voldimmoral ๐Ÿช„ (@voldimmoral) 's Twitter Profile
voldimmoral ๐Ÿช„

@voldimmoral

#Veteran | Progressive Thinker | Diversity Ally โ™ฅ๏ธ Committed to the truth, integrity, fairness, and moral justice. #Equality is a human right, not a debate.

ID: 1537863192591802368

calendar_today17-06-2022 18:22:28

2,2K Tweet

1,1K Followers

924 Following

Dan Nanni (@xmodulo) 's Twitter Profile Photo

A #malware sandbox is an isolated environment used to safely run and observe suspicious files. Here are available #malware analysis sandbox tools and services ๐Ÿ˜Ž๐Ÿ‘‡ Find a pdf ebook with all my #cybersecurity infographics from study-notes.org #infosec #ethicalhacker

A #malware sandbox is an isolated environment used to safely run and observe suspicious files. Here are available #malware analysis sandbox tools and services ๐Ÿ˜Ž๐Ÿ‘‡

Find a pdf ebook with all my #cybersecurity infographics from study-notes.org

#infosec #ethicalhacker
Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

โšก Researcher Reverse-Engineered 0-Day Used to Disable CrowdStrike EDR Source: cybersecuritynews.com/0-day-disable-โ€ฆ A new Bring Your Own Vulnerable Driver (BYOVD) attack that can turn off top-tier endpoint security solutions, including CrowdStrike Falcon. By reverse-engineering a

โšก Researcher Reverse-Engineered 0-Day Used to Disable CrowdStrike EDR 

Source: cybersecuritynews.com/0-day-disable-โ€ฆ

A new Bring Your Own Vulnerable Driver (BYOVD) attack that can turn off top-tier endpoint security solutions, including CrowdStrike Falcon.

By reverse-engineering a
Dark Web Intelligence (@dailydarkweb) 's Twitter Profile Photo

๐Ÿงฐ Top 10 Tools Most Used by Cybercriminals Based on our ongoing interviews with threat actors and underground monitoring, we asked one simple question: โ€œWhat do you actually use?โ€ Hereโ€™s the reality ๐Ÿ‘‡ 1. Lumma Stealer Still one of the most dominant infostealers. Massive

๐Ÿงฐ Top 10 Tools Most Used by Cybercriminals

Based on our ongoing interviews with threat actors and underground monitoring, we asked one simple question: โ€œWhat do you actually use?โ€

Hereโ€™s the reality ๐Ÿ‘‡

1. Lumma Stealer
Still one of the most dominant infostealers. Massive
Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

โš ๏ธ Windows Active Directory Vulnerability Allows Attackers to Execute Malicious Code Source: cybersecuritynews.com/windows-activeโ€ฆ Microsoft has released urgent security updates to address a critical vulnerability in Windows Active Directory that allows attackers to execute malicious code.

โš ๏ธ Windows Active Directory Vulnerability Allows Attackers to Execute Malicious Code 

Source: cybersecuritynews.com/windows-activeโ€ฆ

Microsoft has released urgent security updates to address a critical vulnerability in Windows Active Directory that allows attackers to execute malicious code.
Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

๐Ÿšจ SpankRAT Exploits Windows Explorer Processes for Stealth and Delayed Detection Source: cybersecuritynews.com/spankrat-exploโ€ฆ A newly identified two-component Remote Access Trojan (RAT) toolkit built in Rust, dubbed SpankRAT, is being used by threat actors to abuse legitimate Windows

๐Ÿšจ SpankRAT Exploits Windows Explorer Processes for Stealth and Delayed Detection 

Source: cybersecuritynews.com/spankrat-exploโ€ฆ

A newly identified two-component Remote Access Trojan (RAT) toolkit built in Rust, dubbed SpankRAT, is being used by threat actors to abuse legitimate Windows
Huntress (@huntresslabs) 's Twitter Profile Photo

Tanner Curity John Hammond These invocations followed after typical enumeration commands: โ†’ whoami /priv โ†’ cmdkey /list โ†’ net group and others that indicate hands-on-keyboard threat actor activity. Huntress has isolated the affected organization to prevent further post-exploitation.

Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

๐Ÿšจ Hackers Use Nightmare-Eclipse Tools After Compromising FortiGate SSL VPN Access Source: cybersecuritynews.com/nightmare-ecliโ€ฆ A real-world intrusion campaign leveraging publicly available Nightmare-Eclipse privilege escalation tooling, BlueHammer, RedSun, and UnDefend, following what

๐Ÿšจ Hackers Use Nightmare-Eclipse Tools After Compromising FortiGate SSL VPN Access 

Source: cybersecuritynews.com/nightmare-ecliโ€ฆ

A real-world intrusion campaign leveraging publicly available Nightmare-Eclipse privilege escalation tooling, BlueHammer, RedSun, and UnDefend, following what
Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

โš ๏ธ CrowdStrike LogScale Vulnerability Allows Remote Attackers to Read Files from Server Source: cybersecuritynews.com/crowdstrike-loโ€ฆ An urgent security advisory for a critical unauthenticated path-traversal vulnerability (CVE-2026-40050) affecting its LogScale platform, warning that a

โš ๏ธ CrowdStrike LogScale Vulnerability Allows Remote Attackers to Read Files from Server 

Source: cybersecuritynews.com/crowdstrike-loโ€ฆ

An urgent security advisory for a critical unauthenticated path-traversal vulnerability (CVE-2026-40050) affecting its LogScale platform, warning that a
Dark Night (@dark_night263) 's Twitter Profile Photo

๐—•๐—˜๐—ฆ๐—ง ๐—ข๐—ฆ๐—œ๐—ก๐—ง ๐—ง๐—ข๐—ข๐—Ÿ๐—ฆ ๐Ÿ” (๐—ช๐—ถ๐˜๐—ต ๐—จ๐—ฅ๐—Ÿ๐˜€ ๐ŸŒ + ๐—ฃ๐˜‚๐—ฟ๐—ฝ๐—ผ๐˜€๐—ฒ ๐ŸŽฏ) 1๏ธโƒฃ Shodan ๐Ÿ”— shodan.io ๐ŸŽฏ Finds internet-connected devices (cameras, servers, IoT) 2๏ธโƒฃ Censys ๐Ÿ”— search.censys.io ๐ŸŽฏ Scans internet assets & SSL certificates 3๏ธโƒฃ Criminal IP ๐Ÿ”—

Dark Night (@dark_night263) 's Twitter Profile Photo

๐Ÿ›ก๏ธ ๐—›๐—ฎ๐—ฐ๐—ธ๐—ฒ๐—ฟ ๐—ฆ๐—ฒ๐—ฎ๐—ฟ๐—ฐ๐—ต ๐—˜๐—ป๐—ด๐—ถ๐—ป๐—ฒ๐˜€ (๐—ข๐—ฆ๐—œ๐—ก๐—ง) ๐ŸŒ Infra โ€ข Shodan โ€” Find exposed devices shodan.io โ€ข Censys โ€” Internet-wide asset view censys.io โ€ข FOFA โ€” Asset discovery fofa.info โ€ข ZoomEye โ€” Attack surface mapping

vxdb (@vxdb) 's Twitter Profile Photo

If you wanna stay on top of cybersecurity news, you need these sites in your RSS reader BleepingComputer DarkReading RecordedFuture - The Record SecurityWeek DataBreachedNet TheRegister HackerNews (hit or miss) KrebsOnSecurity 404Media ArsTechnica TechDirt

Simons (@simon_ingari) 's Twitter Profile Photo

Format a 16 GB USB drive. Open it. All files deleted. Take it to IT guy All 16 GB of files are restored. Where were they stored?

HackManac (@h4ckmanac) 's Twitter Profile Photo

๐ŸšจCyber Alert โ€ผ๏ธ ๐Ÿ‡บ๐Ÿ‡ธUS - ๐—จ๐—ฑ๐—ฒ๐—บ๐˜† ShinyHunters claims to have breached Udemy, with over 1.4M records compromised, including PII and other internal corporate data. Threat actor: ShinyHunters Sector: Education Data exposure (claimed): 1,400,000 records Data type: Personal data

๐ŸšจCyber Alert โ€ผ๏ธ

๐Ÿ‡บ๐Ÿ‡ธUS - ๐—จ๐—ฑ๐—ฒ๐—บ๐˜†

ShinyHunters claims to have breached Udemy, with over 1.4M records compromised, including PII and other internal corporate data.

Threat actor: ShinyHunters
Sector: Education
Data exposure (claimed): 1,400,000 records
Data type: Personal data
Dark Night (@dark_night263) 's Twitter Profile Photo

โšก ๐Ÿญ๐Ÿฎ ๐—˜๐—ฆ๐—ฆ๐—˜๐—ก๐—ง๐—œ๐—”๐—Ÿ ๐—–๐—ฌ๐—•๐—˜๐—ฅ๐—ฆ๐—˜๐—–๐—จ๐—ฅ๐—œ๐—ง๐—ฌ ๐—ฆ๐—ž๐—œ๐—Ÿ๐—Ÿ๐—ฆ ๐—ง๐—›๐—”๐—ง ๐——๐—˜๐—™๐—œ๐—ก๐—˜ ๐— ๐—ข๐——๐—˜๐—ฅ๐—ก ๐—ฆ๐—˜๐—–๐—จ๐—ฅ๐—œ๐—ง๐—ฌ ๐—˜๐—ซ๐—ฃ๐—˜๐—ฅ๐—ง๐—ฆ

โšก ๐Ÿญ๐Ÿฎ ๐—˜๐—ฆ๐—ฆ๐—˜๐—ก๐—ง๐—œ๐—”๐—Ÿ ๐—–๐—ฌ๐—•๐—˜๐—ฅ๐—ฆ๐—˜๐—–๐—จ๐—ฅ๐—œ๐—ง๐—ฌ ๐—ฆ๐—ž๐—œ๐—Ÿ๐—Ÿ๐—ฆ ๐—ง๐—›๐—”๐—ง ๐——๐—˜๐—™๐—œ๐—ก๐—˜ ๐— ๐—ข๐——๐—˜๐—ฅ๐—ก ๐—ฆ๐—˜๐—–๐—จ๐—ฅ๐—œ๐—ง๐—ฌ ๐—˜๐—ซ๐—ฃ๐—˜๐—ฅ๐—ง๐—ฆ