Manuel Berrueta

@ManuelBerrueta

Software Security Engineer | | | | Marine | Father | Hacker?! | I play with 1s && 0s | My thoughts/ramblings are my own 😆

V2FzaGluZ3Rvbg==
Vrijeme pridruživanja: rujan 2011.

Tweetovi

Blokirali ste korisnika/cu @ManuelBerrueta

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ManuelBerrueta

  1. proslijedio/la je Tweet
    prije 15 sati

    Secret's out! announces the release of the TrustedSec Community Guide. Discover the vision for making the guide and how you can contribute to making the best for all things sysmon!

    Poništi
  2. proslijedio/la je Tweet
    4. velj
    Poništi
  3. 4. velj
    Poništi
  4. 31. sij
    Poništi
  5. proslijedio/la je Tweet

    While the world mourns the loss of an NBA legend, cybercriminals are, as expected, taking advantage of the tragedy. We found a malicious HTML file posing as a Kobe Bryant wallpaper that contains a coin mining script.

    Prikaži ovu nit
    Poništi
  6. 27. sij
    Poništi
  7. proslijedio/la je Tweet

    Notorious downloader Trojan sLoad's version 2.0, Starslord, has new functionality that can track the stage of infection + an anti-analysis trap that can identify and profile analyst machines. Learn how these new powerful features can pose even higher risk:

    Poništi
  8. proslijedio/la je Tweet
    23. sij

    The critical flaw could give unauthenticated, remote attackers administrative privileges on vulnerable devices.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet

    At the first hacking contest to focus on industrial control systems, hackers demonstrated at least one zero-day in all eight software targets. Which, considering the power grids, refineries and factories this code controls, is a little disturbing.

    Poništi
  10. proslijedio/la je Tweet
    23. sij

    Very tactical preliminary update. It appears an actor is using CVE-2019-19781 for initial access, and other vulnerabilities to pivot into a Windows environment in order to deploy ransomware. If you haven't already begun mitigating, you really need to consider the ramifications.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet

    Because some people asked, here’s APT28 infra from October till now. They setup around 2-3 C2s a month. 184.95.51.172 2020-01 😈 78.142.19.114 2019-12 💀 80.255.3.116 2019-12 💀 193.70.80.214 2019-11 💀 185.141.63.103 2019-11 💀 109.169.15.73 2019-10 💀 178.32.251.98 2019-10 💀

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet

    Here’s the first (new) 2020 IP from our Russian friends in apartment 28: 184.95.51.172 Using an older known domain but the first server we saw being setup in 2020, around January 13th to be exact.

    Poništi
  13. proslijedio/la je Tweet
    17. sij

    Nice to see how rapidly this came together

    Poništi
  14. proslijedio/la je Tweet
    17. sij

    These are the types of events that motivate me. Cyber attacks with physical effects that affect those in society with disabilities. Just an attempt to breach caused folks to miss doctor appointments. Luckily they had a radio backup system in place.

    Poništi
  15. 14. sij

    Thanks for sharing some good information about the for today & . I appreciate the insights!

    Poništi
  16. proslijedio/la je Tweet
    9. sij

    I may not have many followers, but if anyone knows someone who needs an IT veteran with 20 years’ experience, who learned Cisco when telnetting to a switch was not a security risk, and who has a CISSP, SSCP, and several other certs, my DMs are open.

    Poništi
  17. 10. sij
    Poništi
  18. proslijedio/la je Tweet
    9. sij

    SCOOP: New Iranian data wiper malware hits Bapco, Bahrain's national oil company * Attack took place on Dec 29 * Hackers used Dustman, an improved version of the ZeroCleare wiper * Wiper didn't work as intended, didn't destroy company's entire PC fleet

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    8. sij

    As we look ahead to the possibility of retaliatory from Iran, our SVP of Global Intelligence, Sandra Joyce spoke with at about past intrusions by Iranian .

    Poništi
  20. proslijedio/la je Tweet
    8. sij

    Watch out for these fake news outlets. They typically: - Don't link to any article/source - Don't have any website - Use embedded media w/o links - Use extensively hashtags to spread (such as ) - Use generic "news" stock images - Are authorless/anonymous

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·