Steve Linford (@stevelinford) 's Twitter Profile
Steve Linford

@stevelinford

Founder & Chairman of @Spamhaus ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀ ⠀ ▶︎ For Spamhaus Support see: spamhaus.org ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀ ⠀⠀ Views are my own.

ID: 77398418

calendar_today26-09-2009 04:41:59

170 Tweet

176 Followers

168 Following

Spamhaus (@spamhaus) 's Twitter Profile Photo

🎁 Spamhaus researchers are back with one final tip for the holiday season! Before you turn off your laptop and grab a mince pie, how secure are your DNS and domain credentials? Your internet presence relies on domain registration and DNS - if one falls into the wrong hands

🎁 Spamhaus researchers are back with one final tip for the holiday season! 

Before you turn off your laptop and grab a mince pie, how secure are your DNS and domain credentials?

Your internet presence relies on domain registration and DNS - if one falls into the wrong hands
Spamhaus (@spamhaus) 's Twitter Profile Photo

🎉 🎉 We are thrilled to share that the Threat Intel Community Portal has reached a significant milestone - 1,000,000 submissions! And we want to say a massive THANK YOU. In less than four months, we have received 1 million contributions of suspicious IPs, domains, URLs, and

🎉 🎉 We are thrilled to share that the Threat Intel Community Portal has reached a significant milestone - 1,000,000 submissions!

And we want to say a massive THANK YOU.

In less than four months, we have received 1 million contributions of suspicious IPs, domains, URLs, and
Spamhaus (@spamhaus) 's Twitter Profile Photo

OPERATION ENDGAME UPDATE | Following on from the earlier announcement 📢 Spamhaus is now sending notification emails 📩 to ISPs and hosting companies associated with the breached email accounts. Here's what to do if you receive one: 👉 Go to this remediation webpage:

Spamhaus (@spamhaus) 's Twitter Profile Photo

London hospitals are in critical need of O-type blood donations due to a recent ransomware attack, the source of which is believed to be Qilin, a Russian cyber-criminal group. The attack has caused severe disruption to hospital services and poses a real risk to patient safety.

Spamhaus (@spamhaus) 's Twitter Profile Photo

Europol strikes back at Cobalt Strike - another brilliantly coordinated effort with hat tips to abuse.ch and Spamhaus Technology for their involvement and support too 👏 This international operation has taken action against criminal abuse with Operation Morpheus. Abuse reports are

vx-underground (@vxunderground) 's Twitter Profile Photo

How to fix the Crowdstrike thing: 1. Boot Windows into safe mode 2. Go to C:\Windows\System32\drivers\CrowdStrike 3. Delete C-00000291*.sys 4. Repeat for every host in your enterprise network including remote workers 5. If you're using BitLocker jump off a bridge

Spamhaus (@spamhaus) 's Twitter Profile Photo

🚫 Scraping or buying data, especially because it almost always includes spam traps, can lead to serious blocking issues. Always obtain explicit consent for personalized marketing communications, whether email or SMS. Don't rely on the flimsy 'legitimate interest sender' excuse.

🚫 Scraping or buying data, especially because it almost always includes spam traps, can lead to serious blocking issues. Always obtain explicit consent for personalized marketing communications, whether email or SMS. Don't rely on the flimsy 'legitimate interest sender' excuse.
Steve Linford (@stevelinford) 's Twitter Profile Photo

No matter whose cybersecurity services you use, you need this on the edge of your network: DROP (Don’t Route or Peer) is IP traffic you definitely don’t want incoming connections from or outgoing connections to… and it’s free.

Spamhaus (@spamhaus) 's Twitter Profile Photo

New entry: “.ad” now ranks #4 among ccTLDs associated with malicious activity. Detections have surged in the last 30 days 📈 now hitting approx. 3,000 domains in total, mostly via Dynadot, and nearly all linked to Chinese gambling operations 🇨🇳 🔍 Previously limited to Andorran

New entry: “.ad” now ranks #4 among ccTLDs associated with malicious activity.

Detections have surged in the last 30 days 📈 now hitting approx. 3,000 domains in total, mostly via Dynadot, and nearly all linked to Chinese gambling operations 🇨🇳

🔍 Previously limited to Andorran
FBI (@fbi) 's Twitter Profile Photo

Cyber criminals often conduct crimes anonymously by using proxy services that exploit vulnerabilities in end-of-life routers. Read the FBI’s new PSA for tips on identifying routers that are infected with malware and to learn how to protect yourself: ic3.gov/PSA/2025/PSA25…

Cyber criminals often conduct crimes anonymously by using proxy services that exploit vulnerabilities in end-of-life routers. Read the FBI’s new PSA for tips on identifying routers that are infected with malware and to learn how to protect yourself: ic3.gov/PSA/2025/PSA25…
Steve Linford (@stevelinford) 's Twitter Profile Photo

Hola cesar marquina, no sé a qui he de portar això a l'atenció de seguretat d'@andorratelecom, però és un problema urgent per als dominis .AD

Spamhaus (@spamhaus) 's Twitter Profile Photo

🔥 Operation Endgame is BACK! This time targeting #BumbleBee, #Latrodectus, #DanaBot, #WarmCookie, #Qakbot and #Trickbot! Once again this is a HUGE win, with a truly international effort! 💪 As with phase one of #OperationEndgame, Spamhaus are providing remediation support -

Spamhaus (@spamhaus) 's Twitter Profile Photo

“.ad” registry (Andorra 🇦🇩) has stepped up its game, with malicious domain detections down -84%, dropping to #33 on the list of most abused ccTLDs. Nice work. ✌️ Meanwhile, “.my” (Malaysia 🇲🇾) — despite its strict registration rules — has seen a +73% spike in abuse, shooting up

“.ad” registry (Andorra 🇦🇩) has stepped up its game, with malicious domain detections down -84%, dropping to #33 on the list of most abused ccTLDs. Nice work. ✌️

Meanwhile, “.my” (Malaysia 🇲🇾) — despite its strict registration rules — has seen a +73% spike in abuse, shooting up
NCSC UK (@ncsc) 's Twitter Profile Photo

You can report any emails, texts, websites, adverts or phone calls that you think are trying to scam you - even if you're unsure. By reporting phishing attempts you can reduce the amount of scams and help protect others from cyber crime. Learn more 👇 ncsc.gov.uk/collection/phi…

FBI (@fbi) 's Twitter Profile Photo

ALERT—The FBI has recently observed the cybercriminal group Scattered Spider expanding its targeting to include the airline sector. These actors rely on social engineering techniques, often impersonating employees or contractors to deceive IT help desks into granting access.

ALERT—The FBI has recently observed the cybercriminal group Scattered Spider expanding its targeting to include the airline sector. These actors rely on social engineering techniques, often impersonating employees or contractors to deceive IT help desks into granting access.
Spamhaus Technology (@spamhaustech) 's Twitter Profile Photo

✨ DNS Firewall will immediately protect users, customers, and IoT devices from connecting to malicious sites... But, before choosing a provider, ask these 10 essential questions - find the right solution for your business needs 👇👇 hubs.ly/Q03v8S1q0 #DNS #RPZ #Phishing

✨ DNS Firewall will immediately protect users, customers, and IoT devices from connecting to malicious sites...

But, before choosing a provider, ask these 10 essential questions - find the right solution for your business needs 👇👇
hubs.ly/Q03v8S1q0

#DNS #RPZ #Phishing
Steve Linford (@stevelinford) 's Twitter Profile Photo

1) I’d be amazed if Tim Cook reads Truth Social. 2) Apple can just say “We intend to! It’ll take us 4 years to ramp up production” knowing this clown will be out of the Whitehouse by then.

1) I’d be amazed if <a href="/tim_cook/">Tim Cook</a> reads Truth Social.

2) Apple can just say “We intend to! It’ll take us 4 years to ramp up production” knowing this clown will be out of the Whitehouse by then.
Spamhaus Technology (@spamhaustech) 's Twitter Profile Photo

💡 An insightful read from Sven Krohlas, Detection Engineer at Spamhaus Technology on how modern blocklists have advanced, enabling threat classification with far greater precision, from: 👉 IPs to domains, URLs, email addresses, and crypto wallets 👉 binary blocking to targeted rate

💡 An insightful read from Sven Krohlas, Detection Engineer at <a href="/SpamhausTech/">Spamhaus Technology</a> on how modern blocklists have advanced, enabling threat classification with far greater precision, from:
👉 IPs to domains, URLs, email addresses, and crypto wallets
👉 binary blocking to targeted rate