Amila P. (@amilamx) 's Twitter Profile
Amila P.

@amilamx

Senior Associate | Managed Cyber Defence, Cyber Threat Operations at PwC

ID: 66775687

calendar_today18-08-2009 19:35:23

424 Tweet

248 Followers

583 Following

Amila P. (@amilamx) 's Twitter Profile Photo

Researchers are warning of a phishing campaign that pretends to be an automated message from Microsoft Teams. In reality, the attack aims to steal Office 365 recipientsโ€™ login credentials.

Mauricio Amaro L. ๐Ÿ‡จ๐Ÿ‡ฑ๐Ÿ‡ฒ๐Ÿ‡ฝ (@cioamaro) 's Twitter Profile Photo

How to thwart human-operated ransomware campaigns? - Help Net Security j.mp/3ovdXqf #Infosec #CyberSecurity #CyberAttack #Hacking #Privacy #Threat #Malware #Ransomware #Cyberwarning #Phishing #SpyWare #Tech #Technology Mauricio Amaro L. ๐Ÿ‡จ๐Ÿ‡ฑ๐Ÿ‡ฒ๐Ÿ‡ฝ

How to thwart human-operated ransomware campaigns? - Help Net Security j.mp/3ovdXqf
#Infosec #CyberSecurity #CyberAttack #Hacking #Privacy #Threat #Malware #Ransomware #Cyberwarning #Phishing #SpyWare
#Tech #Technology <a href="/CioAmaro/">Mauricio Amaro L. ๐Ÿ‡จ๐Ÿ‡ฑ๐Ÿ‡ฒ๐Ÿ‡ฝ</a>
Amila P. (@amilamx) 's Twitter Profile Photo

Cisco Zero-Day in AnyConnect Secure Mobility Client Remains Unpatched(Exploit Code Available): threatpost.com/cisco-zero-dayโ€ฆ via Threatpost

University of South Wales (@unisouthwales) 's Twitter Profile Photo

Weโ€™ve been named an Academic Centre of Excellence in Cyber Security Education by the National Cyber Security Centre NCSC UK, receiving a Gold Award. ๐Ÿ’ป๐Ÿ† We are one of eight "pioneering" universities who received this recognition by this new government programme. #CyberSecurity

Weโ€™ve been named an Academic Centre of Excellence in Cyber Security Education by the National Cyber Security Centre <a href="/NCSC/">NCSC UK</a>, receiving a Gold Award. ๐Ÿ’ป๐Ÿ†

We are one of eight "pioneering" universities who received this recognition by this new government programme.

#CyberSecurity
Amila P. (@amilamx) 's Twitter Profile Photo

Our own USW Cyber Security student Jack Tabash(Jack) University of South Wales featured in Charted Institute of Information Security @CIISecHQ magazine under outstanding Cyber students in 2020. Proud of you Jack. ๐Ÿ‘‹๐Ÿ‘‹๐Ÿ‘‹ โญ๏ธ๐Ÿ… #CyberSecurity

Our own <a href="/USWCybers/">USW Cyber Security</a> student Jack Tabash(<a href="/_ta_bash/">Jack</a>) <a href="/UniSouthWales/">University of South Wales</a> featured in Charted Institute of Information Security @CIISecHQ magazine under outstanding Cyber students in 2020. Proud of you Jack. ๐Ÿ‘‹๐Ÿ‘‹๐Ÿ‘‹ โญ๏ธ๐Ÿ… #CyberSecurity
Amila P. (@amilamx) 's Twitter Profile Photo

Interested charts by Microsoft Intelligence Team about Solarwinds Supply Chain attack. microsoft.com/security/blog/โ€ฆ

\_(ส˜_ส˜)_/ (@pollo290987) 's Twitter Profile Photo

#Emotet is back and ... + Documents are protected: "Restrict Editing" + They use in the macro: ParagraphStyle + And dll are signed by: FRVFMPRLNIMAMSUIMT

#Emotet is back and ...

+ Documents are protected:   "Restrict Editing"
+ They use in the macro:    ParagraphStyle
+ And dll are signed by:    FRVFMPRLNIMAMSUIMT
Amila P. (@amilamx) 's Twitter Profile Photo

Excited to see that the official release of Snort 3 is here! Well done Cisco Talos Intelligence Group Cisco Look forward to try it ๐Ÿ‘๐Ÿ‘๐Ÿ‘ blog.snort.org/2021/01/snort-โ€ฆ

Alexandre Borges (@ale_sp_brazil) 's Twitter Profile Photo

In malware analysis, the focus is on binaries and their details (C2, persistence, injections/hooking, anti-forensics techniques). On the other hand, maldocs are trivially simple to solve and most of them take 5 minutes or less to collect information. Don't waste time. #malware

In malware analysis, the focus is on binaries and their details (C2, persistence, injections/hooking, anti-forensics techniques). On the other hand, maldocs are trivially simple to solve and most of them take 5 minutes or less to collect information. Don't waste time.

#malware
raptor@infosec.exchange (@0xdea) 's Twitter Profile Photo

The upcoming #Ghidra version 10 is full of new juicy features! Including the much anticipated debuggerโ€ฆ github.com/NationalSecuriโ€ฆ

Lloyd Davies (@lloydlabs) 's Twitter Profile Photo

The Kaseya sideloaded DLL, a thread: * If launched as a service, sleeps for 1000ms indefinitely * If ServiceCrtMain is called, main malicious logic is unwrapped * Initial payload is unpacked, XOR'd using a calculated key and execution continues 1/?

The Kaseya sideloaded DLL, a thread:

* If launched as a service, sleeps for 1000ms indefinitely
* If ServiceCrtMain is called, main malicious logic is unwrapped
* Initial payload is unpacked, XOR'd using a calculated key and execution continues

1/?