Trellix Advanced Research Center (@trellixarc) 's Twitter Profile
Trellix Advanced Research Center

@trellixarc

The Platform CISOs Trust.

ID: 156797347

linkhttp://www.Trellix.com calendar_today17-06-2010 23:52:45

18,18K Tweet

46,46K Followers

2,2K Following

Trellix Advanced Research Center (@trellixarc) 's Twitter Profile Photo

🚨 LockBit's admin panel hacked! Our analysis of the leaked data reveals surprising victimology (China & Taiwan), affiliate negotiation tactics, and the true β€” often inflated β€” earnings of a major RaaS operation. Read more by Jambul Tologonov. bit.ly/4mVKnbr

🚨 LockBit's admin panel hacked! Our analysis of the leaked data reveals surprising victimology (China &amp; Taiwan), affiliate negotiation tactics, and the true β€” often inflated β€” earnings of a major RaaS operation. Read more by <a href="/j_tologon/">Jambul Tologonov</a>. bit.ly/4mVKnbr
Trellix Advanced Research Center (@trellixarc) 's Twitter Profile Photo

What's hot (and not-so-hot) in cyber threats this week? πŸ”₯ Our Advanced Research Center has the Top 10. trellix.com/advanced-resea…

What's hot (and not-so-hot) in cyber threats this week? πŸ”₯ Our Advanced Research Center has the Top 10. trellix.com/advanced-resea…
Trellix Advanced Research Center (@trellixarc) 's Twitter Profile Photo

🚨 Supply Chain Alert: Our team uncovered a sophisticated infection chain: weaponized jQuery Migrate delivered via Parrot TDS. Silent execution, critical data at risk. Deep dive into the malware's technical analysis, TDS mechanism, & defense strategies: bit.ly/4jZUb1E

🚨 Supply Chain Alert: Our team uncovered a sophisticated infection chain: weaponized jQuery Migrate delivered via Parrot TDS. Silent execution, critical data at risk.

Deep dive into the malware's technical analysis, TDS mechanism, &amp; defense strategies: bit.ly/4jZUb1E
Trellix Advanced Research Center (@trellixarc) 's Twitter Profile Photo

Where are the cyber weaknesses? πŸ€” Our report highlights Enterprise, but also watch for dev, end-user & the growing OT risks! bit.ly/3Hyew0y

Where are the cyber weaknesses? πŸ€” Our report highlights Enterprise, but also watch for dev, end-user &amp; the growing OT risks! bit.ly/3Hyew0y
Trellix Advanced Research Center (@trellixarc) 's Twitter Profile Photo

Iran's cyber capabilities are mature & diverse. With escalating geopolitical tensions, understanding them is crucial. John Fokker breaks down the latest in our new blog. bit.ly/4eiIIc7

Iran's cyber capabilities are mature &amp; diverse. With escalating geopolitical tensions, understanding them is crucial. <a href="/John_Fokker/">John Fokker</a> breaks down the latest in our new blog. bit.ly/4eiIIc7
Trellix Advanced Research Center (@trellixarc) 's Twitter Profile Photo

#OneClik APT: We found 3 variants using .NET loader & a Go backdoor ("RunnerBeacon") hidden in legit AWS! 🀯 Evasion tactics include ClickOnce abuse & AppDomainManager hijacking. Read our full analysis for the deep dive: bit.ly/4kYFblU

#OneClik APT: We found 3 variants using .NET loader &amp; a Go backdoor ("RunnerBeacon") hidden in legit AWS! 🀯 Evasion tactics include ClickOnce abuse &amp; AppDomainManager hijacking. Read our full analysis for the deep dive: bit.ly/4kYFblU
Trellix Advanced Research Center (@trellixarc) 's Twitter Profile Photo

Still the #1 threat: Phishing! 🎣 The latest CyberThreat Report highlights why it's crucial to keep your team sharp with security awareness training. bit.ly/4iJjrZu

Still the #1 threat: Phishing! 🎣 The latest CyberThreat Report highlights why it's crucial to keep your team sharp with security awareness training. bit.ly/4iJjrZu
Trellix Advanced Research Center (@trellixarc) 's Twitter Profile Photo

🚨 Our new blog reveals how #AIAgents enable hyper-realistic lures & advanced evasion in PhaaS campaigns. Stay informed, stay safe. Read it now: bit.ly/40qEqcT

🚨 Our new blog reveals how #AIAgents enable hyper-realistic lures &amp; advanced evasion in PhaaS campaigns. Stay informed, stay safe. Read it now: bit.ly/40qEqcT
Trellix Advanced Research Center (@trellixarc) 's Twitter Profile Photo

Reverse engineering tedious? Not anymore! Our new blog by Max 'Libra' Kersten reveals methods to #automagically slash time & boost accuracy, especially for #Ghidra users! ➑️ bit.ly/3I6bz7C

Reverse engineering tedious? Not anymore! Our new blog by <a href="/Libranalysis/">Max 'Libra' Kersten</a> reveals methods to #automagically slash time &amp; boost accuracy, especially for #Ghidra users!   

➑️ bit.ly/3I6bz7C
Trellix Advanced Research Center (@trellixarc) 's Twitter Profile Photo

Summer's heating up, and so is our June 2025 Bug Report! πŸ”₯ We have the rundown on the most interesting vulnerabilities, from RCEs to router worms. Stay informed. Stay cool. Get the details! ➑️ bit.ly/4l8hnft

Trellix Advanced Research Center (@trellixarc) 's Twitter Profile Photo

What's the hottest cyber threat πŸ”₯ on your radar this week? Our teams share the most critical threats in our latest weekly roundup. bit.ly/46JIoxB

What's the hottest cyber threat πŸ”₯ on your radar this week? Our teams share the most critical threats in our latest weekly roundup. bit.ly/46JIoxB
Trellix Advanced Research Center (@trellixarc) 's Twitter Profile Photo

Massive spike in password spray attacks, especially on Cisco VPNs (+399%)! 🀯 More targeted attacks on individual orgs too. Is your security ready? bit.ly/4iJjrZu

Massive spike in password spray attacks, especially on Cisco VPNs (+399%)! 🀯 More targeted attacks on individual orgs too. Is your security ready? bit.ly/4iJjrZu
Trellix Advanced Research Center (@trellixarc) 's Twitter Profile Photo

DoNot APT is still active! Our new blog uncovers their latest campaign targeting European government entities, utilizing spear-phishing tactics with Google Drive links to deploy malware such as the YTY Framework and GEdit. Read more: bit.ly/4lrxapN

DoNot APT is still active! Our new blog uncovers their latest campaign targeting European government entities, utilizing spear-phishing tactics with Google Drive links to deploy malware such as the YTY Framework and GEdit. Read more: bit.ly/4lrxapN
Trellix Advanced Research Center (@trellixarc) 's Twitter Profile Photo

Level up your defenses vs. InfoStealers! πŸ’ͺ User training, blocking odd files, strong MFA, EDR monitoring, and an IR playbook are key! Ale shares more in the report. bit.ly/44eB5Qv

Level up your defenses vs. InfoStealers! πŸ’ͺ User training, blocking odd files, strong MFA, EDR monitoring, and an IR playbook are key! <a href="/lekz86/">Ale</a> shares more in the report. bit.ly/44eB5Qv