@0MARBO Profile picture

Omar Alakkad

@0MARBO

Joined October 2020
Similar User
Fabio Pierazzi photo

@fbpierazzi

Cybersecurity Club || نادي الأمن السيبراني photo

@CySecClub_UPM

Secure ICS OT photo

@Secure_ICS_OT

NawaF ..💙 photo

@NawaF_Aloufi

Maura Pintor photo

@maurapintor

Sagar Samtani photo

@_Sagar_Samtani

Mohamad Kontar photo

@MHMDQi

Shree Janani photo

@ShreeJananiS

Mohammed Raef photo

@mhd_raef

Haitham photo

@ita7min

Abdul Malik Sardar photo

@ICS_AMS

Mohanned | مهنّد photo

@mshehris

wairimu_maina photo

@wairimu1maina

Ralf photo

@rlfbrt

mohamed atta photo

@m3atta

Omar Alakkad Reposted

To the world who turned a cold shoulder, Gazan people burned alive in their tents tonight.


Omar Alakkad Reposted

LLMs rely on adversarial testing or "AI red teaming," but what does it involve? Who should do it? Join our #CSCW2024 with experts including RT leads (@_lamaahma and @ram_ssk), @marylgray, and @bshestakofsky Apply to join: bit.ly/airedteam Paper: arxiv.org/abs/2407.07786


Omar Alakkad Reposted

Oxford surgeon Professor Nick Maynard on what he saw in Gaza:

Tweet Image 1

Omar Alakkad Reposted

http://./\<#0>: ://./<#0> this string crashes discord


Omar Alakkad Reposted

FAQ on the xz-utils backdoor |  by Sam James gist.github.com/thesamesam/223… #XZ #XZutil

Tweet Image 1

Omar Alakkad Reposted

Lotta chatter around #ScreenConnect vulnerabilities now as folks are getting spun up. Fellow @HuntressLabs researchers and I were up all night to recreate the auth bypass and RCE exploit. I'm not a huge fan of giving a PoC to threat actors, but I do dig snazzy video demos 😜


Omar Alakkad Reposted

Well, now that other firms have publicly shared the proof-of-concept, and in-the-wild exploitation is already happening... we feel we aren't adding any risk and are comfortable sharing our analysis. @HuntressLabs writeup on #ScreenConnect vulnerabilities: huntress.com/blog/a-catastr…

Tweet Image 1

Omar Alakkad Reposted

ConnectWise has shared publicly that there are users affected by the recent #ScreenConnect vulnerabilities (authentication bypass->remote code execution), confirming in-the-wild exploitation. They share 3 observed IPs exploiting & installing persistence: connectwise.com/company/trust/…

Tweet Image 1

Omar Alakkad Reposted

#ESETresearch has documented a growing series of OilRig downloaders using legitimate cloud service providers for C&C communication, all deployed against a small group of especially interesting, repeatedly victimized targets in Israel. welivesecurity.com/en/eset-resear… @zuzana_hromcova 1/7


Omar Alakkad Reposted

cocomelonc.github.io/book/2023/12/1… Alhamdulillah, I finished writing this book today. The proceeds from the sale of this book will be used to treat childs. #cybersec #cybersecurity #cybercrime #malware #malwareanalysis #ransomware #hacking #purpleteam #research #threatintelligence #APT


Omar Alakkad Reposted

A few weeks ago I started to rewrite the Havoc Framework from scratch for various reasons. Redesigning the server architecture, RESTful API driven, and the client fully scriptable using Python (commands, events, UI). I wanna fully rewrite everything in the next ~2 months [1/11]


Omar Alakkad Reposted

Today at #BHEU, Microsoft researchers are sharing info about the open-source Microsoft ICS forensics framework, as well as new Rockwell RSLogix and Omron tools that defenders can use and customize for detecting suspicious artifacts in ICS environments: msft.it/6018iumFC


Omar Alakkad Reposted

📘 Cyberattacks on UK Critical Infrastructure 🇬🇧 CTI GitHub Repo - OSINT collection of reports related to cyberattacks and campaigns against UK critical national infrastructure (CNI) for case studies #cybersecurity #infosec #blueteam #cti #threatintel github.com/BushidoUK/UK-C…

Tweet Image 1

Omar Alakkad Reposted

Want to start learning about software exploitation? Then check my FREE course below. More than 12h+ of recorded hands-on content and all the labs, slides, etc are published completely FREE! The course start with the very basics. #Cybersecurity #exploit youtube.com/playlist?list=…

Tweet Image 1

Omar Alakkad Reposted

We’ve published a whitepaper with @NCA_UK outlining the tactics of the cyber crime groups behind ransomware attacks on UK organisations. 🧵

Tweet Image 1

Omar Alakkad Reposted

I've started challenging the very term "technical." There's no one way to be "technical." Someone who codes might know jack about network forensics. There are so many "technical" areas...and understanding how technologies work at a high level and communicating that is technical!


Industrial Control Systems: Engineering Foundations and Cyber-Physical Attack Lifecycle cyberphysicalsecurity.info by Dr.Marina Krotofil


Omar Alakkad Reposted

📢The Microsoft AI Red Team is hiring across all levels! Your area can be Adversarial ML or Responsible AI or Pen testing, and you will fit right in! Questions? DM always open Junior: jobs.careers.microsoft.com/global/en/job/… Senior: jobs.careers.microsoft.com/global/en/job/… Principal: jobs.careers.microsoft.com/global/en/job/…


Loading...

Something went wrong.


Something went wrong.