Ankit Anubhav (@ankit_anubhav) 's Twitter Profile
Ankit Anubhav

@ankit_anubhav

Voice of IoT Security & awareness. I make the world of IoT a safer place.
Ex- McAfee / FireEye / NewSky

ID: 80558080

linkhttps://www.ankitanubhav.info calendar_today07-10-2009 11:57:44

3,3K Tweet

7,7K Takipçi

391 Takip Edilen

Ankit Anubhav (@ankit_anubhav) 's Twitter Profile Photo

An unusual and creative way of propagating crack exe in the wild. The zip has a .url and a rar. The .url instructs the user to Google about some construction website. Once you get into that legit website, go to "contact us". The 5 digits in the middle of the phone number of

An unusual  and creative way of propagating crack exe in the wild.

The zip has a .url and a rar. The .url instructs the user  to Google about some construction website.
Once you get into that legit website, go to "contact us". The 5 digits in the middle of the phone number of
Ankit Anubhav (@ankit_anubhav) 's Twitter Profile Photo

Hackers are using Gamma AI to create phishing page redirectors. To make things worse, the URL of these AI assisted webpages is on gamma.app domain itself, making it challenging for vendors to detect. The phishing makes you solve cloudflare style captcha, and will

Hackers are using Gamma AI to create phishing page redirectors.

To make things worse, the URL of these AI assisted webpages is on gamma.app domain itself, making it challenging for vendors to detect.

The phishing makes you solve cloudflare style captcha, and will
Ankit Anubhav (@ankit_anubhav) 's Twitter Profile Photo

Double abuse of Microsoft Power BI and Backblaze creates an evasive phishing campaign. First - The phishing is hosted on Microsoft's PowerBI an app.powerbi.com link is sent to the user. This redirects to backblazeb2.com domain, leading to the actual phish. Live

Double abuse of <a href="/MSPowerBI/">Microsoft Power BI</a>  and <a href="/backblaze/">Backblaze</a> creates an evasive phishing campaign.

First - The phishing is hosted on Microsoft's PowerBI an app.powerbi.com link is sent to the user.

This redirects to backblazeb2.com domain, leading to the actual phish.

Live
Ankit Anubhav (@ankit_anubhav) 's Twitter Profile Photo

Simple regex bypass for defenses which look for URL specifically in a string. Just put about:blank?go= followed by your desired url. For example the following , if you copy paste it in Chrome about:blank?go=ask.com This should open the website.

Ankit Anubhav (@ankit_anubhav) 's Twitter Profile Photo

Rarely discussed topic - Over the years, there has been a constant skill shortage / downfall on the cyber attackers' side. #cybersecurity

Rarely discussed topic - Over the years, there has been a constant skill shortage / downfall on the cyber attackers' side.

#cybersecurity
Ankit Anubhav (@ankit_anubhav) 's Twitter Profile Photo

Do you like the topic of AI CyberSecurity and want to collaborate & learn? Join my discord channel to talk about both offensive and defensive AI. It doesn't matter if you're a researcher or student, as long as you use the information for ethical and constructive purposes.

Do you like the topic of AI CyberSecurity and want to collaborate &amp; learn?

Join my discord  channel to talk about both offensive and defensive AI. It doesn't matter if you're a researcher or student, as long as you use the information for ethical and constructive purposes.
Ankit Anubhav (@ankit_anubhav) 's Twitter Profile Photo

New article about me about an AI bypass technique, which can work in multiple cases. Compromising AI ChatBots via Memory Corruption #AI #redteam #infosec linkedin.com/pulse/compromi…

Ankit Anubhav (@ankit_anubhav) 's Twitter Profile Photo

Be careful of suspicious #Calendly invites! Travel sector hacker group Storm-1865 is sending calendly invites to victims. These are sent by calendly's official email. The URL is also from calendly.com with an open-redirect to phishing website to avoid detection. Full

Be careful of suspicious #Calendly invites!
Travel sector hacker group Storm-1865 is sending calendly invites to victims. These are sent by calendly's official email.
The URL is also  from calendly.com with an open-redirect to phishing website to avoid detection.

Full