Kwasi Boateng (@cyberrootkb) 's Twitter Profile
Kwasi Boateng

@cyberrootkb

Experte für Cybersicherheit und Musikliebhaber. 🎵 Immer am Lernen, immer am Wachsen.
Stolz auf meine Wurzeln 🇳🇬🇳🇬🇳🇬

ID: 1656489292028583936

calendar_today11-05-2023 02:39:58

627 Tweet

51 Followers

169 Following

it security (@it__security) 's Twitter Profile Photo

Sicherheitsforscher haben eine neue Kampagne namens JINX-0132 aufgedeckt, bei der öffentlich erreichbare #DevOps-Systeme wie Docker, Gitea, HashiCorp Consul und Nomad gezielt kompromittiert werden, um Kryptowährungen wie #Monero zu schürfen. it-daily.net/shortnews/kryp…

PT SWARM (@ptswarm) 's Twitter Profile Photo

⚠️ We’ve reproduced CVE-2025-49113 in Roundcube. This vulnerability allows authenticated users to execute arbitrary commands via PHP object deserialization. If you're running Roundcube — update immediately!

corixpartners (@corixpartners) 's Twitter Profile Photo

The Cybersecurity #Leadership Handbook for the #CISO and the #CEO An essential read for all #leaders around #cybersecurity, looking beyond the #tech horizon, into the real dynamics of transformation UPDATED edition now available here >> buff.ly/zqFxwbD #Infosec2025

The Cybersecurity #Leadership Handbook for the #CISO and the #CEO

An essential read for all #leaders around #cybersecurity, looking beyond the #tech horizon, into the real dynamics of transformation

UPDATED edition now available here >> buff.ly/zqFxwbD 

#Infosec2025
JC Gaillard (@corix_jc) 's Twitter Profile Photo

The #Cybersecurity Spiral of Failure - And How to Break Out of It How decades or #corporate short-termism and lip-service around cybersecurity have led to the endless series of #cyberattacks and #databreaches we see today Everything #security vendors and consultants don't want

The #Cybersecurity Spiral of Failure - And How to Break Out of It

How decades or #corporate short-termism and lip-service around cybersecurity have led to the endless series of #cyberattacks and #databreaches we see today

Everything #security vendors and consultants don't want
ISC2 (@isc2) 's Twitter Profile Photo

What's on your summer reading list?📚 Is there a #cybersecurity-related book you've been meaning to read but haven't gotten around to yet? We're putting together a Summer Reading List article for ISC2 Insights and we'd love to hear from you!

Ru Campbell (@rucam365) 's Twitter Profile Photo

New video: As I've learned from a few incidents, app-to-app access is an attack path few teams monitor. Keith Fleming from the Defender for Cloud Apps team joined me to break down OAuth risks, SaaS security, and how app governance helps defenders. Watch: youtu.be/AcneWgWPp4Y

New video: As I've learned from a few incidents, app-to-app access is an attack path few teams monitor. Keith Fleming from the Defender for Cloud Apps team joined me to break down OAuth risks, SaaS security, and how app governance helps defenders.

Watch: youtu.be/AcneWgWPp4Y
Shanholo (@shanholo) 's Twitter Profile Photo

🚨#Opendir #Malware🚨 hxxp://104.168.5.43/352/ ⚠️#GuLoader ☣️TiWorker.exe➡️c51964bdb5831207af047d12e10a680a ⤵️Drops and executes hxxp://104.168.5.43/352/MPyjmkPLre73.bin

🚨#Opendir #Malware🚨

hxxp://104.168.5.43/352/

⚠️#GuLoader
☣️TiWorker.exe➡️c51964bdb5831207af047d12e10a680a
⤵️Drops and executes hxxp://104.168.5.43/352/MPyjmkPLre73.bin
Hunt.io (@huntio) 's Twitter Profile Photo

⚠️ DragonForce Ransomware Exploits SimpleHelp Flaws to Breach MSPs and Clients securityweek.com/dragonforce-ra… The DragonForce ransomware group exploited three known vulnerabilities in SimpleHelp's remote monitoring and management (RMM) software, CVE-2024-57727, CVE-2024-57728, and

The Hacker News (@thehackersnews) 's Twitter Profile Photo

⚠️ macOS Alert — Fake Spectrum CAPTCHA is a trap! Russian hackers use clipboard hacks + terminal scripts to steal passwords & install Atomic Stealer. Victims unknowingly run commands — handing over control. This sneaky ClickFix tactic preys on your “security check” fatigue.

⚠️ macOS Alert — Fake Spectrum CAPTCHA is a trap!

Russian hackers use clipboard hacks + terminal scripts to steal passwords & install Atomic Stealer.

Victims unknowingly run commands — handing over control.

This sneaky ClickFix tactic preys on your “security check” fatigue.
The Security Transformation Research Foundation (@transform_sec) 's Twitter Profile Photo

Is it Time to Accept that the Current Role of the #CISO Has Failed? buff.ly/mWTvlHc TechNative JC Gaillard @CorixPartners #tech #cybersecurity #infosec #business #leadership #governance #organization #CIO #CEO

Is it Time to Accept that the Current Role of the #CISO Has Failed?

buff.ly/mWTvlHc

<a href="/TechNative/">TechNative</a> <a href="/Corix_JC/">JC Gaillard</a> @CorixPartners #tech #cybersecurity #infosec #business #leadership #governance #organization #CIO #CEO
Hacking Articles (@hackinarticles) 's Twitter Profile Photo

Active Directory Pentesting Using Netexec Tool: A Complete Guide hackingarticles.in/active-directo… #infosec #cybersecurity #cybersecuritytips #microsoft #redteam #informationsecurity #CyberSec #ai #offensivesecurity #infosecurity #cyberattacks #security #oscp #cybersecurityawareness

Active Directory Pentesting Using Netexec Tool: A Complete Guide

hackingarticles.in/active-directo…

#infosec #cybersecurity #cybersecuritytips #microsoft #redteam #informationsecurity #CyberSec #ai #offensivesecurity #infosecurity #cyberattacks #security #oscp #cybersecurityawareness
BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Supply chain attack hits Gluestack NPM packages with 960K weekly downloads - Lawrence Abrams bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

The Security Transformation Research Foundation (@transform_sec) 's Twitter Profile Photo

"A long-awaited – and at times painfully accurate – real-life assessment of the corporate dynamics that have surrounded cybersecurity for the last two decades in large firms" The #Cybersecurity Spiral of Failure – (and how to break out of it) buff.ly/YidQCLD #CISO #CEO

"A long-awaited – and at times painfully accurate – real-life assessment of the corporate dynamics that have surrounded cybersecurity for the last two decades in large firms"

The #Cybersecurity Spiral of Failure – (and how to break out of it)

buff.ly/YidQCLD

#CISO #CEO
Pierluigi Paganini - Security Affairs (@securityaffairs) 's Twitter Profile Photo

Over 950K weekly downloads at risk in ongoing supply chain attack on Gluestack packages securityaffairs.com/178772/malware… #securityaffairs #hacking #malware Aikido Security

Trend Micro Research (@trendmicrorsrch) 's Twitter Profile Photo

Trend Research uncovered a campaign that uses #TikTok videos to trick users into executing PowerShell commands disguised as software activation steps, leading to Vidar and StealC infostealers. Read the full report: ⬇️ research.trendmicro.com/4kmL4sd

ghostlulz (@ghostlulz1337) 's Twitter Profile Photo

👻 Hacking SSO: Pre Account Takeover 👻 No email verification ➕ SSO 🟰 full account compromise. Read more on my blog: ghostlulz.com/blog/pre-accou… #bugbountytip #bugbountytips #hackerone #bugcrowd #infosec #redteam #CyberSec #bugbounty

ً (@aymallseven) 's Twitter Profile Photo

Playing Croatia, Poland, Denmark, Germany, Spain and scoring against all of them at the age of 40 is just pure madness bro ..

JC Gaillard (@corix_jc) 's Twitter Profile Photo

The #Cybersecurity Spiral of Failure – (and how to break out of it) "A long-awaited – and at times painfully accurate – real-life assessment of the corporate dynamics that have surrounded cybersecurity for the last two decades in large firms" buff.ly/YidQCLD #CISO #CEO

The #Cybersecurity Spiral of Failure – (and how to break out of it)

"A long-awaited – and at times painfully accurate – real-life assessment of the corporate dynamics that have surrounded cybersecurity for the last two decades in large firms"

buff.ly/YidQCLD

#CISO #CEO
Cyber_OSINT (@cyber_o51nt) 's Twitter Profile Photo

U.S. agencies assessed that Chinese hackers, known as Salt Typhoon, likely compromised Comcast and Digital Realty, raising significant national security concerns regarding access to critical infrastructure. #CyberSecurity #SaltTyphoon ift.tt/xzThDOa