Odisseus
@_odisseus
Followers
10K
Following
20K
Media
2K
Statuses
17K
Independent Security Researcher, who likes the story of "the legendary Greek hero" (cit.)
Joined July 2013
"The Windows Antimalware Scan Interface (AMSI) is a versatile interface standard bla bla bla..." ๐ With #AMSIkiller you can "patch" the first byte of the process changing it from JE to JMP: so it returns directly. Get your lifetime #AMSI bypass! ๐ https://t.co/USPsxGPlpJ
0
42
137
๐จ CISA says hackers are exploiting a serious WatchGuard firewall flaw (CVE-2025-9242, score 9.3). Attackers can run code without logging in. Over 54,000 Firebox devices are still exposed. Patch before Dec 3. Details โ
thehackernews.com
CISA warns 54K+ WatchGuard firewalls risk remote exploits via CVE-2025-9242; patches due by Dec 3.
3
93
268
๐จ New #LockBit Variant Tagets ESXi and Linux: Critical Infrastructure at Risk. โ ๏ธ In September 2025, on its sixth anniversary, the LockBit group released LockBit 5.0, a new version of its #ransomware. The new variant introduces stronger obfuscation, flexible configurations, and
1
17
41
Ho raccolto in una nota alcune riflessioni sui modelli di #embedding e sul perchรฉ sono fondamentali per tante applicazioni pratiche. Ho scelto #EmbeddingGemma di Google DeepMind: leggero, open-source e utilizzabile anche senza GPU. ๐
guelfoweb.com
Si parla molto di LLM, i cosiddetti Large Language Models come ChatGPT, Gemini o Llama, modelli che sanno scrivere testi, rispondere a domande, riassumere documenti. Insomma addestrati per generare...
0
2
8
Do you think they used the internet?
7
5
78
The #cyberattack against #CollinsAerospaceโs #MUSE platform, at #Heathrow, #Brussels & #Berlin airports points to a likely #supplychain intrusion, with #Alixsec hacktivists, the #Rhysida #ransomware group & #Scattered Spider assessed as plausible actors.
cyfirma.com
Executive Summary On 19 September 2025, multiple major European airports, including London Heathrow (LHR), Brussels (BRU), and Berlin Brandenburg (BER),...
0
3
4
๐๐จ ๐๐๐ฅ๐ฃ๐ข๐ฅ๐ง๐ฆ ๐๐ฌ๐๐๐ฅ๐๐ง๐ง๐๐๐: ๐ฑ ๐๐๐ฆ๐ฆ๐ข๐ก๐ฆ ๐๐๐ข๐จ๐ง ๐ฆ๐จ๐ฃ๐ฃ๐๐ฌ ๐๐๐๐๐ก ๐ฆ๐๐๐จ๐ฅ๐๐ง๐ฌ โ๏ธ๐ป A single ransomware attack disrupted major European airports including Heathrow, Berlin, and Brussels. The result: delays, cancellations, and chaos across
0
7
11
โ ๏ธร stata osservata dal CERT-AGID una nuova campagna malevola a tema condivisione documenti, che riprende lo schema giร osservato nella precedente distribuzione della finta patch per la firma digitale.
Campagna #malware abusa di strumenti di #RMM legittimi tramite falsa condivisione di documenti ๐ฏ Obiettivo: installazione di #PDQConnect, strumento legittimo sfruttato in questo caso per finalitร malevole. โน๏ธ Approfondimenti e #IoC ๐ ๐ https://t.co/usc6H16vMb
0
2
5
Bot Telegram utilizzato come repository per le credenziali rubate.
๐ฎ๐น Campagna di #Phishing @UnivPoliMarche ๐ฏ Obiettivo I criminali mirano a impossessarsi delle credenziali istituzionali di studenti e dipendenti. โน๏ธDettagli e #IoC via Telegram๐ ๐ https://t.co/V2S4e4hMJD
1
5
12
๐v0.51.0 is out now! This version introduces two major updates in Workflow and Findings, along with improvements to the Backend SDK and various bug fixes: โ
Workflow Run History โ
Exporting Findings ๐ Check out the full changelog: https://t.co/oSL4QX9RBL
caido.io
Release Notes
0
11
42
You can now view previous test runs of a workflow in detail. Click "Run" and select a test run to see what data was processed at each node. Part of Caido v0.51.0 โ https://t.co/oSL4QX9RBL
0
3
6
๐จ WinRAR CVE-2025-8088: The invisible persistence SOCs canโt afford to miss Attackers are abusing Alternate Data Streams (ADS) to perform path traversal during archive extraction. By appending colon symbol (:) in file names, they sneak hidden objects into system folders
0
70
207
๐จ DragonForce is a ruthless #ransomware built to paralyze organizations. It wipes backups, disables recovery, spreads across networks, and encrypts everything with no way back. Victims are left facing multimillion-dollar ransom demands ๐ฐ See analysis & gather #IOCs:
1
9
20
I will talk about my paper on anonymous credentials and designated-verifier kzg in october at ACM CCS 2025 in Taipei!
2
6
44
๐ฅ A hacker gang planted a 4G Raspberry Pi inside a bankโs ATM networkโbypassing firewalls to install a rootkit called CAKETAP. It spoofed PIN checks, hid processes, and aimed to trigger fraudulent withdrawals. Details you should know โ
thehackernews.com
UNC2891 used a 4G Raspberry Pi and Linux rootkits to breach ATM networks, exposing flaws in banking infrastructure.
15
131
403
Se avete linea fissa o mobile (non business) @TIM_Official loggatevi su Tim Party, selezionate "Vantaggi" e poi "Un anno di @perplexity_ai Pro a 0โฌ invece di 229โฌ": indicate la mail sulla quale ricevere il codice e usatelo per attivare Perplexity Pro risparmiando 229 euro!๐ฐ
1
3
8
Vulnerabilitร RCE nello strumento di esfiltrazione ransomware Cl0p emersa dopo MoveIT Cybercrime, Cl0p, MoveIT, Ransomware, rce https://t.co/6GSoGYw6O2
0
2
2
๐ข Weโre hiring โ Full Stack Web Developer Are you a developer who loves clean code, thrives in a flexible environment, and enjoys working across the stack? Weโre looking for a Full Stack Web Developer to join our international team. Youโll play a key role in building and
10
6
13
Just spotted a little "hello" from the #Crocodilus Android banker devs โ they left a message in the logs right after the malware launches. Analysis of Crocodilus: https://t.co/frr3w5O2wm New developments: https://t.co/KJEcnaj7J8
14
48
235
๐ Lo scopo della campagna รจ quello di ottenere le credenziali di accesso al servizio webmail "libero . it", raccogliendole in chiaro su un canale di #Telegram che ha iniziato a collezionare account email Libero dal 21 settembre 2023.
๐ฎ๐น Campagna di #phishing in corso per gli account di #LiberoMail โ๏ธ Saldo Bonifico ๐ฏ utenti con account di LiberoMail โน๏ธ Informazioni e #IoC ๐ ๐ https://t.co/MttopRR33Z
0
5
4
๐ฅ Russia-linked hackers are raiding the cloudโagain. Void Blizzard (aka Laundry Bear) is running a stealth campaign hitting NATO states, Ukraine & NGOs across Europe + the US. Tactics? Stolen creds. Phishing PDFs. Evilginx kits. MS Teams access. Targets? Gov, defense, media,
7
68
159