@SBargins Profile picture

S. Bargins

@SBargins

clavando alfileres en tu cabeza

Joined June 2018
Similar User
Lewis photo

@lewsecurity

Ekho photo

@_EKH0

Alex.Shay photo

@D0ct0rflag

Artemis4n6🧑‍💻🚀🌕 photo

@Naveen4n6

S. Bargins Reposted

LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign blogs.blackberry.com/en/2024/11/lig… #Pentesting #CyberSecurity #Infosec

ptracesecurity's tweet image. LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign
 blogs.blackberry.com/en/2024/11/lig… #Pentesting #CyberSecurity #Infosec
ptracesecurity's tweet image. LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign
 blogs.blackberry.com/en/2024/11/lig… #Pentesting #CyberSecurity #Infosec
ptracesecurity's tweet image. LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign
 blogs.blackberry.com/en/2024/11/lig… #Pentesting #CyberSecurity #Infosec
ptracesecurity's tweet image. LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign
 blogs.blackberry.com/en/2024/11/lig… #Pentesting #CyberSecurity #Infosec

S. Bargins Reposted

LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign blogs.blackberry.com/en/2024/11/lig… #Pentesting #CyberSecurity #Infosec

ptracesecurity's tweet image. LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign blogs.blackberry.com/en/2024/11/lig…  #Pentesting #CyberSecurity #Infosec
ptracesecurity's tweet image. LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign blogs.blackberry.com/en/2024/11/lig…  #Pentesting #CyberSecurity #Infosec
ptracesecurity's tweet image. LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign blogs.blackberry.com/en/2024/11/lig…  #Pentesting #CyberSecurity #Infosec
ptracesecurity's tweet image. LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign blogs.blackberry.com/en/2024/11/lig…  #Pentesting #CyberSecurity #Infosec

S. Bargins Reposted

🚨 Fortinet CVE-2024-23113 - actively exploited by state-sponsored hackers - is now being exploited by cybercriminals who have reverse-engineered it and are selling access to compromised devices If you haven't patched, restrict port 541 to approved IPs or enforce cert auth.

mattjay's tweet image. 🚨 Fortinet CVE-2024-23113 - actively exploited by state-sponsored hackers - is now being exploited by cybercriminals who have reverse-engineered it and are selling access to compromised devices

If you haven't patched, restrict port 541 to approved IPs or enforce cert auth.

S. Bargins Reposted

🇨🇳 We're excited to announce the publication of the latest Sekoia #TDR team report, « A Three Beats Waltz: The ecosystem behind Chinese state-sponsored cyber threats." blog.sekoia.io/a-three-beats-…

sekoia_io's tweet image. 🇨🇳 We're excited to announce the publication of the latest Sekoia #TDR team report, « A Three Beats Waltz: The ecosystem behind Chinese state-sponsored cyber threats." 

blog.sekoia.io/a-three-beats-…

S. Bargins Reposted

On Monday February 3 to Thursday February 6, 2025 we'll be facilitating our Advanced Detection Engineering training in the beautiful Brisbane. Come join us! Hosting and registration kindly facilitated by @Division5io division5.io/ADEitE2025.html


S. Bargins Reposted

Today @404mediaco confirmed the individual believed to be responsible for the Snowflake breach (which resulted in the Ticketmaster breach) has been apprehended by the Royal Canadian Mounted Police (RCMP). More information: 404media.co/suspected-snow…


S. Bargins Reposted

How ironic


S. Bargins Reposted

NEW LAB RELEASE: KG Distribution 🚨 A full memory analysis lab with two key systems using MemProcFS. This lab was created and brought to you by the talented @13CubedDFIR 👇 Solve the lab here 👇 xintra.org Test your memory skills on: 👀C2 Analysis &…

inversecos's tweet image. NEW LAB RELEASE: KG Distribution 🚨 

A full memory analysis lab with two key systems using MemProcFS. This lab was created and brought to you by the talented @13CubedDFIR 

👇 Solve the lab here 👇
xintra.org     

Test your memory skills on:  
👀C2 Analysis &…
inversecos's tweet image. NEW LAB RELEASE: KG Distribution 🚨 

A full memory analysis lab with two key systems using MemProcFS. This lab was created and brought to you by the talented @13CubedDFIR 

👇 Solve the lab here 👇
xintra.org     

Test your memory skills on:  
👀C2 Analysis &…

S. Bargins Reposted

🚨 Updated list by @IntelBrokerBF of the companies affected by @Cisco breach: pastebin.com/8vWSscTn

IntCyberDigest's tweet image. 🚨 Updated list by @IntelBrokerBF of the companies affected by @Cisco breach:

pastebin.com/8vWSscTn

S. Bargins Reposted

I *love* this Pyramid of Social Pains from @WadingThruLogs to help close out @WWHackinFest so well. Great job, Wade!

jeffmcjunkin's tweet image. I *love* this Pyramid of Social Pains from @WadingThruLogs to help close out @WWHackinFest so well. 

Great job, Wade!

S. Bargins Reposted

We joined @FBI @NSAGov & @NCSC to outline TTPs used by Russia's SVR (APT29) to target defense, tech & finance sectors globally. They scan for unpatched systems, gain access, and pivot to connected networks. Read the CSA for ways to protect your networks: ic3.gov/Media/News/202…


S. Bargins Reposted

I had to play around with the LOLRMM #KQL query shared by @Antonlovesdnb and created a query that fetches all the filenames and lists all RMM tools that make connections in your environment. github.com/Bert-JanP/Hunt… LOLRMM: lolrmm.io


S. Bargins Reposted

ESET Research details the tools and activities of a new China-aligned threat actor, CeranaKeeper, focusing on massive data exfiltration in Southeast Asia | welivesecurity.com/en/eset-resear… @ESET


S. Bargins Reposted

🚨🔥 LOLRMM IS LIVE! 🔥🚨 The wait is over, folks! 🥳🎉 We’re thrilled to announce the official release of LOLRMM — your new go-to tool to detect and counter RMM abuse! 🕵️‍♂️💻 👉 Check it out NOW at LOLRMM.io 👈 This couldn’t have been possible without our amazing…


S. Bargins Reposted

Identifying Human-operated Ransomware through Windows Event Logs blogs.jpcert.or.jp/en/2024/09/win…

blackorbird's tweet image. Identifying Human-operated Ransomware through Windows Event Logs
blogs.jpcert.or.jp/en/2024/09/win…

United States Trends
Loading...

Something went wrong.


Something went wrong.