Lindsey O'Donnell Welch (@lindseyod123) 's Twitter Profile
Lindsey O'Donnell Welch

@lindseyod123

Cybersecurity writer @HuntressLabs. Previous @DecipherSec @ThreatPost, @CRN, @Holy_cross alum

ID: 323346004

calendar_today24-06-2011 17:32:41

12,12K Tweet

3,3K Takipçi

2,2K Takip Edilen

Lindsey O'Donnell Welch (@lindseyod123) 's Twitter Profile Photo

Analysis of a recent KawaLocker #ransomware incident with what might be my favorite title of all time huntress.com/blog/kawalocke…

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

Cybercriminals are using USB infections for coinmining operations. This blog post unpacks their multi-stage attack, including DLL side-loading, process injection, and using PostgreSQL as C2. Learn more: bit.ly/4lA7hDA

Lindsey O'Donnell Welch (@lindseyod123) 's Twitter Profile Photo

FBI releasing this advisory alongside new Talos research about “Static Tundra” exploiting a 7-year-old Cisco IOS flaw (CVE-2018-0171) blog.talosintelligence.com/static-tundra/

Jamie Levy🦉 (@gleeda) 's Twitter Profile Photo

Occasionally you see a new or newish threat in the SOC. One such example is Syphilis- oops, I mean, Cephalus Ransomware Either way: Don’t Lose Your Head 👇 huntress.com/blog/cephalus-…

Huntress (@huntresslabs) 's Twitter Profile Photo

Ransomware groups don’t just encrypt files, they steal them first. Data staging + exfiltration is the most common step before encryption. Here's how it happens (with real tactics + command lines):👇 okt.to/UWIZev

Ransomware groups don’t just encrypt files, they steal them first.
Data staging + exfiltration is the most common step before encryption.
Here's how it happens (with real tactics + command lines):👇
okt.to/UWIZev
Virus Bulletin (@virusbtn) 's Twitter Profile Photo

Insikt Group releases a deep dive into the Lumma infostealer, active since 2022, and the affiliates behind it. The analysis highlights new, previously undocumented tools and evidence that affiliates run multiple schemes simultaneously. recordedfuture.com/research/behin…

Insikt Group releases a deep dive into the Lumma infostealer, active since 2022, and the affiliates behind it. The analysis highlights new, previously undocumented tools and evidence that affiliates run multiple schemes simultaneously. recordedfuture.com/research/behin…
Lindsey O'Donnell Welch (@lindseyod123) 's Twitter Profile Photo

We recently came across Cephalus #ransomware: -Initial access: RDP compromised accounts -DLL sideloading to launch the ransomware -Ransom notes w/ articles about Cephalus in an apparent attempt to underscore the legitimacy of the ransomware as a threat huntress.com/blog/cephalus-…

Daniel Cuthbert (@dcuthbert) 's Twitter Profile Photo

Of all the web technologies we’ve had and lost, I miss RSS the most. I controlled how I consumed the content, not how an algorithm decides. That and google reader

GreyNoise (@greynoiseio) 's Twitter Profile Photo

On August 21, GreyNoise observed nearly 2,000 malicious IPs probing Microsoft Remote Desktop (RDP) services in a single day — a sharp deviation from baseline activity. Full blog: greynoise.io/blog/surge-mal… #ThreatIntel #RDP #Cybersecurity #GreyNoise #Analysis #RemoteDesktop

On August 21, GreyNoise observed nearly 2,000 malicious IPs probing Microsoft Remote Desktop (RDP) services in a single day — a sharp deviation from baseline activity. Full blog: greynoise.io/blog/surge-mal…

#ThreatIntel #RDP #Cybersecurity #GreyNoise #Analysis #RemoteDesktop
Silas Cutler // p1nk (@silascutler) 's Twitter Profile Photo

2025 State of the Internet Report: Summary and Conclusions censys.com/blog/2025-stat… (Screenshot: PolarEdge infections as of 5 August 2025)

2025 State of the Internet Report: Summary and Conclusions
censys.com/blog/2025-stat…

(Screenshot: PolarEdge infections as of 5 August 2025)
Ryan Naraine (@ryanaraine) 's Twitter Profile Photo

Citrix: "Exploits of CVE-2025-7775 on unmitigated appliances have been observed." NetScaler ADC and NetScaler Gateway emergency patch support.citrix.com/support-home/k…