January 14, 2025
January 14, 2025
Already 1.7 million views and 19k likes in 19 hours... And of course the mentioned .exe is not seems malware at all.
— MalwareHunterTeam (@malwrhunterteam) January 13, 2025
🤷♂️ pic.twitter.com/0nVflr00xI
Thread:
Thread by @malwrhunterteam on Thread Reader App – Thread Reader App
@malwrhunterteam: Already 1.7 million views and 19k likes in 19 hours... And of course the mentioned .exe is not seems malware at all. 🤷♂️ "using Russian-language elements to obscure its origin or intent" ??? 😂 🤦♂...…
Don't believe everything you read on the internet - the said "malware" is literally just an SFX driver installer for the Corechip SR9900 Ethernet adapter.
— 安坂星海 Azaka || VTuber (@AzakaSekai_) January 13, 2025
This is yet another case of a laymen running the installer on https://t.co/PFhJZf6gjx and reading the report aloud. pic.twitter.com/Lgr8IbYQAs
🧵 My Key Takeaways from counter-ransomware activities in 2024 🔍
— Will (@BushidoToken) January 13, 2025
Read the blog for more details:https://t.co/Fl9sQ3Rzu2#cybercrime #ransomware #lockbit pic.twitter.com/83dmxnyHM8
Everyone likes to analyze "good" bugs, such as those found exploited ITW etc. But some of my most interesting discoveries were made analyzing (on the first glance) "bad"/noninteresting bugs.
— Ivan Fratric 💙💛 (@ifsecure) January 13, 2025
Finding the real IP behind Cloudflare has never been so easy. Here you are a tool to search on @shodanhq starting from a simple favicon
— Md Ismail Šojal (@0x0SojalSec) January 12, 2025
- https://t.co/TSCW2Pz8Ih#infosec #cybersec #bugbountytips pic.twitter.com/RGpnegmrN6
"Beej’s Guide to Network Programming"
— katzz (@0xkatzz) January 13, 2025
A decades-old classic for learning about Network Programming in C (it's still updated regularly!).
Covers fundamental topics such as TCP/IP, UDP, DNS, client-server & more with clear examples, bridging the gap between theory & practice. pic.twitter.com/SDyP4UfdCO
https://beej.us/guide/bgnet/pdf/bgnet_usl_c_1.pdf
I did not know this was still updated. That’s wild. I remember reading this back when we had to bang rocks together to make ones and zeroes.
Good thread on the new AI diffusion rules. The section on AI and cyber security is reasonable and references existing USG guides and standards on cyber security vs trying to define new criteria. Perhaps the most unique aspect of these requirements is in section 15(iii) which… https://t.co/NX47fuGjqd
— chrisrohlf (@chrisrohlf) January 13, 2025
Indtroducing: What is this stealer?
— Fred HK (@fr3dhk) January 13, 2025
A new repository that allows for you to identify Stealer malware by the system information text file format commonly included in stealer malware exfiltration.
We encourage everyone to check it out and contribute!https://t.co/PWvlGIXJpi
LeMonde investigation finds that members of a French nuclear-armed submarine crew inadvertently shared sensitive information about the patrol schedule of the ship via the Strava workout app: https://t.co/DJw9VuACV4
— Sean Lyngaas (@snlyngaas) January 13, 2025
Hilarious.
Breaking from @hntrbrkmedia: China’s DJI, the world's largest drone manufacturer, has disabled U.S. geofencing on its drones, enabling flights over airports, military bases, and no-fly zones.
— OSINTtechnical (@Osinttechnical) January 14, 2025
DJI says it is putting “control back in the hands of the drone operators” pic.twitter.com/UGqDi8zjhP
🆕️ MI5 file release, including new details in the cases of the Cambridge spies Kim Philby, Anthony Blunt, and John Cairncross, shedding light on related cases including Constantin Volkov, and Philby’s first wife Litzi ⏬️https://t.co/V9GTGYBP66
— Dr. Dan Lomas (@Sandbagger_01) January 14, 2025
"The Fuzzing Book"
— Md Ismail Šojal (@0x0SojalSec) January 12, 2025
- https://t.co/2q94hg59Qx#infosec #cybersec #bugbountytip
— Shibetoshi Nakamoto (@BillyM2k) January 13, 2025
Jailbreak your Enemies with a Link : Remote Execution on iOS : https://t.co/QSQmaTvSYP
— Binni Shah (@binitamshah) January 12, 2025
How WebKit Memory Corruption Works : https://t.co/SJtDQP0PSb