Will Harris(@parityzero) 's Twitter Profile Photo

I published a step by step guide on using Windows event logs to hunt for malware trying to steal sensitive data from browsers e.g. cookies, passwords etc. security.googleblog.com/2024/04/detect… Hope it's useful!

I published a step by step guide on using Windows event logs to hunt for malware trying to steal sensitive data from browsers e.g. cookies, passwords etc. security.googleblog.com/2024/04/detect… #DFIR Hope it's useful!
account_circle
Shivam Kumar Singh(@MrRajputHacker) 's Twitter Profile Photo

🥸 𝙏𝙚𝙡𝙚𝙜𝙧𝙖𝙢 𝙍𝘾𝙀 𝙋𝙊𝘾 - Fixed

A recent Telegram RCE bug has been fixed, but attackers are still trying to bypass the fix.

⚠️ 𝙒𝙖𝙧𝙣𝙞𝙣𝙜: If you receive a picture or video, DO NOT click or download it! It may contain malware.

account_circle
0xor0ne(@0xor0ne) 's Twitter Profile Photo

Operation triangulation, infection modules analysis

Keychain module: shindan.io/posts/keychain…
Audio module: shindan.io/posts/audio_mo…

Operation triangulation, infection modules analysis

Keychain module: shindan.io/posts/keychain…
Audio module: shindan.io/posts/audio_mo…

#infosec #malware
account_circle
Srinivas BV(@srinivasiyc) 's Twitter Profile Photo

PawPa की कसम की कोई Value नही है,
Malware ने फिर से ट्वीट डिलीट कर दिया..

PawPa की कसम की कोई Value नही है,
Malware ने फिर से ट्वीट डिलीट कर दिया..
account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

Researchers have uncovered a new malware called Wpeeper that uses compromised sites to hide its true command-and-control servers.

This sneaky backdoor can collect device info, manage files, & execute malicious commands.

Learn more: thehackernews.com/2024/05/androi…

account_circle