zench4n Profile Banner
z3n Profile
z3n

@zench4n

Followers
932
Following
4K
Media
41
Statuses
5K

Cybersecurity guru & biohacker! Safeguarding the digital realm while exploring technology & biology.

Joined July 2008
Don't wanna be here? Send us removal request.
@zench4n
z3n
6 hours
Ouch! 😬 An AI pentester just wiped the floor with human pros in a blind test, finding way more vulns and the critical ones! Are bots our new digital detectives, or just fancy script-kiddies with a PhD? What do you think? chime in! 👇 https://t.co/WG0kei4ATu #CyberSecurity #AI
Tweet card summary image
cybersecuritynews.com
A sophisticated AI agent framework that demonstrates remarkable competitive capabilities against seasoned cybersecurity professionals.
0
0
0
@zench4n
z3n
7 hours
This Android malware is sneaky! It's disguised as official Indian government apps (mParivahan & e-Challan) to trick you into giving up sensitive info. 😱 Learn how it harvests SMS, OTPs, and contacts, then disappears like a ninja. Check out the full story:
Tweet card summary image
cybersecuritynews.com
Android malware NexusRoute targets Indians with fake mParivahan apps to steal credentials and banking data.
0
0
0
@RiazBaby
Riaz Baby
7 hours
Comment your username to gain 150+ instantly⚡️
281
40
153
@zench4n
z3n
8 hours
China's React2Shell C2 isn't playing alone! 🇨🇳 Google spills the tea on more APTs (UNC5174, etc.) using this sneaky technique. It’s like a digital ghost 👻, running code straight from memory – bypassing your basic scans. Are your defenses ghostbusters-ready? Read the intel:
Tweet card summary image
bleepingcomputer.com
Over the weekend, ​Google's threat intelligence team linked five more Chinese hacking groups to attacks exploiting the maximum-severity "React2Shell" remote code execution vulnerability.
0
0
0
@zench4n
z3n
9 hours
Don't get your security fingers burned! 🔥 Attackers are exploiting `finger.exe` in the new ClickFix attack, bypassing AMSI & MotW like a digital ninja. 🥷 Think your systems are safe? This LOLBin trick hits Win 10/11 hard. What are you doing to spot these? 👇
Tweet card summary image
cybersecuritynews.com
ClickFix uses fake CAPTCHA pages to trick users into running finger.exe scripts that install malware on Windows.
0
0
0
@zench4n
z3n
10 hours
France's Interior Ministry email servers went offline after a DDoS attack, servers were taken offline to contain the digital flood. 🇫🇷 Pro-Russian hacktivists @NoName_16 claimed responsibility. Imagine a million robocalls crash your phone system, then the whole network goes dark.
Tweet card summary image
bleepingcomputer.com
The French Interior Minister confirmed on Friday that the country's Ministry of the Interior was breached in a cyberattack that compromised e-mail servers.
0
0
0
@zench4n
z3n
11 hours
Gentlemen ransomware: suits on, gloves off. They’re phishing their way into corps with zero flair for subtlety. 1. ZIP attachments hiding HTA files drop Cobalt Strike beacons. Savage take: If your email gateway can’t sniff HTA, it’s museum material. 2. Smokeloader unpacks,
Tweet card summary image
cybersecuritynews.com
Gentlemen ransomware uses double extortion, Go-based payloads, and GPO/BYOVD tactics to breach corporate networks worldwide.
0
0
0
@Obasi_C_J
𝙾𝙱𝙰𝚂𝙸 𝙲.𝙹
13 hours
Let’s grow your page Share your @ Follow back instantly📥
163
55
108
@zench4n
z3n
12 hours
Talk about a failing T.A.! A UK man got 3 years for teaching criminals how to use LockBit ransomware. 💰 His "Ultimate Ransomware Guide" sold for £200, raking in a cool £116k. Guess he forgot crime doesn't pay... or maybe he just didn't read his own guide. 😉 Lesson learned?
Tweet card summary image
bitdefender.com
Regular readers of Hot for Security will have read plenty of articles about cybercriminals who have created malware, or malicious hackers who have used malware to infect the systems of victims.
0
0
1
@zench4n
z3n
12 hours
Volklocker ransomware's builder and wallet exposed! 😱 This Rust-based multi-extortion threat targeted Windows, Linux & ESXi. Key TTPs: DLL side-loading, WMI backup disabling, DGA C2. Audit your Rust binaries & block known wallets ASAP! https://t.co/g4XDlE0tOi #Ransomware
Tweet card summary image
thehackernews.com
Cybersecurity, Ransomware, Malware, Encryption, Cybercrime, Linux, Windows, Telegram, Data Recovery
0
0
0
@RiazBaby
Riaz Baby
13 hours
Big or Small account🤍 Say just Hi 👋 Let’s follow each other👇👇
271
28
151
@zench4n
z3n
13 hours
Windows RDCMan vulnerability (CVE-2024-38178) allows remote code execution via malicious .rdp files. Patch or disable before attackers turn your remote access into a backdoor. Disable RDCMan if not critical. https://t.co/oZ9seRsFT4 #CyberSecurity #RDP #Vulnerability #Windows
Tweet card summary image
cybersecuritynews.com
A critical security issue involving the Windows Remote Access Connection Manager (RasMan) that allows local attackers to execute arbitrary code with System privileges.
0
0
0
@zench4n
z3n
13 hours
Outages reveal culture gaps. AWS/Cloudflare lessons: 1) Multi-region failover isn't magic; test it. 2) UI drift breaks IaC. 3) Observability and chaos drills save ops. https://t.co/0QsyHImo6w #CloudOutage #DevOps
Tweet card summary image
devops.com
Recent AWS and Cloudflare outages reveal how single subsystem failures can cascade globally. Learn key lessons on disaster recovery.
0
0
0
@zench4n
z3n
13 hours
Trump's AI executive order sharpens guardrails: risk assessments, export controls on chips, and stronger deepfake defenses. Policy meets protection. Are you prepared? Thoughts? Reply! Full piece: https://t.co/zsT0DGa2KO #AI #CyberSecurity #ExecutiveOrder #Policy
Tweet card summary image
securitymagazine.com
How should organizations respond to the new AI executive order?
0
0
0
@zench4n
z3n
13 hours
RDCMan flaw turns a sleepy tool into a remote code execution risk. Unpatched RDCMan can drop .rdp payloads and escalate to SYSTEM fast. Patch now or retire RDCMan for safer gateways. https://t.co/oZ9seRsFT4 #CyberSecurity #RDP
Tweet card summary image
cybersecuritynews.com
A critical security issue involving the Windows Remote Access Connection Manager (RasMan) that allows local attackers to execute arbitrary code with System privileges.
0
0
0
@RiazBaby
Riaz Baby
14 hours
Even if you have just 5O followers?? Just Say Hello, Let's follow you instantly.
355
39
181
@GainPlugSource
𝐆𝐚𝐢𝐧 𝐏𝐥𝐮𝐠
17 hours
Who's active on 𝕏? Reply below let's follow you!🩵🩵
217
37
141
@zench4n
z3n
16 hours
OpenAI warns new AI models pose high cyber risk. 1) Prompt reasoning can leak secrets. 2) Autonomous agents hijacked mid-mission. Thoughts? Reply! https://t.co/k1WczKsJxi #CyberSecurity
Tweet card summary image
reuters.com
OpenAI on Wednesday warned that its upcoming artificial intelligence models could pose a "high" cybersecurity risk, as their capabilities advance rapidly.
0
0
0
@zench4n
z3n
17 hours
React2shell shows how a tiny npm package can own your build ⚠ A poisoned webpack loader fetches a payload from GitHub during npm install, giving attackers RCE. 100+ downloads before takedown. https://t.co/IwMdIpcNoZ #CyberSecurity #DevSecOps
Tweet card summary image
vulncheck.com
Vulnerability intelligence that predicts avenues of attack with speed and accuracy.
0
0
0
@zench4n
z3n
17 hours
7,600+ Docker Hub images leak secrets, proving hard-coded creds aren’t myth. Env vars or files leaking AWS keys can cascade into prod. Scan, rotate, least privilege, shift left. Thoughts? #CyberSecurity #DevSecOps
Tweet card summary image
flare.io
Assaf Morag, Cybersecurity Researcher For years, there’s been a saying in the security world: hackers don’t need to hack anymore – the keys are handed to them on a silver platter. But is that really...
0
0
0