MEO (@meolikestech) 's Twitter Profile
MEO

@meolikestech

Technology, Information Systems, and Security. Opinions are my own. [email protected] [email protected] meolikestech 🦋

ID: 256749973

calendar_today24-02-2011 00:39:22

9,9K Tweet

278 Takipçi

699 Takip Edilen

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

A GitHub flaw (or bad design decision) is being abused to distribute malware through URLs linked to Microsoft’s repository, and others, to make the files appear trustworthy. bleepingcomputer.com/news/security/…

Canadian Centre for Cyber Security (@cybercentre_ca) 's Twitter Profile Photo

#CyberAlert | Cyber Activity Impacting CISCO ASA Devices The Cyber Centre, along with our partners NCSC UK, GCHQ, Australian Signals Directorate released a joint Cyber Security Advisory. cyber.gc.ca/en/alerts-advi…

Tanya Janca | Shehackspurple (@shehackspurple) 's Twitter Profile Photo

Today is the launch of @Semgrep Academy! Free courses on #AppSec, Secure Coding, #API Security, Functional Programming, and MORE! Please go check it out here: Academy.Semgrep.dev

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Microsoft delays Windows Recall amid privacy and security concerns - Lawrence Abrams bleepingcomputer.com/news/microsoft… bleepingcomputer.com/news/microsoft…

Qualys (@qualys) 's Twitter Profile Photo

The award-winning Qualys Threat Research Unit (TRU) has discovered a critical vulnerability in OpenSSH, designated CVE-2024-6387 and aptly named "regreSSHion." This Remote Code Execution bug grants full root access, posing a significant exploitation risk. blog.qualys.com/vulnerabilitie…

Naomi Brockwell priv/acc (@naomibrockwell) 's Twitter Profile Photo

I recommend unlinking any desktop device from your signal account. A long-known problem (that I was unaware of until today) is that Signal stores your decryption key on desktop in a plain text file, NOT your keychain, making it accessible to any app.

Communications Security Establishment Canada (@cse_cst) 's Twitter Profile Photo

Today, CSE jointly releases a warning and advisory about a Russia-linked, AI-enabled bot farm for foreign malign influence activity. cyber.gc.ca/en/news-events…

Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Microsoft has uncovered a vulnerability in ESXi hypervisors, identified as CVE-2024-37085, being exploited by threat actors to obtain full administrative permissions on domain-joined ESXi hypervisors and encrypt critical servers in ransomware attacks. msft.it/6012lbTai

Royal Canadian Navy (@royalcannavy) 's Twitter Profile Photo

Scoring 12,565/15,400 points over 175 challenges, our 5-person Fleet Cyber Team won the prestigious SANS Netwars International Services Cup! Bravo Zulu - your capabilities in cyber warfare outperformed 35 teams from 8 countries. Learn what it takes: forces.ca/en/career/cybe…

Scoring 12,565/15,400 points over 175 challenges, our 5-person Fleet Cyber Team won the prestigious SANS Netwars International Services Cup!
Bravo Zulu - your capabilities in cyber warfare outperformed 35 teams from 8 countries. 
Learn what it takes: forces.ca/en/career/cybe…
BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

DigiCert mass-revoking TLS certificates due to domain validation bug - Bill Toulas bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

CISA warned federal agencies to patch a VMware ESXi authentication bypass vulnerability exploited by the Black Basta and Akira ransomware gangs. bleepingcomputer.com/news/security/…

blueteam0ps (@blueteam0ps_) 's Twitter Profile Photo

Excited to announce the 🚀 launch of the 🔥 LOLESXi project. It provides valuable insights into adversarial techniques targeting VMWARE ESXi. lolesxi-project.github.io/LOLESXi/ #threatresearch #lolesxi #dfir

Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Since the beginning of September 2024, Microsoft Threat Intelligence has observed a phishing campaign using emails with “eFax” themed lures containing links or QR codes within PDF attachments, leading to a domain controlled by the EvilProxy phishing-as-a-service (PhaaS) platform.

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Hackers abuse Avast anti-rootkit driver to disable defenses - Bill Toulas bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

Nick Frichette (@frichette_n) 's Twitter Profile Photo

The self described “Shodan of AWS” is now live! This is an amazing project from Daniel Grzelak that helps democratize cloud resource enumeration for the masses. Very excited about this! awseye.com