lucasverdan Profile Banner
Lucas Profile
Lucas

@lucasverdan

Followers
168
Following
45
Media
1
Statuses
2K

Hardering and Malware Reverse

Rio de Janeiro
Joined September 2009
Don't wanna be here? Send us removal request.
@lucasverdan
Lucas
4 months
Attackers can exploit this by sending a malicious HTTP request, gaining elevated privileges and control over the system. Given the high impact, it's crucial for organizations to upgrade to version 2.5.27 or later to mitigate the risk.
1
0
0
@lucasverdan
Lucas
4 months
🚨 A critical vulnerability (CVE-2025-4936) has been discovered in Apache Struts, allowing remote execution of arbitrary code. This affects versions 2.5.26 and earlier.
2
0
0
@lucasverdan
Lucas
4 months
🛡️Remember, a cloud-centric security strategy is not just a choice but a necessity in today's digital landscape. Stay informed and take action to secure your organization!. Learn more: #Cybersecurity #CloudSecurity #AIThreats #DataEncryption #Compliance.
infosecurity-magazine.com
Experts at the Google Cloud Next event set out how security teams need to adapt their focuses in the wake of trends such as rising cyber-attacks
0
0
0
@lucasverdan
Lucas
4 months
access.- Implementing threat detection and response.- Focusing on data encryption and compliance. These actions are key to ensuring the security of cloud-based systems.
1
0
0
@lucasverdan
Lucas
4 months
🌐 Emerging trends like rising cyber-attacks and AI advancements require a shift in focus towards:. - Protecting cloud-native applications.- Securing identities and.
1
0
0
@lucasverdan
Lucas
4 months
🔒 As cyber threats continue to evolve, it's crucial for cybersecurity leaders to stay ahead of the game.
1
0
0
@lucasverdan
Lucas
4 months
However, ransomware remains a critical threat. It's crucial for organizations to focus on robust security measures, such as regular backups, educating employees, and segmenting networks. Stay vigilant and secure!.
1
0
1
@lucasverdan
Lucas
4 months
🚨 Ransomware attacks hit an all-time high, yet the average payout has surprisingly decreased! This shift indicates growing resilience among organizations, with many opting not to pay ransoms. Enhanced backup and recovery systems also play a key role in reducing payouts.
1
0
2
@lucasverdan
Lucas
4 months
Ensure your systems are secure by:.- Enforcing strong passwords.- Enabling multi-factor authentication.- Monitoring login activity for any suspicious behavior. Don't wait – take action now to protect your organization!.
1
0
0
@lucasverdan
Lucas
4 months
🚨 Cybercriminals are targeting PAN-OS GlobalProtect gateways with brute-force login attempts. This could lead to unauthorized access and lateral movement within your network.
1
0
0
@lucasverdan
Lucas
4 months
To stay safe, make sure to only download apps from official app stores and be wary of suspicious websites. Let’s stay vigilant and protect our devices! 🛡️. Read more: #cybersecurity #datasecurity #malware #cybersecurityawareness.
Tweet card summary image
thehackernews.com
SpyNote malware disguised as Chrome installs hidden APKs via fake Play Store pages, stealing sensitive Android data.
0
0
0
@lucasverdan
Lucas
4 months
Meanwhile, BadBazaar and MOONSHINE malware are also being employed to target iOS users, aiming to trick them into downloading malicious apps that can steal data and cause other security breaches.
1
0
0
@lucasverdan
Lucas
4 months
🚨 Cybercriminals are using fake app installation pages to spread SpyNote Android malware, masquerading as official Google Play Store pages for popular apps like Chrome. This new tactic leverages newly registered domains to target Android users.
1
0
0
@lucasverdan
Lucas
4 months
- Implement network segmentation and access controls to limit lateral movement. Stay vigilant and secure! 🔒. Read more: #CyberSecurity #DataSecurity #ITSecurity.
Tweet card summary image
bleepingcomputer.com
Hackers exploited a vulnerability in Gladinet CentreStack's secure file-sharing software as a zero-day since March to breach storage servers
0
0
0
@lucasverdan
Lucas
4 months
If your organization relies on CentreStack, immediate action is needed to patch the vulnerability and implement additional security measures to prevent further breaches. ✅ Recommended steps:.- Update to the latest version of CentreStack.
1
0
0
@lucasverdan
Lucas
4 months
🚨 Urgent: A zero-day vulnerability in CentreStack’s file-sharing software has been exploited since March, leading to severe data breaches and remote code execution.
1
0
0