secureslinger Profile
secureslinger

@secureslinger

Followers
3K
Following
85
Media
53
Statuses
68K

Information Security professional, concerned about home users, corporate users, and the information they are trying to keep private

Southern California
Joined December 2009
Don't wanna be here? Send us removal request.
@secureslinger
secureslinger
8 months
RT @Volexity: .@Volexity’s latest blog post describes in detail how a Russian APT used a new attack technique, the “Nearest Neighbor Attack….
0
178
0
@secureslinger
secureslinger
1 year
RT @Volexity: .@Volexity shares #threatintel on how #StormBamboo compromised an ISP to conduct DNS poisoning attacks on targeted organizati….
0
68
0
@secureslinger
secureslinger
1 year
RT @stevenadair: Some interesting research from our team about malware using emojis as part of its C2. The malware was tailored by UTA0137….
0
16
0
@secureslinger
secureslinger
1 year
RT @Volexity: .@Volexity analyzes #DISGOMOJI 🔥, Discord-based malware 💀 using emojis for C2. #DISGOMOJI is used by #UTA0137, a suspected Pa….
0
79
0
@secureslinger
secureslinger
1 year
Last Night from Southern California #SolarFlare #aurora #Auroraborealis
Tweet media one
0
0
1
@secureslinger
secureslinger
1 year
RT @stevenadair: Our blog with details on the exploitation of CVE-2024-3400 is up! An incredibly fast turn around from our detecting a brea….
0
19
0
@secureslinger
secureslinger
2 years
Tweet media one
0
0
0
@secureslinger
secureslinger
2 years
RT @volatility: .@volatility New Release: #volatility3 v2.5.0 - visit for details and downloads. #memoryforensics….
0
83
0
@secureslinger
secureslinger
2 years
RT @Volexity: Donut, an open-source project, is a set of tools to generate position-independent code to obfuscate, load & execute embedded/….
0
64
0
@secureslinger
secureslinger
2 years
RT @volatility: New blog post – #MemoryForensics R&D Illustrated: Recovering Raw Sockets on Windows 10+. We present our recent research to….
0
23
0
@secureslinger
secureslinger
2 years
25 Useful Volatility Commands #DFIR #CyberSecurity #ComputerForensics.
0
0
0
@secureslinger
secureslinger
2 years
Steps to install Python and Volatility #dfir #cybersecurity.
0
0
0
@secureslinger
secureslinger
2 years
A brief history of Volatility #DFIR #CyberSecurity #infosec.
0
0
0
@secureslinger
secureslinger
3 years
I wonder #rogersoutage #cybersecurity or is it the conspiracy thinker in me.
Tweet media one
0
0
0
@secureslinger
secureslinger
3 years
RT @stevenadair: Nice deep dive from the team on a cross platform malware family we previously encountered on Windows many times. We detect….
0
6
0
@secureslinger
secureslinger
3 years
RT @Volexity: .@Volexity provides new information on #StormCloud #apt which is using a macOS variant of #GIMMICK malware + Google Drive as….
0
49
0
@secureslinger
secureslinger
3 years
RT @virustotal: Meet VT4Browsers++, our browser extension to enrich all IOCs in any website you visit. Read all details here: https://t.co/….
0
273
0
@secureslinger
secureslinger
3 years
RT @three_cube: Network Forensics, Part 1: Wireshark Basics #wireshark #networkforensics #cybersecurity #cyberwarrior . .
0
77
0
@secureslinger
secureslinger
3 years
Tweet media one
0
55
0
@secureslinger
secureslinger
3 years
RT @TheHackersNews: Hackers leveraged a #vulnerability in the Safari browser as part of a watering-hole attack to infect their victims' mac….
0
87
0