Raj SamaniOvjeren akaunt

@Raj_Samani

Chief Scientist | Chief Innovation Officer | Co-author of & CSA Guide to Cloud | Advisor on Internet Security

Vrijeme pridruživanja: siječanj 2010.

Tweetovi

Blokirali ste korisnika/cu @Raj_Samani

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Raj_Samani

  1. Prikvačeni tweet

    A reminder - if you have been affected by the portal has decryptors for a number of variants that can be freely accessed without having to pay criminals:

    Poništi
  2. The most exploited vulnerabilities by consists of "two vulnerabilities in Adobe Flash Player, four vulnerabilities affecting Microsoft’s IE browser, three MS Office flaws and one WinRAR" via

    Poništi
  3. A light bulb being used as an entry vector into a network! find a "heap buffer overflow that can be exploited remotely in Philips Hue Bridge model 2.x to execute arbitrary code"

    Poništi
  4. 5. velj

    Now the DoppelPaymer gang threaten to publish data of victims who fail to pay the ransom via w/comments from me:

    Poništi
  5. proslijedio/la je Tweet
    4. velj

    DoppelPaymer ransomware gang is the latest threatening to dump data for victims who don't pay ransom POV: h/t

    Poništi
  6. 4. velj

    Big thanks to the team for sending me a book detailing the anatomy of an attack presented in a children’s book format. Hey one for you perhaps?

    Poništi
  7. 4. velj

    Excellent work by the team who have released a free tool to check if you have been infected with cc

    Poništi
  8. 3. velj

    The Sodinokibi team offering cash prizes as well as "the opportunity to work with the Sodinokibi team under “mutually beneficial conditions” on forum H/T cc

    Poništi
  9. 3. velj

    Phishing campaigns using the recent outbreak as bait in attacks redirect "victims to an attacker-controlled and Outlook-themed phishing landing page used for collecting and stealing user credentials."

    Poništi
  10. 31. sij
    Poništi
  11. 30. sij

    Now posted all four roles we are hiring within the ATR team - interested in CTI? Apply here: cc

    Poništi
  12. 29. sij

    Analysis by KPN into (REVIL) reveals the "daily average is around 500+ unique encrypted systems" cc

    Poništi
  13. 29. sij

    "Using object linking, it is possible to link the RTF files to the remote object which could be the link to the malicious resource hosted on the remote server. This leads the resulting RTF file to behave as a downloader"

    Poništi
  14. 28. sij

    Highly recommended reading courtesy of " draft version of NIST Cybersecurity Practice Guide SP 1800-26, Detecting and Responding to Ransomware and Other Destructive Events." H/T

    Poništi
  15. 28. sij

    Ragnarok detected in "targeted attacks against unpatched Citrix ADC servers vulnerable to the CVE-2019-19781 exploit" and will also attempt to disable MS Defender

    Poništi
  16. proslijedio/la je Tweet
    27. sij

    This is a great and well documented read on the anatomy of Ransomware, how they deploy, who they attack, who’s behind and if they decrypt when you pay. Good read: ‘Ransomware Costs Double in Q4 as Ryuk, Sodinokibi Proliferate’. Via ⁦

    Poništi
  17. 27. sij

    "In Q4 of 2019, the average ransom payment increased by 104% to $84,116, up from $41,198 in Q3 of 2019." We can thank the likes of Ryuk for such a jump. H/T

    Poništi
  18. 27. sij

    We are hiring! Based in Plano to join the Advanced Threat Research team based in Plano, Tx looking for an Intelligence Analyst: cc

    Poništi
  19. 25. sij
    Poništi
  20. proslijedio/la je Tweet
    24. sij
    Poništi
  21. 24. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·