Rikz Mondia
@_huntsmansec
Followers
729
Following
4K
Media
502
Statuses
9K
Cyber Threat Analyst at Trustwave | eJPT | (ISC)² Certified in Cybersecurity | Bug Bounty Hunter | ZCSIRT | SneakBytes |
Republic of the Philippines
Joined October 2011
The top of one mountain is the bottom of the next! eJPT Certified! @ine @eLearnSecurity . Thanks to the amazing infosec community and to my mentors❤️🔥
6
1
14
PhishingAlert: Threat actors are abusing #Microsoft Teams notifications to deliver callback #phishing. Victims are invited to groups where team names contain the #scam content, such as fake invoices, auto-renewal notices, or #PayPal payment claims, and urges users to call a fake
1
7
32
ROOTCON celebrates two decades next year! This will be EXTRA SPECIAL. Mark your calendars September 23-25, 2026 at Royce Hotel & Casino, Clark. You won't want to miss this. The moments you'll never forget. Mark your calendars—history is waiting. #ROOTCON20 #20YearsStrong
0
3
2
#MalwareAlert: A new "Executive Award" campaign delivers a two-stage hit. First, a polished HTML phish steals credentials straight to Telegram C2. Then, a malicious SVG triggers a PowerShell #ClickFix chain that installs the #Stealerium infostealer via multi-stage loaders. One
0
24
59
New twist from Gootloader: custom WOFF2 glyph swaps to hide filenames in plain sight—plus the same fast playbook to domain controller Case 1 map below; details in the post. https://t.co/CSr9UmVuCA
0
13
61
Hello. The Huntress CTF is back for its third year. October 1st through October 31st with new challenges each and every day, all month long. Free to play, register at any time (even while the game is running!) and play whenever you want at your leisure. https://t.co/YczDhsyVY8
21
148
776
0
0
1
Grateful for @RealTryHackMe's hands-on approach to learning cybersecurity. Huge shoutout to our team, learned a lot from you guys 🫡 🫰
0
0
0
Detected and triaged a multi-stage incident in where a malicious actor attempted to contact a malicious domain to fetch and execute additional payloads. Got a commendation from our dfir team 🫶🏼
0
0
0
👀 DPRK threat actors are now using deepfakes and fake Zoom links to socially engineer macOS users. Starts with a Telegram message. Ends with AppleScript. Targets crypto wallets. Macs don't get viruses? 📖 by @stuartjash & @birchb0y & Jonathan Semon https://t.co/L8cHIVoMBG
1
35
89
Hoping to try this with the team @phcyberunits
🔥 Introducing SAL1 the defensive certification that gets you hired 🔥 ✅Stand out. ✅Increase your chances of getting hired. ✅Brand trusted by millions. ✅Work in a virtual SOC where you operate like an employed analyst. 🔗 https://t.co/3fICnlDQtR
0
0
0
In November 2024, a critical vulnerability was discovered in the Really Simple Security plugin, this flaw was assigned a critical severity rating and CVE-ID 2024-10924. https://t.co/WOGokvWI9F
0
0
0
After careful consideration, discussions, and evaluating the best possible venue for our ever-growing hacker community, ROOTCON 19 is making a bold move! We’re thrilled to announce that ROOTCON 19 will take place at Royce Hotel in Clark, Pampanga! Visit https://t.co/8k1Js5FRNW
0
5
12
I'm not afraid of AI taking over, but I am worried about my toaster DMing me ads for bread.
65
60
600