PRODAFT Profile Banner
PRODAFT Profile
PRODAFT

@PRODAFT

Followers
9K
Following
99
Media
560
Statuses
912

Proactive Defense Against Future Threats | Pioneering #CyberSec and #ThreatIntelligence in Europe & MENA since ’12. CTI Platform: #USTA Risk Intel: #BLINDSPOT

Europe
Joined July 2012
Don't wanna be here? Send us removal request.
@PRODAFT
PRODAFT
4 days
🔧Our open source tool Cradle is built for the threat intelligence community and shared openly with everyone. What started as a public project is now being used by many major organizations to manage complex internal cases and critical knowledge at scale. We are pushing Cradle
0
65
500
@PRODAFT
PRODAFT
5 days
Our seasoned manager, ACK, represented us at MaTeCC in Morocco as a speaker, sharing insights on AI-driven cyber threats and the latest cases we investigate. From Morocco's strong support for cybersecurity to the high-quality technical sessions and an inspiring student community
0
2
9
@PRODAFT
PRODAFT
1 month
⏳After countless hours protecting critical organizations from breaches and supporting global cyber investigations 💪, we are taking a moment to recharge in Cappadocia (Kapadokya), a place that feels like home. ⛰️Here, hot air balloons rise with the sun, ancient valleys and
2
1
15
@PRODAFT
PRODAFT
1 month
We are thrilled to see our work featured in a new WIRED piece on Google's lawsuit against the "Lighthouse" smishing operation. 📱 Huge shout-out to our team for their relentless work tracking Chinese-speaking smishing ecosystems and reporting the infrastructure behind these
0
2
15
@teslaenergy
Tesla Energy
1 day
Low upfront cost and predictable monthly payments for your solar and Powerwall.
1
3
29
@PRODAFT
PRODAFT
1 month
🚀 Exciting Update from CATALYST! We're making it easier than ever to stay ahead of evolving cyber threats. With our new easy subscription model, you can now access TLP:AMBER reports directly on the CATALYST platform, simply complete your payment and start exploring. 🔐 What
0
2
7
@PRODAFT
PRODAFT
1 month
Proud to participate in #OperationEndgame /w @Europol. The next phase represents a significant step toward dismantling cyber crime infrastructure worldwide. https://t.co/La2GyeZgb8
0
5
50
@PRODAFT
PRODAFT
1 month
🚀 New in BLINDSPOT Ever wondered where your employees use corporate accounts, if they reuse passwords, or put their dog’s name into them? 🐶 Humans are still the weakest link. Now you can see how weak that link really is. https://t.co/OKzphxveQd #threatintelligence
0
2
22
@ufc
UFC
17 days
This January
0
103
2K
@PRODAFT
PRODAFT
2 months
🛰️Historic CryptBot screenshot: infostealer quietly infected ~1.8M devices and ran a private shop selling access to compromised machines. Not active today. Do you know what they were dealing with? We do. Attribution matters. #threatintel #malware #cybersecurity
0
5
18
@PRODAFT
PRODAFT
2 months
🫣
@PRODAFT
PRODAFT
2 months
🚨 FIN7 (Savage Ladybug) still using the same Windows SSH backdoor with only small changes since 2022. install.bat + OpenSSH toolset → reverse SSH/SFTP for stealth & exfil. 📂Check recent IOCs: https://t.co/22WtpSC8H8 #CyberSecurity #ThreatIntelligence #Malware #IOC
2
5
58
@PRODAFT
PRODAFT
2 months
🚨 FIN7 (Savage Ladybug) still using the same Windows SSH backdoor with only small changes since 2022. install.bat + OpenSSH toolset → reverse SSH/SFTP for stealth & exfil. 📂Check recent IOCs: https://t.co/22WtpSC8H8 #CyberSecurity #ThreatIntelligence #Malware #IOC
0
41
135
@PRODAFT
PRODAFT
2 months
💬 Privacy claims from ransomware groups are fiction. Files are never deleted. "Private" chats are visible to members, state sponsored actors, and third party providers. 💸 Don’t pay ransom. 🛡️ Protect, contain, investigate. #cybersecurity #ransomware
2
9
25
@PRODAFT
PRODAFT
2 months
🕵️ SectopRAT (ArechClient2) is still active and gaining traction with cybercriminals. Obfuscated .NET RAT w/ HVNC remote control, C2 fallback & data theft (creds, wallets, VPNs, browser data). In case you missed our public report 👉 https://t.co/eLVgsuwvlJ #threatintel #malware
1
20
68
@PRODAFT
PRODAFT
2 months
TR //
0
23
144
@PRODAFT
PRODAFT
2 months
🔐 Patch ≠ Proof of Safety. Patching exposed appliances is essential, but not the finish line. Threat actors exploit, dump creds, stash them, then come back after triaging huge queues. Even after fixing, valid accounts/tokens keep the door unlocked. #threatintelligence
0
2
11
@PRODAFT
PRODAFT
2 months
🛡️ New malware alert: stealth cloud C2, FUD, steals browser creds + runs commands. 🔍 TI dilemma: publish full analysis now for proactive prep, or wait for first victims to add stats, sectors, graphs/maps? #threatintelligence #IOC #malware #cybersecurity
1
2
12
@PRODAFT
PRODAFT
2 months
🕵️ Phantom Mantis (ArmCorp), led by LARVA-368 (hastalamuerte), tested Qilin, Embargo, LockBit, Medusa and BlackLock, then built their own RaaS: The Gentlemen. 🇷🇺🏴‍☠️ Takeaway: monitor threat groups, not just RaaS names. Granular intelligence wins. 🔍🧠🎯 #threatintelligence
3
7
38
@PRODAFT
PRODAFT
2 months
🚨 New phishing campaign incoming: As of Oct 6, 2025, LARVA-438 is targeting US credit unions and country banks using AI-generated bank themed sites on a fast flux network. 👉 IOCs available: https://t.co/1qcWYrIlwB #threatintel #IOC #phishing
0
7
23
@PRODAFT
PRODAFT
2 months
Threat intelligence isn’t just “news.” 🧠 It keeps you updated and one step ahead. So when Qilin-affiliated actors execute ransomware with EDR active 📸, remember: security solutions are essential, but they need proper Threat Intelligence. Stay ready. 🔐 #ThreatIntelligence
0
4
38
@TheHackersNews
The Hacker News
3 months
🇮🇷 Iran’s IRGC hackers just breached 34 devices across 11 telecom giants—using fake LinkedIn job offers. 👥 They posed as HR, ran “interviews,” then secretly dropped a stealth backdoor called MINIBIKE hidden in Azure traffic. Read →
Tweet card summary image
thehackernews.com
Iranian cyber group UNC1549 hacked 11 telecom firms, deploying Azure-hosted MINIBIKE malware through LinkedIn lures to steal data and maintain access.
5
57
129