
secureslinger
@secureslinger
Followers
3K
Following
85
Media
53
Statuses
68K
Information Security professional, concerned about home users, corporate users, and the information they are trying to keep private
Southern California
Joined December 2009
RT @Volexity: .@Volexity shares #threatintel on how #StormBamboo compromised an ISP to conduct DNS poisoning attacks on targeted organizati….
0
68
0
RT @stevenadair: Some interesting research from our team about malware using emojis as part of its C2. The malware was tailored by UTA0137….
0
16
0
RT @Volexity: .@Volexity analyzes #DISGOMOJI 🔥, Discord-based malware 💀 using emojis for C2. #DISGOMOJI is used by #UTA0137, a suspected Pa….
0
79
0
RT @stevenadair: Our blog with details on the exploitation of CVE-2024-3400 is up! An incredibly fast turn around from our detecting a brea….
0
19
0
RT @volatility: .@volatility New Release: #volatility3 v2.5.0 - visit for details and downloads. #memoryforensics….
0
83
0
RT @Volexity: Donut, an open-source project, is a set of tools to generate position-independent code to obfuscate, load & execute embedded/….
0
64
0
RT @volatility: New blog post – #MemoryForensics R&D Illustrated: Recovering Raw Sockets on Windows 10+. We present our recent research to….
0
23
0
RT @stevenadair: Nice deep dive from the team on a cross platform malware family we previously encountered on Windows many times. We detect….
0
6
0
RT @Volexity: .@Volexity provides new information on #StormCloud #apt which is using a macOS variant of #GIMMICK malware + Google Drive as….
0
49
0
RT @virustotal: Meet VT4Browsers++, our browser extension to enrich all IOCs in any website you visit. Read all details here: https://t.co/….
0
273
0
RT @three_cube: Network Forensics, Part 1: Wireshark Basics #wireshark #networkforensics #cybersecurity #cyberwarrior . .
0
77
0
RT @TheHackersNews: Hackers leveraged a #vulnerability in the Safari browser as part of a watering-hole attack to infect their victims' mac….
0
87
0