
Felix
@felixw3000
Followers
2K
Following
893
Media
111
Statuses
5K
👨💻 Engineer, passionate about IT security 🔬 Daytime: Researcher @SophosXOps 🧪 Nightime: write-ups on experiments @ https://t.co/JD9nTOciQE 🙋 Opinions are my own
Belgium
Joined October 2015
Today, I'm releasing Imaginary C2: a malware network behavior analysis tool to:.🅰 Capture HTTP requests towards selectively chosen domains/IPs.🅱️ Easily replay captured C&C responses/served payloads.▶️ Demo use case: simulate TrickBot servers.->
9
285
620
RT @mncoppola: New blog post "Google: Stop Burning Counterterrorism Operations". My reflection on an incident where Project Zero and TAG kn….
poppopret.org
This piece refers to an incident involving Google TAG and Project Zero dating back to 2020 and 2021. At the time, these events stirred a small public debate primarily in favor of Google’s actions. …
0
132
0
RT @aejleslie: Ransomware is a national security and public health crisis. “…the National Health Service confirms more than 1,100 operatio….
therecord.media
Health service staff have been “coordinating work across affected services, as well as with neighbouring providers and national partners to manage disruption,” stated NHS England, although it is...
0
15
0
RT @SBousseaden: Elastic Security Labs has discovered a new method for initial access and evasion in the wild, termed #GrimResource, which….
0
177
0
RT @chvancooten: Doesn't take much to trigger a Crowdstrike exec apparently. If only they had 100% coverage against getting criticized on t….
0
3
0
RT @DAlperovitch: Putin on his endgame: . “They [the West] say that they want to achieve the strategic defeat of Russia on the battlefield.….
0
695
0
RT @ServidaAndrea: ICYMI - this is a very serious issue. Whatever the good intentions might be, undermining end-to-end encryption is always….
0
41
0
RT @chompie1337: microsoft: Exploit Code Unporoven. me: i literally gave you a compiled PoC and also exploit code. m$: No exploit code is a….
0
373
0
RT @arekfurt: The PRC exploited 14,000 Fortigate devices before the vulnerability in question here was even announced. Just let that sink….
0
49
0
RT @cyber_advising: CVE-2024-4577: PHP 8.1.* before 8.1.29, 8.2.* 8.2.20, 8.3.* 8.3.8, when using Apache and PHP-CGI on Windows. allow a ma….
0
53
0
RT @SkyNews: The NHS has launched an urgent appeal for O blood-type donors following a cyber attack that has affected some of the largest h….
0
51
0
RT @JohnHultquist: Mandiant's blog on the Snowflake breaches. The bottomline is that the infostealer problem is coming to a head and defens….
cloud.google.com
A campaign targeting Snowflake customer database instances with the intent of data theft and extortion.
0
57
0
RT @Kostastsale: Check out this awesome report by Sophos on Chinese APT threat actors. There is much to learn from this technical breakdown….
0
112
0
RT @artem_i_baranov: Curious what Windows Internals tricks rootkits have leveraged throughout their history to achieve the necessary goals….
0
89
0
RT @awakecoding: The full OCR text with the temporarily visible password is available in the %LocalAppData%\CoreAIPlatform.00\UKP\{<UUID>}\….
0
117
0
RT @NathanMcNulty: @cyb3rops @peteralexbizjak @UK_Daniel_Card Interestingly, Microsoft and others have been trying to fix this for years wh….
0
6
0
RT @therealshodan: “Largest ever operation”.4 arrests (not convicted yet). To put into perspective I have 2 arrests. Guarantee you none of….
0
4
0