Limor Kessem, CISO

@iCyberFighter

Threat Intel lifer | Author | Speaker hunter, futurist, CISM, champion Women in Security, fighter. Opinions & cheeky retorts strictly my own.

Planet Cyber
Vrijeme pridruživanja: veljača 2012.

Tweetovi

Blokirali ste korisnika/cu @iCyberFighter

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @iCyberFighter

  1. proslijedio/la je Tweet

    Corona Virus themed email making the rounds.

    Poništi
  2. As the star sets, the new kid in town is the botnet, and it's down for anything - from to : |

    Poništi
  3. So, apparently a Ryuk stealer code is now interested in highly sensitive documents... Flashback from 2009 when Zeus v1 botnet logs were chuck full of this sort of data. |

    Poništi
  4. The campaign that never ends... New Watering Hole identified on Kuwaiti website used for credential harvesting: |

    Poništi
  5. Like , only different... Researchers find a heavily obfuscated web swiper concealed in an image tag, will load on checkout pages on -based websites: |

    Poništi
  6. New Iranian Campaign by is Tailored to US Companies, Utilizes an Updated Toolset: |

    Poništi
  7. is back for another round, this time uses HTML Redirectors to deliver |

    Poništi
  8. A new campaign of the Group is targeting Hong Kong universities using and Winnti : |

    Poništi
  9. proslijedio/la je Tweet
    29. sij
    Poništi
  10. proslijedio/la je Tweet
    30. sij

    changed TTP, now dropping JSE script from DOC instead of Powershell to download payload: ▶️ rule for detection:

    Poništi
  11. proslijedio/la je Tweet

    C2 Origin 2020/01/30 1➡️🇺🇸US 77(+3) 2⬆️🇦🇷Argentina 24(+3) 3⬇️🇩🇪Germany 23(+0) 4⬆️🇫🇷France 19(+4) 5➡️🇦🇺Australia 17(+1) 6⬇️🇯🇵Japan 16(-1) Total 399(+1) by

    Poništi
  12. proslijedio/la je Tweet
    3. velj
    Poništi
  13. 3. velj

    Leaked Documents Expose the Secretive Market for Your Web Browsing Data. An Avast antivirus subsidiary sells 'Every search. Every click. Every buy. On every site.' Its clients have allegedly included Home Depot, Google, Microsoft, Pepsi, and McKinsey:

    Poništi
  14. 3. velj

    "The cyber attack the UN tried to keep under wraps" - A look at how the UN got hacked and how it handled this , raising questions about the UN’s responsibilities in data protection and its diplomatic privileges: |

    Poništi
  15. 3. velj

    Marketing giant has privileged access to advertising accounts on Facebook. Hackers took notice and targeted this third-party to launch scams on FB users: |

    Poništi
  16. 3. velj

    Electronic Warfare Associates (), a government contractor that works with the Department of Defense, Department of Justice, and Department of Homeland Security, has been hit with a attack: |

    Poništi
  17. 3. velj

    "The Electronic Frontier Foundation (EFF) on Monday announced that its research into the app’s Android version identified several embedded third-party trackers sucking up “a plethora” of personal information" |

    Poništi
  18. proslijedio/la je Tweet
    2. velj

    נועה קירל: למה תקעתם אותי מכונאית רכב??? מפקד: אמרת שאת רוצה לשרת בחיל החימוש נועה: בחיל הכי מוש! הכי מוש! אוף!

    Poništi
  19. proslijedio/la je Tweet

    The first question is WTF is someone doing with that level of data ON their laptop that they can readily move around in the first place?

    Poništi
  20. proslijedio/la je Tweet
    29. sij

    "Data is like water. And water leaks." at

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·