Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @dileepjallepall
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @dileepjallepall
-
dileep jallepalli proslijedio/la je Tweet
.
@dileepjallepall's Endpoint Detection Research & Ops team is hiring! - Exploit/Malware Researcher: https://feye.io/2FAPF9I - Exploit/Malware Researcher (UNIX and OSX): https://feye.io/2Ufwpqv - Malware Researcher:https://feye.io/2HIogFjPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dileep jallepalli proslijedio/la je Tweet
BLOG | WinRAR Zero-day Abused in Multiple Campaigns Check out this new blog post from our FireEye Labs endpoint researcher
@dileepjallepall on multiple campaigns abusing the CVE-2018-20250 WinRAR vulnerability. >> Read: https://feye.io/2TCqYNU pic.twitter.com/T23j3yCaJq
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dileep jallepalli proslijedio/la je Tweet
We just launched the first ever Microsoft Graph Security Hackathon, challenging developers worldwide to help solve one of cybersecurity's greatest challenges. https://graphsecurityhack.devpost.com/
#graphsecurityhackathonHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dileep jallepalli proslijedio/la je Tweet
BREAKING:
@FireEye identifies suspected Iranian influence operation campaigns targeting audiences in US, UK, Middle East & Latin America leveraging inauthentic news sites & social media platforms to promote political narratives in line w/ Iranian interestshttps://www.fireeye.com/blog/threat-research/2018/08/suspected-iranian-influence-operation.html …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dileep jallepalli proslijedio/la je Tweet
BLOG: @Sud0xD &@dileepjallepall deep dive in-the-wild Exploit Kit miner activity, exploring some lesser-known methods: https://www.fireeye.com/blog/threat-research/2018/06/rig-ek-delivering-monero-miner-via-propagate-injection-technique.html …
RIG Exploit Kit + various exploits
NSIS Loader + @Hexacorn's PROPagate process injection
Several anti-analysis techniquespic.twitter.com/U5qtNodmmy
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dileep jallepalli proslijedio/la je Tweet
Fake updates used in targeted attacks:
Compromised sites spread fake software updates
Malicious JavaScript via DropBox; beacons host data (WMI)
Attackers selectively deploy final payload – sometimes NetSupport Manager
@FireEye blog by@Sud0xD: https://www.fireeye.com/blog/threat-research/2018/04/fake-software-update-abuses-netsupport-remote-access-tool.html …pic.twitter.com/CB4Ai5IFUn
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dileep jallepalli proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
dileep jallepalli proslijedio/la je Tweet
SANNY Malware Delivery Method Updated in Recently Observed Attacks FireEye has tracked the SANNY malware family since 2012; unique to a group focused on Korean Peninsula issues. Check out the malz + significant changes to their delivery:https://www.fireeye.com/blog/threat-research/2018/03/sanny-malware-delivery-method-updated-in-recently-observed-attacks.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dileep jallepalli proslijedio/la je Tweet
Iran-Linked group ‘TEMP.Zagros’ updates tactics, techniques in latest campaign:http://bit.ly/2FTa0Z1
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Our blog post on Iranian threat actor targeting Individuals in India, Pakistan, Tajikistan and Turkey with updated TTPs
#Muddywater#Zagros -https://www.fireeye.com/blog/threat-research/2018/03/iranian-threat-group-updates-ttps-in-spear-phishing-campaign.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dileep jallepalli proslijedio/la je Tweet
Lots more phishing documents - including one sent yesterday (MIT.doc) - and a breakdown of the TTP shift
in our #MuddyWater
campaign write-up: https://www.fireeye.com/blog/threat-research/2018/03/iranian-threat-group-updates-ttps-in-spear-phishing-campaign.html …
That's a lot of POWERSTATS! #DFIR
Feb 2018 use of .INF + .SCT fileshttps://twitter.com/ItsReallyNick/status/966546210088800257 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dileep jallepalli proslijedio/la je Tweet
Couple stats on 1st stage malwares exploiting (or testing) MS Office Equation RCE vuln CVE-2017-11882 since 11/20. 512 unique samples observed & indexed by
@CodexGigasSys intel platform through 11/30. TY@clucianomartins @_embedi_@GossiTheDog@securitydoggo@malwrhunterteam
pic.twitter.com/L2mswTHo1c
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dileep jallepalli proslijedio/la je Tweet
This is just awesome. Nice work guys.http://staaldraad.github.io/2017/10/23/msword-field-codes/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dileep jallepalli proslijedio/la je Tweet
Holy crap. CCleaner trojan 1st stage payload is on 700k PCs, with these orgs targeted for 2nd stage (successfully) http://blog.talosintelligence.com/2017/09/ccleaner-c2-concern.html …pic.twitter.com/i13DbGI3P4
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dileep jallepalli proslijedio/la je Tweet
We are proud to release our Browser Security White Paper comparing Chrome, Edge, and IE: https://www.x41-dsec.de/security/report/whitepaper/2017/09/18/whitepaper-x41-browser-security/ … https://browser-security.x41-dsec.de/X41-Browser-Security-White-Paper.pdf …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dileep jallepalli proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
dileep jallepalli proslijedio/la je Tweet
Want to know if a CVE has been seen in the wild? New API & UI in
@alienvault OTX - https://otx.alienvault.com/indicator/cve/CVE-2017-0199/ … / https://otx.alienvault.com/otxapi/indicator/cve/CVE-2017-0199/ …pic.twitter.com/nOixyS7hN3
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
#adwind RAT spreading via embedded JAR objects in docx. Hash: 20f380e898ec28c0cfef04add1e624f4Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.


Just my opinion, but I'd definitely say these look a bit ... muddy.