Renzon (@r3nzsec) 's Twitter Profile
Renzon

@r3nzsec

IR/Forensics @Unit42_Intel | Co-Founder @guidemtraining | Contributor/Analyst @TheDFIRReport @XintraOrg | CTF member @_hackstreetboys

ID: 1022590604373635080

calendar_today26-07-2018 21:12:53

2,2K Tweet

3,3K Followers

879 Following

Sekoia.io (@sekoia_io) 's Twitter Profile Photo

Since the apparition of the #Interlock ransomware, the Sekoia #TDR team observed its operators evolving, improving their toolset (#LummaStealer #BerserkStealer), and leveraging new techniques such as #ClickFix to deploy the ransomware payload. blog.sekoia.io/interlock-rans…

Since the apparition of the #Interlock ransomware, the Sekoia #TDR team observed its operators evolving, improving their toolset (#LummaStealer #BerserkStealer), and leveraging new techniques such as #ClickFix to deploy the ransomware payload. 

blog.sekoia.io/interlock-rans…
DebugPrivilege (@debugprivilege) 's Twitter Profile Photo

I’m so proud on all the folks at XINTRA - They work incredibly hard to put out quality content! If you’re looking for useful courses or training. Xintra is a great choice!

Nasreddine Bencherchali (@nas_bench) 's Twitter Profile Photo

Introducing 🚀Eventlog Compendium 🚀 A new Streamlit app, that aims to be the go-to resource for understanding and playing with Windows Event Logs. Explore it 👉 eventlog-compendium.streamlit.app Includes the following utilities and docs ⚙️ Build your own Advanced Audit Policy based on

Introducing 🚀Eventlog Compendium 🚀

A new Streamlit app, that aims to be the go-to resource for understanding and playing with Windows Event Logs.

Explore it 👉 eventlog-compendium.streamlit.app

Includes the following utilities and docs

⚙️ Build your own Advanced Audit Policy based on
Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

This is really bad. We’re not talking home users or mom-and-pop shops here - the systems affected are the backbone of major companies and orgs. People started scanning for helper.jsp and cache.jsp and found almost 600 compromised servers within hours. Big names among them. Tried

XINTRA (@xintraorg) 's Twitter Profile Photo

Fortinet dropped an APT34 report just days after we launched our APT34/OilRig lab: fortinet.com/content/dam/fo… Our emulation covers the exact TTPs: ✔️ Kernel elevation ✔️ Malicious JS payloads ✔️ Password Filter DLL ✔️ In-memory keyloggers Try it yourself 👉

Virus Bulletin (@virusbtn) 's Twitter Profile Photo

Unit 42 researchers uncovered a Lampion malware campaign targeting Portuguese government, finance & transport sectors. The threat actor aims to steal sensitive banking info, has impacted dozens of organizations & now has added ClickFix lures to its arsenal unit42.paloaltonetworks.com/lampion-malwar…

Unit 42 researchers uncovered a Lampion malware campaign targeting Portuguese government, finance & transport sectors. The threat actor aims to steal sensitive banking info, has impacted dozens of organizations & now has added ClickFix lures to its arsenal unit42.paloaltonetworks.com/lampion-malwar…
MyDFIR (@mydfir) 's Twitter Profile Photo

The Active Directory Project 2.0 is fully released! For those wanting to get some hands on practice, feel free to follow along and learn how to setup your own AD/Splunk environment and create an automation & response workflow in Shuffle. Cybersecurity Project: Active Directory

The DFIR Report (@thedfirreport) 's Twitter Profile Photo

🌟New report out today!🌟 Another Confluence Bites the Dust: Falling to ELPACO-team Ransomware Analysis and reporting completed by @pcsc0ut.bsky.social, @irishdeath.bsky.social & Tornado 🔊Audio: Available on Spotify, Apple, YouTube and more! thedfirreport.com/2025/05/19/ano…

Ryan "Chaps" Chapman (@rj_chap) 's Twitter Profile Photo

AMAZING keynote coming up at the SANS Institute | SANS DFIR #RansomwareSummit 2025! The DFIR Report's Pete & Angelo Violetti are presenting "Adapting Tradecraft: Examining #Ransomware Attacks in 2024 - Insights from The DFIR Report"! FREE reg @: sans.org/u/1yCa

AMAZING keynote coming up at the <a href="/SANSInstitute/">SANS Institute</a> | <a href="/sansforensics/">SANS DFIR</a> #RansomwareSummit 2025! <a href="/TheDFIRReport/">The DFIR Report</a>'s <a href="/_pete_0/">Pete</a> &amp; <a href="/angelo_violetti/">Angelo Violetti</a> are presenting "Adapting Tradecraft: Examining #Ransomware Attacks in 2024 - Insights from The DFIR Report"!
FREE reg @: sans.org/u/1yCa
Renzon (@r3nzsec) 's Twitter Profile Photo

Classic #ransomhub execution baked into the encryptor itself. Check out the latest report here and learn how that exposed RDP on your network can trigger a massive ransomware attack. #dfir thedfirreport.com/2025/06/30/hid… The DFIR Report

Classic #ransomhub execution baked into the encryptor itself. Check out the latest report here and learn how that exposed RDP on your network can trigger a massive ransomware attack. #dfir 

thedfirreport.com/2025/06/30/hid…

<a href="/TheDFIRReport/">The DFIR Report</a>
✞ inversecos (@inversecos) 's Twitter Profile Photo

Become a contributor at XINTRA XINTRA 🔎 We're looking for RED and BLUE team contributors 🔴Red Team – Emulate real APT groups 🔵Blue Team – Investigate & respond to emulations What you get: - Challenging, realistic emulations - Hack & forensicate vendor devices -

Become a contributor at XINTRA <a href="/XintraOrg/">XINTRA</a> 🔎

We're looking for RED and BLUE team contributors 

🔴Red Team – Emulate real APT groups
🔵Blue Team – Investigate &amp; respond to emulations

What you get:
- Challenging, realistic emulations
- Hack &amp; forensicate vendor devices
-