Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @esthreat
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @esthreat
-
eSentire Threat Intel proslijedio/la je Tweet
Emotet Uses Coronavirus Scare to Infect Japanese Targets - by
@sergheihttps://www.bleepingcomputer.com/news/security/emotet-uses-coronavirus-scare-to-infect-japanese-targets/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Following
@layle_ctf's#rce demo release, discussion of CVE-2020-0610 dominates cve talk on twitterpic.twitter.com/xwjdcV5ggT
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Happy Monday! In case you missed the
#citrix updates Friday:https://esentire.com/security-advisories/update-citrix-releases-critical-security-patches …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
They just keep coming this year! Advisories for
#IE#citrixhttps://www.esentire.com/security-advisories …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
eSentire perspectives on the threat landscape in 2019: more examples of delivery malware
#emotet sharing obfuscation with banking trojan#ursnif, some sexy espionage stuff, some malware evolution,#ransomware being manually installed, etc. What a year!https://esentire.com/resource-library/esentire-annual-threat-intelligence-report-2019-perspectives-and-2020-predictions …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Busy start to the year! (
#dustman), (#cloudhopper), (#citrix#netscaler#cve_2019_19781)https://www.esentire.com/security-advisories …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Active botnet indicators and injection attempts. The Mozi payload comes with "Hello, World" user agent, the d payload comes with "DEMON" user agent . Associated
#greynoise tags and classification included in images. indicators available in raw text: https://pastebin.com/XwcmXiL6 pic.twitter.com/uLDDTgnSq1
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
eSentire Threat Intel proslijedio/la je Tweet
2019-09-30 - IRS-themed
#malspam pushed#Hancitor-style#Amadey -#pcap of an infection, some malware/artifacts, three malspam examples, and the IOCs available in a data dump at: https://www.malware-traffic-analysis.net/2019/09/30/index.html …pic.twitter.com/DABOl5C5tR
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Today's Botnet Soup and an injection samplepic.twitter.com/H8mnjmmOi6
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Thorough set of indicators for Emotet.https://twitter.com/Cryptolaemus1/status/1174935781787324416 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
An more recent in-depth
#ostap report by@bromium:https://www.bromium.com/deobfuscating-ostap-trickbots-javascript-downloader/ …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Our report in early August compares this recent
#ostap variant dropping#trickbot to@CERT_Polska's analysis.@TrendMicro also did a break down (referenced in our report) but hadn't identified the dropper as Ostap. https://www.esentire.com/blog/oh-snap-new-ostap-variant-observed-in-the-wild/ …https://twitter.com/JR0driguezB/status/1152312469831991296 …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A healthy dose of recent
#emotet and#trickbot indicators are reported by Brad@malware_traffic: https://isc.sans.edu/forums/diary/Emotet+malspam+is+back/25330/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Some high level analysis on the return of
#emotet Researchers are seeing the recent mailspam campaign hijack ongoing email threads and replying to all participants. Double check your revived email conversations.https://www.esentire.com/security-advisories/emotet-returns-september-2019/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Looks like this
#mirai variant is shifting download servers to 178.32.178.197 as evidenced by the thicker lines (indicating the most recent activity). The single attacking ip that joins the two clusters can be found in#greynoise: https://viz.greynoise.io/query/?gnql=ip%3A67.239.10.53 …pic.twitter.com/YKWDLb6FaF
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Injection example from an active
#botnet hailing 23.254.225.234 Running a sample of the the associated attacking infrastructure through#greynoise, it looks like a#mirai variant: https://viz.greynoise.io/query/?gnql=ip%3A%2042.115.104.76 …pic.twitter.com/GFFIAOUYEl
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A month of
#botnet activity. Attacking infrastructure (red) is grouped into campaigns by shared download server (cyan). Some devices act as both downloader and attacking infrastructure (purple). As usual, targets include many SOHO devices (netgear, D-Link, GPON)pic.twitter.com/Q2uXkr4RSL
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
E2 had ~120URLs today. More reply chain malspam and trickbotish loader.