cyberanalyzer's profile picture. Malware Analyst #CyberSecurity #Malware #ThreatIntel #Ransomware #OSINT #Phishing #Maldoc #DFIR #InfoSec

Cyber Analyzer

@cyberanalyzer

Malware Analyst #CyberSecurity #Malware #ThreatIntel #Ransomware #OSINT #Phishing #Maldoc #DFIR #InfoSec

Cyber Analyzer reposted

How Windows access tokens work #ThreatHunting #DFIR

ACEResponder's tweet image. How Windows access tokens work

#ThreatHunting #DFIR

Cyber Analyzer reposted

🚨🚨CVE-2025-53772(CVSS 8.8): Critical RCE in Microsoft IIS WebDeploy! Authenticated attackers can exploit untrusted data deserialization via HTTP headers to execute code remotely. 🔥PoC: gist.github.com/hawktrace/6783… Search by vul.cve Filter👉vul.cve="CVE-2025-53772" ZoomEye…

zoomeye_team's tweet image. 🚨🚨CVE-2025-53772(CVSS 8.8): Critical RCE in Microsoft IIS WebDeploy!  Authenticated attackers can exploit untrusted data deserialization via HTTP headers to execute code remotely. 
🔥PoC: gist.github.com/hawktrace/6783…

Search by vul.cve Filter👉vul.cve="CVE-2025-53772"
ZoomEye…

Details on the critical RCE vulnerability we discovered in Microsoft Web Deploy CVE-2025-53772. hawktrace.com/blog/cve-2025-… #iiswebdeploy #infosec #webdeploy #iis #cve-2025-53772

hawktrace's tweet image. Details on the critical RCE vulnerability we discovered in Microsoft Web Deploy CVE-2025-53772.

hawktrace.com/blog/cve-2025-…

#iiswebdeploy #infosec #webdeploy #iis #cve-2025-53772


Cyber Analyzer reposted

🚀 Released NoVirusThanks USB Radar v1.8.0: Track #USB device events (when a USB device is plugged-in or unplugged, when a file is copied/moved from/to a USB device and files deleted on a USB device) ➨ usbradar.com #CyberSecurity #CyberDefense #DFIR #InfoSec


Cyber Analyzer reposted

🚨 WinRAR CVE-2025-8088: The invisible persistence SOCs can’t afford to miss Attackers are abusing Alternate Data Streams (ADS) to perform path traversal during archive extraction. By appending colon symbol (:) in file names, they sneak hidden objects into system folders…

anyrun_app's tweet image. 🚨 WinRAR CVE-2025-8088: The invisible persistence SOCs can’t afford to miss 

Attackers are abusing Alternate Data Streams (ADS) to perform path traversal during archive extraction. By appending colon symbol (:) in file names, they sneak hidden objects into system folders…
anyrun_app's tweet image. 🚨 WinRAR CVE-2025-8088: The invisible persistence SOCs can’t afford to miss 

Attackers are abusing Alternate Data Streams (ADS) to perform path traversal during archive extraction. By appending colon symbol (:) in file names, they sneak hidden objects into system folders…

Cyber Analyzer reposted

🚨 A fake npm package just hijacked crypto wallets. “nodejs-smtp” disguised itself as the legit nodemailer library—while secretly injecting code into Atomic & Exodus apps to steal BTC, ETH, USDT, XRP, and SOL. Full story → thehackernews.com/2025/09/malici…


Cyber Analyzer reposted

🚀 The new Tools page is LIVE! 🎉 With 100+ free online security tools, we've got everything about IP/domain analysis, data extraction, image EXIF, URL tools—your security needs, all in one place! ➡️ bit.ly/3HStZJi #infosec #cybersecurity #saas

apivoid's tweet image. 🚀 The new Tools page is LIVE! 🎉 With 100+ free online security tools, we've got everything about IP/domain analysis, data extraction, image EXIF, URL tools—your security needs, all in one place! ➡️ bit.ly/3HStZJi #infosec #cybersecurity #saas

Cyber Analyzer reposted

Improved bypass for Windows 11 OOBE: 1. Shift-F10 2. start ms-cxh:localonly Only required on Home and Pro editions.


Cyber Analyzer reposted

🚨#Opendir #Malware🚨 hxxp://172.245.123.24/530/ hxxp://172.245.123.24/380/ ⚠️#FormBook #Stealer ☣️cosses.exe➡️c338c9cdccb21a6f023987865b4a6269 📦#AutoIt 📡hxxp://www.temecula.deals/📸⤵️ 📡hxxp://www.agistaking.xyz

ShanHolo's tweet image. 🚨#Opendir #Malware🚨

hxxp://172.245.123.24/530/ 
hxxp://172.245.123.24/380/

⚠️#FormBook #Stealer 
☣️cosses.exe➡️c338c9cdccb21a6f023987865b4a6269
📦#AutoIt 
📡hxxp://www.temecula.deals/📸⤵️
📡hxxp://www.agistaking.xyz
ShanHolo's tweet image. 🚨#Opendir #Malware🚨

hxxp://172.245.123.24/530/ 
hxxp://172.245.123.24/380/

⚠️#FormBook #Stealer 
☣️cosses.exe➡️c338c9cdccb21a6f023987865b4a6269
📦#AutoIt 
📡hxxp://www.temecula.deals/📸⤵️
📡hxxp://www.agistaking.xyz
ShanHolo's tweet image. 🚨#Opendir #Malware🚨

hxxp://172.245.123.24/530/ 
hxxp://172.245.123.24/380/

⚠️#FormBook #Stealer 
☣️cosses.exe➡️c338c9cdccb21a6f023987865b4a6269
📦#AutoIt 
📡hxxp://www.temecula.deals/📸⤵️
📡hxxp://www.agistaking.xyz

🧵2 🪂 @censysio possible pivot point 🔥🔥 (not services.tls.certificates.leaf_data.issuer.common_name:"DESKTOP-E4F55FE") and "DESKTOP-E4F55FE"

ShanHolo's tweet image. 🧵2
🪂 @censysio possible pivot point 🔥🔥
(not services.tls.certificates.leaf_data.issuer.common_name:"DESKTOP-E4F55FE") and "DESKTOP-E4F55FE"


Cyber Analyzer reposted

We have entered into a new era that renders MFA useless thanks to phishing kits like #Sneaky2FA which are designed to bypass MFA and provide threat actors with access to victim Office 365 accounts via session cookies. Check out the blog post here for more information and…

YungBinary's tweet image. We have entered into a new era that renders MFA useless thanks to phishing kits like #Sneaky2FA which are designed to bypass MFA and provide threat actors with access to victim Office 365 accounts via session cookies.

Check out the blog post here for more information and…

Suspicious URL: hxxps://nextpointkaynersave[.]com/index51[.]php at 104.21.16.1 and hxxps://run-px[.]com at 104.21.64.1 | @cloudflare #malvertising #phishing #ads #malware #infosec #cybersecurity

cyberanalyzer's tweet image. Suspicious URL: hxxps://nextpointkaynersave[.]com/index51[.]php at 104.21.16.1 and hxxps://run-px[.]com at 104.21.64.1 | @cloudflare #malvertising #phishing #ads #malware #infosec #cybersecurity
cyberanalyzer's tweet image. Suspicious URL: hxxps://nextpointkaynersave[.]com/index51[.]php at 104.21.16.1 and hxxps://run-px[.]com at 104.21.64.1 | @cloudflare #malvertising #phishing #ads #malware #infosec #cybersecurity

Active #phishing URL used to receive <form> data from pages hosted at ebsau4[.]s3[.]amazonaws[.]com: hxxps://aeriscargo[.]com/wp-admin/js/widgets/widgets/widgets/widgets/push/validate[.]php | HTTP/1.1 200 OK #cybersecurity #infosec #spam


Cyber Analyzer reposted

AnyDesk Exploit Alert: CVE-2024-12754 Enables Privilege Escalation—PoC Available securityonline.info/anydesk-exploi…


Cyber Analyzer reposted

Sidewinder list of 25 officers.docx 8a4ee0e5267e1393f576aa3732c33d15 C2 pubad-gov-lk[.]net-src[.]info #Sidewinder #APT #IOC

suyog41's tweet image. Sidewinder

list of 25 officers.docx
8a4ee0e5267e1393f576aa3732c33d15

C2
pubad-gov-lk[.]net-src[.]info

#Sidewinder #APT #IOC

Cyber Analyzer reposted

macOS Vulnerability (CVE-2023-32428) Grants Root Access, PoC Published securityonline.info/macos-vulnerab…


Cyber Analyzer reposted

#ESETresearch reveals the first Linux UEFI bootkit, Bootkitty. It disables kernel signature verification and preloads two ELFs unknown during our analysis. Also discovered, a possibly related unsigned LKM – both were uploaded to VT early this month. welivesecurity.com/en/eset-resear… 1/5


Cyber Analyzer reposted

🚨 Cybercriminals are ramping up attacks this season, hiding malware in emails and QR codes. It’s a perfect storm for multi-stage attacks—don’t let your guard down. Learn how to spot these hidden threats: thehackernews.com/2024/11/latest… #cybersecurity


Cyber Analyzer reposted

Ducktail C2 ceipvirgendeloreto[.]one Advertising Specialist - Job Description (730).rar f35ddad58eb8da489f60cb4ec65183b6f4f8dbb0ed91a3d87b6db29c2feaa5d8 #Ducktail #IOC

suyog41's tweet image. Ducktail

C2
ceipvirgendeloreto[.]one

Advertising Specialist - Job Description (730).rar
f35ddad58eb8da489f60cb4ec65183b6f4f8dbb0ed91a3d87b6db29c2feaa5d8

#Ducktail #IOC

Cyber Analyzer reposted

sidewinder Consular_guidline_for _Pakistani_citizen_visiting_Nepal.docx (copy) fa95fadc73e5617305a6b71f77e9d255d14402650075107f2272f131d3cf7b00 C2 nepaliport[.]immigration[.]gov[.]np #sidewinder #APT #IOC

Consular_guidline_for_Pakistani_citizen_visiting_Nepal.docx -> mofa-gov-np.dirctt888[.]info #sidewinder 76daea942654d8175f642696fc758b03767db14ca5dda9994797a3f95a34294a

StrikeReadyLabs's tweet image. Consular_guidline_for_Pakistani_citizen_visiting_Nepal.docx

-&amp;gt; mofa-gov-np.dirctt888[.]info
#sidewinder 
76daea942654d8175f642696fc758b03767db14ca5dda9994797a3f95a34294a


Loading...

Something went wrong.


Something went wrong.