Felix (@felixw3000) 's Twitter Profile
Felix

@felixw3000

👨‍💻 Engineer, passionate about IT security
🔬 Daytime: Researcher @SophosXOps
🧪 Nightime: write-ups on experiments @ uperesia.com
🙋 Opinions are my own

ID: 4068317806

linkhttps://www.uperesia.com calendar_today29-10-2015 14:12:26

4,4K Tweet

1,1K Followers

501 Following

Nathan McNulty (@nathanmcnulty) 's Twitter Profile Photo

Florian Roth ⚡️ p19k mRr3b00t Interestingly, Microsoft and others have been trying to fix this for years while Google is the one who set us all back 5+ years You can thank the geniuses in this thread for screwing IdP providers: groups.google.com/a/chromium.org…

<a href="/cyb3rops/">Florian Roth ⚡️</a> <a href="/peteralexbizjak/">p19k</a> <a href="/UK_Daniel_Card/">mRr3b00t</a> Interestingly, Microsoft and others have been trying to fix this for years while Google is the one who set us all back 5+ years

You can thank the geniuses in this thread for screwing IdP providers:
groups.google.com/a/chromium.org…
丂卄ㄖᗪ卂几 - 👋 crack fingers (@therealshodan) 's Twitter Profile Photo

“Largest ever operation” 4 arrests (not convicted yet) To put into perspective I have 2 arrests. Guarantee you none of my botnet activity graphs on Monday will even show this disruption. We have to do better, so much better. europol.europa.eu/media-press/ne…

Marc-André Moreau (@awakecoding) 's Twitter Profile Photo

The full OCR text with the temporarily visible password is available in the %LocalAppData%\CoreAIPlatform.00\UKP\{<UUID>}\ukg.db SQLite database, nicely gift wrapped 🎁 for infostealer malware to exfiltrate:

The full OCR text with the temporarily visible password is available in the %LocalAppData%\CoreAIPlatform.00\UKP\{&lt;UUID&gt;}\ukg.db SQLite database, nicely gift wrapped 🎁 for infostealer malware to exfiltrate:
Artem I. Baranov 🐦 (@artem_i_baranov) 's Twitter Profile Photo

Curious what Windows Internals tricks rootkits have leveraged throughout their history to achieve the necessary goals of concealing malicious activities, I've published a pdf with a breakdown of these tricks. It covers the following rootkit families. artemonsecurity.blogspot.com/2024/06/window…

Curious what Windows Internals tricks rootkits have leveraged throughout their history to achieve the necessary goals of concealing malicious activities, I've published a pdf with a breakdown of these tricks. It covers the following rootkit families. artemonsecurity.blogspot.com/2024/06/window…
Kostas (@kostastsale) 's Twitter Profile Photo

Check out this awesome report by Sophos on Chinese APT threat actors. There is much to learn from this technical breakdown; it's not your ordinary threat actor. Reading this report, you will notice that they used tools like impacket for lateral movement, which provides an

Sky News (@skynews) 's Twitter Profile Photo

The NHS has launched an urgent appeal for O blood-type donors following a cyber attack that has affected some of the largest hospitals in London. Sky's Science Editor Tom Clarke has the full story ⬇️ trib.al/unjm70D 📺 Sky 501, Virgin 602, Freeview 233 and YouTube

John Hultquist (@johnhultquist) 's Twitter Profile Photo

Mandiant's blog on the Snowflake breaches. The bottomline is that the infostealer problem is coming to a head and defenses have to account for it. cloud.google.com/blog/topics/th…

Cyber Advising (@cyber_advising) 's Twitter Profile Photo

CVE-2024-4577: PHP 8.1.* before 8.1.29, 8.2.* 8.2.20, 8.3.* 8.3.8, when using Apache and PHP-CGI on Windows. allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP on server. PoC labs.watchtowr.com/no-way-php-str…

CVE-2024-4577: PHP 8.1.* before 8.1.29, 8.2.* 8.2.20, 8.3.* 8.3.8, when using Apache and PHP-CGI on Windows. allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP on server. 

PoC
labs.watchtowr.com/no-way-php-str…
Brian in Pittsburgh (@arekfurt) 's Twitter Profile Photo

The PRC exploited 14,000 Fortigate devices before the vulnerability in question here was even announced. Just let that sink in. Mass intrusion campaigns by state actors abusing either perimeter 0days or supply chain backdoors have become reality.

chompie (@chompie1337) 's Twitter Profile Photo

microsoft: Exploit Code Unporoven me: i literally gave you a compiled PoC and also exploit code m$: No exploit code is available, or an exploit is theoretical. me:

Andrea Servida (@servidaandrea) 's Twitter Profile Photo

ICYMI - this is a very serious issue. Whatever the good intentions might be, undermining end-to-end encryption is always a bad idea and a huge risk to freedom and society!

Cas van Cooten (@chvancooten) 's Twitter Profile Photo

Doesn't take much to trigger a Crowdstrike exec apparently. If only they had 100% coverage against getting criticized on the internet 🙃

Doesn't take much to trigger a Crowdstrike exec apparently. If only they had 100% coverage against getting criticized on the internet 🙃
Dmitri Alperovitch (@dalperovitch) 's Twitter Profile Photo

Putin on his endgame: “They [the West] say that they want to achieve the strategic defeat of Russia on the battlefield. What does this mean for Russia? For Russia, this means the end of its statehood. This means the end of the 1000-year history of the Russian state. I think

Alexander Leslie (@aejleslie) 's Twitter Profile Photo

Ransomware is a national security and public health crisis. “…the National Health Service confirms more than 1,100 operations in total — almost 200 of them relating to cancer treatments — have been postponed due to the incident.” (via Alex Martin) therecord.media/london-hospita…

Samir (@sbousseaden) 's Twitter Profile Photo

Elastic Security Labs has discovered a new method for initial access and evasion in the wild, termed #GrimResource, which involves arbitrary execution in mmc.exe through a crafted MSC file. elastic.co/security-labs/… gist.github.com/joe-desimone/2…

Michael Coppola (@mncoppola) 's Twitter Profile Photo

New blog post "Google: Stop Burning Counterterrorism Operations" My reflection on an incident where Project Zero and TAG knowingly shut down an active Western counterterrorism cyber operation, and the real-world harm that could have resulted from it. poppopret.org/2024/06/24/goo…