Artsiom Holub Profile
Artsiom Holub

@Mesiagh

Followers
3K
Following
6K
Media
35
Statuses
2K

Security Research Analyst. Cyber Security Geek. Bookworm.

USA
Joined October 2015
Don't wanna be here? Send us removal request.
@urlscanio
urlscan.io
10 days
Think urlscan is only useful for phishing? Think again. We break down how urlscan Pro can be leveraged to identify exposed malware C2 admin panels and support infrastructure hunting. New intel report published on urlscan Pro now.
0
39
197
@PhillipWylie
Phillip Wylie
11 days
To help celebrate @arcanuminfosec Information Security's two-year anniversary, @Jhaddix gave me 5 codes good for any Arcanum course to give away! Winners will be announced on 1/22. πŸ‘ 1 Like = 1 Entry! ♻️ 1 Share = 2 Entries!
60
415
671
@RussianPanda9xx
RussianPanda 🐼 πŸ‡ΊπŸ‡¦
12 days
In other news, we just dropped a new blog on threat actors leveraging AI to write their half-ass working scripts and payloads. At this point I'm not even mad, just disappointed. πŸ™ƒ https://t.co/PrlOT6SfQs
12
21
129
@RussianPanda9xx
RussianPanda 🐼 πŸ‡ΊπŸ‡¦
17 days
NEW BLOG: The Great VM Escape πŸ’• We caught threat actors deploying a VMware ESXi exploit toolkit in the wild - potentially was a zero-day developed over a year before VMware's disclosure πŸ‘€ If anyone has thoughts on it let me know, but I needed almost a full case of beer to
Tweet card summary image
huntress.com
Huntress outlines a complex, multi-step attack designed to break out of guest VMs and target the ESXi hypervisor, using potential zero-day vulnerabilities and sneaky VSOCK communication.
22
186
761
@RussianPanda9xx
RussianPanda 🐼 πŸ‡ΊπŸ‡¦
1 month
New video dropped! πŸ€“ Vibe hunting through @ValidinLLC with no preparation at all, just pivoting on whatever looks interesting and seeing where it takes us πŸ‡πŸ•³οΈ We stumbled across SmartApe, SmokedHam, Mintsloader ... Also caught up with Kenneth, the mind behind Validin! 🧠
2
20
81
@IntCyberDigest
International Cyber Digest
2 months
β€ΌοΈπŸ‡°πŸ‡΅ Meet North Korean recruiter 'Aaron,' who infiltrates Western companies by using AI and posing as a remote IT worker using stolen or rented identities. He was lured into a sandbox by researchers, who observed the wild APT in a controlled setting to see what he would do.
32
471
3K
@gadievron
Gadi Evron
2 months
Introducing RAPTOR, an Autonomous Offensive/Defensive Research Framework based on Anthropic's Claude Code, written by @dcuthbert, @halvarflake, @mbrg0, and myself. Let's rock. Get it from GitHub, here:
Tweet card summary image
github.com
Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents, and skills, and orchestrating security tool usage, we confi...
13
120
585
@Mesiagh
Artsiom Holub
4 months
New shiny things = expanded attack surface. #LLM #MCP
@fr0gger_
Thomas Roccia 🀘
4 months
πŸ‘€ A malicious MCP server spotted in the wild! The Postmark MCP server (used to send and track emails through Postmark API) introduced a suspicious behavior in version 1.0.16. The attacker cloned the legitimate Postmark MCP code and added a malicious BCC line, then published it
0
0
2
@TheDFIRReport
The DFIR Report
4 months
🌟New report out today!🌟 From a Single Click: How Lunar Spider Enabled a Near Two-Month Intrusion Analysis/reporting completed by @RussianPanda, Christos Fotopoulos, Salem Salem, reviewed by @svch0st. Audio: Available on Spotify, Apple, YouTube and more! Report:⬇️
5
53
154
@fr0gger_
Thomas Roccia 🀘
4 months
πŸ‘€ New Microsoft threat report shows how attackers are using AI for evasion and obfuscation in a phishing campaign! One part is very interesting, the team spotted 5 AI fingerprints in the code. But instead of hiding the attack (the initial goal), these fingerprints actually
7
49
196
@mrgretzky
Kuba Gretzky
5 months
I foresee 2026 as a year of FIDO authentication downgrade attacks. πŸͺπŸŸ I discovered a universal method for downgrading secure MFA methods (passkeys, security keys) to less secure alternatives during phishing attacks. Enjoy the quick demo! 🎬
14
93
413
@fr0gger_
Thomas Roccia 🀘
5 months
And here is the complete video of the talk πŸ€“ https://t.co/CR2gNSc8sb
@fr0gger_
Thomas Roccia 🀘
5 months
πŸ€“ I just published my @AusCERT talk titled β€œGenerative AI Breaches: Threats, Investigations, and Response.” In this presentation, I explain how to protect and investigate AI breaches. Small thread πŸ§΅πŸ‘‡
0
22
87
@TalosSecurity
Cisco Talos Intelligence Group
6 months
The latest threat in the wild: A stealthy malvertising campaign spreading a powerful multi-stage malware Talos calls "PS1Bot." Find out what makes this campaign so dangerous and how it’s evolving: https://t.co/qbcAi505Or
0
11
26
@TalosSecurity
Cisco Talos Intelligence Group
6 months
Join Cisco Talos Incident Response for an off-the-record briefing on how we tackle threats on the frontlines. Real stories, real lessons. Register now: https://t.co/pcWCf1w2Z1
0
8
8
@TalosSecurity
Cisco Talos Intelligence Group
6 months
Ransomware actors are using decades-old PowerShell 1.0 to outsmart modern defenses β€” a surprising twist revealed in Cisco Talos IR’s latest quarterly trends report. Get the latest on this tactic and recent threats: https://t.co/SJYAWAP5HM
0
10
8
@Unit42_Intel
Unit 42
6 months
Attackers are more frequently using Windows shortcut (LNK) files to distribute malware. We cover four main categories of LNK malware: exploit execution, malicious file execution, in-argument script execution and overlay execution. https://t.co/rrlupQXSNh
1
61
116
@StaySafeOnline
National Cybersecurity Alliance
6 months
Smishing is phishing, but through text messages. Instead of a scam email landing in your inbox, it arrives as an SMS, iMessage, or other text-based notification on your phone. Learn more about smishing, and how to spot a smishing text:
Tweet card summary image
staysafeonline.org
Smishing is like phishing, except it’s sent to your phone. Learn what smishing is and how to avoid scams!
1
22
26
@clcoding
Python Coding
7 months
🚨 BREAKING: Google just released a set of free AI courses. Zero fees. No prior knowledge needed. Here are 11 courses you definitely don’t want to miss:
14
362
2K
@RussianPanda9xx
RussianPanda 🐼 πŸ‡ΊπŸ‡¦
7 months
#SocGholish , #UNC4108 folks have been making some updates to their #JuniperStealer πŸ‘€ I covered the stealer in this article earlier in February: https://t.co/WoEN7M8vMP
0
14
87
@TalosSecurity
Cisco Talos Intelligence Group
7 months
Attackers are increasingly using your own legitimate IT tools to hide in plain sight. Learn how to spot them before they cause damage in our latest blog: https://t.co/cBfsyuasx9
0
3
4