If you are in infosec and live in FL, maybe you can book some conference sep 11-> and wait it out with your family https://t.co/NwqjWAcBUc
— snowfl0w (@snowfl0w) September 5, 2017
https://t.co/NwqjWAcBUc from Twitter https://twitter.com/snowfl0w
If you are in infosec and live in FL, maybe you can book some conference sep 11-> and wait it out with your family https://t.co/NwqjWAcBUc
— snowfl0w (@snowfl0w) September 5, 2017
I wouldn't say "not accurate". After all it is a go-to long-term model. But, yeah, I would say historically perhaps not as good as the Euro.
— Dan Kaplan (@DanKaps) September 2, 2017
.@JohnCornyn on Hurricane Harvey @NBCDFW pic.twitter.com/aHERA25ArF
— Julie Fine (@JulieFineNBC5) August 26, 2017
Regarding Marcus Hutchins aka MalwareTech - my position. https://t.co/EzGs34eQz7
— Kevin Beaumont (@GossiTheDog) August 5, 2017
[UPDATE] Added a new CLI option to the public API wrapper that can be used to fetch samples and PCAPs: https://t.co/lAJv7tAlnw
— Payload Security (@PayloadSecurity) July 25, 2017
Since it takes me forever to do anything these days (especially a blog post), here's a screenshot of what I'm talking about. #DFIR /1 pic.twitter.com/vfgD5cPTrE
— Jack Crook (@jackcr) July 25, 2017
— # mind mapper # (@Thoughtskiller1) June 4, 2017
@malwrhunterteam @malwareunicorn . So does Kwampirs
— Andre M. DiMino (@sempersecurus) May 15, 2017
I heard ya'll like overlaps– another Lazarus sample with same WannaCrypt Overlap: 409c6a19705ccbd3185d5d0656c7811d @ 0x4018C0 from Oct 2014 pic.twitter.com/bLCuIT87vQ
— J. A. Guerrero-Saade (@juanandres_gs) May 15, 2017
In fact, Cisco says WannaCry has no way to check bitcoins paid. Clicking "check payment" gives random fake response https://t.co/UiaJ688DUO
— Andy Greenberg (@a_greenberg) May 15, 2017
WanaCryptor File Encryption https://t.co/VeLuCWh3mQ
— Nicolas Krassas (@Dinosn) May 15, 2017
A 'kill switch' is slowing the spread of #WannaCry ransomware https://t.co/QgVVQufs5o via @pcworld
— Betty C. Jung (@bettycjung) May 13, 2017
wikileaks: Russia hardest hit by NSA turbo-charged ransomware #WannaCry https://t.co/K9VDjZ1EdR
— L'Afrique Cachée (@africachee) May 13, 2017
#WannaCry crosses 100k mark! Spreads all over the world. https://t.co/us4MO3kthg
— Umar Khan (@CreativityLogic) May 13, 2017
This is actual footage of #WannaCry #ms17-010 spreading through University of Milano-Bicocca pic.twitter.com/GuiDe4GdSl
— Rickey Gevers (@UID_) May 12, 2017
Love this idea - Infosec cons, can we make this a thing? https://t.co/xC7btOAQQe
— Jayme (@highmeh) May 12, 2017
#WannaCry resources password:WNcry@2ol7 pic.twitter.com/OOcawrC8WR
— xors (@xorsthings) May 12, 2017
LATEST: 100,000+ attacks of #WannaCry ramsomware detected in 24 hours #WanaCrypt0r #WCry https://t.co/xCaUzzFJF8 pic.twitter.com/xIAgbkBX5i
— rick (@rickrick888) May 13, 2017
…
#wannacry have made 17k NZD so far based on the wallet addresses stated in https://t.co/TNlyKJBarz - should buy u a few smokes in jail team
— bogan (@bogan) May 13, 2017
More great analysis of #WannaCry malware by Talos https://t.co/S74elk4772
— 🏴 Lauri Love 🏴 (@laurilove) May 13, 2017
After the #Sbahn in Frankfurt also Bhf Neustadt affected by the Ransomware outbreak. #WannaCry pic.twitter.com/JgVwi5Khz6
— Rickey Gevers (@UID_) May 12, 2017
Attack distribution by country. #WannaCry #ShadowBrokers find more on @Securelist : https://t.co/RWW3y4wPLb pic.twitter.com/dWOPyX2dIc
— Ido Naor (@IdoNaor1) May 12, 2017
A2
— Michael Kaiser (@MKaiserNCSA) May 4, 2017
#IDTheftChat #LayerUp http://pic.twitter.com/9D46mGyYwP
New Karmen Ransomware-as-a-Service Advertised on Hacking Forumshttps://t.co/S4pVeS2d01
— BleepingComputer (@BleepinComputer) April 18, 2017
Todays Xerox spamrun carries #Dridex and CVE-2017-0199. DL's from (1st): btt5sxcx90[.]com, rottastics36w[.]net -> btt5sxcx90[.]com/7500.exe
— peterkruse (@peterkruse) April 18, 2017
Too bad I can't buy stock in a Russian troll factory. Profits are gonna soar. https://t.co/a68DauZtQI
— Sam Greene (@samagreene) April 18, 2017
@etlow Here is a public version of your data via Google Sheets if you should need it :-) -> https://t.co/UJ5cwIhkPh
— Simon Zerafa (@SimonZerafa) April 17, 2017
Need Trump OSINT on Russia. This is nice at timelines and connecting all the dots https://t.co/vgwrWJorYi
— Root ♊ (@rootsecdev) April 12, 2017
Anonymous leaks plague the White House - even the people behind the Easter Egg Roll are leaking! https://t.co/65r8m04xzc http://pic.twitter.com/yXQmchMymR
— Travis (@tcd004) April 11, 2017
Subdomino - An application that enumerates subdomains and scan them with several rules https://t.co/jBBN9Ctrjw http://pic.twitter.com/8qcaOWXihS
— howucan.gr (@howucan_gr) April 9, 2017
#EquationGroup had X11 server #Linux keylogger!
— Maksym Zaitsev (@cryptolok) April 9, 2017
all users affected, even root! http://pic.twitter.com/tbsv5fHeUD
Interesting discussion from @Adam_Cyber https://t.co/xnZwWYrrkx
— Brendan Conlon (@bmconlon) March 20, 2017
FAQ slide from @CrowdStrike presentation on FANCY BEAR X-Agent for Android that @DAlperovitch and I just wrapped up http://pic.twitter.com/lZ4SktgCaN
— adam_cyber (@Adam_Cyber) January 4, 2017
On the left are strings from FANCY BEAR linux implant, on the right are strings from the Android implant used against Ukraine military http://pic.twitter.com/TkLWIybGl3
— adam_cyber (@Adam_Cyber) December 29, 2016
Ah-ha, I had an epiphany in the shower this morning and realized how to get codeexec in LastPass 4.1.43. Full report and exploit on the way. http://pic.twitter.com/vQn20D9VCy
— Tavis Ormandy (@taviso) March 25, 2017
Ouch Watchguard.... http://pic.twitter.com/7lZLsYbM0k
— Andre M. DiMino (@sempersecurus) March 23, 2017
@Jose_Pagliery Just saw you explain Trump/Alfabank DNS traffic oddness. Anyone considered IODINE xfers over DNS? >> https://t.co/juuMmQYl6k http://pic.twitter.com/NWoWfmZDd4
— JΞSŦΞR ✪ ΔCŦUAL³³º¹ (@th3j35t3r) March 10, 2017
The President, who I work for, just had China grant him trademarks for Trump escort services. Prostitutes! Why isn't this on the news?
— White House staffer (@AngryWHStaffer) March 9, 2017
http://pic.twitter.com/3YSXZq1EVj
— Elon Musk (@elonmusk) March 6, 2017
Russian APT - APT28 collection of samples including OSX XAgent - Nice curation of #Malware & resources by @snowfl0w https://t.co/S7EHWNO1V7
— Andre M. DiMino (@sempersecurus) February 21, 2017
I updated by targeted threats tracker, with latest reports and indicators of compromise https://t.co/Ue0NZ1BMyo
— Nex ~ Claudio (@botherder) February 21, 2017
Very helpful Florian. https://t.co/HvLs4cJ2QX
— Brent Wrisley (@brentwrisley) February 13, 2017
The ransomware tube map. Taken from our State of Cyber Security Report: https://t.co/GjZ4Ax50J6 http://pic.twitter.com/QuiVDE5b80
— Mikko Hypponen (@mikko) February 15, 2017
To do:
— Dave Lewis (@gattaca) January 29, 2017
1) design my Canada tattoo
2) buy a new burner phone
3) rock back and forth in the corner.
This is what you need to know about the #iMessage security flaw➡ https://t.co/JTJRPLkfrE #cybersecurity #iPhone http://pic.twitter.com/ZnzogRh8yM
— Panda Security (@Panda_Security) January 20, 2017
Crowd at Obama’s inauguration in 2009. Crowd at Trump’s inauguration today. http://pic.twitter.com/zZvTFiodXI
— Joon Lee (@iamjoonlee) January 20, 2017