Intel_Owl (@intel_owl_lovol) 's Twitter Profile
Intel_Owl

@intel_owl_lovol

Interested in OSINT/SOCMINT, GEOINT, SIGINT, Cyber Threat Intel, and PsyOps/Disinfo Campaigns

ID: 1452792846927413251

calendar_today26-10-2021 00:23:35

2,2K Tweet

183 Followers

768 Following

U.S. Attorney Alaska (@usao_ak) 's Twitter Profile Photo

(1) The U.S. Department of Justice & U.S. Attorney's Office for #Alaska announced today cyber operations as part of a global crackdown on DDoS-for-hire services. Distributed Denial of Service (DDoS) attacks flood targeted computers & servers with information to prevent them from being able

(1) The <a href="/TheJusticeDept/">U.S. Department of Justice</a> &amp; U.S. Attorney's Office for #Alaska announced today cyber operations as part of a global crackdown on DDoS-for-hire services. Distributed Denial of Service (DDoS) attacks flood targeted computers &amp; servers with information to prevent them from being able
rat (@ratxss) 's Twitter Profile Photo

In January the seizure of RAMP scattered the Ransomware community. Now ransomware actors spreading across gated forums like T1erOne and Rehub. I spoke to T1erOne in an exclusive interview. buymeacoffee.com/insidedarknet/…

Darknet Diaries (@darknetdiaries) 's Twitter Profile Photo

Her dad brought home a $300 box that gave him thousands of channels, every movie, every show, even pay-per-view. Her sister said the home network had been slow ever since. So she took one home, put it on its own network behind a firewall, and watched who it was talking to.

blackorbird (@blackorbird) 's Twitter Profile Photo

ZionSiphon, an OT‑focused malware targeting Israeli water treatment and desalination systems. Self-destruct function. The malware also includes a removable-media propagation mechanism. darktrace.com/blog/inside-zi…

ZionSiphon, an OT‑focused malware targeting Israeli water treatment and desalination systems.
Self-destruct function.
The malware also includes a removable-media propagation mechanism.
darktrace.com/blog/inside-zi…
Clandestine (@akaclandestine) 's Twitter Profile Photo

🔴 Threat Intelligence Alert: OpenMythos Just Released The open-source community has received a theoretical PyTorch reconstruction of Anthropic’s speculated “Claude Mythos” architecture. Developed by Kye Gomez (swarms), the repository kyegomez/OpenMythos implements a Recurrent-Depth

International Cyber Digest (@intcyberdigest) 's Twitter Profile Photo

🚨 The Vercel breach traces back to a Context[.]ai gooner employee infected with Lumma infostealer. The malware harvested his Google Workspace credentials, porn and anime site logins, and the in-game username "lecoonjames" (see profile pic below, he changed the username

🚨 The Vercel breach traces back to a Context[.]ai gooner employee infected with Lumma infostealer. The malware harvested his Google Workspace credentials, porn and anime site logins, and the in-game username "lecoonjames" (see profile pic below, he changed the username
blackorbird (@blackorbird) 's Twitter Profile Photo

#Sandworm group leverages nested SSH-TOR tunnels to build a double-encrypted anonymous direct elevator between victims and attackers. This highly evasive attack enables unrestricted sensitive data theft and persistent remote control. mp.weixin.qq.com/s/nJpqvXCYV3Zd…

#Sandworm group leverages nested SSH-TOR tunnels to build a double-encrypted anonymous direct elevator between victims and attackers. 
This highly evasive attack enables unrestricted sensitive data theft and persistent remote control.
mp.weixin.qq.com/s/nJpqvXCYV3Zd…
LuemmelSec (@theluemmel) 's Twitter Profile Photo

Threat Intel Nom Nom — open source threat intel aggregator that monitors RSS feeds, websites, APIs, and .onion sites for your keywords. Auto-extracts IOCs, alerts via Discord/email/webhook. Docker one-liner setup. Free, no signup, no nonsense. github.com/LuemmelSec/Thr…

Threat Intel Nom Nom — open source threat intel aggregator that monitors RSS feeds, websites, APIs, and .onion sites for your keywords. Auto-extracts IOCs, alerts via Discord/email/webhook. Docker one-liner setup. Free, no signup, no nonsense.

github.com/LuemmelSec/Thr…
vxdb (@vxdb) 's Twitter Profile Photo

If you wanna stay on top of cybersecurity news, you need these sites in your RSS reader BleepingComputer DarkReading RecordedFuture - The Record SecurityWeek DataBreachedNet TheRegister HackerNews (hit or miss) KrebsOnSecurity 404Media ArsTechnica TechDirt

Andy Greenberg (@agreenberg at the other places) (@a_greenberg) 's Twitter Profile Photo

A newly decoded piece of sabotage malware called Fast16, created before Stuxnet, was made to silently tamper with calculations in research and engineering software. Likely created by the US or an ally, and possibly used against Iran's nuclear program. wired.com/story/fast16-m…

Sweep (@0xsweep) 's Twitter Profile Photo

This 25yo British hacker sold $2 MILLION of stolen data and got caught from a single $250 transaction Kai West ran the dark web’s biggest stolen data marketplace for 2 years under the name IntelBroker He hacked Apple, AMD, Cisco, Nokia, HPE, General Electric, Europol, the US

This 25yo British hacker sold $2 MILLION of stolen data and got caught from a single $250 transaction

Kai West ran the dark web’s biggest stolen data marketplace for 2 years under the name IntelBroker

He hacked Apple, AMD, Cisco, Nokia, HPE, General Electric, Europol, the US
Dark Night (@dark_night263) 's Twitter Profile Photo

OnionClaw: Give AI Agents Full Tor & Dark Web OSINT Access 🤖🧅 Autonomous OSINT pipeline over Tor — search, scrape, analyze .onion data with identity rotation and zero attribution. • 18 dark web search engines • Full OSINT pipeline (search → scrape → analyze) • Tor

Nicolas Krassas (@dinosn) 's Twitter Profile Photo

Find zero-days while you sleep. DeepZero is an automated vulnerability research framework that parses, decompiles, and analyzes thousands of Windows kernel drivers for exploitable IOCTLs natively using AI agents. github.com/416rehman/Deep…

Dark Night (@dark_night263) 's Twitter Profile Photo

DroneAware Node — Turn a Raspberry Pi into a Real-Time Drone Detection Sensor 📡🚁 DroneAware Node lets you detect nearby drones using Remote ID broadcasts. • Captures Bluetooth + WiFi Remote ID signals • Extracts drone ID, location, speed, altitude • Range up to ~5 miles

DroneAware Node — Turn a Raspberry Pi into a Real-Time Drone Detection Sensor 📡🚁

DroneAware Node lets you detect nearby drones using Remote ID broadcasts.

• Captures Bluetooth + WiFi Remote ID signals
• Extracts drone ID, location, speed, altitude
• Range up to ~5 miles
Dark Web Informer - Cyber Threat Intelligence (@darkwebinformer) 's Twitter Profile Photo

🚨 Chicago Teen, 19, Linked to International "Scattered Spider" Hacking Ring, Prosecutors Say A young cybercriminal known online as "Bouquet" allegedly lived a globe-trotting lifestyle, bouncing between Dubai, Thailand, and New York while flaunting designer jewelry, wads of

🚨 Chicago Teen, 19, Linked to International "Scattered Spider" Hacking Ring, Prosecutors Say

A young cybercriminal known online as "Bouquet" allegedly lived a globe-trotting lifestyle, bouncing between Dubai, Thailand, and New York while flaunting designer jewelry, wads of
Clandestine (@akaclandestine) 's Twitter Profile Photo

GitHub - Bedrock-Safeguard/gentlemen-decryptor: First-ever decryptor for The Gentlemen ransomware — recovers encryption keys from process memory dumps using X25519 ephemeral key extraction. 35/35 files decrypted. Research by Bedrock Safeguard Inc. · GitHub github.com/Bedrock-Safegu…