Photon Research Team

@photon_research

We are ' threat intelligence & security research team, comprised of security researchers, security practitioners and intelligence analysts.

Global
Vrijeme pridruživanja: veljača 2019.

Tweetovi

Blokirali ste korisnika/cu @photon_research

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @photon_research

  1. Prikvačeni tweet

    Hey Twitter 👋. Get to know some of our Photon Research Team members in this quick video snippet.

    Poništi
  2. proslijedio/la je Tweet

    Is the Cybercriminal Forum Dead? Our team dives into our recent research around forums to understand why forums are flourishing in a world of alternative technologies. Watch the recording here👇

    Poništi
  3. proslijedio/la je Tweet
    4. velj

    New research from shows criminals are acting as travel agents, supplying customers with: 💳Airline-specific accounts & credit cards ✈️Discounted flights & gift cards 👩‍🏫Tutorials to conduct this type of fraud 🎟️Fraudulent tickets

    Poništi
  4. proslijedio/la je Tweet
    3. velj
    Poništi
  5. 31. sij
    Poništi
  6. proslijedio/la je Tweet
    31. sij
    Poništi
  7. proslijedio/la je Tweet
    30. sij

    The Sodinokibi ransomware gang (a main suspect in the Travelex hack) allegedly sponsored a contest on a Russian forum offering up to $15,000 for proposals on emerging hacking techniques, per .

    Poništi
  8. 30. sij
    Poništi
  9. proslijedio/la je Tweet
    30. sij

    Competitions on Russian-language cybercriminal forums: Sharing expertise or threat actor showboating? Read the latest blog from 👇

    Poništi
  10. 30. sij

    Competitions have been a feature of the Russian-language cybercriminal scene practically since the advent of cybercriminal forums. Check out the latest developments:

    Poništi
  11. proslijedio/la je Tweet
    30. sij

    Our team took a deep-dive into the criminal underground to investigate the persistence of forums, uncovering serval reasons they remain attractive and appealing alternatives. Read the full report 👇

    Poništi
  12. proslijedio/la je Tweet
    29. sij
    Poništi
  13. proslijedio/la je Tweet
    28. sij

    1. Windows Defender 2. EDR 3. Automated defanging of documents 4. Disabling macros, OLE, DDE, etc. 5. Disabling Windows Script Hosting 6. Private VLANs 7. Application whitelisting 8. Users not being local admins 9. 2FA on everything 10. Up-to-date patching

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    28. sij
    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    28. sij
    Poništi
  16. proslijedio/la je Tweet
    22. sij

    Following our research into 2FA, examined account takeover (ATO) from the perspective of the cybercriminal to figure out... Why and how do criminals perform ATO? Read the 5 step analysis below👇

    Poništi
  17. proslijedio/la je Tweet
    22. sij

    Featuring commentary from me, firmly coming down on the side of publishing PoC exploit code is, despite it’s drawbacks, a net benefit for everyone.

    Poništi
  18. proslijedio/la je Tweet
    21. sij

    Our team recently found more than 212k files exposed by a 3rd party for an IT consulting firm.😮 Passwords were exposed in plaintext and the password lists included the passcode to an individual’s cell phone. Learn how to manage your security ecosystem👇

    Poništi
  19. 21. sij
    Poništi
  20. proslijedio/la je Tweet
    21. sij
    Poništi
  21. 21. sij

    . talking earlier about creating a custom attribution model for your team.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·