Huntio Profile Banner
Hunt.io Profile
Hunt.io

@Huntio

Followers
4K
Following
222
Media
62
Statuses
890

https://t.co/9I6nRUiFjm is a service that provides threat intelligence data about observed network scanning and cyber attacks.

United States
Joined June 2023
Don't wanna be here? Send us removal request.
@Huntio
Hunt.io
1 day
๐Ÿšฉ New SAP NetWeaver Bug Lets Attackers Access Sensitive Data and Execute Commands https://t.co/1Acs20Ztbt Researchers report a critical flaw in SAP NetWeaver that can be abused to read sensitive configuration and business data and, in some cases, achieve remote command
Tweet card summary image
securityaffairs.com
SAP addressedย 13 new flaws, including a maximum severity vulnerability in SAP NetWeaver, which could lead to arbitrary command execution.
0
6
9
@Huntio
Hunt.io
2 days
๐Ÿšฉ Threat Actors Abuse Blockchain Smart Contracts to Spread Malware via WordPress Sites https://t.co/4GbzLlm7Ty Threat actor UNC5142 is leveraging smart contracts on public chains (via an โ€œEtherHidingโ€ technique) alongside compromised WordPress sites to distribute
0
2
6
@Huntio
Hunt.io
2 days
๐Ÿ’ก What is The Value of Threat Hunting Playbooks? https://t.co/OBdH8m7zvu For experienced defenders, the challenge isnโ€™t knowing what to hunt; itโ€™s executing hunts consistently, efficiently, and with measurable outcomes. Threat hunting playbooks solve this by providing a
Tweet card summary image
hunt.io
Explore the best threat hunting playbooks built from real operations to speed up detection, improve workflows, and strengthen defense.
0
1
4
@StixPhish
Phish Stix
3 days
@HackingLZ @ex_raritas @Huntio +1 for huntio. Especially after Censys changed its business model to exclude us poors.
1
2
3
@Huntio
Hunt.io
2 days
๐Ÿšฉ Researchers Expose TA585โ€™s โ€œMonsterV2โ€ Malware Campaign https://t.co/WZviXNnYxG A sophisticated cybercrime actor TA585, has been found running end-to-end phishing campaigns that deliver the high-end โ€œMonsterV2โ€ stealer/RAT/loader, managing its own infrastructure and
Tweet card summary image
infosecurity-magazine.com
A newly identified cybercrime group TA585 is running an advanced cyber operation distributing MonsterV2 malware
0
5
7
@Huntio
Hunt.io
3 days
โš ๏ธ Two New Windows Zero-Days Exploited in the Wild https://t.co/McHJNHNkOw Microsoft has confirmed two actively exploited zero-day vulnerabilities: CVE-2025-24990 (a privilege escalation in the Agere modem driver present in all Windows versions) and CVE-2025-59230 (an
Tweet card summary image
thehackernews.com
Microsoftโ€™s October 2025 Patch Tuesday fixes 183 flaws, including three exploited zero-days and two 9.9 CVSS bugs.
0
53
168
@Huntio
Hunt.io
3 days
๐ŸŽฏ ๐—™๐—ฟ๐—ผ๐—บ ๐— ๐˜‚๐—ป๐—ถ๐˜๐—ถ๐—ผ๐—ป๐˜€ ๐˜๐—ผ ๐— ๐—ฎ๐—น๐˜„๐—ฎ๐—ฟ๐—ฒ: ๐—๐—ผ๐˜€๐—ฒ๐—ฝ๐—ต ๐—›๐—ฎ๐—ฟ๐—ฟ๐—ถ๐˜€๐—ผ๐—ป ๐—ผ๐—ป ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐——๐—ฒ๐˜๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป & ๐——๐—ถ๐—ด๐—ถ๐˜๐—ฎ๐—น ๐—™๐—ผ๐—ฟ๐—ฒ๐—ป๐˜€๐—ถ๐—ฐ๐˜€ From the Air Force munitions field to leading threat detection ops at EY, Joseph Harrisonโ€™s journey shows how discipline,
Tweet card summary image
hunt.io
In this interview, Joseph Harrison shares how his Air Force-minted discipline fuels his work in threat detection and digital forensics, and how he leverages Hunt.ioโ€™s data (especially JA4) to catch...
0
4
7
@HackingLZ
Justin Elze
4 days
Come get your pentester/CTF player
4
6
49
@volrant136
Demon
3 days
#APT #Sidewinder using #New #Exfiltration #Server in Phising Campaign Targeting #Srilanka 1/ @Huntio tracked a new collection server "mailsserver-lk[.]com" in recent sightings in 3 attacks. Observed PDF: WPS NAP 5th Core Steering comm -Meeting Minute.pdf
1
8
14
@Huntio
Hunt.io
3 days
๐Ÿšฉ North Korean Hackers Merge BeaverTail & OtterCookie into a Single Advanced JS Malware https://t.co/mc5inLhJ6e Researchers at Cisco Talos found a North Korea-aligned actor refining its tool-kit by combining features of the BeaverTail info-stealer and the OtterCookie backdoor
Tweet card summary image
thehackernews.com
OtterCookie v5 merges BeaverTail features with new keylogging and blockchain-based C2 tactics.
0
2
4
@Huntio
Hunt.io
4 days
โš ๏ธ WatchGuard Fireware Vulnerability Permits Unauthenticated Code Execution (CVE-2025-9242) https://t.co/Mycm9VYD6m A critical out-of-bounds write vulnerability in the Fireware OS iked process allows remote, unauthenticated attackers to execute arbitrary code on Firebox
Tweet card summary image
securityaffairs.com
A critical WatchGuard Fireware vulnerability, tracked as CVE-2025-9242, could allow unauthenticated code execution.
1
2
3
@Huntio
Hunt.io
4 days
These sites were designed to harvest credentials by mimicking login pages, especially Zimbra webmail panels, and then sent captured data to centralized collection infrastructure such as mailbox3-inbox1-bd[.]com. Read our findings โžก๏ธ https://t.co/H3uDmGmIDA #ThreatHunting
Tweet card summary image
hunt.io
APT Sidewinder targets South Asian government and military portals using Netlify-hosted phishing pages to harvest credentials. Learn more.
0
1
6
@Huntio
Hunt.io
4 days
๐ŸŒ Two months ago, we uncovered APT Sidewinderโ€™s use of Netlify and Pages[.]dev hosting platforms to deploy phishing portals that impersonated government and defense agencies throughout South Asia. โฌ‡๏ธ https://t.co/H3uDmGmIDA #MalwareAnalysis #SecurityResearch
Tweet card summary image
hunt.io
APT Sidewinder targets South Asian government and military portals using Netlify-hosted phishing pages to harvest credentials. Learn more.
2
10
35
@Huntio
Hunt.io
4 days
Each directory listing reveals the malware type, file count, country, size, and hosting provider. From there, researchers can pivot deeper, analyzing associated MITRE ATT&CK techniques or identifying related malware families like Meterpreter or Bulz. See how Hunt detects live
Tweet card summary image
hunt.io
Book your free Threat Hunting platform demo with Hunt today. Help your security team expose attackers, find C2 servers, IOCs, and malware in directories.
0
0
2
@Huntio
Hunt.io
4 days
๐Ÿ“Œ ๐—™๐—ถ๐—ป๐—ฑ๐—ถ๐—ป๐—ด ๐—–๐—ผ๐—ฏ๐—ฎ๐—น๐˜ ๐—ฆ๐˜๐—ฟ๐—ถ๐—ธ๐—ฒ ๐—ถ๐—ป ๐˜๐—ต๐—ฒ ๐—ช๐—ถ๐—น๐—ฑ ๐˜„๐—ถ๐˜๐—ต ๐—”๐˜๐˜๐—ฎ๐—ฐ๐—ธ๐—–๐—ฎ๐—ฝ๐˜๐˜‚๐—ฟ๐—ฒโ„ข Huntโ€™s AttackCaptureโ„ข feature continuously monitors open directories to identify active malware infrastructure. Using advanced signature detection and tagging, it flags Cobalt
1
7
17
@Huntio
Hunt.io
5 days
๐Ÿšฉ New .NET โ€œCAPI Backdoorโ€ Targets Russian Auto & E-Commerce Firms via Phishing ZIPs https://t.co/2EylQ7OuL7 Security researchers at Seqrite Labs uncovered a novel backdoor written in .NET that abuses the Windows Cryptographic API (CAPI) and uses instances of rundll32.exe to
Tweet card summary image
thehackernews.com
Seqrite Labs reveals CAPI Backdoor malware targeting Russian firms via phishing ZIPs and rundll32.exe.
0
4
12
@Huntio
Hunt.io
5 days
๐Ÿ“– If youโ€™re still relying on static IOCs, youโ€™re missing the real picture. Our free eBook, Modern Threat Hunting, provides a repeatable framework for uncovering adversary infrastructure at scale, utilizing methods such as certificate tracking, IOC pivoting, C2 detection, and
Tweet card summary image
hunt.io
Download our free eBook and learn how to uncover adversary infrastructure at scale in 10 practical, repeatable steps.
0
9
26
@Huntio
Hunt.io
5 days
You can query by tags, malware names, ports, or host providers and instantly return captures with detailed metadata: file structures, timestamps, confidence scores, and enrichment data. Book a demo and get access to your API โžก๏ธ https://t.co/YJzGDkh8LJ #ThreatHunting
Tweet card summary image
hunt.io
Book your free Threat Hunting platform demo with Hunt today. Help your security team expose attackers, find C2 servers, IOCs, and malware in directories.
0
0
1
@Huntio
Hunt.io
5 days
๐Ÿ“Œ ๐—”๐˜๐˜๐—ฎ๐—ฐ๐—ธ๐—–๐—ฎ๐—ฝ๐˜๐˜‚๐—ฟ๐—ฒโ„ข ๐—Ÿ๐—ถ๐˜€๐˜๐—ถ๐—ป๐—ด ๐—”๐—ฃ๐—œ ๐—˜๐—ป๐—ฑ๐—ฝ๐—ผ๐—ถ๐—ป๐˜ ๐—ง๐—ผ ๐—™๐—ถ๐—น๐˜๐—ฒ๐—ฟ ๐—ช๐—ต๐—ฎ๐˜ ๐— ๐—ฎ๐˜๐˜๐—ฒ๐—ฟ๐˜€ When investigating, context is everything. The AttackCaptureโ„ข Listing endpoint lets you filter Huntโ€™s dataset to find exactly what youโ€™re looking for - malware
1
1
3
@Huntio
Hunt.io
6 days
โš ๏ธ Chinese Threat Actors Exploit ArcGIS Server Zero-Day for Geo-Spatial Data Theft https://t.co/bQu1Z8H4Oy Nation-state actors have been exploiting a critical vulnerability in ArcGIS Server to gain remote code execution and extract sensitive infrastructure-mapping data used for
Tweet card summary image
thehackernews.com
Chinese hackers used a modified ArcGIS server to maintain hidden access for over a year.
0
12
27