Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @_odisseus
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_odisseus
-
Prikvačeni tweet
How to develop your own custom
#malware (step by step) that establishes a shell through the target’s browser. Re-purposing#BeEF’s bind#shellcode, modifying BeEF’s (0.4.7.0-alpha) backend and leveraging on#AutoIt. Via@eLearnSecurity https://blog.usejournal.com/red-team-diary-entry-3-custom-malware-development-establish-a-shell-through-the-browser-bed97c6398a5 …pic.twitter.com/7519NMa332
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Odisseus proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Odisseus proslijedio/la je Tweet
Cyber range, la piattaforma virtuale che prepara alla difesa dalle minacce cyber, nello spazio vendor Aizoon con Danilo Massa CTO Cyber Security Division e Giovanni Cerrato, project manager. http://itasec.it
@CyberSecNatLab@aizoongroup#ITASEC20#cybersecurity#Anconapic.twitter.com/B6PBhqneB3
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Cisco Discovery Protocol (CDP) enabled devices are vulnerable to Denial-of-Service (DoS) and Remote Code Execution (RCE)


CVE-2020-3110
CVE-2020-3111
CVE-2020-3118
CVE-2020-3119
CVE-2020-3120
Note: https://kb.cert.org/vuls/id/261385/
Hacking Video: https://www.youtube.com/watch?v=nYtDJlzU-ao&feature=youtu.be …pic.twitter.com/vxHxa6jlMH
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
FBI downloaded CIA’s Hacking Tools Using Starbuck’s WiFi "So, anytime actions on the internet are traceable as well as downloads, and we didn’t want to use an FBI system. ... which could then be traced back to us" https://www.emptywheel.net/2020/02/05/the-fbi-downloaded-cias-hacking-tools-using-starbucks-wifi/ …pic.twitter.com/N7fvlkLo3B
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Odisseus proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Odisseus proslijedio/la je Tweet
@MalwarePatrol@Malwageddon@CertPa@CERTEU@guelfoweb@zlab_team@_odisseus@cybereason Hackers abuse#BitBucket to infect 500K+ hosts with arsenal of#malware https://securityaffairs.co/wordpress/97357/cyber-crime/bitbucket-malware-attack.html …#securityaffairs#hackingHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Odisseus proslijedio/la je Tweet
again in the wild
#hito#Botnet#IoT#Malware Threat Actor : Evolution's International Hack team Payload 𝗟𝗜𝗡𝗞: hxxp://37.49.231.190/kc-botnet/x86_64 𝗪𝗛𝗢𝗜𝗦: NL / ASN: AS209299 VITOX-TELECOM Currently 𝗔𝗰𝘁𝗶𝘃𝗲 cc:@_odisseus@ankit_anubhav@_rngm_@bad_packetspic.twitter.com/yJNh3WBetg
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Odisseus proslijedio/la je Tweet
APT + Ransomware = $$$
#Ransomware operators are partnering with specialists who use#APT techniques to provide stealthy infiltration and network-wide encryption capabilities in#TargetedAttacks https://www.advanced-intel.com/post/digital-pharmacusa-supply-chain-attacks-for-ransomware-intrusions …pic.twitter.com/LExg3psp3I
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Odisseus proslijedio/la je Tweet
Update
#IoT#Botnet#Mirai#ELF#malware#Trojan.Linux#Backdoor Exploit Target:#GPON#HUAWEI#ThinkPHP 𝗜𝗣: 188.166.36.43 cnc: 50717 Payload 𝗟𝗜𝗡𝗞: http://188.166.36.43/serviceDATAS000541800/s0s13.x86 | http://188.166.36.43:80/ssh-updater.sh cc:@digitalocean@bad_packetspic.twitter.com/NJC9ByGab3
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Odisseus proslijedio/la je Tweet
INTERPOL supports arrest of cybercriminals targeting online shopping websites <-- web-commerce compromise + injected jscript + card/PII skimminghttps://www.interpol.int/en/News-and-Events/News/2020/INTERPOL-supports-arrest-of-cybercriminals-targeting-online-shopping-websites …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Odisseus proslijedio/la je Tweet
#IoT#Botnet#Mirai#ELF#malware#Trojan.Linux#Backdoor Targeting#SSH Exploit Target :#GPON#HUAWEI#ThinkPHP 𝗜𝗣: 45.148.10.181 Payload 𝗟𝗜𝗡𝗞: http://45.148.10.181/ssh-updater.sh | hxxp://45.148.10.181/gpon443 | hxxp://45.148.10.181/thinkphp Currently 𝗔𝗰𝘁𝗶𝘃𝗲pic.twitter.com/T7q4gXs17X
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Odisseus proslijedio/la je Tweet
#Mirai#IoT#Malware#Backdoor#ELF#UPX Targeting#Telnet 𝗜𝗣: 217.182.38.147 Payload 𝗟𝗜𝗡𝗞: hxxp://217.182.38.147/telnet.sh CnC Port: TCP/1791 𝗪𝗛𝗢𝗜𝗦: Country : FR AS16276 OVH |@OVHcloud@as16276 Currently 𝗔𝗰𝘁𝗶𝘃𝗲 CC:@bad_packets@_odisseus@securityaffairspic.twitter.com/ZJ89LB0dsM
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Odisseus proslijedio/la je Tweet
I am so proud of
@yoroisecurity dev team ! It was able to implement the#CurveBall catch technique on our#free#yomi Hunter in no time ! To know more on that new feature please visit : https://blog.yoroi.company/announcement/yomi-hunter-catches-the-curveball/ … Feel free to use it: https://yomi.yoroi.company/ pic.twitter.com/ti4Dcvirhe
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Odisseus proslijedio/la je Tweet
@Marco_Ramilli@_odisseus@mrtlgu@barbaracarfagna@Luke_like orgoglioso di essere con gli amici di USIGRai per parlare di Cybersecurity con@_antoniopirozzi e@arturodicorintopic.twitter.com/m66zUx7wW1
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Odisseus proslijedio/la je Tweet
According to
@IBMSecurity X-Force Threat Intelligence Index,#Hacktivism Attacks Drop 95% Since 2015 https://securityintelligence.com/posts/the-decline-of-hacktivism-attacks-drop-95-percent-since-2015/ …pic.twitter.com/is0XenIege
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Interesting to see
#Yomi Malware Hunter - a free sandbox-based analysis - about the last known#Nemty#Ransomware. https://yomi.yoroi.company/report/5e25e2a471ef016089703d7f/5e25e2add1cc4993da633952/overview … Please check: - Behaviour Analysis - Static Analysis - Network Analysis cc:@Marco_Ramilli@securityaffairs@arturodicorinto@baciamociiipic.twitter.com/otZdtnp9CO
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Odisseus proslijedio/la je Tweet
Because I prefer C,
#curveball#cve20200601 little POC to create your own EC alternative keys > https://github.com/gentilkiwi/curveball/releases/ … With a lots of keys included in the release.pic.twitter.com/kkboaxUARk
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
NEMTY 2.5
#Ransomware works perfectly inside a VMware virtual machine. No evasion techniques found at the moment.#nemty Find an example here, thank you@anyrun_app. https://app.any.run/tasks/a8ea71e9-b910-4f09-97bf-a8577d81d0c4/ … Thanks to:@trovarsiancorapic.twitter.com/HXjMXLL8c7
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Odisseus proslijedio/la je Tweet
A month after disclosing existence of a critical RCE vulnerability (CVE-2019-19781) in
#Citrix ADC & Gateway software—also under active ATTACKS—the company finally today released the 1st batch of security patches for versions 11.1 & 12.0 ➤ https://thehackernews.com/2020/01/citrix-adc-patch-update.html …#infosecHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.