Hacker Trends
02/01
02/02
02/03
Statistic
11/15 02:36 (UTC)
02/01
02/02
02/03
24 Posts
Twitter Dev on Twitter: "Starting February 9, we will no longer support free access to the Twitter API, both v2 and v1.1. A paid basic tier will be available instead 🧵" / Twitter
https://
twitter.com
/TwitterDev/status/1621026986784337922
19 Posts
Unserializable, but unreachable: Remote code execution on vBulletin
https://
www.ambionics.io
/blog/vbulletin-unserializable-but-unreachable
10 Posts
No Pineapple! –DPRK Targeting of Medical Research and Technology Sector | WithSecure™ Labs
https://
labs.withsecure.com
/publications/no-pineapple-dprk-targeting-of-medical-research-and-technology-sector
10 Posts
GitHub - zblurx/certsync: Dump NTDS with golden certificates and UnPAC the hash
https://
github.com
/zblurx/certsync
9 Posts
Joe Cutler on Twitter: "My advisor is buying me a new laptop. I just learned that the delivery is going to be intercepted by Penn so they can “set up the machine”. I pressed, and they said they were installing spyware software called CrowdStrike." / Twitter
https://
twitter.com
/alpha_convert/status/1620847576164732928
8 Posts
MalwareBazaar | Browse Checking your browser
https://
bazaar.abuse.ch
/sample/495e5b52716772099ac02c9476feabdd7d51856951d5e61f381c7016f90bb247/
8 Posts
Qakbot/Qakbot_BB12_02.02.2023.txt at main · pr0xylife/Qakbot · GitHub
https://
github.com
/pr0xylife/Qakbot/blob/main/Qakbot_BB12_02.02.2023.txt
8 Posts
MalwareBazaar | Browse Checking your browser
https://
bazaar.abuse.ch
/sample/232ec42b51df281533c557d9013aa5bbeff130bc6e0cb8de7ef1cf965ed81eb1/
7 Posts
5 Golden Rules of Threat Hunting From IBM Security X-Force
https://
securityintelligence.com
/posts/5-golden-rules-threat-hunting-x-force/
6 Posts
Virus Bulletin on Twitter: "Proofpoint's Tommy Madjar, @cocaman, @joewise34, @selenalarson & Chris Talib warn about the increasing use of Microsoft OneNote documents to deliver malware via email as multiple threat actors (such as TA577 & TA570) start to use this delivery method. https://t.co/hm55ket6tL https://t.co/VmD2vM4T8J" / Twitter
https://
twitter.com
/virusbtn/status/1621080483730984960
6 Posts
North Korean Hackers Exploit Unpatched Zimbra Devices in 'No Pineapple' Campaign
https://
thehackernews.com
/2023/02/north-korean-hackers-exploit-unpatched.html
6 Posts
ランサムウェア/攻撃グループの変遷と繋がり (Rev.2) | 調査研究/ブログ | 三井物産セキュアディレクション株式会社
https://
www.mbsd.jp
/research/20230201/whitepaper/
6 Posts
Stop Passing the Buck on Cybersecurity | Foreign Affairs
https://
www.foreignaffairs.com
/united-states/stop-passing-buck-cybersecurity
6 Posts
ImageMagick: The hidden vulnerability behind your online images - Metabase Q
https://
www.metabaseq.com
/imagemagick-zero-days/