 now that LockBit has resumed operations after its Feb 2024 disruption. Like others, we've found possible imposters on #VirusTotal identifying as Lockbit 4.0. A list of five SHA256 hashes is available at: bit.ly/3wAbxPB

#Unit42ThreatIntel
Unit42_Intel's tweet image. High interest in #LockBit 4.0 now that LockBit has resumed operations after its Feb 2024 disruption. Like others, we've found possible imposters on #VirusTotal identifying as Lockbit 4.0. A list of five SHA256 hashes is available at: bit.ly/3wAbxPB

#Unit42ThreatIntel
Unit42_Intel's tweet image. High interest in #LockBit 4.0 now that LockBit has resumed operations after its Feb 2024 disruption. Like others, we've found possible imposters on #VirusTotal identifying as Lockbit 4.0. A list of five SHA256 hashes is available at: bit.ly/3wAbxPB

#Unit42ThreatIntel

Cyb5r3 Gene 已轉發

NCSC UK 🇬🇧 alert on 🇷🇺 SVR tactics ⚠️ 🎯 SVR tradecraft includes: • Password spraying dormant and/or service accounts • MFA fatigue attacks • Abusing token-issued access • Registering their own devices • Residential Proxy Network for C2 ncsc.gov.uk/news/svr-cyber…


Loading...

Something went wrong.


Something went wrong.