TakeDownCon (@takedowncon) 's Twitter Profile
TakeDownCon

@takedowncon

TakeDownCon is a highly technical forum that focuses on the latest vulnerabilities, the most potent exploits, and the current security threats.

ID: 231464374

linkhttps://www.takedowncon.com calendar_today28-12-2010 16:04:11

2,2K Tweet

1,1K Followers

456 Following

TakeDownCon (@takedowncon) 's Twitter Profile Photo

Hacker Halted has partnered with GORUCK to bring a real-world challenge to Hacker Halted and Global CISO Forum participants. Register: hackerhalted.com/go-ruck/

Hacker Halted has partnered with <a href="/GORUCK/">GORUCK</a>  to bring a real-world challenge to Hacker Halted and Global CISO Forum participants.  Register: hackerhalted.com/go-ruck/
Global CyberLympics (@cyberlympics) 's Twitter Profile Photo

The Cyberlympics 2018 online elimination round begins tonight! We had 134 teams participate this year from around the world. Good luck to all the teams!

The Cyberlympics 2018 online elimination round begins tonight! We had 134 teams participate this year from around the world. Good luck to all the teams!
TakeDownCon (@takedowncon) 's Twitter Profile Photo

Olympic Destroyer took its time, compromised the IT supply chain. NotPetya attribution. Coin scams. Coin miners. Botnets old and new. - In today's podcast we hear that Olympic Destroyer may have started with a supply-chain compromise back in December.... ow.ly/aUEh50gvSkR

TakeDownCon (@takedowncon) 's Twitter Profile Photo

The complexities of Olympic Destroyer. More blame for Russia in the matter of NotPetya. Congress mulls election security. New York cyber milestone. Ed Snowden as phishbait. - In today's podcast, we hear more about Olympic Destroyer: its relationship s... ow.ly/Rwkd50gwIgK

TakeDownCon (@takedowncon) 's Twitter Profile Photo

The uncanny HEX men — Research Saturday - The research we’re discussing today is called, “Beware the Hex Men”, and it tracks multiple attack campaigns conducted by a Chinese threat actor. The GuardiCore Labs team identified three attack variants that ... ow.ly/2V1D50gxjmn

TakeDownCon (@takedowncon) 's Twitter Profile Photo

SWIFT fraud in India. DPRK hacking updates. Notes on Russian influence ops, both indictments and continuing activity. Alleged Florida gunman may have been an Internet known wolf. - In today's podcast we hear that SWIFT fraud has hit an Indian lender. ... ow.ly/C0sB50gzv9F

TakeDownCon (@takedowncon) 's Twitter Profile Photo

SWIFT phishbait. DPRK hacking gets better; GRU hacking looks east. Coldroot RAT. Cryptojacking. Election cybersecurity. - In today's podcast, we hear that SWIFT phishbait is hitting inboxes. North Korean hackers show fresh sophistication and new ambit... ow.ly/qLTZ50gAp60

TakeDownCon (@takedowncon) 's Twitter Profile Photo

Code signing certificates for sale. Impact of cybercrime on the world economy. Reaper out from under Lazarus's shadow. Catphishing. Cyber intelligence against terror. Ransomware and other hacks. - In today's podcast, we hear that counterfeit certifica... ow.ly/GWRv50gBhHq

TakeDownCon (@takedowncon) 's Twitter Profile Photo

Mirai variant establishes proxies. Buggy smart contracts. Banking glitch. Studies from Verizon, Thales. FTC addresses credential stuffing. - In today's podcast we hear, OMG, that Mirai is out in a new and improved form. Researchers find buggy smart co... ow.ly/Sg7q50gC7XA

TakeDownCon (@takedowncon) 's Twitter Profile Photo

Phishing for holiday winnings — Research Saturday - Or Katz is principal lead security researcher for Akamai's Enterprise Security Business Unit, and the research he’s sharing today is a widespread phishing campaign targeting users using an advertisin... ow.ly/pkza50gCJ6N

TakeDownCon (@takedowncon) 's Twitter Profile Photo

Olympic hacking—false flags and attack infrastructure. Cryptojacking. Smartphone security bans. Heraldic animals of hacking. - In today's podcast, we hear that anonymous US Intelligence sources call the Olympic hacks a Russian false flag operation. Mo... ow.ly/SAR550gE7sm

TakeDownCon (@takedowncon) 's Twitter Profile Photo

Cryptojacking through an AWS S3 bucket. Threats, risk, and unintentional mistakes. Crime and punishment. Industry notes. Alien hackers? - In today's podcast, we hear that CoinHive was installed via a misconfigured AWS S3 bucket. Unintentional password... ow.ly/Jjlt50gEZFf

TakeDownCon (@takedowncon) 's Twitter Profile Photo

Memcrash and amplification attacks. SAML vulnerabilities. Thanatos ransomware. Petya returns (so does Marcher). Deterrence and election security. - In today's podcast, we hear that Memcrash threatens big DDoS events. Problems with single-sign-on solut... ow.ly/xnHD50gFUmw

TakeDownCon (@takedowncon) 's Twitter Profile Photo

Fancy Bear finds Berlin just right. RedDrop Android blackmail malware. Another AWS S3 exposure. FTC settles; SEC investigates. Blockchain radix malorum? - In today's podcast, we hear that Fancy Bear has been busy in a sensitive German government netwo... ow.ly/Bitn50gGO1M

TakeDownCon (@takedowncon) 's Twitter Profile Photo

Memcrashing no longer just a theoretical possibility. Fancy Bear's pawprints in German networks and other peoples' embassies. Deterrence in cyberspace. High-profile fraud victims. - In today's podcast, we hear that a Memcrash amplification attack took... ow.ly/OV2650gHDPz

TakeDownCon (@takedowncon) 's Twitter Profile Photo

Lebal malware phishes for victims — Research Saturday - Researchers at Comodo Security Solutions have been tracking a recently discovered strain of malware named Lebal. The malware uses several clever techniques to attempt to hide itself, and once ins... ow.ly/3Hrq50gIfxU

TakeDownCon (@takedowncon) 's Twitter Profile Photo

Humanitarian organizations targeted. Memcrash extortion. Spring Break bug. Equifax breach update. Russian influence operations (and American "yelling and hollering"). - In today's podcast, we hear about a new campaign that targets humanitarian organiz... ow.ly/uaRb50gJGTh