Dan Perez (@mrdanperez) 's Twitter Profile
Dan Perez

@mrdanperez

🇨🇳Mission TL @Google | #Malware Naming Wizard | #Attribution Connoisseur | All tweets are my own. #ThreatIntel #APT

ID: 2273962662

linkhttps://www.linkedin.com/in/mrdanperez calendar_today03-01-2014 04:31:04

3,3K Tweet

4,4K Takipçi

1,1K Takip Edilen

Sean Lyngaas (@snlyngaas) 's Twitter Profile Photo

Scoop from Natasha Bertrand, Katie Bo Lillis & Zachary Cohen: US intelligence shows that Russia and China have directed their spies to actively target US federal workers focused on national security who have been fired or feel they could be soon: cnn.com/2025/02/28/pol…

National Security Division, U.S. Dept of Justice (@dojnatsec) 's Twitter Profile Photo

Justice Department Charges 12 Chinese Contract Hackers and Law Enforcement Officers in Global Computer Intrusion Campaigns 🔗: justice.gov/opa/pr/justice…

Justice Department Charges 12 Chinese Contract Hackers and Law Enforcement Officers in Global Computer Intrusion Campaigns

🔗: justice.gov/opa/pr/justice…
Dan Perez (@mrdanperez) 's Twitter Profile Photo

🚨UNC3886 🇨🇳 Deploying Custom Malware to Juniper Junos OS Router🚨 👀 and ensure you are keeping your devices up to date!

Josh++ (@josh_murchie) 's Twitter Profile Photo

"GTIG assesses that UNC5221 will continue pursuing zero-day exploitation of edge devices based on their consistent history of success and aggressive operational tempo." If you're not paying attention to this TA then I don't know what to tell you 🤷‍♂️ cloud.google.com/blog/topics/th…

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

🚨 APT41 is using malware, TOUGHPROGRESS, that leverages Google Calendar for command and control. Learn more about the campaign, how GTIG disrupted it using custom detection signatures, and how to defend against future attacks: bit.ly/4kCNqU1

🚨 APT41 is using malware, TOUGHPROGRESS, that leverages Google Calendar for command and control.

Learn more about the campaign, how GTIG disrupted it using custom detection signatures, and how to defend against future attacks: bit.ly/4kCNqU1