Toggle navigation
TWText.com
TWText.com
faq
Contact US
Follow US
#Malware
👋justj@ckie👋
jackienumber3
I think this beauty was the response I got to "you should watch the news". It went on for like 6 hours. It wasn't the first time. It came from
Read more
Dave Kennedy
HackingDave
It has always been my goal to appropriately communicate to the media what is happening out there and what amazing work the security industry is doing.I have to be honest,
Read more
Chris Vickery
VickerySec
The Watergate2.0 operation began in June 2016.Minus the hotel rooms, plus smartphones. Hot-mic audio streaming, screen capture, and file transfer, all through deceptively invoked web browser components (e.g. WebRTC +
Read more
hakan
hatr
NEW:#APT32/#OceanLotus is targeting dissidents, human rights workers and journalists across In a joint investigation with @zeitonline, we retraced their steps, did tons of technical work, spoke w/ affected people
Read more
\_(ʘ_ʘ)_/
pollo290987
1/6How looks a malicious document of #Qakbot, the macro code is protected by password, when you open the doc the macro is executed and try to download the payload from
Read more
6102
6102bitcoin
User claims to have lost 1400 BTC after clicking malware link from a malicious electrum server.Regardless of whether or not this is true it serves as a good reminder to
Read more
Lili Fatalisme
denkiii
https://www.lapresse.ca/covid-19/202005/29/01-5275480-tracage-numerique-des-cas-de-covid-19-plus-de-transparence-exigee.phple problème principal demeure à mon avis que 1. y'en a pas d'app présentement, personne ne peut regarder u
Read more
Robert M. Lee
RobertMLee
I’m scheduled to join @jimsciutto on @CNN at 10am Eastern to talk about ransomware and intrusions into our industrial infrastructure in context of the Colonial Pipeline incident. Join me if
Read more
Brian in Pittsburgh
arekfurt
Seeing questions today from very small orgs on what *they* can do re. the heightened ransomware threat.Let's review the essential, no-cost things these orgs can--and must--do to hugely reduce risk:Counter
Read more
Ben Kaufman 🇸🇻🌋
_benkaufman
A recap of the issue 1/ Electrum is a light client, which means it must connect to the blockchain through a server, which by default is chosen from a list
Read more
Tetrane
tetrane
One of our users compared vulnerability research as trying to find a needle in the proverbial haystack and shared with us how REVEN makes a huge difference. This inspired us
Read more
Bryan (Papoo) #VoteForBiden
PapooTx
Georgia’s new electronic voting system is vulnerable to cyberattacks that could undermine public confidence, create chaos at the polls or change the results on Election Day.#ONEV1 #OVElections https://ajc.com/politics/election/in-high-sta
Read more
New Priest Cult 45
BasedCuk
Ransomware, a simple but ruthless piece of malware that will lock down (encrypt) your files and ... the attacker will contact you to demand a ransom be paid to decrypt
Read more
Thomas Jerome
MrThomasJerome
Let's see which ones result in the most unfollows lol 1. Murder enabled and encouraged by widespread earnest belief in flawed ontology 2. Too broad to have an opinion on,
Read more
bara
capybotra
The curse of Jackie Chan the brand killer: a superstition that all companies endorsed by Jackie Chan are doomed to fail. BaWang shampoo ambassadoraccused of having carcinogens mixed in with
Read more
Alpha OmegaEnergy "The Energy Kraken"
AOECOIN
#Breaking #BreakingNews "A Malware is present on the servers that reveals every login& password of everyone who logs into these networks, it's like putting it on the darkweb"FACTS: -It's been
Read more
‹
1
2
...
4
5
6
7
8
9
10
...
12
13
›