M&& (@agitmgreen) 's Twitter Profile
M&&

@agitmgreen

ID: 2315600474

calendar_today28-01-2014 14:40:06

119 Tweet

61 Followers

2,2K Following

Matt Johansen (@mattjay) 's Twitter Profile Photo

Kevin Briggs, a senior advisor at CISA, has publicly revealed ongoing vulnerabilities in U.S. telecom networks. TL;DR - He has evidence vulns in teleco's are being used to track and spy on U.S. citizens. Buckle up, here's what we know:

vx-underground (@vxunderground) 's Twitter Profile Photo

April 8th, 2024, a Threat Actor operating under the moniker "USDoD" placed a large database up for sale on Breached titled: "National Public Data". They claimed it contained 2,900,000,000 records on United States citizens. They put the data up for sale for $3,500,000. National

Davey Winder (@happygeek) 's Twitter Profile Photo

By me Forbes: This Wi-Fi driver vulnerability impacts all versions of Windows and enables a no-interaction, no-authentication remote code attack as long as the attacker is in range. #infosec #windows #wifi forbes.com/sites/daveywin…

Lukas Stefanko (@lukasstefanko) 's Twitter Profile Photo

New Android malware - #NGate - relays NFC data from victims’ payment cards, via victims’ compromised mobile phones, to attacker's device waiting at an ATM to withdraw cash welivesecurity.com/en/eset-resear…

Matt Johansen (@mattjay) 's Twitter Profile Photo

⚠️ Breaking: North Korea just burned an 0-Day in Chromium. They used it to install a Windows rootkit and the campaign targeted cryptocurrency platforms and users. Here's what we know:

Howard Lince III (@howardl3) 's Twitter Profile Photo

A 9.9 CVE has been announced for Linux 👀 Remote code execution. No details yet. Heartbleed was 7.5, for reference. This is one of the worst in history. All GNU/Linux systems impacted.

HackManac (@h4ckmanac) 's Twitter Profile Photo

🚨Data Breach Alert ‼️ IntelBroker, in collaboration with EnergyWeaponUser and zjj, claims to be selling data from a recent Cisco breach. The compromised data reportedly includes GitHub and GitLab projects, SonarQube projects, source code, hardcoded credentials, certificates,

🚨Data Breach Alert ‼️

IntelBroker, in collaboration with EnergyWeaponUser and zjj, claims to be selling data from a recent Cisco breach.

The compromised data reportedly includes GitHub and GitLab projects, SonarQube projects, source code, hardcoded credentials, certificates,
M&& (@agitmgreen) 's Twitter Profile Photo

The US government has launched a national-security investigation into TP-Link, the China-founded router maker whose equipment has been targeted in repeated Chinese cyber attacks bloomberg.com/news/articles/… via Bloomberg Technology

xvonfers (@xvonfers) 's Twitter Profile Photo

Wow... "We discover 119 vulnerabilities in LTE/5G core infrastructure...and some of which can be used to remotely compromise and access the cellular core..." cellularsecurity.org/ransacked nathanielbennett.com/publications/r…

Wow...
"We discover 119 vulnerabilities in LTE/5G core infrastructure...and some of which can be used to remotely compromise and access the cellular core..."
cellularsecurity.org/ransacked
nathanielbennett.com/publications/r…
Matt Johansen (@mattjay) 's Twitter Profile Photo

Hackers are using Google Tag Manager (GTM) to inject credit card skimmers into E-commerce sites. At least 6 compromised sites identified so far. Here's what we're seeing. 👇

Boerboel (@deplorablenorth) 's Twitter Profile Photo

Ive fought beside Americans and on several occasions they risked themselves to save Canadians. And we did the same for them. For the most part, it was Americans who cared for our dead over there, as if they were their own fallen. When we needed medevacs for our fallen, they

David | crypto/acc (@dhkleung) 's Twitter Profile Photo

Now that we know who's behind the Bybit attack. Let's look at how the hack actually worked. At a high level, the hack involved the 4 broad group of events: 1. Attacker deployed a trojan contract and a backdoor contract. 2. Attacker tricked signers of the upgradeable

Now that we know who's behind the <a href="/Bybit_Official/">Bybit</a> attack. Let's look at how the hack actually worked.

At a high level, the hack involved the 4 broad group of events:

1. Attacker deployed a trojan contract and a backdoor contract.

2. Attacker tricked signers of the upgradeable
DataRepublican (small r) (@datarepublican) 's Twitter Profile Photo

Good morning! As I continue work on yesterday's project, I want to share the most valuable tool I've ever created—published under my real name. This resource cross-references Bible verses with the Ante-Nicene Fathers, a 19th-century classical series documenting early Christian

George (@behizytweets) 's Twitter Profile Photo

BREAKING: Home Depot has started giving out free training to Americans who want to work in HVAC, carpentry, electricity, & construction. The classes are self-paced and students will earn certifications they can use on their resumes. THIS IS AWESOME!

BREAKING: Home Depot has started giving out free training to Americans who want to work in HVAC, carpentry, electricity, &amp; construction.

The classes are self-paced and students will earn certifications they can use on their resumes. 

THIS IS AWESOME!
arctotherium (@arctotherium42) 's Twitter Profile Photo

Master thread on the 2015-2022 closure of the Internet, the process by which every major Internet platform went from broadly open with a few basic guidelines to strict narrative enforcement, often with the collaboration of govts and outsourcing moderation power to NGOs.