Casperinous Profile Banner
Casperinous Profile
Casperinous

@Casperinous

Followers
675
Following
18K
Media
442
Statuses
15K

Joined February 2013
Don't wanna be here? Send us removal request.
@aall86
Andrea Allievi
11 days
https://t.co/txBlxmMa61 Anti-cheat evolution in Windows... New Year post while I am in vacation is ready!!! πŸŽ‰ Happy 2026!
1
38
91
@pedestrian
ARTIFAXING
15 days
11
1K
13K
@cimmerian_v
Cimmerian Pervert
20 days
β€œSo much fog.” β€œWhat can Santa do against such hateful weather?” β€œRide out with me.”
92
3K
32K
@LinuxHandbook
Linux Handbook
21 days
"Just use the command line" Gen Z devops who has always used drag and drop tools πŸ‘‡
16
28
556
@_winterknife_
winterknife 🌻
1 month
Whether you're learning x86 instruction encoding or writing YARA rules, ZydisInfo is an amazing (yet slightly underrated) tool for the job.
4
81
588
@_CPResearch_
Check Point Research
1 month
πŸ€ Cracking ValleyRAT: From Builder Secrets to Kernel Rootkits CP<r> reveals: πŸ” Full #ValleyRAT/#Winos teardown 🧩 Leaked builder + artifacts mapped to all plugins πŸ› οΈ Win11-loadable kernel rootkits πŸ’₯ Stealthy driver install, APC injection, AV/EDR wipe https://t.co/RLKgbRYjXx
Tweet card summary image
research.checkpoint.com
Highlights: Introduction Throughout 2025, we conducted and published several reports related to our research on the Silver Fox APT. In some of them (for example,Β here), the threat actor delivered the...
1
27
93
@___prosti
Gabriel Prostitis
1 month
stop using ubuntu 24.04 to host your kernel pwn challenges lmao https://t.co/uCCNthelDn
5
86
575
@abuse_ch
abuse.ch
1 month
MaksRAT HKCU\Software\Microsoft\Windows\CurrentVersion\Run\javacom Botnet C2s πŸ“‘ 104.198.24 .41:6656 avocado .gay www.foldacces .online www.makslove .xyz www.mavenrat .xyz www.blackprofit .online Malware sample shared by @smica83 πŸ’ͺ https://t.co/PaORPNKhNU IOCs are available
2
17
56
@Intel471Inc
Intel 471
1 month
Intel 471 observed a new Android banking trojan impersonating an mBank security app in Poland. We named it FvncBot, noting a new codebase and capabilities used for mobile #fraud. Read the full analysis: https://t.co/mUwGZXqpOH #cybersecurity #threatintel #cybercrime
Tweet card summary image
intel471.com
Intel 471 discovered a new Android trojan, FvncBot, that masquerades as a security application for mBank, a major Polish bank. Our Malware Intelligence team analyzed its code, which is new and not...
0
8
11
@abuse_ch
abuse.ch
1 month
Mirai botnet #zerobot spreading through 172.86.123.179 (cloudzy πŸ‡¦πŸ‡ͺ) ‡️ Mirai botnet C2 domain: 0bot.qzz .io (Gandi SAS πŸ‡«πŸ‡·) Mirai botnet C2 server: 140.233.190.96:69 (Internet Magnate πŸ‡ΏπŸ‡¦) Payload URLs: 🌐 https://t.co/ZuY2xTCiTE Mirai malware sample: πŸ€– https://t.co/5bz3ENhodv
0
11
42
@Threatlabz
Zscaler ThreatLabz
1 month
Zscaler ThreatLabz has published a technical analysis of Matanbuchus version 3.0 and has observed recent deployments consistent with hands-on-keyboard ransomware operations. This new version of Matanbuchus implements a number of obfuscation techniques to evade detection such as
1
27
98
@gadievron
Gadi Evron
1 month
Introducing RAPTOR, an Autonomous Offensive/Defensive Research Framework based on Anthropic's Claude Code, written by @dcuthbert, @halvarflake, @mbrg0, and myself. Let's rock. Get it from GitHub, here:
Tweet card summary image
github.com
Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents, and skills, and orchestrating security tool usage, we confi...
13
121
585
@abuse_ch
abuse.ch
2 months
We’ve identified an interesting malware family πŸ”, which we’ve named #GrokPy due to its use of a Grok LLM model πŸ€– to solve and subsequently bypass CAPTCHAs πŸ”₯ The malware gets dropped by #Amadey and: πŸͺ collects information about the infected device, such as screen
4
43
132
@hexacon_fr
Hexacon
2 months
If you missed HEXACON 2025 or want to rewatch some of the talks, they’re now available on our YouTube channel πŸ“½οΈ Enjoy the content, and see you in 2026! https://t.co/KHHVAGY48M
Tweet card summary image
youtube.com
1
58
133
@Threatlabz
Zscaler ThreatLabz
2 months
Zscaler ThreatLabz has discovered CVE-2025-50165 in the Microsoft Windows Graphics Component. With a CVSS score of 9.8, this vulnerability enables attackers to execute arbitrary code using a specially crafted JPEG image that can be triggered by any application that leverages the
12
165
551
@spamhaus
Spamhaus
2 months
ENDGAME 3.0 REMEDIATION | Following on from the πŸ“’ announcement last week Spamhaus is now sending notification emails πŸ“© to ISPs associated with infected machines. Here's what to do if you receive one: πŸ‘‰ Go to this remediation webpage: https://t.co/05by7QtU9d πŸ‘‰ Enter the
spamhaus.org
0
7
22
@abuse_ch
abuse.ch
2 months
Yet another new stealer in town: #ArkanixStealer πŸ”₯ %AppData%\Arkanix_lol\history.json %AppData%\Arkanix_lol\system_info.json %AppData%\Arkanix_lol\screenshot_monitor_1.png Akranix botnet C2: πŸ“‘ https://arkanix .pw/api/session/create πŸ“‘ https://arkanix .pw/delivery
4
30
146
@HexRaysSA
Hex-Rays SA
2 months
⌨️ Introducing HCLI: The Modern Command-Line Interface for IDA. Automate workflows, simplify plugin development across platforms, manage licenses and more. https://t.co/1PWeVZmePY
0
48
133