Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @360Netlab
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @360Netlab
-
360 Netlab proslijedio/la je Tweet
Now I understand why so many Gafgyt and Mirai variants were named Corona, as shown in my download DB. The authors wanted their shit to spread like a real corona family of virus.pic.twitter.com/6iel2OXl7C
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
360 Netlab proslijedio/la je Tweet
#cybersecurity#Magecart#ThreatHunting -- reporting address hxxps://apis-analytics.com/testify#baddomain apis-analytics[.]com just registered severals days agopic.twitter.com/jcQ7bkONoA
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Our application for an automatic developer account has been shot down and appeal is not allowed.
. Anyhow, xbox was ddosed today by the gafgyt botnet.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Our
#BoTMon (DDoS botnet C2 command tracking system) shows http://a.root-servers.net was attacked about 45 mins ago by the xor.ddos botnet. (Should we create a dedicated twitter account for this purpose so our followers won't get flooded by the alerts?pic.twitter.com/bRsiCjv7Yr
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Our DDos botnet C2 command tracking system shows http://justice.gov is being attacked right now by the mirai botnet.pic.twitter.com/PHF66GCCPf
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Our DDos botnet C2 command tracking system shows http://mcdonalds.com was attacked 5 hours ago today by the mirai botnet, big mac hater?pic.twitter.com/m9DcRG1Okf
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Our DDos botnet C2 command tracking system shows http://speedtest.net (151.101.2.219) has been ddos attacked today by the gafgyt botnet, what is the motivation for attacking http://speedtest.net ?pic.twitter.com/47KapBChbu
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
360 Netlab proslijedio/la je Tweet
#systemdMiner (1/2)releases new tool for SSH brute. It downloads an .tgz file from 94.237.85[.89:8080/sshd.tar.gz.$(uname -m) which contains 3 files: pw|ss|ssh - pw: SSH passwd list(18K+) - ss: pnscan ELF file to scan SSH Servers - ssh: bruteforcing tool which integrates sshpasspic.twitter.com/TPQcfbmp9P
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A new mirai variant is causing network wide 81 scan traffic spike, https://scan.netlab.360.com/#/dashboard?dstport=81&tsbeg=1577037600000&tsend=1577642400000 … and it is going after this https://github.com/mcw0/PoC/blob/master/TVT-PoC.py …, do you see it?
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Watch your 6379 port.https://twitter.com/JiaYu_521/status/1211142314124439552 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hmmmm, googletagmanager, sounds very legit....,
https://twitter.com/xuy1202/status/1210173838991884288 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
#0-day And sending the captured files to a receiver at 103.82.143.51. Due to the real impact here, we suggest reader looking for anything going to that IP on their network and take necessary actions. (2/2)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
#0-day Since 2019-12-04 08:22:29 (UTC), we have been witnessing ongoing 0 day attack targeting a network CPE vendor (not the big players, but there are about ~100,000 devices online according to public available data). The attacker is snooping on port 21,25,143,110 (1/2)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Our latest blog, Mozi, another botnet uses DHT protocol targeting weak telnet password and 11 different vulnerabilitieshttps://blog.netlab.360.com/mozi-another-botnet-using-dht/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Our latest blog, Dacls, the Dual platform RAT, what is interesting is the links to the Lazarus Group, so Lazarus targets Linux as well?https://blog.netlab.360.com/dacls-the-dual-platform-rat-en/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
DDG has another updatehttps://twitter.com/JiaYu_521/status/1204251342698475520 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
360 Netlab proslijedio/la je Tweet
ECHOBOT came back with DDoS and a lot of exploits https://twitter.com/bad_packets/status/1203782167953731584 …pic.twitter.com/1GPQRGbjNO
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
360 Netlab proslijedio/la je Tweet
#cybersecurity#IOC recently I spent some time on data-anomaly-driven web security tracing, parts of the results: -- way too many WordPress sites were been hacked( i got over 10k in less 1 month), and most of them will keep the compromised status for very long timepic.twitter.com/dF7WrgeJwo
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Our latest blog, https://blog.netlab.360.com/the-awaiting-roboto-botnet-en/ … This P2P botnet is an interesting one, with multiply build-in features and encryption mechanisms, it just sits quietly under the radar, what is it waiting for?
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.