Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @GoCyberYourself
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @GoCyberYourself
-
Kevin proslijedio/la je Tweet
Possible APT34 domain lebanonbuilder[.]com was registered on 2/2 through THCservers using cd.redel@protonmail[.]com and is hosted on a probable dedicated server at 23.106.160[.]127. In
@ThreatConnect: https://app.threatconnect.com/auth/incident/incident.xhtml?incident=2989360197 …pic.twitter.com/vokwbytFai
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Kevin proslijedio/la je Tweet
Want to see how the
@Mandiant red team weaponizes@FireEye threat intel for R&D and TTP development? Check out some research I did with@evan_pena2003 and@FuzzySec. Also includes some new executables that can be used for DLL abuse.https://www.fireeye.com/blog/threat-research/2020/01/abusing-dll-misconfigurations.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Suspicious domain hr-westat\.com was registered on 1/25 by george.kayak@yandex\.com. One to watch considering the
@IntezerLabs report on#apt34.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Kevin proslijedio/la je Tweet
New
#phishing campaign from#APT34. The Iranian-backed group is using an updated toolset tailored to US-based companies to evade detection. Technical analysis by@polarply &@kajilot:https://hubs.ly/H0mPVWK0Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Kevin proslijedio/la je Tweet
NEW: a cyber-espionage campaign that has attacked organisations across Europe and the Middle East for the last two years is believed to be the work of hackers acting in the interests of the Turkish government, sources tell me,
@josephmenn and@Bing_Chrishttps://reut.rs/2vq9I8kPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Kevin proslijedio/la je Tweet
Two suspicious domains registered through NameCheap at essentially the same time on 1/16/20 and hosted on dedicated servers in M247 IP space: - ms6-upload-serv3[.]com (185.236.202[.]248) - state-awe3-apt[.]com (185.236.203[.]247) In
@ThreatConnect: https://app.threatconnect.com/auth/incident/incident.xhtml?incident=2968522487 …pic.twitter.com/KeNQ5gts2h
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Kevin proslijedio/la je Tweet
Here is the link to the SpecterOps Adversary Tactics: PowerShell course material: https://github.com/specterops/at-ps … Enjoy! For information about our current training offerings, information can be found here: https://specterops.io/how-we-help/training-offerings … (4/4)
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Kevin proslijedio/la je Tweet
Here’s the first (new) 2020 IP from our Russian friends in apartment 28: 184.95.51.172 Using an older known domain but the first server we saw being setup in 2020, around January 13th to be exact.pic.twitter.com/qg87zFGz0O
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Kevin proslijedio/la je Tweet
Looks like the x64
#ZeroCleare variant hit VTI: becb74a8a71a324c78625aa589e77631633d0f15af1473dfe34eca06e7ec6b86pic.twitter.com/sP1UTolXti
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Kevin proslijedio/la je Tweet
Hainan Xiandun Technology Company is APT40. They recruited Hainan based Cambodian linguists three months before APT40 conducted their Cambodia campaign.
#APT40#DingXiaoyang#HainanXiandun#Hainan#MSS https://intrusiontruth.wordpress.com/2020/01/15/hainan-xiandun-technology-company-is-apt40/ …pic.twitter.com/ivGykil3Vu
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Suspicious domain defenseisrael[.]com was registered through Njalla on 1/14 and is currently hosted at 185.10.68[.]221.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Kevin proslijedio/la je Tweet
So just to be explicit about our research
@ThreatConnect, we initially came across the cubenergy-my-sharepoint[.]com by exploiting some consistencies that we've seen in previous Fancy Bear infrastructure.https://twitter.com/kyleehmke/status/1206573157261414405 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Kevin proslijedio/la je Tweet
Check our new post: APT27 ZxShell RootKit module updates https://lab52.io/blog/apt27-rootkit-updates/ …
#malware#APTHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Kevin proslijedio/la je Tweet
We aren't the only people to be suspicious of the Hainan front companies: "How can you find this company on the Internet, can I trust this job advert?" asks one Chinese netizen.
#HainanYili#Hainan#APT#MSS https://intrusiontruth.wordpress.com/2020/01/13/who-else-works-for-this-cover-company-network/ …pic.twitter.com/Vu5nMdnQ52
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Suspicious domains verifyacount[.]com and venifyaccount[.]com were recently registered through Njalla and are hosted at 145.239.41[.]166
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.