Amin Hasbini (@cyberauthority) 's Twitter Profile
Amin Hasbini

@cyberauthority

Technology researcher

ID: 49392714

calendar_today21-06-2009 18:52:07

4,4K Tweet

7,7K Takipçi

31 Takip Edilen

Costin Raiu (@craiu) 's Twitter Profile Photo

Thinking of a career in Reverse Engineering? Don't miss this RE101 Training Walkthrough with Ivan Kwiatkowski on Feb 16: brighttalk.com/webcast/15591/…

Leonid Bezvershenko (@bzvr_) 's Twitter Profile Photo

Magic is here! We have discovered a previously unknown #APT that has been attacking organizations in the area affected by the conflict between Russia and Ukraine. Observed victims were compromised with previously unknown implants that we dubbed #PowerMagic and #CommonMagic. [1/4]

Magic is here! We have discovered a previously unknown #APT that has been attacking organizations in the area affected by the conflict between Russia and Ukraine. Observed victims were compromised with previously unknown implants that we dubbed #PowerMagic and #CommonMagic. [1/4]
Akhbar Al Aan أخبار الآن (@akhbar) 's Twitter Profile Photo

قال الدكتور محمد أمين حاسبيني مدير فريق البحث والتحليل العالمي في شركة “كاسبرسكي لاب”: يجب ان يكون للدول والحكومات دور في السيطرة على هذا التطور للاستفادة منها وتفادي المشاكل. #الذكاء_الاصطناعي akhb.ar/p1B12 Amin Hasbini سَجَد الجبوري

العربية (@alarabiya) 's Twitter Profile Photo

الخبير التقني في أمن المعلومات أمين حاسبيني: فرق حرب سيبرانية حول العالم تصطف مع #روسيا و #أوكرانيا.. وبعض المجموعات تهاجم الطرفين #العربية

Marc R (@seifreed) 's Twitter Profile Photo

Kaspersky unravels the secrets of #GoldenJackal #APT Group! Since 2019, this stealthy actor has been targeting #government & diplomatic entities across the Middle East & South Asia. Exclusive details & IOC via Kaspersky's latest release ⬇️ bit.ly/3IzkZWI

Eugene Kaspersky (@e_kaspersky) 's Twitter Profile Photo

We've discovered a new cyberattack against iOS called Triangulation. The attack starts with iMessage with a malicious attachment, which, using a number of vulnerabilities in iOS installs spyware. No user action is required. #IOSTriangulation

We've discovered a new cyberattack against iOS called Triangulation. 

The attack starts with iMessage with a malicious attachment, which, using a number of vulnerabilities in iOS installs spyware. No user action is required.

#IOSTriangulation
Leonid Bezvershenko (@bzvr_) 's Twitter Profile Photo

Ever wanted to take another look at #OperationTriangulation malware? Then check out VirusTotal - we have uploaded malicious modules used in this campaign. virustotal.com/gui/file/ff2f2… virustotal.com/gui/file/7e779… virustotal.com/gui/file/c2393… virustotal.com/gui/file/ff2f2…

Ever wanted to take another look at #OperationTriangulation malware? Then check out VirusTotal - we have uploaded malicious modules used in this campaign. 

virustotal.com/gui/file/ff2f2…

virustotal.com/gui/file/7e779…

virustotal.com/gui/file/c2393…

virustotal.com/gui/file/ff2f2…
Mert Değirmenci (@r00tten) 's Twitter Profile Photo

We discovered a DLL file, identified as hrserv.dll, which is a previously unknown web shell that has features such as custom encoding methods for client communication and in-memory execution. securelist.com/hrserv-apt-web…

Kurt Baumgartner (@k_sec) 's Twitter Profile Photo

"In addition to the name “Callisto Group,” FSB Center 18 is known by cybersecurity investigators as “Dancing Salome” by Kaspersky Labs, “STAR BLIZZARD” by Microsoft Threat Intelligence Center and “COLDRIVER” by Google’s Threat Analysis Group"

Steve Weis (@sweis) 's Twitter Profile Photo

This iMessage exploit is crazy. TrueType vulnerability that has existed since the 90s, 2 kernel exploits, a browser exploit, and an undocumented hardware feature that was not used in shipped software: securelist.com/operation-tria…

This iMessage exploit is crazy. TrueType vulnerability that has existed since the 90s, 2 kernel exploits, a browser exploit, and an undocumented hardware feature that was not used in shipped software:
securelist.com/operation-tria…
Boris Larin (@oct0xor) 's Twitter Profile Photo

We're revealing details of an obscure debugging feature in the Apple A12-A16 SoC’s that bypasses all of the hard-to-hack hardware-based memory protections on new iPhones. Its not used by the firmware and we don't know how the attackers found out about it. securelist.com/operation-tria…