Explore tweets tagged as #Cyberthint
"Frogblight" Banking #Malware Targeting #Türkiye We analyzed #Frogblight, a new Android malware targeting users in Türkiye and spreading via fake "e-ifade/ Dava Dosyası" applications. 🔍 Technical Insights & Origin: - Infection: Fake UYAP links sent via SMS. - Capabilities:
1
1
6
Actively Attacks Observed on #FortiGate Devices! The CVE-2025-59718 and CVE-2025-59719 vulnerabilities (CVSS 9.8) affecting #Fortinet products (FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager) allow attackers to bypass authentication entirely by manipulating SAML SSO,
0
2
3
North Korean "Synthetic Employees": Next-Generation Infiltration Operations Masked with Artificial Intelligence As of 2025, North Korea-linked threat actors are emerging not only through financial fraud but also through cyber infiltration strategies involving remote recruitment.
0
2
4
🌍 @cyberthint CEO Ismail Saygili discusses overlooked behavioral deviations, agentless visibility, and contextual signals that sharpen detection accuracy. 📌 Key takeaways: - Dormant RDP accounts suddenly active → potential compromise - Low-and-slow exfiltration avoids
1
3
5
Critical LPE (CVE-2025-66430) Vulnerability for #Plesk 👉 https://t.co/RToGo5b5X2 A local privilege escalation (LPE) vulnerability identified as "CVE-2025-66430" with a "CVSS 9.1" severity score has been detected in the widely used Plesk platform. This vulnerability allows any
0
1
5
It's time for a patch for those managing their server/hosting using the #Plesk platform!
Critical LPE (CVE-2025-66430) Vulnerability for #Plesk 👉 https://t.co/RToGo5b5X2 A local privilege escalation (LPE) vulnerability identified as "CVE-2025-66430" with a "CVSS 9.1" severity score has been detected in the widely used Plesk platform. This vulnerability allows any
0
0
0
Apache Tomcat Flaws Allow Remote Code Execution Two high-severity flaws in #ApacheTomcat (CVE-2025-55752 & CVE-2025-55754) pose a significant risk, including potential remote code execution (#RCE). The most critical flaw (CVE-2025-55752, "Important") is a directory traversal
0
2
4
Sea Turtle #APT Group Analysis https://t.co/aImFMC7Y0p
#SeaTurtle #TealKurma #MarbledDust #SILICON #CosmicWolf
0
4
8
#SONDAKIKA ♦️Hydra Market, Turkiye E-Devlet uygulamasından 61 milyon vatandaşın şifre bilgilerini ele geçirdiğini iddia ederek satışa çıkardı. Veriler’in satışa çıkarıldıktan sadece 11 saat sonra satıldığı açıklandı. Kimin aldığı ise bilinmiyor. - @cyberthint
3
22
84
The failed "insider" attempt targeting CrowdStrike was not an isolated incident; it was a harbinger of a strategic shift. Following a failed $25,000 bribery attempt, the group changed tactics and is now focusing on hybrid cloud infrastructures. Our analysis shows that the
0
1
5
A New RCE Vulnerability for 7-Zip Two high-severity flaws in #7Zip (CVE-2025-11001 & CVE-2025-11002, CVSS 7.0) allow a crafted ZIP file to abuse symbolic links and write outside the extraction folder, leading to potential code execution with user privileges. These
0
3
6
Beware of the "insider" threat! The Scattered LAPSUS$ Hunters group isn't offended to burn money...
The failed "insider" attempt targeting CrowdStrike was not an isolated incident; it was a harbinger of a strategic shift. Following a failed $25,000 bribery attempt, the group changed tactics and is now focusing on hybrid cloud infrastructures. Our analysis shows that the
0
0
1
31 temmuz'da cyberthint, Bayraktar bilgilerinin sizdirildigi iddia edilen post icin inceleme makalesi yayinlamis.. Olayin fake oldugu, TB2 kaynak kodu yerine, saldirganin flappy bird benzeri bir oyunun kaynak kodlarini yayinladigi ortaya cikmis.🤣 https://t.co/QmH7udbDgL
8
6
112
Hello X community!🌐 Cyberthint's June 2024 #ransomware report has been published! At Cyberthint, we closely monitor the activities of ransomware groups and shed light on the latest statistics every month. 📊🔍 In the meantime, some snaps from the report: - Has the #FED Been
0
2
4
Hello X community!🌐 Cyberthint's July 2024 #ransomware report has been published! At Cyberthint, we closely monitor the activities of ransomware groups and shed light on the latest statistics every month. 📊🔍 In the meantime, some snaps from the report: - A Variant of #Play
0
2
4
“cyberthint, 61 milyon 288 bin 38 tc vatandaşının şifre ve tc kimlik bilgilerinden oluşan e-devlet bilgilerinin, rusya kaynaklı dark web pazar yeri hydra market üzerinden satışa çıkarıldığını ve 11 saat sonra satıldığını öne sürdü.” via @apostonews
0
7
8
🔵🇹🇷Bayraktar TB2'nin kaynak kodlarına erişildiği iddiası çürütüldü 🔸Cyberthint, Bayraktar TB2 SİHA'nın kaynak kodlarına eriştiğini iddia eden kişiye siber operasyon gerçekleştirerek iddianın yanlış olduğunu kanıtladı https://t.co/RnmH1j9Jqc
2
18
213