Explore tweets tagged as #Cyberthint
@cyberthint
Cyberthint
20 days
"Frogblight" Banking #Malware Targeting #Türkiye We analyzed #Frogblight, a new Android malware targeting users in Türkiye and spreading via fake "e-ifade/ Dava Dosyası" applications. 🔍 Technical Insights & Origin: - Infection: Fake UYAP links sent via SMS. - Capabilities:
1
1
6
@cyberthint
Cyberthint
20 days
Actively Attacks Observed on #FortiGate Devices! The CVE-2025-59718 and CVE-2025-59719 vulnerabilities (CVSS 9.8) affecting #Fortinet products (FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager) allow attackers to bypass authentication entirely by manipulating SAML SSO,
0
2
3
@cyberthint
Cyberthint
2 months
North Korean "Synthetic Employees": Next-Generation Infiltration Operations Masked with Artificial Intelligence As of 2025, North Korea-linked threat actors are emerging not only through financial fraud but also through cyber infiltration strategies involving remote recruitment.
0
2
4
@blackorbird
blackorbird
1 year
Sea Turtle APT Group Analysis https://t.co/Ir8elGFfv5
2
33
103
@TechNadu
TechNadu
3 months
🌍 @cyberthint CEO Ismail Saygili discusses overlooked behavioral deviations, agentless visibility, and contextual signals that sharpen detection accuracy. 📌 Key takeaways: - Dormant RDP accounts suddenly active → potential compromise - Low-and-slow exfiltration avoids
1
3
5
@cyberthint
Cyberthint
21 days
Critical LPE (CVE-2025-66430) Vulnerability for #Plesk 👉 https://t.co/RToGo5b5X2 A local privilege escalation (LPE) vulnerability identified as "CVE-2025-66430" with a "CVSS 9.1" severity score has been detected in the widely used Plesk platform. This vulnerability allows any
0
1
5
@ixmailsaygili
İsmail Saygılı
21 days
It's time for a patch for those managing their server/hosting using the #Plesk platform!
@cyberthint
Cyberthint
21 days
Critical LPE (CVE-2025-66430) Vulnerability for #Plesk 👉 https://t.co/RToGo5b5X2 A local privilege escalation (LPE) vulnerability identified as "CVE-2025-66430" with a "CVSS 9.1" severity score has been detected in the widely used Plesk platform. This vulnerability allows any
0
0
0
@cyberthint
Cyberthint
2 months
Apache Tomcat Flaws Allow Remote Code Execution Two high-severity flaws in #ApacheTomcat (CVE-2025-55752 & CVE-2025-55754) pose a significant risk, including potential remote code execution (#RCE). The most critical flaw (CVE-2025-55752, "Important") is a directory traversal
0
2
4
@cyberthint
Cyberthint
2 years
0
4
8
@FahrettinAltay_
Fahrettin Altay
3 years
#SONDAKIKA ♦️Hydra Market, Turkiye E-Devlet uygulamasından 61 milyon vatandaşın şifre bilgilerini ele geçirdiğini iddia ederek satışa çıkardı. Veriler’in satışa çıkarıldıktan sadece 11 saat sonra satıldığı açıklandı. Kimin aldığı ise bilinmiyor. - @cyberthint
3
22
84
@cyberthint
Cyberthint
2 months
The failed "insider" attempt targeting CrowdStrike was not an isolated incident; it was a harbinger of a strategic shift. Following a failed $25,000 bribery attempt, the group changed tactics and is now focusing on hybrid cloud infrastructures. Our analysis shows that the
0
1
5
@cyberthint
Cyberthint
3 months
A New RCE Vulnerability for 7-Zip Two high-severity flaws in #7Zip (CVE-2025-11001 & CVE-2025-11002, CVSS 7.0) allow a crafted ZIP file to abuse symbolic links and write outside the extraction folder, leading to potential code execution with user privileges. These
0
3
6
@dijitalunicorn
TheMarJinaL
10 months
@muratozer_ist
Murat Özer
10 months
Telefonlarınızdaki İBB'ye ait tüm uygulamaları silin. Tüm kişisel verilerimiz satılmış.
2
0
5
@ixmailsaygili
İsmail Saygılı
2 months
Beware of the "insider" threat! The Scattered LAPSUS$ Hunters group isn't offended to burn money...
@cyberthint
Cyberthint
2 months
The failed "insider" attempt targeting CrowdStrike was not an isolated incident; it was a harbinger of a strategic shift. Following a failed $25,000 bribery attempt, the group changed tactics and is now focusing on hybrid cloud infrastructures. Our analysis shows that the
0
0
1
@CanDeger
Can Deger
2 years
31 temmuz'da cyberthint, Bayraktar bilgilerinin sizdirildigi iddia edilen post icin inceleme makalesi yayinlamis.. Olayin fake oldugu, TB2 kaynak kodu yerine, saldirganin flappy bird benzeri bir oyunun kaynak kodlarini yayinladigi ortaya cikmis.🤣 https://t.co/QmH7udbDgL
8
6
112
@cyberthint
Cyberthint
2 years
Hello X community!🌐 Cyberthint's June 2024 #ransomware report has been published! At Cyberthint, we closely monitor the activities of ransomware groups and shed light on the latest statistics every month. 📊🔍 In the meantime, some snaps from the report: - Has the #FED Been
0
2
4
@cyberthint
Cyberthint
1 year
Hello X community!🌐 Cyberthint's July 2024 #ransomware report has been published! At Cyberthint, we closely monitor the activities of ransomware groups and shed light on the latest statistics every month. 📊🔍 In the meantime, some snaps from the report: - A Variant of #Play
0
2
4
@ruhavi
reha ruhavioğlu.
3 years
“cyberthint, 61 milyon 288 bin 38 tc vatandaşının şifre ve tc kimlik bilgilerinden oluşan e-devlet bilgilerinin, rusya kaynaklı dark web pazar yeri hydra market üzerinden satışa çıkarıldığını ve 11 saat sonra satıldığını öne sürdü.” via @apostonews
0
7
8
@Defence_Turk
Defence Turk
2 years
🔵🇹🇷Bayraktar TB2'nin kaynak kodlarına erişildiği iddiası çürütüldü 🔸Cyberthint, Bayraktar TB2 SİHA'nın kaynak kodlarına eriştiğini iddia eden kişiye siber operasyon gerçekleştirerek iddianın yanlış olduğunu kanıtladı https://t.co/RnmH1j9Jqc
2
18
213