stdal_ Profile Banner
STAND//ALONE Profile
STAND//ALONE

@stdal_

Followers
33
Following
547
Media
4
Statuses
334

nothing new under the sun, that's why we gotta rise above

Joined January 2022
Don't wanna be here? Send us removal request.
@stdal_
STAND//ALONE
8 days
RT @vxunderground: How tf did the FBI / NSA get a picture of North Korean IT workers working
Tweet media one
0
231
0
@stdal_
STAND//ALONE
8 days
RT @Cyber_O51NT: A recent report reveals that Pakistani freelancers are creating cracking websites linked to stealer malware, using a pay-p….
0
14
0
@stdal_
STAND//ALONE
26 days
RT @Cyber_0leg: 💸 From dirty crypto to clean money: how Russophone cybercriminals launder illicit crypto profits?. Fake inheritances, shady….
0
33
0
@stdal_
STAND//ALONE
3 months
RT @Intrinsec: 🔎 [THREAD] – New analysis by Intrinsec Cyber Threat Intelligence on the latest operations by Russian-aligned intrusion sets….
0
28
0
@stdal_
STAND//ALONE
4 months
RT @Intrinsec: 🔎 [THREAD] – Doppelgänger: A New Disinformation Campaign Spreading on Social Media 📢.📄 A newly released report sheds light o….
0
7
0
@stdal_
STAND//ALONE
6 months
RT @TrendMicroRSRCH: Fake #installers bundled with #infostealers are a constant threat, compromising user credentials and data integrity. T….
0
4
0
@stdal_
STAND//ALONE
6 months
RT @Intrinsec: 🚨 [New Report Alert!]. Our CTI team just published: "Premium Panel: phishing tool used in longstanding campaigns worldwide."….
0
13
0
@stdal_
STAND//ALONE
6 months
RT @404mediaco: Researcher turns insecure license plate cameras into open source surveillance tool. Privacy advocate draws attention to the….
0
25
0
@stdal_
STAND//ALONE
6 months
RT @TrendMicroRSRCH: Earth Koshchei’s rogue Remote Desktop Protocol campaign targets government, military, and academia via spear-phishing,….
0
2
0
@stdal_
STAND//ALONE
6 months
RT @BleepinComputer: Fake LDAPNightmware exploit on GitHub spreads infostealer malware - @billtoulas. https://t.co/….
0
54
0
@stdal_
STAND//ALONE
6 months
RT @fs0c131y: Hackers claim to have breached Gravy Analytics, a US location data broker selling to government agencies. They shared 3 sam….
0
3K
0
@stdal_
STAND//ALONE
6 months
RT @Intrinsec: 🎉 Happy New Year! . Our CTI team has just published a new report: "CryptBot: Hunting for Initial Access Vectors.". Here’s wh….
0
6
0
@stdal_
STAND//ALONE
8 months
RT @Intrinsec: 🚨 New Report Alert! 🚨. Our CTI team has just released a new report: "Prospero & Proton66: Uncovering the links between bulle….
0
18
0
@stdal_
STAND//ALONE
10 months
RT @Mandiant: 🚨 Mandiant observed #LummaC2 stealers leveraging a new obfuscation technique to thwart analysis tools and stifle reverse engi….
0
60
0
@stdal_
STAND//ALONE
10 months
RT @_mikolajek_: ⚠️Hier, un petit malin a enregistré Son titulaire peut donc créer des sites et envoyer des mails….
0
2K
0
@stdal_
STAND//ALONE
10 months
RT @mattjay: ⚠️ Breaking: North Korea just burned an 0-Day in Chromium. They used it to install a Windows rootkit and the campaign targete….
0
1K
0
@stdal_
STAND//ALONE
11 months
RT @MsftSecIntel: Microsoft observed Iranian state-sponsored threat actor Peach Sandstorm deploying a new custom multi-stage backdoor named….
0
105
0
@stdal_
STAND//ALONE
11 months
RT @780thC: Mandiant is releasing details of a suspected Iran-nexus counterintelligence operation aimed at collecting data on Iranians and….
0
27
0
@stdal_
STAND//ALONE
11 months
RT @RustyNoob619: As far as pivoting is concerned in CTI, you can pretty much do it all between @virustotal, @censysio & @urlscanio 🐧. I ha….
0
79
0
@stdal_
STAND//ALONE
11 months
RT @DailyOsint: Need an all-in-one tool for your OSINT needs?. Osint.rock, an easy-to-use collection of email, phone number, and whois look….
0
186
0