Pedro Fernandes (@pedrofcyber) 's Twitter Profile
Pedro Fernandes

@pedrofcyber

National Cybersecurity Centre of Portugal | Ex-Microsoft | Certified Ethical Hacker (CEH)

ID: 1814254032493387776

linkhttps://www.pedrof.com/ calendar_today19-07-2024 11:01:15

32 Tweet

44 Followers

498 Following

Google Cloud Security (@googlecloudsec) 's Twitter Profile Photo

New report from Google Threat Intelligence Group šŸ“ We detail how threat actors, including nation states, are using AI to accelerate attacks, from model extraction to the new HONESTCUE malware. Read the report: bit.ly/3OFrf4M

New report from Google Threat Intelligence Group šŸ“

We detail how threat actors, including nation states, are using AI to accelerate attacks, from model extraction to the new HONESTCUE malware.

Read the report: bit.ly/3OFrf4M
Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Microsoft Defender researchers observed attackers using yet another evasion approach to the ClickFix technique: Asking targets to run a command that executes a custom DNS lookup and parses the `Name:` response to receive the next-stage payload for execution.

Microsoft Defender researchers observed attackers using yet another evasion approach to the ClickFix technique: Asking targets to run a command that executes a custom DNS lookup and parses the `Name:` response to receive the next-stage payload for execution.
Microsoft Security Support Team (@msftsecsuppteam) 's Twitter Profile Photo

šŸ“¢ Heads up, Defender for Endpoint admins! Starting early March 2026, Microsoft Defender Antivirus exclusions will no longer be stored in a readable format on devices when using MDE security settings management. āš ļø If you rely on monitoring or scripts that check AV exclusions

Pedro Fernandes (@pedrofcyber) 's Twitter Profile Photo

I just completed the course "Cybersecure Consumer", from the National Cybersecurity Centre of Portugal: pedrof.com/blog/en/2026/i…

Claude (@claudeai) 's Twitter Profile Photo

Introducing Claude Code Security, now in limited research preview. It scans codebases for vulnerabilities and suggests targeted software patches for human review, allowing teams to find and fix issues that traditional tools often miss. Learn more: anthropic.com/news/claude-co…

Pedro Fernandes (@pedrofcyber) 's Twitter Profile Photo

I just completed the course "Cybersocial Citizen", from the National Cybersecurity Centre of Portugal: pedrof.com/blog/en/2026/i…

Pedro Fernandes (@pedrofcyber) 's Twitter Profile Photo

I just completed the course "Introduction to the Security of Classified Information", from the National Security Cabinet of Portugal: pedrof.com/blog/en/2026/i…

Pedro Fernandes (@pedrofcyber) 's Twitter Profile Photo

I just completed the course "Security of Classified Information - Complementary Course", from the National Security Cabinet of Portugal: pedrof.com/blog/en/2026/i…

Microsoft Azure (@azure) 's Twitter Profile Photo

Microsoft Sovereign Cloud now supports fully disconnected operations, bringing Azure governance, productivity, and support for large AI models across real world connectivity needs. Learn more: msft.it/6017QZrud

Microsoft Sovereign Cloud now supports fully disconnected operations, bringing Azure governance, productivity, and support for large AI models across real world connectivity needs. Learn more: msft.it/6017QZrud
Kali Linux (@kalilinux) 's Twitter Profile Photo

Kali & LLM: macOS with Claude Desktop GUI & Anthropic Sonnet LLM: This post will focus on an alternative method of using Kali Linux, moving beyond direct terminal command execution. Instead, we will leverage a Large Language Model (LLM) to translate… kali.org/blog/kali-llm-…

Kali & LLM: macOS with Claude Desktop GUI & Anthropic Sonnet LLM: This post will focus on an alternative method of using Kali Linux, moving beyond direct terminal command execution. Instead, we will leverage a Large Language Model (LLM) to translate… kali.org/blog/kali-llm-…
FBI Cyber Division (@fbicyberdiv) 's Twitter Profile Photo

🚨 Malicious cyber actors are targeting and compromising Cisco SD-WAN systems deployed by organizations worldwide. These actors have exploited a previously undisclosed authentication bypass vulnerability, CVE-2026-20127, for initial access before escalating privileges using

🚨 Malicious cyber actors are targeting and compromising Cisco SD-WAN systems deployed by organizations worldwide.

These actors have exploited a previously undisclosed authentication bypass vulnerability, CVE-2026-20127, for initial access before escalating privileges using
Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

GTIG, Mandiant & partners disrupted a global cyber espionage campaign by suspected PRC-nexus actor UNC2814. The group used a novel backdoor, GRIDTIDE, abusing Google Sheets API for C2. We dismantled the infrastructure & released IOCs. Read more: bit.ly/4rVqqnz

GTIG, Mandiant & partners disrupted a global cyber espionage campaign by suspected PRC-nexus actor UNC2814. 

The group used a novel backdoor, GRIDTIDE, abusing Google Sheets API for C2. We dismantled the infrastructure & released IOCs.

Read more: bit.ly/4rVqqnz
GrapheneOS (@grapheneos) 's Twitter Profile Photo

We're happy to announce a long-term partnership with Motorola. We're collaborating on future devices meeting our privacy and security standards with official GrapheneOS support. motorolanews.com/motorola-three…

Claude (@claudeai) 's Twitter Profile Photo

Memory is now available on the free plan. We've also made it easier to import saved memories into Claude. You can export them whenever you want.

Memory is now available on the free plan.

We've also made it easier to import saved memories into Claude. 

You can export them whenever you want.
Pedro Fernandes (@pedrofcyber) 's Twitter Profile Photo

I participated in the ā€œNIS2 Roadmapā€ course, from the National Cybersecurity Centre: pedrof.com/blog/en/2026/i…