Rezultati pretraživanja
  1. 17. pro 2018.
  2. 27. sij

    This project is the most important activity in our team, we do what can be done, and keep on learning to be more efficient, let’s do this together.

  3. 22. sij

    I thank Mr. Paganini of for following the progress of variants well. His latest article reviewing analysis of Mirai is connecting the dots between Fbot, , and revealing its original coders , before

  4. 15. sij

    New : -0065-2020 - /- (The detail of know-how & analysis from what I tweeted yesterday: ). There you go. Hope this helps many good folks in battling threats! Enjoy! ! /

  5. 28. lis 2019.
    Odgovor korisnicima

    Okay, look forward. Meanwhile for IR purpose this is the full depacked binary's strings that can tell you much info about what this ELF is doing. LINK: Thank's for the pokes, poke me anytime you guys want! I'll crack it for ya. Cheers! !!!

  6. Osobe Vidi sve

  7. 30. ruj 2019.
  8. Morning world! :-) working on some cool bits today, deploying with the team to a customer today! 🤜🤜🤜🔥🔥🔥🔥

  9. 22. ruj 2019.
  10. 3. ruj 2019.

    Kenneth Schuchman pleads guilty. "He has compromised as many as 700,000 of devices over 15 months." cc:

  11. 14. lip 2019.

    Going on so much needed vacation and seeing my mom for the first time in 8 years in person. So probably no threat intel will be posted for next two weeks, but I know amazing team of researchers will keep the things rolling and fighting malware.

  12. 24. svi 2019.

    Malware/Virus Theory | Short and Sweet Overview Big thanks to for breaking a pretty complex theory down into a bite sized chunk that for me has just sparked a burning curiosity!

  13. 16. svi 2019.

    can i be real for a sec? its just a hobby. but it won't. money they make in 1 good BEC guarantees we can take down phish all day long and it won't mean anything in the end. truth is we are pissing our pants in a roomfull of blind people.

  14. 28. tra 2019.

    New packet of simple malwares has been rised again with routine failed Pony - AZORult - Lokibot: access granted successfully to some panels 😉

    Prikaži ovu nit
  15. 5. tra 2019.

    Hi , your server 80.211.232.121 (http and ftp protocol) is delivering with exploit inside for attack. We know it's Friday, but maybe there is still someone who can clean it 😜 Nice find by . ! Cheers!

  16. 1. tra 2019.
  17. 22. ožu 2019.
  18. 18. ožu 2019.

    hxxp://host.gomencom.website/Downloads/

  19. 15. ožu 2019.
  20. 4. ožu 2019.

    Saefko RAT admin testing. home IP: 129.56.48.80 [NG] computer name\user: crazyhacker-PC\crazyhacker

  21. 28. velj 2019.

    Guess the person who infect/try to infect people with RAT. home IP: 41.204.40.246

    Prikaži ovu nit

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.