z3n
@zench4n
Followers
932
Following
4K
Media
41
Statuses
5K
Cybersecurity guru & biohacker! Safeguarding the digital realm while exploring technology & biology.
Joined July 2008
Ouch! 😬 An AI pentester just wiped the floor with human pros in a blind test, finding way more vulns and the critical ones! Are bots our new digital detectives, or just fancy script-kiddies with a PhD? What do you think? chime in! 👇 https://t.co/WG0kei4ATu
#CyberSecurity #AI
cybersecuritynews.com
A sophisticated AI agent framework that demonstrates remarkable competitive capabilities against seasoned cybersecurity professionals.
0
0
0
This Android malware is sneaky! It's disguised as official Indian government apps (mParivahan & e-Challan) to trick you into giving up sensitive info. 😱 Learn how it harvests SMS, OTPs, and contacts, then disappears like a ninja. Check out the full story:
cybersecuritynews.com
Android malware NexusRoute targets Indians with fake mParivahan apps to steal credentials and banking data.
0
0
0
China's React2Shell C2 isn't playing alone! 🇨🇳 Google spills the tea on more APTs (UNC5174, etc.) using this sneaky technique. It’s like a digital ghost 👻, running code straight from memory – bypassing your basic scans. Are your defenses ghostbusters-ready? Read the intel:
bleepingcomputer.com
Over the weekend, Google's threat intelligence team linked five more Chinese hacking groups to attacks exploiting the maximum-severity "React2Shell" remote code execution vulnerability.
0
0
0
Don't get your security fingers burned! 🔥 Attackers are exploiting `finger.exe` in the new ClickFix attack, bypassing AMSI & MotW like a digital ninja. 🥷 Think your systems are safe? This LOLBin trick hits Win 10/11 hard. What are you doing to spot these? 👇
cybersecuritynews.com
ClickFix uses fake CAPTCHA pages to trick users into running finger.exe scripts that install malware on Windows.
0
0
0
France's Interior Ministry email servers went offline after a DDoS attack, servers were taken offline to contain the digital flood. 🇫🇷 Pro-Russian hacktivists @NoName_16 claimed responsibility. Imagine a million robocalls crash your phone system, then the whole network goes dark.
bleepingcomputer.com
The French Interior Minister confirmed on Friday that the country's Ministry of the Interior was breached in a cyberattack that compromised e-mail servers.
0
0
0
Gentlemen ransomware: suits on, gloves off. They’re phishing their way into corps with zero flair for subtlety. 1. ZIP attachments hiding HTA files drop Cobalt Strike beacons. Savage take: If your email gateway can’t sniff HTA, it’s museum material. 2. Smokeloader unpacks,
cybersecuritynews.com
Gentlemen ransomware uses double extortion, Go-based payloads, and GPO/BYOVD tactics to breach corporate networks worldwide.
0
0
0
Talk about a failing T.A.! A UK man got 3 years for teaching criminals how to use LockBit ransomware. 💰 His "Ultimate Ransomware Guide" sold for £200, raking in a cool £116k. Guess he forgot crime doesn't pay... or maybe he just didn't read his own guide. 😉 Lesson learned?
bitdefender.com
Regular readers of Hot for Security will have read plenty of articles about cybercriminals who have created malware, or malicious hackers who have used malware to infect the systems of victims.
0
0
1
Volklocker ransomware's builder and wallet exposed! 😱 This Rust-based multi-extortion threat targeted Windows, Linux & ESXi. Key TTPs: DLL side-loading, WMI backup disabling, DGA C2. Audit your Rust binaries & block known wallets ASAP! https://t.co/g4XDlE0tOi
#Ransomware
thehackernews.com
Cybersecurity, Ransomware, Malware, Encryption, Cybercrime, Linux, Windows, Telegram, Data Recovery
0
0
0
Big or Small account🤍 Say just Hi 👋 Let’s follow each other👇👇
271
28
151
Windows RDCMan vulnerability (CVE-2024-38178) allows remote code execution via malicious .rdp files. Patch or disable before attackers turn your remote access into a backdoor. Disable RDCMan if not critical. https://t.co/oZ9seRsFT4
#CyberSecurity #RDP #Vulnerability #Windows
cybersecuritynews.com
A critical security issue involving the Windows Remote Access Connection Manager (RasMan) that allows local attackers to execute arbitrary code with System privileges.
0
0
0
Outages reveal culture gaps. AWS/Cloudflare lessons: 1) Multi-region failover isn't magic; test it. 2) UI drift breaks IaC. 3) Observability and chaos drills save ops. https://t.co/0QsyHImo6w
#CloudOutage #DevOps
devops.com
Recent AWS and Cloudflare outages reveal how single subsystem failures can cascade globally. Learn key lessons on disaster recovery.
0
0
0
Trump's AI executive order sharpens guardrails: risk assessments, export controls on chips, and stronger deepfake defenses. Policy meets protection. Are you prepared? Thoughts? Reply! Full piece: https://t.co/zsT0DGa2KO
#AI #CyberSecurity #ExecutiveOrder #Policy
securitymagazine.com
How should organizations respond to the new AI executive order?
0
0
0
RDCMan flaw turns a sleepy tool into a remote code execution risk. Unpatched RDCMan can drop .rdp payloads and escalate to SYSTEM fast. Patch now or retire RDCMan for safer gateways. https://t.co/oZ9seRsFT4
#CyberSecurity #RDP
cybersecuritynews.com
A critical security issue involving the Windows Remote Access Connection Manager (RasMan) that allows local attackers to execute arbitrary code with System privileges.
0
0
0
Even if you have just 5O followers?? Just Say Hello, Let's follow you instantly.
355
39
181
OpenAI warns new AI models pose high cyber risk. 1) Prompt reasoning can leak secrets. 2) Autonomous agents hijacked mid-mission. Thoughts? Reply! https://t.co/k1WczKsJxi
#CyberSecurity
reuters.com
OpenAI on Wednesday warned that its upcoming artificial intelligence models could pose a "high" cybersecurity risk, as their capabilities advance rapidly.
0
0
0
React2shell shows how a tiny npm package can own your build ⚠ A poisoned webpack loader fetches a payload from GitHub during npm install, giving attackers RCE. 100+ downloads before takedown. https://t.co/IwMdIpcNoZ
#CyberSecurity #DevSecOps
vulncheck.com
Vulnerability intelligence that predicts avenues of attack with speed and accuracy.
0
0
0
7,600+ Docker Hub images leak secrets, proving hard-coded creds aren’t myth. Env vars or files leaking AWS keys can cascade into prod. Scan, rotate, least privilege, shift left. Thoughts? #CyberSecurity #DevSecOps
flare.io
Assaf Morag, Cybersecurity Researcher For years, there’s been a saying in the security world: hackers don’t need to hack anymore – the keys are handed to them on a silver platter. But is that really...
0
0
0