Cyber Sirene (@shreya4n6) 's Twitter Profile
Cyber Sirene

@shreya4n6

CTI Researcher @Fortinet

ID: 1223297669034127364

calendar_today31-01-2020 17:31:21

73 Tweet

154 Takipçi

689 Takip Edilen

Thomas Roccia 🤘 (@fr0gger_) 's Twitter Profile Photo

4⃣ - Anatomy of a YARA rule - Once you have gained more knowledge of threat intelligence concepts and methodologies, learning to use YARA rules can be very powerful for your threat hunting abilities!🛠️ #yararules #threathunting

4⃣ - Anatomy of a YARA rule - Once you have gained more knowledge of threat intelligence concepts and methodologies, learning to use YARA rules can be very powerful for your threat hunting abilities!🛠️ #yararules #threathunting
FalconFeeds.io (@falconfeedsio) 's Twitter Profile Photo

The hackers' groups ThreatSec, GhostSec, Stormous, Blackforums, and SiegedSec have come together to create a united collective called "The Five Families." Additionally, this collective has dropped hints regarding collaborative operations in the future. #CTI #ThreatIntel #Infosec

The hackers' groups ThreatSec, GhostSec, Stormous, Blackforums, and SiegedSec have come together to create a united collective called "The Five Families." Additionally, this collective has dropped hints regarding collaborative operations in the future.

#CTI #ThreatIntel #Infosec
Cyber Sirene (@shreya4n6) 's Twitter Profile Photo

Another day, another RaaS group on our radar! Get an understanding of the service and its capabilities of Qbit Ransomware group from our write-up by Shreya Talukdar and @hacback17 CloudSEK #threatintelligence #humint cloudsek.com/blog/undergrou…

Cyber Sirene (@shreya4n6) 's Twitter Profile Photo

In this post I, Shreya Talukdar and @hacback17 authored a document that delves into The Five Families' Cyber Operations and their overall impact on the web across the globe. Feel free to share your suggestions 👇 #CTI #fivefamilies #hacktivists linkedin.com/posts/shreya4n…

Cyber Sirene (@shreya4n6) 's Twitter Profile Photo

Read and share this excellent article written by @hacback17 on: Education - Your Ticket to Freedom or Barrier open.substack.com/pub/atrandom/p…

Cyber Sirene (@shreya4n6) 's Twitter Profile Photo

Check out my article on how phishing tools and services are making cybercrime easier than ever. I welcome any suggestions you may have. shreyatalukdar.substack.com/p/point-click-…

Cyber Sirene (@shreya4n6) 's Twitter Profile Photo

Polishing my skills again. Here are my learnings from the Bike HackTheBox Machine shreya4n6.medium.com/takeaways-from…

Cyber Sirene (@shreya4n6) 's Twitter Profile Photo

Basic example of how threat actors exploit brand trust Let me know your thoughts. shreya4n6.medium.com/how-threat-act…

Cyber Sirene (@shreya4n6) 's Twitter Profile Photo

Hello, Twitter family! Follow me on Medium for blogs about different cybersecurity research topics. Let’s learn and stay secure together! medium.com/@shreya4n6

Cyber Sirene (@shreya4n6) 's Twitter Profile Photo

Hello Guys. I am happy to share my article on 'How Threat Actors Exploit Brand'. I’d love to hear your thoughts on the article! Your feedback and suggestions are always welcome! #ThreatIntelligence #phishing #Brandtrust #CTI #Darkweb shreya4n6.medium.com/how-threat-act…

Cyber Sirene (@shreya4n6) 's Twitter Profile Photo

Hello connections,I usually share cybersecurity content here, but today I wanted to share something different I have been working on. Here is my YouTube channel. If you enjoy the content, I would appreciate your support. Thank you🙏 youtu.be/Z8lUxuHXgpA?si…