Virus Bulletin(@virusbtn) 's Twitter Profileg
Virus Bulletin

@virusbtn

Security information portal, testing and certification body.
Organisers of the annual Virus Bulletin conference. @[email protected]

ID:118059149

linkhttps://www.virusbulletin.com/ calendar_today27-02-2010 13:27:37

25,1K تغريدات

58,8K متابعون

1,4K التالية

Virus Bulletin(@virusbtn) 's Twitter Profile Photo

We are pleased to announce and welcome onboard the first five partners of : Malwation, Cisco Talos Intelligence Group, Fortinet, Cyber Threat Alliance & QI-ANXIN. Find out how to join them and make your company visible among security peers: virusbulletin.com/conference/vb2…

We are pleased to announce and welcome onboard the first five partners of #VB2024: @malwation, @TalosSecurity, @Fortinet, @CyberAlliance & @QI_ANXIN. Find out how to join them and make your company visible among security peers: virusbulletin.com/conference/vb2…
account_circle
Cybersecurity and Infrastructure Security Agency(@CISAgov) 's Twitter Profile Photo

New advisory provides recently observed and on Akira ransomware. With FBI and international partners, we published actionable information to help all orgs identify and protect against this ransomware activity. go.dhs.gov/J9n

New #StopRansomware advisory provides recently observed #IOCs and #TTPs on Akira ransomware. With @FBI and international partners, we published actionable information to help all orgs identify and protect against this ransomware activity. go.dhs.gov/J9n
account_circle
Microsoft Threat Intelligence(@MsftSecIntel) 's Twitter Profile Photo

Microsoft has tracked at least 70 Russian actors engaged in Ukraine-focused disinformation campaigns concentrated on undermining support for Ukraine. Meanwhile, China seeks to exploit societal polarization and diminish faith in US democratic systems: msft.it/6013Y8noc

account_circle
Virus Bulletin(@virusbtn) 's Twitter Profile Photo

Cisco Talos researcher Vanja Svajcer writes about the OfflRouter VBA macro virus afecting users in Ukraine. blog.talosintelligence.com/offlrouter-vir…

Cisco Talos researcher Vanja Svajcer writes about the OfflRouter VBA macro virus afecting users in Ukraine. blog.talosintelligence.com/offlrouter-vir…
account_circle
Virus Bulletin(@virusbtn) 's Twitter Profile Photo

Zscaler's Roy Tay & Sudeep Singh observed a malvertising campaign pushing the MadMxShell backdoor. The threat actor registered multiple domains spoofing legitimate IP scanners and other software typically used by IT security & network administration teams. zscaler.com/blogs/security…

Zscaler's Roy Tay & Sudeep Singh observed a malvertising campaign pushing the MadMxShell backdoor. The threat actor registered multiple domains spoofing legitimate IP scanners and other software typically used by IT security & network administration teams. zscaler.com/blogs/security…
account_circle
Virus Bulletin(@virusbtn) 's Twitter Profile Photo

WithSecure researchers look into Kapeka, likely a new addition to Sandworm’s arsenal, used in attacks against victims in Eastern Europe. Kapeka is a flexible backdoor with all the necessary functionalities to serve as an early-stage toolkit. withsecure.com/en/whats-new/p…

WithSecure researchers look into Kapeka, likely a new addition to Sandworm’s arsenal, used in attacks against victims in Eastern Europe. Kapeka is a flexible backdoor with all the necessary functionalities to serve as an early-stage toolkit. withsecure.com/en/whats-new/p…
account_circle
Virus Bulletin(@virusbtn) 's Twitter Profile Photo

Google Mandiant researchers decided to graduate the Sandworm group into APT44 & release a report that provides additional insights into the group’s new operations, retrospective insights, & context on how the group is adjusting to support Moscow’s war aims cloud.google.com/blog/topics/th…

Google Mandiant researchers decided to graduate the Sandworm group into APT44 & release a report that provides additional insights into the group’s new operations, retrospective insights, & context on how the group is adjusting to support Moscow’s war aims cloud.google.com/blog/topics/th…
account_circle
Sophos X-Ops(@SophosXOps) 's Twitter Profile Photo

During a recent investigation into several criminal forums, Sophos X-Ops discovered something interesting: an influx of crude, cheap ransomware, mostly sold as a one-time purchase rather than typical RaaS models. 1/16

account_circle
Joe Słowik 🌻(@jfslowik) 's Twitter Profile Photo

Thoughts on how should view as more a mindset or practice and less as a specific person or role, and how this can extend the benefits of threat-driven understanding in security:
pylos.co/2024/04/17/the…

account_circle
Virus Bulletin(@virusbtn) 's Twitter Profile Photo

Proofpoint's Greg Lesnewich & Crista Giering describe the tactics successfully used by TA427 to gather information on topics of strategic importance to the North Korean regime. proofpoint.com/us/blog/threat…

Proofpoint's Greg Lesnewich & Crista Giering describe the tactics successfully used by TA427 to gather information on topics of strategic importance to the North Korean regime. proofpoint.com/us/blog/threat…
account_circle
Virus Bulletin(@virusbtn) 's Twitter Profile Photo

Splunk researchers look into the tactics, techniques and procedures employed by APT29 in a recent campaign. The attack chain begins with a spear-phishing email leading to the delivery of the WINELOADER backdoor. splunk.com/en_us/blog/sec…

Splunk researchers look into the tactics, techniques and procedures employed by APT29 in a recent campaign. The attack chain begins with a spear-phishing email leading to the delivery of the WINELOADER backdoor. splunk.com/en_us/blog/sec…
account_circle
moto_sato(@58_158_177_102) 's Twitter Profile Photo

ばらまきメールに潜む死神の悪戯を紐解く

『今回のブログでは、最近観測された多段の感染プロセスを有する日本語のばらまき型攻撃メールの解析内容について解説します。』

blog.itochuci.co.jp/entry/2024/04/…

account_circle
Ivan Kwiatkowski(@JusticeRage) 's Twitter Profile Photo

On March 25, the FBI released an indictment of APT31 hackers. We read it carefully to find new intel, and managed to connect a few dots (including about the RAWDOOR malware family).

Full article and IOCs: harfanglab.io/en/insidethela…

account_circle
Virus Bulletin(@virusbtn) 's Twitter Profile Photo

Secureworks CTU researchers look into activity conducted by the INC Ransom group, tracked as GOLD IONIC. secureworks.com/blog/gold-ioni…

Secureworks CTU researchers look into activity conducted by the INC Ransom group, tracked as GOLD IONIC. secureworks.com/blog/gold-ioni…
account_circle
Virus Bulletin(@virusbtn) 's Twitter Profile Photo

G DATA's Banu Ramakrishnan writes about a malicious Android app that masquerades as Google Chrome. The malware takes advantage of the popularity of and trust associated with Chrome to trick users into downloading and installing it. gdatasoftware.com/blog/2024/04/3…

G DATA's Banu Ramakrishnan writes about a malicious Android app that masquerades as Google Chrome. The malware takes advantage of the popularity of and trust associated with Chrome to trick users into downloading and installing it. gdatasoftware.com/blog/2024/04/3…
account_circle
NSA Cyber(@NSACyber) 's Twitter Profile Photo

The future is here: AI systems are widely available and accessible. But with new systems come new risks. Along with partners, we’re releasing a new set of best practices to help your org stay secure. Read “Deploying AI Systems Securely” now: nsa.gov/Press-Room/Pre…

The future is here: AI systems are widely available and accessible. But with new systems come new risks. Along with partners, we’re releasing a new set of best practices to help your org stay secure. Read “Deploying AI Systems Securely” now: nsa.gov/Press-Room/Pre…
account_circle
OpenJS Foundation(@openjsf) 's Twitter Profile Photo

⚠️ We're calling all open source maintainers to be alert for social engineering takeover attempts and to take steps to protect their open source projects, after a failed credible takeover attempt.

Read our blog post with OpenSSF for details: hubs.la/Q02sQmgl0

⚠️ We're calling all open source maintainers to be alert for social engineering takeover attempts and to take steps to protect their open source projects, after a failed credible takeover attempt. Read our blog post with @openssf for details: hubs.la/Q02sQmgl0
account_circle
Virus Bulletin(@virusbtn) 's Twitter Profile Photo

AhnLab researchers look into the Linux version of Pupy RAT, an open-source and cross-platform malware continuously used by various attackers, including APT groups. asec.ahnlab.com/ko/64073/

AhnLab researchers look into the Linux version of Pupy RAT, an open-source and cross-platform malware continuously used by various attackers, including APT groups. asec.ahnlab.com/ko/64073/
account_circle