MalwareTips (@malwaretipscom) 's Twitter Profile
MalwareTips

@malwaretipscom

Cybersecurity community (est. 2009) offering free malware removal guides, tech news, scam alerts, help forums, & security resources.

ID: 224593013

linkhttps://malwaretips.com/ calendar_today09-12-2010 11:21:51

5,5K Tweet

5,5K Followers

271 Following

MalwareTips (@malwaretipscom) 's Twitter Profile Photo

🚨BREAKING: U.S. Government takes down China-linked botnet!Volt Typhoon targeted vulnerable routers in a major hacking campaign. The FBI remotely dismantled the KV-botnet, disrupting covert data transfer networks. Stay vigilant and follow Cybersecurity and Infrastructure Security Agency guidance for device security!

Karsten Hahn (@struppigel) 's Twitter Profile Photo

New Video: Why malware simulators cannot tell you if a malware or technique is detected by AV🦔📹 (... unless they were specifically made for that product) #MalwareAnalysisForHedgehogs youtube.com/watch?v=yJZCY2…

Karsten Hahn (@struppigel) 's Twitter Profile Photo

Article: "GoTo Meeting loads Remcos RAT via Rust Shellcode Loader" #GDATA #Techblog #Remcos #RustShLoader gdatasoftware.com/blog/2024/05/3…

Article: "GoTo Meeting loads Remcos RAT via Rust Shellcode Loader"

#GDATA #Techblog #Remcos #RustShLoader
gdatasoftware.com/blog/2024/05/3…
BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Avast releases free decryptor for DoNex ransomware and past variants - Bill Toulas bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

Malwarebytes (@malwarebytes) 's Twitter Profile Photo

Rewards programs can be a great way to save money, but require you to share your personal information, potentially putting your data at risk. How many rewards programs have you signed up for?

Gen Threat Labs (@genthreatlabs) 's Twitter Profile Photo

🚨 Interesting #FakeCaptcha technique alert! Attackers are using mshta commands formatted to show only harmless text like 'Verify you are human' in the Windows Run Dialog, hiding the malicious part. They also extended their #impersonation portfolio with Cloudflare CAPTCHA

🚨 Interesting #FakeCaptcha technique alert! Attackers are using mshta commands formatted to show only harmless text like 'Verify you are human' in the Windows Run Dialog, hiding the malicious part. They also extended their #impersonation portfolio with <a href="/Cloudflare/">Cloudflare</a> CAPTCHA
SC Media (@scmagazine) 's Twitter Profile Photo

Chinese threat actor Storm-0940 has been stealing credentials from Microsoft customers by leveraging the Quad7 botnet to launch highly evasive password spray attacks on a broad cross-section of organizations in Europe and North America. #cybersecurity bit.ly/4fakRex

Coffeezilla (@coffeebreak_yt) 's Twitter Profile Photo

MrBeast crypto investigation is LIVE for Patrons early. Been looking into this for a while and talking to everyone I can. It's a complex story, with a lot of finger-pointing and unanswered questions.

SquareX (@getsquarex) 's Twitter Profile Photo

SquareX is here to put a stop to that—providing real-time protection to keep your data and privacy secure. Read the ongoing discussion at: malwaretips.com/threads/google… (MalwareTips)

Gen (@gendigitalinc) 's Twitter Profile Photo

A rare leak just pulled back the curtain on LockBit, one of the world’s most dangerous ransomware gangs. Think affiliate onboarding, revenue splits, even support desks. It’s not just crime. It’s a criminal business model. 🔍 Read more: gendigital.com/blog/insights/…

Adlice (@adlicesoftware) 's Twitter Profile Photo

Are you regular user of our products ? Help us increasing our score on #TrustPilot ! trustpilot.com/review/www.adl…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🔥 Apple just gave the iPhone 17 a built-in shield against hackers. A new feature called Memory Integrity Enforcement blocks the very exploits spyware depends on—buffer overflows, use-after-free bugs—without slowing performance. 🔒 This could be Apple’s biggest security upgrade

🔥 Apple just gave the iPhone 17 a built-in shield against hackers.

A new feature called Memory Integrity Enforcement blocks the very exploits spyware depends on—buffer overflows, use-after-free bugs—without slowing performance.

🔒 This could be Apple’s biggest security upgrade