May 9, 2025
May 9, 2025
Russian hackers are interested in chaos and money, says NATO CCDCOE director
— 780th Military Intelligence Brigade (Cyber) (@780thC) May 8, 2025
May 8, 2025, ERR | Estoniahttps://t.co/HibxWpGMWg | Russian cyberattacks against Ukraine have also caused global economic damage.
What keeps kernel shadow stack effective against kernel exploits? by @standa_t https://t.co/07GomwRJWC
— Alex Plaskett (@alexjplaskett) May 8, 2025
EXCLUSIVE: Bryan Vorndran, who has helped guide the FBI to be more aggressive in disrupting malicious hackers and cybercrime gangs, will retire from the agency soon.
— Martin Matishak (@martinmatishak) May 8, 2025
On @TheRecord_Media https://t.co/VII8U8IKIp
Qtap: An eBPF agent that captures pre-encrypted network traffic, providing rich context about egress connections and their originating processes.
GitHub - qpoint-io/qtap: Qtap: An eBPF agent that captures pre-encrypted network traffic, providing rich context about egress connections and their originating processes.
Qtap: An eBPF agent that captures pre-encrypted network traffic, providing rich context about egress connections and their originating processes. - qpoint-io/qtap

Cloud Egress : Your Biggest Blindspot | Qpoint
See Through Encryption to Map Dependencies, Identify Sensitive Data Sharing, and Enforce Egress Controls
an ai system is the top hacker at h1 us leaderboard pic.twitter.com/3xykSJECBi
— mbg (@mbrg0) May 8, 2025
Lockbit ransomware group has been compromised. Their backend panel was dumped.
— vx-underground (@vxunderground) May 8, 2025
You can see my build logs in the data dump.
Lockbit gave me access after I sent him a bunch of cat pictures. pic.twitter.com/G1F3mhs6u7
How Ransomware Groups Got In: @rapid7 MDR’s Top Initial Access Vectors from Q1 2025.
— Jon Hencinski (@jhencinski) May 8, 2025
Top Initial Access Vectors
- Account Compromise (No MFA)
- Vuln Exploitation (all known, patchable)
- Brute Forcing
- Exposed RDP
- SEO Poisoning
What our #MDR team saw in real-world…
Tariffs just got real: our first $36K bill with 125% + 20% + 25% markup hits hard 💸. These are upfront costs - due before selling a single unit - causing serious cash flow strain, price increases, read more! 📦 https://t.co/G8uZX97sQC#Tariffs pic.twitter.com/LNN2p0Gkym
— adafruit industries (@adafruit) May 8, 2025
Latest #Pakistan's #SideCopy #APT Targeting #Indian Govt. entities with the python-based #Ares #RAT Malware
— Cyber Team (@Cyberteam008) May 8, 2025
Infra: https://t.co/SkNQlxfrio
Note: Infection chain of the campaign and other details are explained in the screenshot.@500mk500 @PrakkiSathwik #Malware #ioc pic.twitter.com/fAgWGKDuSy
I've exported the chats from the #lockbit #ransomware #databreach into an easier to read text format. I hate MySQL formating and it's honestly an eye sore as was the JSON
— Evil Rabbit Security Inc. (@EvilRabbitSec) May 8, 2025
Updated files: https://t.co/Y4GoO00FZA
JSON output is in the thread.
cc @vxdb @DarkWebInformer… pic.twitter.com/4sAFSFUAal
with offensivecon around the corner, i figured id write another post on linux kernel exploitation techniques - this time i cover the world of page table exploitation! enjoy 🤓https://t.co/dqW9eMJkVI
— sam4k (@sam4k1) May 7, 2025
Oh cool a hit infosec tweet, is it:
— Josh (@passthehashbrwn) May 8, 2025
A) an existing technique rewritten in a useless language
B) a "new" EDR killer
C) a "new" byte patch
D) engagement farming account reposting old blogs
Math major possible career paths:
— Mac Lane’s Strongest Soldier (@1969itS) May 8, 2025
- quant
- programmer
- grad student
- pope https://t.co/eFjWwsomTy
— es3n1n (@es3n1n) May 8, 2025
Want to be even more depressed?
— Rachel Blum (@groby) May 9, 2025
For a 6.2GHz CPU (i9-14900KS), data can travel at most 4.8 cm/cycle. (1.9 in/cycle in uncivilized units)
Keep your DRAM close, and your cache closer. https://t.co/sB1JurSlTV

DOGE software engineer’s computer infected by info-stealing malware - Ars Technica
The presence of credentials in leaked “stealer logs” indicates his device was infected.
Daax, being the traditional memesteroni he is, shared a cool proof-of-concept which demonstrates how to get a pointer to the Process Environment Block without using the GS and/or FS register.
— vx-underground (@vxunderground) May 7, 2025
Look at the full thread. It's interesting. https://t.co/iUDdlXfOxb
Unlock forbidden Windows knowledge! 🤫💻
— Daax (@daaximus) May 4, 2025
Find the PEB through truly undetected means and pop calculator 💥
The non-golf form will be available below 👇#redteamtips #windowsinternals #rust pic.twitter.com/aEIm6ZNDHu
