#threatintel search results

NOX — Cyber Threat Intelligence Framework Async, plugin-driven CTI engine • 124+ sources • Recursive pivoting • OPSEC (proxy + kill-switch) • Hash cracking + correlation • Autoscan: breach → pivot → dork → scrape github.com/nox-project/no… #OSINT #ThreatIntel


🚨 HIGH: CVE-2026-34587 (CVSS 8.1) - Kirby CMS authorization bypass allows authenticated attackers to publish pages without proper permissions. Patch to v4.9.0 or v5.4.0 immediately. #CVE #PatchNow #ThreatIntel

DFIR_Lab's tweet image. 🚨 HIGH: CVE-2026-34587 (CVSS 8.1) - Kirby CMS authorization bypass allows authenticated attackers to publish pages without proper permissions. Patch to v4.9.0 or v5.4.0 immediately. #CVE #PatchNow #ThreatIntel

🚨 HIGH: CVE-2011-2005 (CVSS 7.8) - Windows XP/Server 2003 afd.sys privilege escalation. Local attackers can gain elevated privileges via crafted application. Legacy systems at risk. #CVE #PatchNow #ThreatIntel

DFIR_Lab's tweet image. 🚨 HIGH: CVE-2011-2005 (CVSS 7.8) - Windows XP/Server 2003 afd.sys privilege escalation. Local attackers can gain elevated privileges via crafted application. Legacy systems at risk. #CVE #PatchNow #ThreatIntel

🔴 CVE-2026-3854: GitHub/GHES RCE — 88% GHES unpatched 🟠 ShinyHunters: 8.2M Pitney Bowes via Anodot 🟠 LAPSUS$ leaks 96GB Checkmarx 🟠 GlassWorm: 73 OpenVSX sleepers 🟠 Scattered Spider arrest intel.overresearched.net/2026/04/28/cti… #Daily #ThreatIntel #InfoSec


If Iran is already flexing on the FBI Director’s inbox, your real problem isn’t the password spray. It’s the quiet tenant sabotage that looks like “just another admin change.” Details + what to watch next: blog.alphahunt.io/forecasts-from… #AlphaHunt #ThreatIntel


Lazarus Group hit KelpDAO for $290M. Fast attribution because their infrastructure patterns are recognizable — same ASNs, same residential proxy clusters. Those signals exist in network telemetry before the attack. Most vendors aren't reading them. #ThreatIntel #CyberSecurity

knutix's tweet image. Lazarus Group hit KelpDAO for $290M. Fast attribution because their infrastructure patterns are recognizable — same ASNs, same residential proxy clusters. Those signals exist in network telemetry before the attack. Most vendors aren't reading them. #ThreatIntel #CyberSecurity

A failed Windows patch has left users exposed to zero-click attacks, now exploited by threat actors tied to APT28. One missed update can put entire networks at risk. Patch management is not optional! 🛡️ #cybersecurity #threatintel Source: Security Week

efani's tweet image. A failed Windows patch has left users exposed to zero-click attacks, now exploited by threat actors tied to APT28. One missed update can put entire networks at risk. Patch management is not optional! 🛡️ #cybersecurity #threatintel
Source: Security Week

Catching up on the @TechSphereAcad class I missed. Diving into Threat Intelligence. It’s one thing to see an alert, but using the Diamond Model to understand the 'Who, How, and Why' behind an attack is a game changer #CyberSecurity #ThreatIntel #SOC

mr_kay7's tweet image. Catching up on the @TechSphereAcad class I missed. 

Diving into Threat Intelligence. It’s one thing to see an alert, but using the Diamond Model to understand the 'Who, How, and Why' behind an attack is a game changer 

#CyberSecurity #ThreatIntel #SOC
mr_kay7's tweet image. Catching up on the @TechSphereAcad class I missed. 

Diving into Threat Intelligence. It’s one thing to see an alert, but using the Diamond Model to understand the 'Who, How, and Why' behind an attack is a game changer 

#CyberSecurity #ThreatIntel #SOC
mr_kay7's tweet image. Catching up on the @TechSphereAcad class I missed. 

Diving into Threat Intelligence. It’s one thing to see an alert, but using the Diamond Model to understand the 'Who, How, and Why' behind an attack is a game changer 

#CyberSecurity #ThreatIntel #SOC
mr_kay7's tweet image. Catching up on the @TechSphereAcad class I missed. 

Diving into Threat Intelligence. It’s one thing to see an alert, but using the Diamond Model to understand the 'Who, How, and Why' behind an attack is a game changer 

#CyberSecurity #ThreatIntel #SOC

🔐 From a Single Phone Call to 5.5M Records: The Anatomy of the ADT Breach Home security giant ADT confirmed a data breach affecting 5.5 million customers after the ShinyHunters 🔗 threataft.com/articles/adt-d… #CyberSecurity #ThreatIntel #ADT #DataBreach #ShinyHunters #Okta


Infoblox uncovers the K99 compound: a brutal MaaS operation using human trafficking to power biometric hijacking and global Android banking fraud. #K99Compound #ThreatIntel #HumanRights #CyberSecurity #BankingTrojan #MaaS #SoutheastAsia securityonline.info/k99-triumph-ci…

the_yellow_fall's tweet image. Infoblox uncovers the K99 compound: a brutal MaaS operation using human trafficking to power biometric hijacking and global Android banking fraud.

#K99Compound #ThreatIntel #HumanRights #CyberSecurity #BankingTrojan #MaaS #SoutheastAsia
securityonline.info/k99-triumph-ci…

Rev-shell via jsc.exe AppDomainManager hijack: bin[.]zip > jsluncher SW_HIDE > jsc.exe + .config > JscLoader.dll > LoadLibrary victim.dll > cmd/TCP-53 Cute C2 IP exported as _p1.._p4 (patch w/o rebuild) #threatintel #LOLBin


What does a first draft in Indago look like? ~75–85% done structured + sourced What’s left is your analysis Full workflow → indagotech.com/all-articles/h… #threatintel #osint


Zscaler reveals a 2026 attack chain using fake Adobe Reader lures to install ScreenConnect via in-memory execution and UAC bypass. Protect your network now! #ScreenConnect #ThreatIntel #Malware #CyberSecurity #Zscaler #InfoSec securityonline.info/fake-adobe-rea…

the_yellow_fall's tweet image. Zscaler reveals a 2026 attack chain using fake Adobe Reader lures to install ScreenConnect via in-memory execution and UAC bypass. Protect your network now!

#ScreenConnect #ThreatIntel #Malware #CyberSecurity #Zscaler #InfoSec
securityonline.info/fake-adobe-rea…

🚨 HIGH: CVE-2011-2005 (CVSS 7.8) - Windows XP/Server 2003 afd.sys privilege escalation. Local attackers can gain elevated privileges via crafted application. Legacy systems at risk. #CVE #PatchNow #ThreatIntel

DFIR_Lab's tweet image. 🚨 HIGH: CVE-2011-2005 (CVSS 7.8) - Windows XP/Server 2003 afd.sys privilege escalation. Local attackers can gain elevated privileges via crafted application. Legacy systems at risk. #CVE #PatchNow #ThreatIntel

🚨 HIGH: CVE-2026-34587 (CVSS 8.1) - Kirby CMS authorization bypass allows authenticated attackers to publish pages without proper permissions. Patch to v4.9.0 or v5.4.0 immediately. #CVE #PatchNow #ThreatIntel

DFIR_Lab's tweet image. 🚨 HIGH: CVE-2026-34587 (CVSS 8.1) - Kirby CMS authorization bypass allows authenticated attackers to publish pages without proper permissions. Patch to v4.9.0 or v5.4.0 immediately. #CVE #PatchNow #ThreatIntel

🚨 HIGH SEVERITY: CVE-2011-0611 (CVSS 8.8) Adobe Flash Player memory corruption flaw enables remote code execution via crafted SWF files. Affects Flash, AIR, Reader & Acrobat. Exploited in wild via malicious Office docs. Patch immediately! #CVE #PatchNow #ThreatIntel

DFIR_Lab's tweet image. 🚨 HIGH SEVERITY: CVE-2011-0611 (CVSS 8.8)

Adobe Flash Player memory corruption flaw enables remote code execution via crafted SWF files. Affects Flash, AIR, Reader & Acrobat.

Exploited in wild via malicious Office docs.

Patch immediately!

#CVE #PatchNow #ThreatIntel

Brazilian LofyGang resurfaced after three years, distributing LofyStealer malware disguised as Minecraft hack 'Slinky.' The stealer harvests credentials, tokens, and financial data from multiple browsers before exfiltrating to C2 servers. #ThreatIntel 🔗 Full TRC analysis:

aviatrix.ai

LofyGang's LofyStealer Targets Minecraft Players in 2026

In April 2026, Brazilian cybercrime group LofyGang launched LofyStealer, a malware disguised as a Minecraft hack, to steal sensitive user data.


Nessus Agent vulnerability could allow attackers to gain SYSTEM-level access. Check your exposure now. ⚠️ Also, Re-examine wireless protocol use, as legacy WEP and WPA remain weaker options. Get more news: esecurityplanet.com #Cybersecurity #Infosec #ThreatIntel


🔴 CVE-2026-3854: GitHub/GHES RCE — 88% GHES unpatched 🟠 ShinyHunters: 8.2M Pitney Bowes via Anodot 🟠 LAPSUS$ leaks 96GB Checkmarx 🟠 GlassWorm: 73 OpenVSX sleepers 🟠 Scattered Spider arrest intel.overresearched.net/2026/04/28/cti… #Daily #ThreatIntel #InfoSec


Security Bulletin: Windows (CVE-2026-32202, CVSS 4.3) allows spoofing and credential leakage via SMB. Actively exploited — patch now. #ThreatIntel #RedLeggCTI hubs.li/Q04dPT200


As part of the first task at Cyblack SOC Academy, I studied the courses provided on LetsDefend: Cyber Threat Intelligence (CTI) How to Investigate a SIEM Alert VirusTotal for SOC Analysts @ireteeh @segoslavia @Hubris_savvy #CyberSecurity #SOC #ThreatIntel #BlueTeam

Becca_cyber's tweet image. As part of the first task at Cyblack SOC Academy, I studied the courses provided on LetsDefend: 

Cyber Threat Intelligence (CTI)
How to Investigate a SIEM Alert VirusTotal for SOC Analysts 

@ireteeh @segoslavia @Hubris_savvy 

#CyberSecurity #SOC #ThreatIntel #BlueTeam
Becca_cyber's tweet image. As part of the first task at Cyblack SOC Academy, I studied the courses provided on LetsDefend: 

Cyber Threat Intelligence (CTI)
How to Investigate a SIEM Alert VirusTotal for SOC Analysts 

@ireteeh @segoslavia @Hubris_savvy 

#CyberSecurity #SOC #ThreatIntel #BlueTeam
Becca_cyber's tweet image. As part of the first task at Cyblack SOC Academy, I studied the courses provided on LetsDefend: 

Cyber Threat Intelligence (CTI)
How to Investigate a SIEM Alert VirusTotal for SOC Analysts 

@ireteeh @segoslavia @Hubris_savvy 

#CyberSecurity #SOC #ThreatIntel #BlueTeam
Becca_cyber's tweet image. As part of the first task at Cyblack SOC Academy, I studied the courses provided on LetsDefend: 

Cyber Threat Intelligence (CTI)
How to Investigate a SIEM Alert VirusTotal for SOC Analysts 

@ireteeh @segoslavia @Hubris_savvy 

#CyberSecurity #SOC #ThreatIntel #BlueTeam

🚨 DEFACEMENT ALERT 🚨 Group: BABAYO EROR SYSTEM Target: Multiple victims across various domains, including educational, media, and design sectors. #threatintel #defacement #multiplecountries

ThreatviewioLab's tweet image. 🚨 DEFACEMENT ALERT 🚨
Group: BABAYO EROR SYSTEM
Target: Multiple victims across various domains, including educational, media, and design sectors.

#threatintel #defacement #multiplecountries

Rev-shell via jsc.exe AppDomainManager hijack: bin[.]zip > jsluncher SW_HIDE > jsc.exe + .config > JscLoader.dll > LoadLibrary victim.dll > cmd/TCP-53 Cute C2 IP exported as _p1.._p4 (patch w/o rebuild) #threatintel #LOLBin


Catching up on the @TechSphereAcad class I missed. Diving into Threat Intelligence. It’s one thing to see an alert, but using the Diamond Model to understand the 'Who, How, and Why' behind an attack is a game changer #CyberSecurity #ThreatIntel #SOC

mr_kay7's tweet image. Catching up on the @TechSphereAcad class I missed. 

Diving into Threat Intelligence. It’s one thing to see an alert, but using the Diamond Model to understand the 'Who, How, and Why' behind an attack is a game changer 

#CyberSecurity #ThreatIntel #SOC
mr_kay7's tweet image. Catching up on the @TechSphereAcad class I missed. 

Diving into Threat Intelligence. It’s one thing to see an alert, but using the Diamond Model to understand the 'Who, How, and Why' behind an attack is a game changer 

#CyberSecurity #ThreatIntel #SOC
mr_kay7's tweet image. Catching up on the @TechSphereAcad class I missed. 

Diving into Threat Intelligence. It’s one thing to see an alert, but using the Diamond Model to understand the 'Who, How, and Why' behind an attack is a game changer 

#CyberSecurity #ThreatIntel #SOC
mr_kay7's tweet image. Catching up on the @TechSphereAcad class I missed. 

Diving into Threat Intelligence. It’s one thing to see an alert, but using the Diamond Model to understand the 'Who, How, and Why' behind an attack is a game changer 

#CyberSecurity #ThreatIntel #SOC

The big question: how do you shift from reactive to playbook-driven, intelligence-driven action? Not just responding to alerts. But having intelligence trigger the playbook before the alert even fires. 🎯 This is where mature teams pull ahead. #ThreatIntel #SOC #IR


The real cost of fragmented intelligence? A tax on attention. Your analysts are focused on the wrong thing - while the threat keeps moving. ⏱️ CTI doesn't wait for you to get organized. #ThreatIntel #SOC #CTI


Catching up on the @TechSphereAcad class I missed. Diving into Threat Intelligence. It’s one thing to see an alert, but using the Diamond Model to understand the 'Who, How, and Why' behind an attack is a game changer #CyberSecurity #ThreatIntel #SOC

mr_kay7's tweet image. Catching up on the @TechSphereAcad class I missed. 

Diving into Threat Intelligence. It’s one thing to see an alert, but using the Diamond Model to understand the 'Who, How, and Why' behind an attack is a game changer 

#CyberSecurity #ThreatIntel #SOC
mr_kay7's tweet image. Catching up on the @TechSphereAcad class I missed. 

Diving into Threat Intelligence. It’s one thing to see an alert, but using the Diamond Model to understand the 'Who, How, and Why' behind an attack is a game changer 

#CyberSecurity #ThreatIntel #SOC
mr_kay7's tweet image. Catching up on the @TechSphereAcad class I missed. 

Diving into Threat Intelligence. It’s one thing to see an alert, but using the Diamond Model to understand the 'Who, How, and Why' behind an attack is a game changer 

#CyberSecurity #ThreatIntel #SOC
mr_kay7's tweet image. Catching up on the @TechSphereAcad class I missed. 

Diving into Threat Intelligence. It’s one thing to see an alert, but using the Diamond Model to understand the 'Who, How, and Why' behind an attack is a game changer 

#CyberSecurity #ThreatIntel #SOC

A failed Windows patch has left users exposed to zero-click attacks, now exploited by threat actors tied to APT28. One missed update can put entire networks at risk. Patch management is not optional! 🛡️ #cybersecurity #threatintel Source: Security Week

efani's tweet image. A failed Windows patch has left users exposed to zero-click attacks, now exploited by threat actors tied to APT28. One missed update can put entire networks at risk. Patch management is not optional! 🛡️ #cybersecurity #threatintel
Source: Security Week

Who is Pryx? 👀 Our latest cybercrime intelligence report examines a threat actor tied to data breaches, Hellcat / SLSH, and claims of access to infrastructure leading to a fatal incident ⬇️ See full report #CyberCrime #OSINT #ThreatIntel #Ransomware

IntelOpsV3's tweet image. Who is Pryx? 👀

Our latest cybercrime intelligence report examines a threat actor tied to data breaches, Hellcat / SLSH, and claims of access to infrastructure leading to a fatal incident

⬇️ See full report

#CyberCrime #OSINT #ThreatIntel #Ransomware

Zscaler reveals a 2026 attack chain using fake Adobe Reader lures to install ScreenConnect via in-memory execution and UAC bypass. Protect your network now! #ScreenConnect #ThreatIntel #Malware #CyberSecurity #Zscaler #InfoSec securityonline.info/fake-adobe-rea…

the_yellow_fall's tweet image. Zscaler reveals a 2026 attack chain using fake Adobe Reader lures to install ScreenConnect via in-memory execution and UAC bypass. Protect your network now!

#ScreenConnect #ThreatIntel #Malware #CyberSecurity #Zscaler #InfoSec
securityonline.info/fake-adobe-rea…

🚨 Potential Phishing / Malicious App Distribution Fake Google Play page detected: motor--appstore-googleplay/.pages/.dev (Language: Russian) Redirects users to download an APK from: shadowroute/.co/motor #Phishing #Malware #ThreatIntel #AndroidSecurity @500mk500

Malwarehunterr's tweet image. 🚨 Potential Phishing / Malicious App Distribution

Fake Google Play page detected:

motor--appstore-googleplay/.pages/.dev (Language: Russian)

Redirects users to download an APK from:

shadowroute/.co/motor

#Phishing #Malware #ThreatIntel #AndroidSecurity @500mk500

A GreyNoise report reveals that surges in internet scanning precede 50% of major vulnerabilities by 11 days. Learn to spot the signals before the CVE drops. #ZeroDay #ThreatIntel #CyberSecurity #InfoSec #NetworkSecurity #Cisco #EarlyWarning meterpreter.org/the-11-day-hea…

the_yellow_fall's tweet image. A GreyNoise report reveals that surges in internet scanning precede 50% of major vulnerabilities by 11 days. Learn to spot the signals before the CVE drops.

#ZeroDay #ThreatIntel #CyberSecurity #InfoSec #NetworkSecurity #Cisco  #EarlyWarning
meterpreter.org/the-11-day-hea…

This Diamond Model from our “Cat’s Got Your Files: Lynx Ransomware” report illustrates the four core elements of the intrusion. See how all four vertices aligned for full-domain compromise 👇 thedfirreport.com/2025/12/17/cat… #DFIR #ThreatIntel #Ransomware #BlueTeam #CyberSecurity

TheDFIRReport's tweet image. This Diamond Model from our “Cat’s Got Your Files: Lynx Ransomware” report illustrates the four core elements of the intrusion.

See how all four vertices aligned for full-domain compromise 👇
thedfirreport.com/2025/12/17/cat…

#DFIR #ThreatIntel #Ransomware #BlueTeam #CyberSecurity

We saved your seat at 'The Five Most Dangerous New Attack Techniques: Crucial Tips for Defenders' keynote — starting soon at RSAC 2026 Conference! 🪤 Moscone West, Level 1. Don't miss it. See you soon. 👀 @OneRSAC | #Cybersecurity #ThreatIntel

SANSInstitute's tweet image. We saved your seat at 'The Five Most Dangerous New Attack Techniques: Crucial Tips for Defenders' keynote — starting soon at RSAC 2026 Conference! 🪤 

Moscone West, Level 1. Don't miss it. See you soon. 👀 

@OneRSAC | #Cybersecurity #ThreatIntel

Crucix: Tu terminal OSINT sin nube. 27 fuentes de inteligencia en una interfaz estilo Jarvis. Satélites, economía, conflictos, todo en tu máquina. ¡Conéctalo a un LLM para alertas proactivas! Ideal para #OSINT. 🕵️‍♂️🧠💥📡 #Ciberseguridad #ThreatIntel #Infosec #OpenSource

EsGeeks's tweet image. Crucix: Tu terminal OSINT sin nube. 27 fuentes de inteligencia en una interfaz estilo Jarvis. Satélites, economía, conflictos, todo en tu máquina. ¡Conéctalo a un LLM para alertas proactivas! Ideal para #OSINT.
🕵️‍♂️🧠💥📡 #Ciberseguridad #ThreatIntel #Infosec #OpenSource

ASEC uncovers Kimsuky’s evolved LNK-to-Python chain abusing Dropbox for stealthy persistence. Learn how to detect this complex multi-stage backdoor. #Kimsuky #ThreatIntel #MalwareAnalysis #InfoSec #CyberSecurity #APT #Backdoor securityonline.info/kimsuky-multi-…

the_yellow_fall's tweet image. ASEC uncovers Kimsuky’s evolved LNK-to-Python chain abusing Dropbox for stealthy persistence. Learn how to detect this complex multi-stage backdoor.

#Kimsuky #ThreatIntel #MalwareAnalysis #InfoSec #CyberSecurity #APT #Backdoor
securityonline.info/kimsuky-multi-…

RSAC 2026 made one thing clear: AI is reshaping cybersecurity—across attacks, teams, and skills. The gap isn’t awareness. It’s capability. Here’s what stood out—and what comes next: 🔗 go.sans.org/41T2NW @OneRSAC | #ThreatIntel #AI

SANSInstitute's tweet image. RSAC 2026 made one thing clear: AI is reshaping cybersecurity—across attacks, teams, and skills.
The gap isn’t awareness. It’s capability.

Here’s what stood out—and what comes next:

🔗 go.sans.org/41T2NW

@OneRSAC | #ThreatIntel #AI
SANSInstitute's tweet image. RSAC 2026 made one thing clear: AI is reshaping cybersecurity—across attacks, teams, and skills.
The gap isn’t awareness. It’s capability.

Here’s what stood out—and what comes next:

🔗 go.sans.org/41T2NW

@OneRSAC | #ThreatIntel #AI
SANSInstitute's tweet image. RSAC 2026 made one thing clear: AI is reshaping cybersecurity—across attacks, teams, and skills.
The gap isn’t awareness. It’s capability.

Here’s what stood out—and what comes next:

🔗 go.sans.org/41T2NW

@OneRSAC | #ThreatIntel #AI
SANSInstitute's tweet image. RSAC 2026 made one thing clear: AI is reshaping cybersecurity—across attacks, teams, and skills.
The gap isn’t awareness. It’s capability.

Here’s what stood out—and what comes next:

🔗 go.sans.org/41T2NW

@OneRSAC | #ThreatIntel #AI

🎖️ El Curso de Maltego Graph CE está permanente disponible en el aula virtual para acceso inmediato. 📲 WhatsApp: wa.me/51949304030 🌐 reydes.com/e/Curso_Maltego #cyberthreatintelligence #threatintel #cybersecurity #investigation #cyberinvestigation #bugbounty #osint

Alonso_ReYDeS's tweet image. 🎖️ El Curso de Maltego Graph CE está permanente disponible en el aula virtual para acceso inmediato. 📲 WhatsApp: wa.me/51949304030 🌐 reydes.com/e/Curso_Maltego

#cyberthreatintelligence #threatintel #cybersecurity #investigation #cyberinvestigation #bugbounty #osint

🚨 NEW GROUP ALERT: We added #ALP001 to our #ThreatIntel platform. 🛡️ This new ransomware group is already advertising victims: one in the #USA 🇺🇸 and one high-profile target in #China 🇨🇳. The Chinese victim is a global giant in the video surveillance industry. This is a

ido_cohen2's tweet image. 🚨 NEW GROUP ALERT: We added #ALP001 to our #ThreatIntel platform. 🛡️

This new ransomware group is already advertising victims: one in the #USA 🇺🇸 and one high-profile target in #China 🇨🇳.

The Chinese victim is a global giant in the video surveillance industry. This is a

Infoblox uncovers the K99 compound: a brutal MaaS operation using human trafficking to power biometric hijacking and global Android banking fraud. #K99Compound #ThreatIntel #HumanRights #CyberSecurity #BankingTrojan #MaaS #SoutheastAsia securityonline.info/k99-triumph-ci…

the_yellow_fall's tweet image. Infoblox uncovers the K99 compound: a brutal MaaS operation using human trafficking to power biometric hijacking and global Android banking fraud.

#K99Compound #ThreatIntel #HumanRights #CyberSecurity #BankingTrojan #MaaS #SoutheastAsia
securityonline.info/k99-triumph-ci…

We’re seeing a “Missing Font” ClickFix chain in the wild. Flow: 1️⃣ Fake “Missing Font” prompt 2️⃣ Leads to a BSOD-style recovery screen 3️⃣ Prompts users to open Terminal/PowerShell directly (skipping the Run dialog) and execute commands #infosec #DFIR #threatintel

TheDFIRReport's tweet image. We’re seeing a “Missing Font” ClickFix chain in the wild.

Flow:
1️⃣ Fake “Missing Font” prompt
2️⃣ Leads to a BSOD-style recovery screen
3️⃣ Prompts users to open Terminal/PowerShell directly (skipping the Run dialog) and execute commands

#infosec #DFIR #threatintel

What happens when crime gets corporate? Structured roles. Recruitment pipelines. Organized operations. Join our webinar to understand the dark web job market. Register: kas.pr/r3hb #CyberSecurity #ThreatIntel #DarkWeb

kaspersky's tweet image. What happens when crime gets corporate? Structured roles. Recruitment pipelines. Organized operations.

Join our webinar to understand the dark web job market. Register: kas.pr/r3hb

#CyberSecurity #ThreatIntel #DarkWeb

A useful way to revisit key CTI ideas from the SANS Cyber Threat Intelligence Summit 2022 - all in one place. If you work in threat intel, wouldn’t it help to keep summit resources easy to return to? start.me/p/6rnyLp/sans-… #CTI #ThreatIntel

startme's tweet image. A useful way to revisit key CTI ideas from the SANS Cyber Threat Intelligence Summit 2022 - all in one place. If you work in threat intel, wouldn’t it help to keep summit resources easy to return to? start.me/p/6rnyLp/sans-…
 #CTI #ThreatIntel

China is secretly building hacker networks out of everyday routers and IoT devices, turning home tech into digital weapons. This shift means attacks can come from anywhere, anytime. Stay alert and secure your devices. 🔐 #cybersecurity #threatintel Source: CyberScoop

efani's tweet image. China is secretly building hacker networks out of everyday routers and IoT devices, turning home tech into digital weapons. This shift means attacks can come from anywhere, anytime. Stay alert and secure your devices. 🔐 #cybersecurity #threatintel
Source: CyberScoop

I vibe coded a phishing threat intelligence platform 45 days later: → 1,100+ domains monitored → 117 confirmed phishing → 12 campaigns tracked Free public feed: domshield.io #VibeCoding #CyberSecurity #ThreatIntel

Q8CyberTi's tweet image. I vibe coded a phishing threat intelligence platform

45 days later:

→ 1,100+ domains monitored
→ 117 confirmed phishing
→ 12 campaigns tracked

Free public feed: domshield.io
#VibeCoding #CyberSecurity #ThreatIntel

A top member of the Scattered Spider crew pleaded guilty after orchestrating phishing and SIM-swapping attacks that stole over $8M from US victims. This international bust is a serious win against cybercrime. 🕸️💸 #cybersecurity #threatintel Source: CyberScoop

efani's tweet image. A top member of the Scattered Spider crew pleaded guilty after orchestrating phishing and SIM-swapping attacks that stole over $8M from US victims. This international bust is a serious win against cybercrime. 🕸️💸
#cybersecurity #threatintel
Source: CyberScoop

Loading...

Something went wrong.


Something went wrong.