@lewsecurity Profile picture

Lewis

@lewsecurity

IR, malware, threats and intelligence research. Doing security @Microsoft. Based in the UK. (Opinions my own).

Joined June 2022
Similar User
Param Dhagia photo

@paramdhagia

assanii photo

@hikari_lmc

Jayaharsha photo

@jayaharsha

JD Saladfinger photo

@JDSaladfinger

D8c photo

@D8c_au

Pinned

Virus.xcheck is a Python tool that bulk verifies the existence of file hashes in the Virus Exchange database. Note this is alpha. #Vx #Malware #Python @vxunderground github.com/lewiswigmore/V…


Lewis Reposted

Between July 2023 and June 2024, Microsoft observed nation-state threat actors conduct operations for financial gain, enlist cybercriminals to collect intelligence, and make use of the same tools and frameworks favored by cybercriminals: msft.it/6018mf9Sm


Lewis Reposted

Playing charades with the Tesla Optimus robot last night. This is either the single greatest robotics and LLM demo the world has ever seen, or it's MOSTLY remote operated by a human. No in between.


Lewis Reposted

New breach: Internet Archive had 31M records breached last month including email address, screen name and bcrypt password hash. 54% were already in @haveibeenpwned Read more: bleepingcomputer.com/news/security/…


Lewis Reposted

Updates to vx-underground Samples: - AcidRain - AgentTesla - Android.SoumniBot - AveMaria - GuLoader - LummaStealer - NjRat - PikaBot - QakBot - Rawdoor - Remcos - SystemBC - Upstyle - Vultur - zLoader Papers: - 2024-06-06 - Remcos RAT Analysis - 2024-06-06 - Agent Tesla…

Tweet Image 1

Lewis Reposted

mfers ready for a new season? 🔥

Tweet Image 1

Lewis Reposted

Read this FAQ on the XZ Utils vulnerability CVE-2024-3094 and get guidance on assessing exposure and discovering affected devices using Microsoft Defender Vulnerability Management, Microsoft Defender for Cloud, and Microsoft Security Exposure Management: msft.it/6015cLJVB


Lewis Reposted

The xz package, starting from version 5.6.0 to 5.6.1, was found to contain a backdoor. The impact of this vulnerability affected Kali between March 26th to March 29th. If you updated your Kali installation on or after March 26th, it is crucial to apply the latest updates today.


Lewis Reposted

Over the past couple of days we have become aware of malware targeting gamers! More specifically, a currently unidentified Threat Actor is utilizing an infostealer to target individuals who cheat (Pay-to-Cheat) in video games. A Call of Duty cheat provider (PhantomOverlay) was…


Lewis Reposted

The new Microsoft Security Exposure Management is a huge win for all #MXDR customers and I especially love the overhauled Attack Path Analysis feature. 🛡️ If you are a customer go check it out today in the security portal. techcommunity.microsoft.com/t5/security-co…

Tweet Image 1

Lewis Reposted

Credit to @britishlibrary for sharing lessons learned from the cyber attack it experienced last year – a great example of taking a transparent approach for the benefit of others.

Today we’ve published a paper about the cyber-attack that took place last October. Its goal is to share our understanding of what happened and to help others learn from our experience. You can read the paper on our website, and hear from our CEO, Sir Roly Keating, in this…

Tweet Image 1


20 years of backups lost in the Tietoevry attack ⚙️ sweclockers.com/nyhet/38221-20…


U.S. Internet Leaked Years of Internal, Customer Emails 🔧 krebsonsecurity.com/2024/02/u-s-in… #Dataleak


Vulnerability Summary for the Week of February 5, 2024 | CISA 🛠️ cisa.gov/news-events/bu… #Vulnerability


Vulnerability Summary for the Week of February 5, 2024 | CISA ⚙️ cisa.gov/news-events/bu… #Vulnerability


United States Trends
Loading...

Something went wrong.


Something went wrong.