Gustavo Bessa #cybersecurity (@cyberbessa) 's Twitter Profile
Gustavo Bessa #cybersecurity

@cyberbessa

Monitoring cyber threats. Sharing knowledge. Building cyber resilience.

ID: 1496929681123196933

linkhttp://linkedin.com/in/cyberbessa/ calendar_today24-02-2022 19:27:31

253 Tweet

67 Followers

125 Following

Gustavo Bessa #cybersecurity (@cyberbessa) 's Twitter Profile Photo

Amazon Redshift Python Connector Vulnerability: CVE-2025-5279 Patched A new vulnerability, CVE-2025-5279, has been discovered in the Amazon Redshift Python Connector when configured with the BrowserAzureOAuth2CredentialsProvider plugin. This vulnerability, affecting versions

Gustavo Bessa #cybersecurity (@cyberbessa) 's Twitter Profile Photo

Suricata 8 Unveils Entropy Keyword for Enhanced Threat Detection Exciting news from the Suricata community: the new Suricata 8 release introduces the entropy keyword into its rule language. This feature enables security analysts to identify high-entropy data patterns, a key

Gustavo Bessa #cybersecurity (@cyberbessa) 's Twitter Profile Photo

Netgate Releases pfSense Community Edition 2.8.0 with Expanded Features Exciting news for the cybersecurity community! Netgate has rolled out version 2.8.0 of the pfSense Community Edition, bringing a host of new features and improvements. Notably, this update unlocks several

Netgate Releases pfSense Community Edition 2.8.0 with Expanded Features

Exciting news for the cybersecurity community! Netgate has rolled out version 2.8.0 of the pfSense Community Edition, bringing a host of new features and improvements. Notably, this update unlocks several
Gustavo Bessa #cybersecurity (@cyberbessa) 's Twitter Profile Photo

Exploring Use Cases of AI in Understanding Cyber Attacks Using Honeypots A recent case study from a SANS.edu BACS student illustrates the utility and challenges of leveraging AI to understand unique cyber attacks on a Raspberry Pi-based honeypot. In particular,

Gustavo Bessa #cybersecurity (@cyberbessa) 's Twitter Profile Photo

Alternate Data Streams: A Hidden Cyber Threat Evasion Tactic Adversaries continue to find ingenious ways to evade detection, and one such method is the use of Alternate Data Streams (ADS) in Windows NTFS. These streams enable malicious actors to conceal data within

Gustavo Bessa #cybersecurity (@cyberbessa) 's Twitter Profile Photo

APT41's Adaptive Tactics Exploit Google Calendar for Stealthy C2 Operations The Google Threat Intelligence Group (GTIG) has uncovered a sophisticated campaign by APT41, using an innovative malware named "TOUGHPROGRESS." This campaign cleverly leverages Google Calendar as a

Gustavo Bessa #cybersecurity (@cyberbessa) 's Twitter Profile Photo

Simple SSH Backdoor Uses OpenSSH on Windows Hosts A new threat has surfaced involving a trojanized version of SSH client tools, where attackers are exploiting OpenSSH on Windows systems to establish a backdoor. The malware in question masquerades as "dllhost.exe" and tries to

Gustavo Bessa #cybersecurity (@cyberbessa) 's Twitter Profile Photo

Evaluating Guardrails on LLM Platforms: Insights and Implications A recent study conducted by Unit 42 has revealed significant insights into the effectiveness of large language model (LLM) guardrails across leading platforms. These guardrails act as crucial defense mechanisms,

Gustavo Bessa #cybersecurity (@cyberbessa) 's Twitter Profile Photo

Azure OpenAI DNS Resolution Issue Potentially Exposed Cross-Tenant Vulnerabilities A recent finding by Unit 42 highlights a significant configuration flaw within Azure OpenAI's DNS resolution system. This issue, discovered in late 2024, could have allowed malicious actors to

Gustavo Bessa #cybersecurity (@cyberbessa) 's Twitter Profile Photo

New vBulletin Vulnerabilities Highlight Patching Challenges A wave of vulnerabilities has been identified in vBulletin, one of the most common platforms for creating bulletin boards. Researchers have highlighted issues stemming from PHP 8.1's changes in behavior, allowing

Gustavo Bessa #cybersecurity (@cyberbessa) 's Twitter Profile Photo

CVE-2025-5688 Discovered in FreeRTOS-Plus-TCP: Critical Out-of-Bounds Write Vulnerability A critical vulnerability, CVE-2025-5688, has been identified in FreeRTOS-Plus-TCP, affecting implementations that use Buffer Allocation Scheme 1 with LLMNR or mDNS enabled. This flaw arises

Gustavo Bessa #cybersecurity (@cyberbessa) 's Twitter Profile Photo

Voice Phishing Targeting Salesforce Data Emerges as a New Threat Vector Recently, Google Threat Intelligence Group exposed a financially motivated threat cluster, UNC6040, that targets Salesforce environments through sophisticated voice phishing (vishing) techniques. This

Voice Phishing Targeting Salesforce Data Emerges as a New Threat Vector  

Recently, Google Threat Intelligence Group exposed a financially motivated threat cluster, UNC6040, that targets Salesforce environments through sophisticated voice phishing (vishing) techniques. This
Gustavo Bessa #cybersecurity (@cyberbessa) 's Twitter Profile Photo

A New Threat Lurking in Backdoored Game Cheats The cybersecurity community is facing a new challenge with the discovery of Blitz malware, a sophisticated Windows-based threat that is disseminated via backdoored game cheats. Distributed through platforms like Telegram and

Gustavo Bessa #cybersecurity (@cyberbessa) 's Twitter Profile Photo

MISP 2.4.211 and 2.5.13 Released with Crucial Fixes and Enhanced Features The latest MISP updates have been released, introducing a robust set of enhancements designed to enhance security, search functionality, and overall stability. With the roll-out of versions 2.5.13 and

MISP 2.4.211 and 2.5.13 Released with Crucial Fixes and Enhanced Features

The latest MISP updates have been released, introducing a robust set of enhancements designed to enhance security, search functionality, and overall stability. With the roll-out of versions 2.5.13 and
Gustavo Bessa #cybersecurity (@cyberbessa) 's Twitter Profile Photo

Wireshark 4.4.7 Update Fixes Vulnerability and Bugs Wireshark 4.4.7 has just been released, addressing one vulnerability (CVE-2025-5601) alongside fixing eight bugs. This update is crucial for those who rely on secure network traffic analysis, ensuring that any potential gaps

Gustavo Bessa #cybersecurity (@cyberbessa) 's Twitter Profile Photo

Proteja suas contas digitais! Descubra como o Bitwarden facilita o gerenciamento de senhas no celular e computador. Segurança e praticidade em um só lugar!

Gustavo Bessa #cybersecurity (@cyberbessa) 's Twitter Profile Photo

Descubra como a VPN protege sua navegação em redes públicas e quando ela é essencial. Entenda o papel da VPN ao criar um "cano de aço" para seus dados e como escolher uma VPN confiável. #VPN #segurançaonline