RiskIQ Community (@passivetotal) 's Twitter Profile
RiskIQ Community

@passivetotal

Providing freemium #ThreatHunting capabilities in order to surface threats faster and reduce risk. Built on top of @RiskIQ massive data collection.

ID: 2479900676

linkhttps://community.riskiq.com calendar_today06-05-2014 14:27:33

1,1K Tweet

4,4K Followers

5 Following

RiskIQ (@riskiq) 's Twitter Profile Photo

Microsoft security researchers observed a new #Magecart tactic: using obfuscation techniques to deliver and hide skimming scripts - a shift from injecting scripts via vulnerability exploitation. Read the analysis, which includes RiskIQ research, here: bit.ly/3Go1tKi

RiskIQ (@riskiq) 's Twitter Profile Photo

Understanding the cybercrime 'gig' economy is vital. Microsoft processes 24 trillion signals a day and tracks 35+ unique #ransomware families and 250 threat actors. Learn how Microsoft combats ransomware-as-a-service and how RiskIQ augments these efforts: bit.ly/3z3eRBN

RiskIQ (@riskiq) 's Twitter Profile Photo

Join RiskIQ at #RSAC2022! 🤝Visit booth #6288 in the North Hall 💻 Schedule a demo for great giveaways! 🗣️Attend our learning talk about tackling threats at a global scale 🎵Register for the Security Leaders concert to jam out with NEON TREES Register 👇 bit.ly/3yz71zH

Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

New blog post: Learn how to use MSTICPy, an open-source Python tool, to extract valuable threat intelligence from different kinds of data sets, including leaked chat logs: msft.it/6011bkZuR

RiskIQ (@riskiq) 's Twitter Profile Photo

Via Microsoft Security's Security Insider, Steve Ginty, Director of cyber intelligence, talks about the importance of knowing your external attack surface, gives tips on security readiness, and identifies the most critical step to take against threat actors: bit.ly/3ydOKrr

RiskIQ (@riskiq) 's Twitter Profile Photo

Understanding the cybercrime 'gig' economy is vital. Microsoft processes 24 trillion signals a day and tracks 35+ unique #ransomware families and 250 threat actors. Learn how Microsoft combats ransomware-as-a-service and how RiskIQ augments these efforts: bit.ly/3z3eRBN

RiskIQ (@riskiq) 's Twitter Profile Photo

We're all set for #RSAC2022! 🤝 This week, be sure to visit us at booth #6288 in the North Hall. 🎵Also, it's not too late to register for tonight's Security Leaders concert to jam out with NEON TREES! Register here: bit.ly/3yz71zH

We're all set for #RSAC2022!

🤝 This week, be sure to visit us at booth #6288 in the North Hall. 

🎵Also, it's not too late to register for tonight's Security Leaders concert to jam out with <a href="/neontrees/">NEON TREES</a>!

Register here: bit.ly/3yz71zH
RiskIQ (@riskiq) 's Twitter Profile Photo

RiskIQ researchers reviewed malicious files hosted on Discord's CDN. Five different files with image extensions loaded up an executable identified as 'Smoke Loader.' Read more about this threat tactic and other abuse of the Discord CDN in the RiskIQ TIP: bit.ly/3Qj3cp1

RiskIQ researchers reviewed malicious files hosted on Discord's CDN. Five different files with image extensions loaded up an executable identified as 'Smoke Loader.' Read more about this threat tactic and other abuse of the Discord CDN in the RiskIQ TIP: bit.ly/3Qj3cp1
RiskIQ (@riskiq) 's Twitter Profile Photo

RiskIQ researchers reviewed malicious files hosted on Discord's CDN. Five different files with image extensions loaded up an executable identified as 'Smoke Loader.' Read more about this threat tactic and other abuse of the Discord CDN in the RiskIQ TIP: bit.ly/3Qj3cp1

RiskIQ researchers reviewed malicious files hosted on Discord's CDN. Five different files with image extensions loaded up an executable identified as 'Smoke Loader.' Read more about this threat tactic and other abuse of the Discord CDN in the RiskIQ TIP: bit.ly/3Qj3cp1
RiskIQ (@riskiq) 's Twitter Profile Photo

If you missed our learning-packed #CyberThreatWorkshop series this past winter, don't worry! All videos are now on-demand. Join thousands of other #cybersecurity pros, and stay steps ahead of threats to your attack surface, here: bit.ly/3P9bVti

Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

We updated our comprehensive blog on ransomware-as-a-service with information on recently observed activities from DEV-0193 (Trickbot LLC), DEV-0504, DEV-0237, and DEV-0401, and a new section on Qakbot campaigns that lead to ransomware deployments: msft.it/6013bWxOf

RiskIQ (@riskiq) 's Twitter Profile Photo

If you missed our learning-packed #CyberThreatWorkshop series, don't worry! All videos are now on-demand. Join thousands of other #cybersecurity pros, and stay steps ahead of threats to your attack surface, here: bit.ly/3P9bVti

RiskIQ (@riskiq) 's Twitter Profile Photo

Between 21 and 28 June 2022, RiskIQ detected 164 #Magecart and skimmer injected URLs and 243 unique C2 domains used by known Magecart threat actors. Get the analysis and IOCs in the RiskIQ #ThreatIntelligence Portal: bit.ly/3a8CNtt

Between 21 and 28 June 2022, RiskIQ detected 164 #Magecart and skimmer injected URLs and 243 unique C2 domains used by known Magecart threat actors. Get the analysis and IOCs in the RiskIQ #ThreatIntelligence Portal: bit.ly/3a8CNtt
Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Microsoft discovered and patched a 0-day exploit (CVE-2022-22047) that #KNOTWEED, an Austria-based private sector offensive actor, used to deploy #Subzero malware. Analysis of campaigns, tactics, & payloads in this #MSTIC blog w/ Security Response RiskIQ: msft.it/6017j1vJ1

RiskIQ (@riskiq) 's Twitter Profile Photo

After acquiring RiskIQ about a year ago, Microsoft continues to build on its vision to provide unmatched threat intelligence, today announcing the launch of Microsoft Defender Threat Intelligence and Microsoft Defender External Attack Surface Management: bit.ly/3PZ6zRd

Microsoft Security (@msftsecurity) 's Twitter Profile Photo

During a cyberattack, every second counts. See a year’s worth of cybercrime through a single 60-second window: msft.it/6010jKC12 #SecurityInsider #Cyberattack

During a cyberattack, every second counts. See a year’s worth of cybercrime through a single 60-second window: msft.it/6010jKC12 #SecurityInsider #Cyberattack
Microsoft Security (@msftsecurity) 's Twitter Profile Photo

See demos of Microsoft Defender Threat Intelligence and Defender External Attack Surface Management. Register now: msft.it/6018jRx1I #BeFearless #ThreatIntelligence

See demos of Microsoft Defender Threat Intelligence and Defender External Attack Surface Management. 

Register now: msft.it/6018jRx1I 
#BeFearless #ThreatIntelligence
Microsoft Security (@msftsecurity) 's Twitter Profile Photo

Join Charlie Bell at the Stop Ransomware with Microsoft Security digital event to learn how threat intelligence can help organizations prepare for the worst. Register now: msft.it/6017jZvsN #MicrosoftSecurity #ThreatIntelligence

Vasu Jakkal (@vasujakkal) 's Twitter Profile Photo

Today we released our latest edition of CyberSignals to share #ransomeware insights and how we can defend against it. Microsoft Security microsoft.com/security/blog/…