Tweetovi

Blokirali ste korisnika/cu @dileepjallepall

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @dileepjallepall

  1. proslijedio/la je Tweet
    26. ožu 2019.

    .'s Endpoint Detection Research & Ops team is hiring! - Exploit/Malware Researcher: - Exploit/Malware Researcher (UNIX and OSX): - Malware Researcher:

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    26. ožu 2019.

    BLOG | WinRAR Zero-day Abused in Multiple Campaigns Check out this new blog post from our FireEye Labs endpoint researcher on multiple campaigns abusing the CVE-2018-20250 WinRAR vulnerability. >> Read:

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    3. pro 2018.

    We just launched the first ever Microsoft Graph Security Hackathon, challenging developers worldwide to help solve one of cybersecurity's greatest challenges.

    Poništi
  4. proslijedio/la je Tweet
    21. kol 2018.

    BREAKING: identifies suspected Iranian influence operation campaigns targeting audiences in US, UK, Middle East & Latin America leveraging inauthentic news sites & social media platforms to promote political narratives in line w/ Iranian interests

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    28. lip 2018.

    🆕 BLOG: & deep dive in-the-wild Exploit Kit miner activity, exploring some lesser-known methods: 1⃣ RIG Exploit Kit + various exploits 2⃣ NSIS Loader + 's PROPagate process injection 3⃣ Several anti-analysis techniques

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    5. tra 2018.

    Fake updates used in targeted attacks: 1⃣ Compromised sites spread fake software updates 2⃣ Malicious JavaScript via DropBox; beacons host data (WMI) 3⃣ Attackers selectively deploy final payload – sometimes NetSupport Manager blog by :

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    5. tra 2018.
    Poništi
  8. proslijedio/la je Tweet
    23. ožu 2018.

    SANNY Malware Delivery Method Updated in Recently Observed Attacks FireEye has tracked the SANNY malware family since 2012; unique to a group focused on Korean Peninsula issues. Check out the malz + significant changes to their delivery:

    Poništi
  9. proslijedio/la je Tweet
    15. ožu 2018.

    Iran-Linked group ‘TEMP.Zagros’ updates tactics, techniques in latest campaign:

    Poništi
  10. Our blog post on Iranian threat actor targeting Individuals in India, Pakistan, Tajikistan and Turkey with updated TTPs -

    Poništi
  11. proslijedio/la je Tweet
    13. ožu 2018.

    Lots more phishing documents - including one sent yesterday (MIT.doc) - and a breakdown of the TTP shift*️⃣ in our 🇮🇷 campaign write-up: That's a lot of POWERSTATS! *️⃣ Feb 2018 use of .INF + .SCT files

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    1. pro 2017.

    Couple stats on 1st stage malwares exploiting (or testing) MS Office Equation RCE vuln CVE-2017-11882 since 11/20. 512 unique samples observed & indexed by intel platform through 11/30. TY @_embedi_ 👊🏻

    Poništi
  13. proslijedio/la je Tweet
    29. lis 2017.
    Poništi
  14. proslijedio/la je Tweet

    Holy crap. CCleaner trojan 1st stage payload is on 700k PCs, with these orgs targeted for 2nd stage (successfully)

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    19. ruj 2017.
    Poništi
  16. proslijedio/la je Tweet
    1. srp 2017.

    What a beast bug bounty... :O

    Poništi
  17. proslijedio/la je Tweet
    15. ruj 2017.
    Prikaži ovu nit
    Poništi
  18. RAT spreading via embedded JAR objects in docx. Hash: 20f380e898ec28c0cfef04add1e624f4

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·