Manuel Urueña (@muruenya) 's Twitter Profile
Manuel Urueña

@muruenya

Security Architect at @RedeiaCorp. Entropy fighter.
@[email protected]
@muruenya.bsky.social

ID: 261301392

calendar_today05-03-2011 17:37:00

8,8K Tweet

341 Takipçi

1,1K Takip Edilen

Hamid Kashfi (@hkashfi) 's Twitter Profile Photo

1.CodeBreakers emerges, hacking Sepah bank. 2.They demand $42M for ransom, 3. Release the most valuable chunks of records for free, while hardly pushing sponsored PR! 4.They disappear and the tg. group is gone 5.Predatory Sparrows drops in and nuke the Sepah bank. 2+2=3.14?

Rob Joyce (@rgb_lights) 's Twitter Profile Photo

Predatory Sparrow’s past cyber attacks on Iranian steel plants and gas stations have demonstrated tangible effects in Iran. Disrupting the availability of this bank’s funds, or triggering a broader collapse of trust in Iranian banks, could have major impacts there.

J. A. Guerrero-Saade (@juanandres_gs) 's Twitter Profile Photo

MeteorExpress (aka Predatory Sparrow, Gonjeshke Darande, Adelat Ali, Indra, CodeBreakers, etc) represents the most significant effort at cyber signaling and force projection in nearly a decade. #NoRegerts sentinelone.com/labs/meteorexp…

MeteorExpress (aka Predatory Sparrow, <a href="/GonjeshkeDarand/">Gonjeshke Darande</a>, Adelat Ali, Indra, CodeBreakers, etc) represents the most significant effort at cyber signaling and force projection in nearly a decade.
#NoRegerts
sentinelone.com/labs/meteorexp…
John Scott-Railton (@jsrailton) 's Twitter Profile Photo

🚨NEW REPORT: exposing a new hacking tactic. 🇷🇺Russian state-backed hackers used an App-Specific Password attack against prominent Russia expert Keir Giles & others. It's like they know what we all expect from them...and then did the opposite 1/ By us The Citizen Lab & @google's

🚨NEW REPORT: exposing a new hacking tactic.

🇷🇺Russian state-backed hackers used an App-Specific Password attack against prominent Russia expert <a href="/KeirGiles/">Keir Giles</a> &amp; others. 

It's like they know what we all expect from them...and then did the opposite  1/

By us <a href="/citizenlab/">The Citizen Lab</a> &amp; @google's
Dwyer (@_dwyer_) 's Twitter Profile Photo

Dudes... please enable Detailed File Share auditing in your environment. All these attackers who switched over to the Impacket suite still run the default configs and it takes like 2 seconds to find them.

Dudes... please enable Detailed File Share auditing in your environment. All these attackers who switched over to the Impacket suite still run the default configs and it takes like 2 seconds to find them.
780th Military Intelligence Brigade (Cyber) (@780thc) 's Twitter Profile Photo

Russia’s military intelligence agency (GRU) is targeting Western logistics and technology companies, the US Department of Defense warned in May. cepa.org/article/russia… CEPA

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

Mandiant has observed an increasing number of attacks targeting VMware vSphere in recent years, notably for deploying ransomware. Dive deep into what specifically is fueling this trend and get actionable guidance to defend your VMware vSphere estate in our latest blog posts. 👇

Mandiant has observed an increasing number of attacks targeting VMware vSphere in recent years, notably for deploying ransomware.

Dive deep into what specifically is fueling this trend and get actionable guidance to defend your VMware vSphere estate in our latest blog posts. 👇
Kim Zetter (@kimzetter) 's Twitter Profile Photo

Two yrs ago when researchers found backdoor in encryption algo used to secure radio comms for police/military/intel agencies, the org behind algo told users to deploy end-to-end encryption on top of it. Now researchers found security prob with the E2E too wired.com/story/encrypti…

Zack Korman (@zackkorman) 's Twitter Profile Photo

Microsoft isn’t disclosing this so: M365 Copilot allowed users to access files without producing an audit log. All you had to do was ask Copilot to not link to the file. You don’t even have to ask; it sometimes just happens. If your org uses Copilot your audit log is likely wrong

Flipper Zero (@flipper_zero) 's Twitter Profile Photo

Right now, the media is hyping up a story that a SECRET HACKER FIRMWARE FOR FLIPPER ZERO HAS APPEARED ON THE DARKNET THAT CAN HACK ANY CAR!!!11 WE’RE ALL IN DANGER. Let’s break it down and see if that’s actually true (spoiler: it’s not): blog.flipper.net/can-flipper-ze…

Right now, the media is hyping up a story that a SECRET HACKER FIRMWARE FOR FLIPPER ZERO HAS APPEARED ON THE DARKNET THAT CAN HACK ANY CAR!!!11 WE’RE ALL IN DANGER.
 
Let’s break it down and see if that’s actually true (spoiler: it’s not): blog.flipper.net/can-flipper-ze…
thaddeus e. grugq (@thegrugq) 's Twitter Profile Photo

The vast majority of hacking is just credentials. There are four basic ways to get creds: STAB Steal: using malware, etc. Try: brute force, guessing, etc. Ask: social engineering, etc. Buy: infostealer logs, etc. Steal. Try. Ask. Buy. A collab with mRr3b00t

Print3M // SecTube.tv (@print3m_) 's Twitter Profile Photo

Let me explain where this incredible vulnerability in Notepad++ comes from... my blog post from 3w ago. The problem is there's no vuln. I described this as sneaky init access. You might as well do binary patching of any PE file in the world. #infosec print3m.github.io/blog/dll-sidel…

ChristoGrozev@bsky.social (@christogrozev) 's Twitter Profile Photo

GRU's Spy Airbnb: check out our latest video investigation into Unit 29155, and the "Czech" spy couple they used to help them plant explosives in weapons depots. youtu.be/tRqcJV0Z55c?si…

Ollie Whitehouse (@ollieatnowhere) 's Twitter Profile Photo

At NCSC UK we have just released guidance on using Privileged Access Workstations (PAWs) in Operational Technology (OT) environments.. ncsc.gov.uk/collection/ope…

sapir federovsky (@sapirxfed) 's Twitter Profile Photo

This is simply an amazing talk. Except the subject itself and the REALLY GOOD explanations, Some really interesting research and detection methods hide in this post. BTW, I used the same methods in some of my researches lately, and found similar insights. knowing I'm in the

ClearSky Cyber Security (@clearskysec) 's Twitter Profile Photo

A new wiper attack has been identified by ClearSky Cyber Security affecting Ukraine. We named this wiper "GamaWiper" (VBS-based wiper). The intrusion chain begins with the exploitation of a vulnerable WinRAR version (CVE-2025-80880). We assess with moderate confidence that this

A new wiper attack has been identified by ClearSky Cyber Security affecting Ukraine. 
We named this wiper "GamaWiper" (VBS-based wiper).
The intrusion chain begins with the exploitation of a vulnerable WinRAR version (CVE-2025-80880). We assess with moderate confidence that this
John Hultquist (@johnhultquist) 's Twitter Profile Photo

DOJ confirms our earlier assessment of ties between hacktivist front Cyber Army of Russia Reborn (CARR) and Russia’s military intelligence service, the GRU. CARR carried out cyberattacks on US and European critical infrastructure but hid behind this false persona.

Sean Lyngaas (@snlyngaas) 's Twitter Profile Photo

US charges and extradites 33-year-old Ukrainian woman for her alleged role in pro-Russia hacking group that caused spillage at a Texas water plant and an ammonia leak at a meat processing plant in LA. cnn.com/2025/12/10/pol…