PO3T

@PO3T1985

IT security analyst, malware enthusiast, poker player, gamer. ♠️♣️♥️♦️ All opinions expressed here are my own, not those of my employer.

Switzerland
Beigetreten Dezember 2013

Tweets

Du hast @PO3T1985 blockiert

Bist du sicher, dass du diese Tweets sehen willst? Das Ansehen von Tweets wird @PO3T1985 nicht entblocken.

  1. 7. Okt.

    FYI dropping also seen in 🇨🇭malspam campaign. Sample uploaded: Watch out for "inert" url in messages like Qbot and Emotet did. Good writeup by Zscaler fits this sample:

    Rückgängig machen
  2. hat retweetet
    22. Sept. 2020

    We share now our malware samples on MalwareBazaar - We strongly believe in sharing and this is why we decided to upload all TLP:WHITE binaries we receive or collect ourselves to MalwareBazaar.

    Rückgängig machen
  3. 4. Sept. 2020

    🤬 update, dc on end. Fix your shit. And you better not send me to low priority queue! What an awesome gift for starting the well deserved weekend - really appreciate u basically DoS ing yourself.

    Rückgängig machen
  4. 18. Aug. 2020

    oh no... quick, someone's getting away with prize pool 😂

    Rückgängig machen
  5. 15. Juli 2020

    Must have been an player hacking all those Twitter accounts. Cuz that BTC scam had Jita ISK scam written all over it 😃

    Rückgängig machen
  6. 28. Juni 2020

    Passed, cheers guys 😁

    Diesen Thread anzeigen
    Rückgängig machen
  7. 23. Juni 2020

    Love the practice labs. When I subscribed for the training course at first I was afraid it might be just theoretical lessons about what’s to come in the exam. What a relief when I started the first lab 😋 Imao very good course to get started. Lets see how I do on Friday at exam.

    Diesen Thread anzeigen
    Rückgängig machen
  8. 3. Juni 2020

    On 12.05.2020 I had this one: C2: 79.134.225.49 mail[.]swissshopauto[.]top Not quite the same domain name, but similar enough to raise my curiosity.

    Diesen Thread anzeigen
    Rückgängig machen
  9. 3. Juni 2020

    continues to make the rounds in 🇨🇭 masquerading as email using for initial stage. C2: 185.19.85.168 Interesting domain name mail[.]swissauto[.]top - I saw a similar one not too long ago...

    Diesen Thread anzeigen
    Rückgängig machen
  10. 18. März 2020

    oh, just saw - that was an older tweet 😝 sorry

    Diesen Thread anzeigen
    Rückgängig machen
  11. 18. März 2020

    fyi - you were looking for a sample 😉 (can't DM).

    Diesen Thread anzeigen
    Rückgängig machen
  12. 18. März 2020

    Microsoft Office365 sites now using CAPTCHA - I presume for sandbox evasion.

    Diesen Thread anzeigen
    Rückgängig machen
  13. hat retweetet
    29. Jan. 2020

    Introducing my newest project: I got phished The goal is to notify IT-security representatives about phishing victims within their constituency 📨 👉 A big thanks to who initiated the project! 👏 For bug reports and feature requests -> DM me

    Rückgängig machen
  14. hat retweetet
    26. Jan. 2020

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Diesen Thread anzeigen
    Rückgängig machen
  15. 18. Jan. 2020

    I agree though that you need some kind of emergency patching procedure, otherwise you'll eventually get hit like in this case. If you run threat intel, trigger that procedure, if you see that you won't last till next cycle.

    Diesen Thread anzeigen
    Rückgängig machen
  16. 18. Jan. 2020

    Correction: Most companies have patching ^^ Anyhow, lets keep in mind that most of these companies have to do some testing, before rolling out patches - this is not single clients like at home where you can immediately patch to production - and even those fail sometimes ;)

    Diesen Thread anzeigen
    Rückgängig machen
  17. 18. Jan. 2020

    All companies have patching - but that takes time and resources. There is definitely some lessons to be learned here, this sort of reporting though is not helping. So go easy, will ya?

    Diesen Thread anzeigen
    Rückgängig machen
  18. 18. Jan. 2020

    I'd appreciate if media stop their sensationalist reporting about CVE-2019-19781, telling people vulnerability has been long since been known about... its been 3 weeks - over the holidays on top of that.

    Diesen Thread anzeigen
    Rückgängig machen
  19. 18. Jan. 2020

    still making the rounds. As in the past using cloud file sharing.

    Rückgängig machen
  20. 14. Jan. 2020

    and all contributers: you guys rock my world. Thank you so much for your hard work - it is priceless.

    Diesen Thread anzeigen
    Rückgängig machen

Das Laden scheint etwas zu dauern.

Twitter ist möglicherweise überlastet oder hat einen vorübergehenden Schluckauf. Probiere es erneut oder besuche Twitter Status für weitere Informationen.

    Vielleicht gefällt dir auch

    ·