fatih (@fatihsnsy) 's Twitter Profile
fatih

@fatihsnsy

Sr. Security Researcher @kaspersky GReAT | Team Lead @zayotem | Opinions are my own.

ID: 721800902219284480

linkhttps://fatihsensoy.com calendar_today17-04-2016 20:42:00

734 Tweet

481 Takipçi

424 Takip Edilen

ransomNews (@ransomnews) 's Twitter Profile Photo

🚨 Failed ATM heist via 4G Raspberry Pi The UNC2891 (LightBasin) group planted a 4G‑equipped Raspberry Pi on a bank’s ATM network, enabling stealthy lateral movement and a TinyShell C2 channel. Though intended to spoof ATM withdrawals, the attempt failed, highlighting hybrid

🚨 Failed ATM heist via 4G Raspberry Pi

The UNC2891 (LightBasin) group planted a 4G‑equipped Raspberry Pi on a bank’s ATM network, enabling stealthy lateral movement and a TinyShell C2 channel.

Though intended to spoof ATM withdrawals, the attempt failed, highlighting hybrid
Clint Gibler (@clintgibler) 's Twitter Profile Photo

Google (Google) shares initial results from running their AI-based "Deep Sleep" vulnerability finding system powered by Gemini at scale. 20 vulnerabilities across imagemagick, ffmpeg, redis, QuickJS, and more. goo.gle/bigsleep

Google (<a href="/Google/">Google</a>) shares initial results from running their AI-based "Deep Sleep" vulnerability finding system powered by Gemini at scale.

20 vulnerabilities across imagemagick, ffmpeg, redis, QuickJS, and more.

goo.gle/bigsleep
yed (@frdfzi) 's Twitter Profile Photo

I'm sharing my note, containing little tips and checklist on how we can attribute a piece of malware or a campaign to certain threat groups. Although it does not cover all methodologies but I think it's good for beginners to learn this topic. 👍🏻 fareedfauzi.github.io/cheatsheets/th…

Saurabh Sharma (@saurabhsha15) 's Twitter Profile Photo

We recently analyzed GodRAT, a new malware strain derived from Gh0stRAT, actively targeting financial organizations. More details here - securelist.com/godrat/117119/

VMRay (@vmray) 's Twitter Profile Photo

🚨Alert: Internet Archive abused as hosting service for stealthy malware delivery 🔍This delivery chain is another example of legitimate and trusted services being abused for malware delivery: it starts with a JScript loader launching a PowerShell script which then downloads a

🚨Alert: Internet Archive abused as hosting service for stealthy malware delivery

🔍This delivery chain is another example of legitimate and trusted services being abused for malware delivery: it starts with a JScript loader launching a PowerShell script which then downloads a
Costin Raiu (@craiu) 's Twitter Profile Photo

iOS 18.6.2 is out, patching an ImageIO bug that “may have been exploited” in sophisticated targeted attacks - update now 👉

iOS 18.6.2 is out, patching an ImageIO bug that “may have been exploited” in sophisticated targeted attacks - update now 👉
vxdb (@vxdb) 's Twitter Profile Photo

The NSA, the UK’s NCSC, and several international partners have attributed the Salt Typhoon hacking campaigns to three China-based technology companies. - Sichuan Juxinhe Network Technology Co. Ltd - Beijing Huanyu Tianqiong Information Technology Co. - Sichuan Zhixin Ruijie

Virus Bulletin (@virusbtn) 's Twitter Profile Photo

Insikt Group identifies a new threat actor, TAG-150, active since at least March 2025. Its multi-layered infrastructure is used to deploy likely self-developed malware families, including CastleLoader, CastleBot, and the newly documented CastleRAT. recordedfuture.com/research/from-…

Insikt Group identifies a new threat actor, TAG-150, active since at least March 2025. Its multi-layered infrastructure is used to deploy likely self-developed malware families, including CastleLoader, CastleBot, and the newly documented CastleRAT. recordedfuture.com/research/from-…
780th Military Intelligence Brigade (Cyber) (@780thc) 's Twitter Profile Photo

Silent Push has identified dozens of previously unreported domains, all aiming to obtain long-term, stealthy access to targeted organizations, used by the Chinese APT group, Salt Typhoon | silentpush.com/blog/salt-typh… Silent Push

FalconFeeds.io (@falconfeedsio) 's Twitter Profile Photo

🚨 Scattered Spider’s New Playbook — Insider Recruitment & Access Marketplace The group has moved from chaotic data leaks to an organized cybercrime model. They’re now: 🔸 Recruiting employees and insiders in telecom, SaaS, gaming, and hosting firms (US/UK/AU/CA/FR). 🔸

🚨 Scattered Spider’s New Playbook — Insider Recruitment &amp; Access Marketplace

The group has moved from chaotic data leaks to an organized cybercrime model.

They’re now:
🔸 Recruiting employees and insiders in telecom, SaaS, gaming, and hosting firms (US/UK/AU/CA/FR).
🔸
Marc R (@seifreed) 's Twitter Profile Photo

🚀 Introducing #r2morph , a metamorphic binary transformation engine built on radare + #r2pipe. It applies semantic mutations (NOPs, instruction swaps, dead code, opaque predicates…) without breaking functionality. 🧠 Perfect for research on evasion, obfuscation & malware

Ryan Naraine (@ryanaraine) 's Twitter Profile Photo

NEW from Apple: We’re doubling our top award to $2 million for exploit chains that can achieve similar goals as sophisticated mercenary spyware attacks." security.apple.com/blog/apple-sec…

NEW from Apple:  We’re doubling our top award to $2 million for exploit chains that can achieve similar goals as sophisticated mercenary spyware attacks."

security.apple.com/blog/apple-sec…
Boris Larin (@oct0xor) 's Twitter Profile Photo

CNCERT confirms Operation Triangulation attacks on Chinese orgs and connects it to NewDSZ - the implant we discovered and analyzed in 2023 mp.weixin.qq.com/s/XPjT0BVOJPJx…

TheSAS2025 (@thesascon) 's Twitter Profile Photo

Omar Amin and Sojun Ryu of Kaspersky GReAT dissect BlueNoroff's elaborate scam in their #TheSAS2025 talk. The scheme combines sophisticated social engineering with many clever tactics to trick victims into installing infostealers. The attack flow blends legitimate services like

Omar Amin and Sojun Ryu of <a href="/kaspersky/">Kaspersky</a> GReAT dissect BlueNoroff's elaborate scam in their #TheSAS2025 talk. The scheme combines sophisticated social engineering with many clever tactics to trick victims into installing infostealers. The attack flow blends legitimate services like
hypen (@hypen1117) 's Twitter Profile Photo

It was truly an honor to be part of #TheSAS2025 as a speaker! I and Omar (Omar) shared some juicy insights from our extensive research on #BlueNoroff's #GhostCall and #GhostHire campaign, part of #SnatchCrypto. You can find our research below. ✅ securelist.com/bluenoroff-apt…

Omar (@beacon_exe) 's Twitter Profile Photo

couldn't ask for a better partner in crime at #TheSAS2025 stage. Check out our full research, uncovering #GhostCall and #GhostHire of #Bluenoroff here: securelist.com/bluenoroff-apt…

Virus Bulletin (@virusbtn) 's Twitter Profile Photo

Google Threat Intelligence Group confirms first operational use of “just in time” AI in malware families such as PROMPTFLUX and PROMPTSTEAL, where LLMs generate malicious scripts and obfuscate code on the fly. cloud.google.com/blog/topics/th…

Google Threat Intelligence Group confirms first operational use of “just in time” AI in malware families such as PROMPTFLUX and PROMPTSTEAL, where LLMs generate malicious scripts and obfuscate code on the fly. cloud.google.com/blog/topics/th…