Результаты поиска
  1. Люди Все

  2. 12 часов назад
  3. 15 часов назад

    🚨 ALERT 🚨 Active botnet command-and-control (C2) server detected.

  4. 15 часов назад

    New payload targeting routers detected: http://103.83.157.41/bins/mips (🇸🇬) http://103.83.157.41/bins/ C2 port: 5301/tcp Type: Mirai-like Vulnerability exploited: CVE-2017-17215 Source IP: 167.71.64.218 (🇺🇸)

  5. 19 часов назад

    WARNING for new Databreach! announced the discovery of a nearly decade long involving unauthorized access to its servers

  6. 19 часов назад
  7. 26 июн.

    Orgs aren't getting exploited because we're not sharing IOCs fast enough... Orgs are getting owned because they're not focused on basic defenses used to combat common behaviors. IOCs have value, but it's tiny.

  8. 26 июн.
  9. 25 июн.

    New: Farsight 5 Questions with Joep Gommers, Founder and CEO, EclecticIQ.

  10. 25 июн.

    95% of the insiders we usually encounter are men. usually invest a lot to make sure they have the right guy inside the institution.

  11. 24 июн.

    Q: Tensions are high, ICS targets are possible. What does a team do now? 1. Watch political and world events (news) 2. Help focus their efforts on most likely scenarios 3. Develop insight into these areas of interest:

  12. 24 июн.

    MISP dashboard v1.2 has been released including new filtering features, diagnostic tools and bug fixes.

  13. 22 июн.

    Almost there! Added entity list inputs and multi-transform selections alongside a host of bug fixes and stability improvements ... oh and a port is ready 😁

  14. 22 июн.

    New payload targeting routers detected: http://185.244.25.155/lx/apep.mpsl (🇳🇱) http://185.244.25.155/lx/ Type: Mirai-like Exploit source IP: Multiple – all from 🇨🇳 Target Port: 8080/tcp

  15. 21 июн.
  16. 21 июн.
    Photo courtesy of PhishLabs
  17. 21 июн.

    We made our pulse on the recent campaigns public (mostly focused on the US CEA job candidate one):

  18. 19 июн.
  19. 18 июн.
  20. 14 июн.

    Our team doesn’t produce a lot of reports (by design). But we still use The Report as a tool or to answer specific requirements. This means that, although we tend to favor tactical, operational, intel, WRITING tradecraft is always important.

    Показать эту ветку
  21. 10 июн.

    Our found that the CVE-2017-11882 Microsoft Office vulnerability is being used for mass-spam campaigns and has been shared among different Chinese groups. Read more about the vulnerability on via :

Загрузка может занять некоторое время.

Вероятно, серверы Твиттера перегружены или в их работе произошел кратковременный сбой. Повторите попытку или посетите страницу Статус Твиттера, чтобы узнать более подробную информацию.