-
Still 100% behind SOD...it will come together
#SODIN -
Latest
#Sodin/#Sodinokibi wave presents in %TEMP%/MicrosoftOfficeWord.exe, hits in Germany and Austria. (15/69) https://www.virustotal.com/gui/file/f450ef75377d132cd469ad569e97ae64dc0abc225a3755da32495c625141f3ab/detection … -
Di Canio to city? fuck right off
#SODin -
@BCFC_Supporters i think we need to give SOD time, it annoys me that these people think they speak for everybody in the ground#SODin -
O'Driscoll is annoyed + I agree with every word he's saying! He's not the change we need the players to learn how to play with pride!
#SODin -
Keeping SOD will turnout to be a good decision
#SODIN -
Part two of our three-part series on ransomware is out. This time we take a closer look at detecting Sodin ransomware in our malware sandbox.
#ransomware#sodin#malware#sandboxhttps://hatching.io/blog/ransomware-part2 … -
#Sodin#ransomware exploits
Windows vulnerability
processor architecture
Oracle Weblogic vulnerability
attacks MSP providers.
Very unusual #ransomware. Technical details: https://kas.pr/h3eh pic.twitter.com/pL3Yrf7d97
-
#Nemty#ransomware based loosely on#Sodinokibi (#Sodin or#REvil) is in the development stage and uses excessive#encryption Parts of the code imply it is#Russian in origin#malware#cybersecurity#security#infosec https://govanguard.com/i0j0 pic.twitter.com/nuvgo6RNxT
-
#REvil /#Sodinokibi /#Sodin#Ransomware victim (so many names
)
Extension: .upd9ykc65v
probably new variant
@demonslay335@Amigo_A_@yassine_lemmoupic.twitter.com/SByZLa6jBr
-
@TheCiderDiaries Two cracking podcasts so far, can't wait for the 3rd.#BristolCity We surely have the right man at the helm.#Sodin -
"Six of
#CyrusOne's managed service customers, primarily in its New York#datacenter, experienced availability issues following a#ransomware attack..."#cybersecurity#cyberattack#REvil#Sodin#Sodinokibi#MSPhttps://www.ciodive.com/news/cyrusone-ransomware-REvil/568549/ … -
Even if I didn't have a ST I would still be going to city tomoz
#addicted#ctid#throughthick&thin#sodin -
Seriously, give O'Driscoll the call and tell him he'll get whatever he needs to implement a three year plan.
#SODin -
#Sodin ransomware is now exploiting a Windows#zero-day vulnerability, and does not require user interaction to trigger an infection, warn@kaspersky researchers http://bit.ly/2KVKQeW via@computerweekly -
The
#Sodin#ransomware (aka Sodinokibi or REvil) is exploiting#Windows vulnerabilities and processor architecture. https://securelist.com/sodin-ransomware/91473/?utm_source=twitter&utm_medium=social&utm_campaign=uk_securelist_db0077_organic&utm_content=sm-post&utm_term=uk_twitter_organic_db0077_sm-post_social_securelist … -
In a world where
#ransomware runs rampant,#Sodin stands out. The newly discovered#malware exploits Windows#vulnerability CVE-2018-8453 to elevate privileges — a rarity for ransomware. https://buff.ly/2NH6iqC pic.twitter.com/EdEh0HbXZK
-
Sodin Hell!! °⁹••⁹°


https://www.darkreading.com/perimeter/sodin-ransomware-exploits-windows-privilege-escalation-bug/d/d-id/1335145?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple … #infosec#EthicalHacking#ITSecurity#ITSEC#CyberSecurity#hacking#ransonware#PatchTuesday#windows#Microsoft#android#StaySafeOnline#Taiyyib#ransonware#malware#SecurityIntelligence#Sodin
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.