Raj SamaniVerified account

@Raj_Samani

Chief Scientist | Chief Innovation Officer | Co-author of & CSA Guide to Cloud | Advisor on Internet Security

Joined January 2010

Tweets

You blocked @Raj_Samani

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @Raj_Samani

  1. Pinned Tweet
    19 Oct 2017

    New blog by me. Now freely available. Ransomware Decryption Framework

    Undo
  2. Retweeted
    16 hours ago

    Do you know a woman engineer who is an unsung hero? Perhaps it is your engineering wife, sister, co-worker or daughter who has accomplished so much? Nominate your women engineer for the 2019 feature on Women Engineers You Should Know!

    Undo
  3. Undo
  4. Dec 27

    The Q3 threat report details distribution of four samples of V5 likely spread via the Fallout exploit kit. The chart displays a typical exploit kit infection rate:

    Undo
  5. Dec 26

    " kill switch domain receives over 17m beacons, or connections, in a one week period. These connections are coming from over 630k unique IP addresses consisting of 194 different countries"

    Undo
  6. Dec 24

    Enjoyed the research from who kicked off the festive season by "hacking some smart Christmas lights" where "communications are not encrypted it is trivial to Man-in-the-Middle the traffic"

    Undo
  7. Dec 21

    "Ryuk demands ransoms of between 15 and 50 bitcoins (between $50,000 and $170,000), with the price escalating by 0.5 bitcoins every day the victim doesn’t pay"

    Undo
  8. Dec 20
    Undo
  9. Dec 20
    Undo
  10. Dec 19
    Undo
  11. Dec 19

    We have just published our new Q3 Threat report where "Gamut, the top spam- producing botnet, spews “sextortion” scams, which demand payment"

    Undo
  12. Dec 19

    Really excellent analysis detailing "Unfolding History of Japanese-Speaking Underground Communities" via

    Undo
  13. Dec 18
    Undo
  14. Dec 18
    Undo
  15. Retweeted
    Dec 17

    Real editor meets guest editor - meets in the first of our daily Q&As. Nice guilty pleasure, never seen your Christmas film.

    Undo
  16. Dec 17
    Undo
  17. Dec 15

    " V3 installs a malicious service that runs the wiper component. Once running, it overwrites all files with random rubbish and triggers a reboot, resulting in a “blue screen of death” or a driver error making the system inoperable"

    Undo
  18. Dec 14

    We have just published our latest blog detailing the return of v3 targeting "oil, gas, energy, telecom, and government organizations in the Middle East and southern Europe".

    Undo
  19. Retweeted
    Dec 14

    Introducing our Guest Editors & These superstars will be running the show for the magazine next week.

    Undo
  20. Dec 14

    Now available on - Komrade Cyber podcast which details an inside look into the recent Sharpshooter campaign feat. &

    Undo
  21. Dec 14

    "Looking deeper into the newest lookalike, they found it had a different “trigger date” for when it would execute. If an infected system’s time was set to after December 7 2017, it would launch"

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·