February 15, 2024
February 15, 2024
https://vault.fbi.gov/kevin-mitnick/kevin-mitnick-part-01-final/viewWhen I heard Musk say this on Tuesday, my assumption was that it was a programming issue. Because I can code and have written to databases and because I am familiar with other examples of default values being misinterpreted. Yet somehow Musk isn't.
— Philip Bump (@pbump.com) 2025-02-14T13:39:32.051Z
It was never satire
— Cool Rick (@deadseriousrick.bsky.social) 2025-02-14T13:43:42.556Z
Does anyone know how to get around Venmo’s character limit? pic.twitter.com/duvV2m30u4
— Dan White (@atdanwhite) February 14, 2025
A repo on GitHub claims to have the source code of Brute Ratel and NightHawk. Haven’t tested/looked into it, but I thought many of you would be interested in it. https://t.co/rLqRWi9Miu
— Scoubi (@ScoubiMtl) February 14, 2025
GitHub - APTIRAN/C2: The repository of popular C2 (sources).
The repository of popular C2 (sources). Contribute to APTIRAN/C2 development by creating an account on GitHub.
ecdsa private key leak due to nonce reuse strikes again, this time in the elliptic npm library https://t.co/zs3FDpPWTL
— yan (@bcrypt) February 13, 2025
https://www.theregister.com/2025/02/14/chinese_spies_ransomware_moonlighting/?td=rt-3a
SiphonDNS : Covert data exfiltration via DNS : https://t.co/HiKkCZB5lT
— Binni Shah (@binitamshah) February 14, 2025
Repo : https://t.co/r1N4nwWt0f pic.twitter.com/tiAL4mAtmB
I can imagine how effective this lure is, and I hate it: https://t.co/puaJwSbs3m pic.twitter.com/zsngnd8BIE
— Brian in Pittsburgh (@arekfurt) February 14, 2025
Had this saved in the WIP folder forever
— Dylan🛡AttacktheSOC (@DylanInfosec) February 14, 2025
KQL for anti-forensics activitieshttps://t.co/3RhxxSLh4g
So much can be added to this. Think 3rd party tools to aid anti-forensics, browser forensics... too much to name
OMG, look at this😶updates to come! https://t.co/GVSKs19vWf
New Blog! Investigating Anonymous VPS services used by Ransomware Gangs
— Will (@BushidoToken) February 14, 2025
h/t to @drb_ra for lending me some of their C2 data! Made my life a lot easier 🫡
🔗 https://t.co/kAwKmzcnFi pic.twitter.com/zRdeFBsjuD
pic.twitter.com/PeBQSvD7mE Meta just published two papers showing they can decode thoughts into text with 80% accuracy, in real time, using non-invasive brain-computer interfaces. Thought-to-action is almost here.
— Chubby♨️ (@kimmonismus) February 14, 2025
Kurzweil was right, as always. Brain-computer chips are the future.
Endless Exploits: The Saga of a macOS Vulnerability Struck Nine Times by @patch1thttps://t.co/HwkGqdQjPZ
— Alex Plaskett (@alexjplaskett) February 14, 2025
We have been tracking multiple Russian APT groups aggressively targeting organizations with Microsoft Device Code authentication phishing. The attackers got creative with tricking users into granting them access to their accounts. Have a look at our blog for all the details. https://t.co/Xx5kD8cZjO
— Steven Adair (@stevenadair) February 14, 2025