S. Bargins
@SBarginsclavando alfileres en tu cabeza
Similar User
@lewsecurity
@_EKH0
@D0ct0rflag
@Naveen4n6
How to use JA4H to find new C2 servers! [WebScout blog] blog.webscout.io/dissecting-ja4…
LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign blogs.blackberry.com/en/2024/11/lig… #Pentesting #CyberSecurity #Infosec
''How attackers defeat detections based on page signatures'' #infosec #pentest #redteam #blueteam pushsecurity.com/blog/how-aitm-…
LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign blogs.blackberry.com/en/2024/11/lig… #Pentesting #CyberSecurity #Infosec
🚨 Fortinet CVE-2024-23113 - actively exploited by state-sponsored hackers - is now being exploited by cybercriminals who have reverse-engineered it and are selling access to compromised devices If you haven't patched, restrict port 541 to approved IPs or enforce cert auth.
🇨🇳 We're excited to announce the publication of the latest Sekoia #TDR team report, « A Three Beats Waltz: The ecosystem behind Chinese state-sponsored cyber threats." blog.sekoia.io/a-three-beats-…
Microsoft Dev Tunnels: Tunnelling C2 and More newtonpaul.com/tunneling-c2-t… #threathunting
New blog Post: ETW Forensics - Why use Event Tracing for Windows over EventLog? ^TN blogs.jpcert.or.jp/en/2024/11/etw…
On Monday February 3 to Thursday February 6, 2025 we'll be facilitating our Advanced Detection Engineering training in the beautiful Brisbane. Come join us! Hosting and registration kindly facilitated by @Division5io division5.io/ADEitE2025.html
Today @404mediaco confirmed the individual believed to be responsible for the Snowflake breach (which resulted in the Ticketmaster breach) has been apprehended by the Royal Canadian Mounted Police (RCMP). More information: 404media.co/suspected-snow…
From Intelligence to Detection: A Workflow for Integrating CTI, IR, Hunting & Red Teams detect.fyi/from-intellige…
NEW LAB RELEASE: KG Distribution 🚨 A full memory analysis lab with two key systems using MemProcFS. This lab was created and brought to you by the talented @13CubedDFIR 👇 Solve the lab here 👇 xintra.org Test your memory skills on: 👀C2 Analysis &…
🚨 Updated list by @IntelBrokerBF of the companies affected by @Cisco breach: pastebin.com/8vWSscTn
I *love* this Pyramid of Social Pains from @WadingThruLogs to help close out @WWHackinFest so well. Great job, Wade!
We joined @FBI @NSAGov & @NCSC to outline TTPs used by Russia's SVR (APT29) to target defense, tech & finance sectors globally. They scan for unpatched systems, gain access, and pivot to connected networks. Read the CSA for ways to protect your networks: ic3.gov/Media/News/202…
I had to play around with the LOLRMM #KQL query shared by @Antonlovesdnb and created a query that fetches all the filenames and lists all RMM tools that make connections in your environment. github.com/Bert-JanP/Hunt… LOLRMM: lolrmm.io
ESET Research details the tools and activities of a new China-aligned threat actor, CeranaKeeper, focusing on massive data exfiltration in Southeast Asia | welivesecurity.com/en/eset-resear… @ESET
🚨🔥 LOLRMM IS LIVE! 🔥🚨 The wait is over, folks! 🥳🎉 We’re thrilled to announce the official release of LOLRMM — your new go-to tool to detect and counter RMM abuse! 🕵️♂️💻 👉 Check it out NOW at LOLRMM.io 👈 This couldn’t have been possible without our amazing…
Identifying Human-operated Ransomware through Windows Event Logs blogs.jpcert.or.jp/en/2024/09/win…
United States Trends
- 1. $CUTO 7.969 posts
- 2. Friday the 13th 70,8 B posts
- 3. DeFi 206 B posts
- 4. #HappyBirthdayTaylor 14,6 B posts
- 5. #IDEGEN N/A
- 6. Odell 4.208 posts
- 7. #FridayVibes 7.913 posts
- 8. Good Friday 66 B posts
- 9. #BlueBloodsFinale N/A
- 10. Ciri 112 B posts
- 11. CALVIN KLEIN 30,7 B posts
- 12. #FridayMotivation 6.134 posts
- 13. Witcher 131 B posts
- 14. Happy Friyay 2.301 posts
- 15. Wordle 1,273 X N/A
- 16. Recycling 30,3 B posts
- 17. Geralt 16,3 B posts
- 18. Brink 7.765 posts
- 19. De'Vondre Campbell 13,1 B posts
- 20. One for the Swifties N/A
Something went wrong.
Something went wrong.