
Daniel(a)
@_ChezDaniela
Followers
2K
Following
141K
Media
2K
Statuses
14K
Somewhere in between foodie, wine lover and security geek Python đź’™|Personal tweets|GSNA/GPEN/GCFR | cancer survivor
APD
Joined December 2014
#btvvirtual is one of the ways - check @BlueTeamVillage tweets for updates.
We’re excited to see all the DEF CON people here with us in Vegas, but we’re also thinking of everyone out there who can’t make it in this year. There are still a few ways to participate from the comfort of your own keyboard:
2
4
29
RT @Shadowserver: Proud to support our international LE partners in @Europol /@Eurojust coordinated Operation Eastwood - another successful….
0
6
0
RT @BleepinComputer: North Korean XORIndex malware hidden in 67 malicious npm packages - @billtoulas. https://t.co/….
0
57
0
RT @malmoeb: Dear attacker, Clear-History does not clear the PSReadLine command history file. Clear-History, as taken from the official do….
0
18
0
RT @soursecc: More of these #ScatteredSpider 🕷️. /146.70.87[.]184./www-mlcrosoft[.]com./account.www-mlcrosoft[.]com./sso.www-mlcrosoft[.]co….
0
28
0
RT @RGB_Lights: Wow. Spain is putting salt typhoon out of business. They are just going to hand it all to them: Huawei contracted to man….
0
88
0
RT @nostarch: SNEAK PEEK: New design dropping at DEF CON and it's *chef's kiss*. But what IS it? Hat? Sticker? Tattoo on a No Starch editor….
0
18
0
RT @K_N1kolenko: #XWorm #RAT #ioc.31.57.97.31:2020.31.57.97.126:111.31.57.97.217:2322.45.74.10.206:6000.144.172.105.184:7777.146.70.87.178:….
0
3
0
RT @K_N1kolenko: #RedLine #Stealer #ioc.51.89.204.11:53454, id:'cheat'.176.46.157.64:1912, id:'qq66'.
0
1
0
RT @JohnHultquist: Four UK arrests in Scattered Spider incidents. Suspects are 17 to 20 years old.
0
32
0
RT @anyrun_app: 🚨 Fake 7-Zip installer exfiltrates Active Directory files. A #malicious installer disguised as 7-Zip steals critical Active….
0
48
0
RT @YungBinary: Threat actors decompiled and recompiled SonicWall's .NET based NetExtender client to include a backdoor that harvests VPN c….
0
13
0
RT @kubesploit: Learn how Beelzebub runs honeypots inside your Kubernetes cluster to detect lateral movement. It fakes real services, captu….
0
3
0