Biggins 🐀 (@wimothyjiggins) 's Twitter Profile
Biggins 🐀

@wimothyjiggins

Intelligence Lead - Healthcare. Cyber Hygiene Cultist. (Threat) Landscape painter. All views are those of my infernal host.

ID: 1482201336368492546

calendar_today15-01-2022 04:02:04

711 Tweet

63 Takipçi

189 Takip Edilen

Dr David Robert Grimes (@drg1985) 's Twitter Profile Photo

60 years ago today on the 27th October 1962, human life on Earth came the closest it has ever come to a terrible ending. Everyone alive today owes their life to this handsome devil, and most of us don't even know his name. Let's change that - a thread 🧵

60 years ago today on the 27th October 1962, human life on Earth came the closest it has ever come to a terrible ending. Everyone alive today owes their life to this handsome devil, and most of us don't even know his name. Let's change that - a thread 🧵
alex 🐀 (@tinysnekcomics) 's Twitter Profile Photo

why would i pay $8 to get a blue check if i could put a rat next to my name for free??? i’m calling on everyone to join me in becoming #RatVerified

Cryptolaemus (@cryptolaemus1) 's Twitter Profile Photo

🚨Emotet back in Distro Mode🚨 - As of 0800 UTC E4 began spamming and as of 0930 UTC E5 began spamming again. Looks like Ivan is in need of some cash again so he went back to work. Be on the lookout for direct attached XLS files and zipped and password protected XLS. 1/x

Chris Sanders 🔎 🧠 (@chrissanders88) 's Twitter Profile Photo

When an attacker gains initial access to a system on a network, common actions are: 1. Scanning the network for pivot targets 2. Pillaging the system for valuable files 3. Stealing credentials from the system Each provides an opportunity for honeypot-based detection 🧵 1/

Matt Zorich (@reprise_99) 's Twitter Profile Photo

The yearly Microsoft Digital Defense report is out - aka.ms/mddr - always worth a read if you want to see global trends in cyber security from what we are seeing here at Microsoft.

Biggins 🐀 (@wimothyjiggins) 's Twitter Profile Photo

The wildest part of western citizens growing fascination with fascism, nazi-esque beliefs and anti-semitism is how many of their grandfather's likely spilt blood (theirs and others) in across the globe to squash regimes that thought just like that. Truly bizarre to see.

Josh Duffney (@joshduffney) 's Twitter Profile Photo

Grokking algorithms is by far the best resource I’ve found for someone without a CS degree for understanding basic algorithms and data structures. 💯

Grokking algorithms is by far the best resource I’ve found for someone without a CS degree for understanding basic algorithms and data structures. 💯
Germán Fernández (@1zrr4h) 's Twitter Profile Photo

#Truebot botnet 🔦 (#Silence) 1039 bots distributed in 111 countries 🌐 At least 83 domains belong to governments and 3 are military domains (potential victims). LATAM 🔥 REF: microsoft.com/en-us/security… + Raspberry Robin > Truebot > Clop ransomware 🚨

#Truebot botnet 🔦 (#Silence)
1039 bots distributed in 111 countries 🌐

At least 83 domains belong to governments and 3 are military domains (potential victims).

LATAM 🔥

REF: microsoft.com/en-us/security…
+ Raspberry Robin > Truebot > Clop ransomware 🚨
vx-underground (@vxunderground) 's Twitter Profile Photo

vx-underground has obtained exclusive footage of the British government interviewing a world famous cyber-criminal with deep affiliations to the chinese hacker known as Lympfao

Greg Lesnewich (@greglesnewich) 's Twitter Profile Photo

#100DaysofYARA #100DaysofYARA2 gang! We've got a game plan for Jan 1! 100 Days of YARA is a self-enforced challenge to learn YARA for the first time, or learn new techniques for creating rules, or submit rules for cool malware you've observed! 🧵

Allison Wikoff (@saltywikoff) 's Twitter Profile Photo

PwC's #threatintel team published our reporting on Russia-based TA #BlueCallisto (aka #TAG53 #SEABORGIUM #Callisto). Though they have included Ukrainian targeting in their operations, they've maintained a focus on US gov't orgs including Nat'l labs (1/2) pwc.com/gx/en/issues/c…