Keith KorbenD Wingo (@korbend_intel) 's Twitter Profile
Keith KorbenD Wingo

@korbend_intel

Threat synthesis, the Korben Dallas way. Keith Wingo. Christian. Husband. Veteran.

ID: 915628924582924288

calendar_today04-10-2017 17:25:21

2,2K Tweet

1,1K Followers

468 Following

FalconFeeds.io (@falconfeedsio) 's Twitter Profile Photo

🚨 FalconFeeds IOC Analysis – Aug 29, 2025 200+ active IOCs across botnets, stealers & APT infra: Rhadamanthys Stealer → 45.74.16[.]12:443 🇺🇸 Cobalt Strike → 45.153.124[.]230:8080 🇪🇺 AsyncRAT → 38.242.230[.]250:8808 🇩🇪 Extreme RAT → 145.82.185[.]205 (multi-port) 🇸🇦 Mozi

🚨 FalconFeeds IOC Analysis – Aug 29, 2025

200+ active IOCs across botnets, stealers & APT infra:

Rhadamanthys Stealer → 45.74.16[.]12:443 🇺🇸

Cobalt Strike → 45.153.124[.]230:8080 🇪🇺

AsyncRAT → 38.242.230[.]250:8808 🇩🇪

Extreme RAT → 145.82.185[.]205 (multi-port) 🇸🇦

Mozi
Andrew Côté (@andercot) 's Twitter Profile Photo

every god-fearing generation of men maintain and uphold The Wire Box, a strategic reserve of technical entropy from which the anonymous will rise up and become the prophesied Chosen Wire in Our Time of Need.

every god-fearing generation of men maintain and uphold The Wire Box, a strategic reserve of technical entropy from which the anonymous will rise up and become the prophesied Chosen Wire in Our Time of Need.
Morty (@mortyjin) 's Twitter Profile Photo

GCONV_PATH Injection in GNU Inetutils telnetd Credit: Discovered by Justin Swartz Reference: seclists.org/oss-sec/2026/q… Justin revealed that while CVE-2026-24061 fix addressed the "-f root" authentication bypass, the underlying environment variable sanitization issue remains

GCONV_PATH Injection in GNU Inetutils telnetd

Credit: Discovered by Justin Swartz
Reference: seclists.org/oss-sec/2026/q…

Justin revealed that while CVE-2026-24061 fix addressed the "-f root" authentication bypass, the underlying environment variable sanitization issue remains
AISecHub (@aisechub) 's Twitter Profile Photo

A password like G7$kL9#mQ2&xP4!w looks strong. Every password checker rates it "excellent." But researchers at Irregular just published something worth knowing: that exact string appeared 18 out of 50 times when Claude was asked to generate a password. The reason: LLMs are

A password like G7$kL9#mQ2&xP4!w looks strong.

Every password checker rates it "excellent."

But researchers at Irregular just published something worth knowing: that exact string appeared 18 out of 50 times when Claude was asked to generate a password.

The reason: LLMs are
Hedgie (@hedgiemarkets) 's Twitter Profile Photo

🦔 Researchers at Aikido Security found 151 malicious packages uploaded to GitHub between March 3 and March 9. The packages use Unicode characters that are invisible to humans but execute as code when run. Manual code reviews and static analysis tools see only whitespace or blank

LuemmelSec (@theluemmel) 's Twitter Profile Photo

Whoopsi: CVE-2026-20963 is now UNAUTHENTICATED!!!! Patch ASAP. msrc.microsoft.com/update-guide/v… Updated the scanner: github.com/LuemmelSec/Pen…

Whoopsi:
CVE-2026-20963 is now UNAUTHENTICATED!!!!
Patch ASAP.

msrc.microsoft.com/update-guide/v…

Updated the scanner:
github.com/LuemmelSec/Pen…
Jack Lindsey (@jack_w_lindsey) 's Twitter Profile Photo

In one episode, the model needed to edit files it lacked permissions for. After searching for workarounds, it found a way to inject code into a config file that would run with elevated privileges, and designed the exploit to delete itself after running.(4/14)

Stratosberry (@stratosberry) 's Twitter Profile Photo

striga Is this another one of those vulnerabilities that is not exploitable by default and requires a specific configuration that is often not seen in real-world scenarios?