NTECH81 Profile Banner
P. Anr Profile
P. Anr

@NTECH81

Followers
197
Following
851
Media
1K
Statuses
6K

Joined September 2014
Don't wanna be here? Send us removal request.
@LetsDefendIO
LetsDefend
1 year
Incident Response Cheat Sheet
3
130
725
@MEVX_Official
MevX
1 year
✍️ MevX New Update - Referral Tracking We're excited to announce an update to the #MevX Referral Tracking system, designed to make it easier for users to monitor their referrals and earnings. The update includes three new columns: Referral Count, Claimable Volume, and Lifetime
24
12
19
@MEVX_Official
MevX
2 years
🌟 Discover What MEVX Offers! 🌟 MEVX is crafting a robust ecosystem to ensure you have the best experience with every trade on our platform. Here's what you can look forward to: 🔹 Multi-Wallet Support 🔹 Quick Buy/Sell 🔹 Sniper Mode - Turbo Snipe 🔹 Limit Order 🔹
425
2K
3K
@elhackernet
elhacker.NET
2 years
El ransomware FreeWorld ataca servidores MS-SQL DB#JAMMER está hackeando BD MS-SQL no seguras para penetrar en redes corporativas y desplegar ransomware Utilizan ataques de fuerza bruta contra servidores MS-SQL que utilizan credenciales débiles https://t.co/bHVXQeBhMh
1
93
185
@TheHackersNews
The Hacker News
3 years
Cybercriminals are increasingly using 'EvilProxy' #Phishing-as-a-Service (PhaaS) toolkit to carry out account takeovers. Their primary targets are C-level executives, resulting in thousands of breached #Microsoft 365 accounts. Details: https://t.co/PcudQ6dady #cybersecurity
Tweet card summary image
thehackernews.com
Threat actors are utilizing the 'EvilProxy' Phishing-as-a-Service (PhaaS) toolkit to carry out account takeovers.
3
95
175
@NTECH81
P. Anr
3 years
#VATQ VIRUS (.vatq FILE) RANSOMWARE 🔐 FIX & DECRYPT FILES https://howtofix.guide/vatq-virus-file/?s=09
0
0
1
@NTECH81
P. Anr
3 years
ransomware #Rorschach présenté comme « le plus rapide observé » pour le chiffrement. En partie autonome, se propage automatiquement lorsqu’il est exécuté sur un contrôleur de domaine, tout en effaçant les journaux d’événements des machines affectées ». https://t.co/zftSQ4AUXm
lemagit.fr
Check Point, Group-IB et Palo Alto Networks documentent un rançongiciel découvert en janvier 2023. Pouvant être utilisé contre les systèmes Windows et Linux/ESXi, il s’avère particulièrement rapide.
0
0
0