Yakov Goldberg

@ubersec

Entrepreneur, Researcher, Cod3r, DFIR, Malware Analysis, Reverser, Sr. Director , Professor, Expert , . Tweets are my own!

washington dc
Vrijeme pridruživanja: svibanj 2009.

Tweetovi

Blokirali ste korisnika/cu @ubersec

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ubersec

  1. 4. velj
    Poništi
  2. proslijedio/la je Tweet
    4. velj

    targets 🇮🇹 from VBA > WMIC > DLL "info_02_04.doc" hxxp://bghqyf1.com/cdjq/4oslx.php?l=dsi4.cab c2: kuu15austin21.]com qryyueeriberto.]com v15zxnapoleonln.]com v214.111 [10291029JSJUYNHG]

    Prikaži ovu nit
    Poništi
  3. 4. velj

    SWEED: Exposing years of Agent Tesla campaigns

    Poništi
  4. 4. velj

    Threat Research Report: Infostealers and self-compiling droppers set loose by an unusual spam campaign via

    Poništi
  5. 2. velj
    Poništi
  6. 2. velj
    Poništi
  7. 2. velj
    Poništi
  8. 1. velj
    Poništi
  9. 1. velj

    The Chicken keeps laying new eggs: uncovering new GC MaaS tools used by top-tier threat actors by QuoScient GmbH

    Poništi
  10. proslijedio/la je Tweet
    31. sij
    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    31. sij

    /ezilon.tk hxxp://butland.cf/sabali/sab.php d6dc266e6f568a2053955bed23c3d556 0ff26d6593c18e567b7ec30052ae6df0

    Poništi
  12. proslijedio/la je Tweet
    1. velj

    found at SHA256: 30751c3186c636cbc1c992f22f522896d381b2753ca3e4f8f052a1137570d5ed C2: tcp://windowssupdate[.]hopto[.]org:5553

    Poništi
  13. 1. velj

    Tracking Down REvil’s ‘Lalartu’ by utilizing multiple OSINT methods by

    Poništi
  14. 1. velj

    Detecting Citrix CVE-2019-19781

    Poništi
  15. 1. velj
    Poništi
  16. 1. velj

    Abusing DLL Misconfigurations — Using Threat Intelligence to Weaponize R&D

    Poništi
  17. proslijedio/la je Tweet
    31. sij

    Look at the Analysis of "Request 0rder-Ack.exe" with malicious activity.

    Poništi
  18. 31. sij
    Poništi
  19. 31. sij

    What do you want to say about this? Winnti Group targeting universities in Hong Kong via

    Poništi
  20. 31. sij

    Tracking Down REvil’s ‘Lalartu’ by utilizing multiple OSINT methods by

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·