Perey Bao (@pereybaos) 's Twitter Profile
Perey Bao

@pereybaos

ID: 1788254363108225024

calendar_today08-05-2024 17:07:30

43 Tweet

5 Followers

199 Following

MalwareHunterTeam (@malwrhunterteam) 's Twitter Profile Photo

"Credit Card Frauder.exe": 819190f5d012d3267c1bc6294da9f50060316bb146aacbc61863094959e1afe7 "computer has been seized by the Federal Bureau of Investigation" "We notice also your illegal activity online, to get your files back you must e-mail us at [email protected]" 😂

"Credit Card Frauder.exe": 819190f5d012d3267c1bc6294da9f50060316bb146aacbc61863094959e1afe7
"computer has been seized by the Federal Bureau of Investigation"
"We notice also your illegal activity online, to get your files back you must e-mail us at crimeinvest23@proton.me"
😂
Cyber Advising (@cyber_advising) 's Twitter Profile Photo

CVE-2024-7479 & CVE-2024-7481: exploit proof of concept of a vulnerability in TeamViewer that enables an unprivileged user to load an arbitrary Kernel Driver into the system. PoC github.com/PeterGabaldon/…

CVE-2024-7479 & CVE-2024-7481: exploit proof of concept of a vulnerability in TeamViewer that enables an unprivileged user to load an arbitrary Kernel Driver into the system.

PoC
github.com/PeterGabaldon/…
Arda Büyükkaya (@whichbufferarda) 's Twitter Profile Photo

🚨 New threat research: SilkSpecter, a likely China-based 🇨🇳 threat actor, is targeting EU & US e-commerce shoppers for financial fraud by using fake Black Friday sites to steal victims' debit and credit card details. blog.eclecticiq.com/inside-intelli…

🚨 New threat research: SilkSpecter, a likely China-based 🇨🇳 threat actor, is targeting EU & US e-commerce shoppers for financial fraud by using fake Black Friday sites to steal victims' debit and credit card details.
blog.eclecticiq.com/inside-intelli…
Aurimas Griciūnas (@aurimas_gr) 's Twitter Profile Photo

What is 𝗥𝗲𝗔𝗰𝘁 𝗔𝗴𝗲𝗻𝘁 pattern? As with most of the Agentic System Design patterns, it is all about flow engineering - how you construct the initial prompt and how you route your system according to the outputs produced by the LLM. ReAct stands for Reasoning and Action.

ThreatBook (@threatbooklabs) 's Twitter Profile Photo

🚨New blog:APT32 used GitHub to distribute a Cobalt Strike exploit plugin containing a Trojan, targeting cybersecurity professionals. ThreatBook identified this attack event in November 2024 and located the attacker's GitHub account.threatbook.io/blog/id/1100 #APT32 #OceanLotus

🚨New blog:APT32 used GitHub to distribute a Cobalt Strike exploit plugin containing a Trojan, targeting cybersecurity professionals. ThreatBook identified this attack event in November 2024 and located the attacker's GitHub account.threatbook.io/blog/id/1100
#APT32 #OceanLotus
🥝🏳️‍🌈 Benjamin Delpy (@gentilkiwi) 's Twitter Profile Photo

st25tb_kiemul may be less user-friendly than st25tb_kameleon is, but I still love this project 🥰 Works with Launchpad, latest boards and even early prototypes boards - all compatible with this new release (8 slots,tear-off,...) 🔗 github.com/gentilkiwi/st2… (still need doc update)

st25tb_kiemul may be less user-friendly than st25tb_kameleon is, but I still love this project 🥰

Works with Launchpad, latest boards and even early prototypes boards - all compatible with this new release (8 slots,tear-off,...)
🔗 github.com/gentilkiwi/st2…
(still need doc update)
Tarab Naqvi (@sayyedtarab) 's Twitter Profile Photo

"Stop defaming our son. He wasn't a terrorist." Family of Qari Iqbal Mohammad slams Godi media for falsely branding him a Pakistani militant. He died in Pakistani shelling in Poonch ! They demand legal action. #FakeNews #GodiMedia #Poonch #kashmir #IndiaPakistanWar

CyberWar - 싸워 (@cyberwar_15) 's Twitter Profile Photo

#NorthKorea #APT37 Analysis of APT37 Attack Case Disguised as a Think Tank for National Security Strategy in South Korea (Operation. ToyBox Story) genians.co.kr/en/blog/threat…

#NorthKorea #APT37 

Analysis of APT37 Attack Case Disguised as a Think Tank for National Security Strategy in South Korea (Operation. ToyBox Story)

genians.co.kr/en/blog/threat…
Unit 42 (@unit42_intel) 's Twitter Profile Photo

A #CypherIT crypter is being used in #LummaStealer infections. This campaign is spread via various sources. The binaries use NSIS installers and AutoIt scripts. From an infection, we also saw a clipper payload targeting cryptocurrency wallets. Details at bit.ly/3Fibxse

A #CypherIT crypter is being used in #LummaStealer infections. This campaign is spread via various sources. The binaries use NSIS installers and AutoIt scripts. From an infection, we also saw a clipper payload targeting cryptocurrency wallets. Details at bit.ly/3Fibxse
Shubham Sharma (@shubham_pen) 's Twitter Profile Photo

How do LLMs actually work? LLMs power AI applications like ChatGPT, Grok, and Claude to generate human-like text and assist with complex tasks. Credit to Nikki Siapno #infosec #cybersecurity #cybersecuritytips #CyberSec #networking #infosecurity #cybersecurityawareness

How do LLMs actually work?  
LLMs power AI applications like ChatGPT, Grok, and Claude to generate human-like text and assist with complex tasks.
Credit to <a href="/NikkiSiapno/">Nikki Siapno</a> 

#infosec #cybersecurity #cybersecuritytips #CyberSec #networking #infosecurity #cybersecurityawareness
Alex. Turing (@turingalex) 's Twitter Profile Photo

🚨Mission from my big brother SKII: The payload in the sample is encrypted with AES_CBC and compressed with LZMA. The decryption key is derived from a parameter in Python. The final payload abuses a #Zulip chat room as its #C2. Happy hunting 🍷 & Stay vigilant⏰Xlab

🚨Mission from my big brother <a href="/SethKingHi/">SKII</a>: The payload in the sample is encrypted with AES_CBC and compressed with LZMA. The decryption key is derived from a parameter in Python. The final payload abuses a #Zulip chat room as its #C2. 
Happy hunting 🍷 &amp; Stay vigilant⏰<a href="/Xlab_qax/">Xlab</a>
Wiser.my (@officialwisermy) 's Twitter Profile Photo

CelcomDigi telah melancarkan MobileSHIELD, sebuah aplikasi keselamatan mudah alih berkuasa AI yang dibangunkan bersama pakar keselamatan global, F-Secure. Perkhidmatan ini boleh dilanggan secara bulanan atau dengan kontrak 12 bulan untuk lebih jimat.

CelcomDigi telah melancarkan MobileSHIELD, sebuah aplikasi keselamatan mudah alih berkuasa AI yang dibangunkan bersama pakar keselamatan global, F-Secure.

Perkhidmatan ini boleh dilanggan secara bulanan atau dengan kontrak 12 bulan untuk lebih jimat.
dtac (@dtac) 's Twitter Profile Photo

ลูกค้าทรู ดีแทค เล่นเน็ตปลอดภัย ห่างไกลมิจฉาชีพ 🦹 ต้องนี่เลย! สมัครแพ็กเกจเน็ต 2GB นาน 30 วัน แค่ 59 บ. แถมฟรี 2 ตัวช่วยป้องกันมิจฉาชีพออนไลน์ 👍 ฟรี! แอป F-Secure for True ช่วยบล็อกเว็บอันตราย ตรวจสอบและแจ้งเตือนข้อมูลรั่วไหล แอปปลอม ไวรัส มัลแวร์ในมือถือ

ลูกค้าทรู ดีแทค เล่นเน็ตปลอดภัย ห่างไกลมิจฉาชีพ 🦹 ต้องนี่เลย! สมัครแพ็กเกจเน็ต 2GB นาน 30 วัน แค่ 59 บ. แถมฟรี 2 ตัวช่วยป้องกันมิจฉาชีพออนไลน์

👍 ฟรี! แอป F-Secure for True ช่วยบล็อกเว็บอันตราย ตรวจสอบและแจ้งเตือนข้อมูลรั่วไหล แอปปลอม ไวรัส มัลแวร์ในมือถือ