IICyberSecurity @iicsorg
Cyber Security - Seguridad Cibernética iicybersecurity.org Pennsylvania, USA Joined August 2012-
Tweets25K
-
Followers11K
-
Following33
-
Likes250
Malware eterno: Los rootkits CVE-2024-3400 persisten a través de actualizaciones y restablecimientos de los firewalls de Palo Alto noticiasseguridad.com/malware-virus/…
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets securitynewspaper.com/2024/04/30/ete…
¡Vulnerabilidades críticas en Cisco ASA y FTD! Aprenda a explotar CVE-2024-20353 y CVE-2024-20359 cibertip.com/ciberseguridad…
Critical Vulnerabilities in Cisco ASA & FTD Exposed! Learn How to Exploit CVE-2024-20353 and CVE-2024-20359 exploitone.com/cyber-security…
Hackeando con MagicDots: Explotando puntos y espacios en nombres de archivos/rutas para obtener derechos de administrador permanentes noticiasseguridad.com/importantes/ha…
Hacking with MagicDots: Exploiting Dots & Spaces in Filenames/Pathnames for Permanent Admin Rights securitynewspaper.com/2024/04/22/hac…
Hospitales como Rehenes:Ciberataques Dejan a los Hospitales Franceses en Caos cibertip.com/hacking-incide…
Healthcare Hack Horror: Cyberattacks Leave French Hospitals in Chaos for $10 Million exploitone.com/data-breach/he…
Comprometer la seguridad de las claves criptográficas a través de PuTTY con CVE-2024-31497 noticiasseguridad.com/seguridad-info…
Compromising Cryptographic Key Security Through PuTTY: A Deep Dive into CVE-2024-31497 securitynewspaper.com/2024/04/16/com…
Las 11 reglas esenciales de seguridad en la nube de Falco para proteger aplicaciones en contenedores sin costo noticiasseguridad.com/importantes/la…
The 11 Essential Falco Cloud Security Rules for Securing Containerized Applications at No Cost securitynewspaper.com/2024/04/12/the…
¿Cómo hackear un Smart TV LG mediante vulnerabilidades en LG WebOS? noticiasseguridad.com/seguridad-info…
How to hack a LG Smart TV via vulnerabilities in LG WebOS? securitynewspaper.com/2024/04/09/how…
Cómo la vulnerabilidad HTTP/2 provoca el agotamiento de la CPU, el desbordamiento de la memoria y la evasión del registros cibertip.com/ciberseguridad…
Cómo la vulnerabilidad HTTP/2 provoca el agotamiento de la CPU, el desbordamiento de la memoria y la evasión del registros cibertip.com/ciberseguridad…
How HTTP/2 CONTINUATION Flood Vulnerability Lead to CPU Exhaustion, Memory Overflow exploitone.com/forensics/how-…
Cómo comprobar si una distro de Linux está comprometida por la puerta trasera XZ Utils en 6 pasos noticiasseguridad.com/importantes/co…
How to Check if a Linux Distribution is Compromised by the XZ Utils Backdoor in 6 Steps securitynewspaper.com/2024/04/02/how…
Dual Vulnerabilities in Microsoft SharePoint Server: Essential Steps to Mitigate Vulnerabilities exploitone.com/vulnerabilitie…
ESET Latinoamérica @ESETLA
40K Followers 16K Following Twitter Oficial de ESET Latam. Seguridad, noticias, tendencias y guías para que disfrutes de la tecnología de forma más segura.🅰️s_informático @as_informatico
16K Followers 2K Following #ciberseguridad #programación #IoT #electrónica #tecnología. 🧑🏻💻Raúl León @rleon_mx
5K Followers 5K Following Cybersecurity Professional / InfoSec Rockstar / Business Intelligence / Co-host Podcast “Pláticas de Ciberseguridad” / UTN Crew / Tweets are on my own. 🇲🇽Securízame @Securizame
14K Followers 186 Following Consultoría, #auditoría, asesoría en proyectos de #seguridad informática, sistemas y comunicaciones.Formación a medida,soporte en seguridad. #Forense y peritajeMarcela Pallero 🇦�.. @Marce_I_P
9K Followers 6K Following 🇦🇷 Ciberseguridad, Riesgos e Incidentes. Cuenta personal = Op. personales. Políticas Públicas en Ciberseguridad. Más justicia social. Agnóstica.Miguel s h @Miguels14008060
6 Followers 71 FollowingHackerStickers @HackerStick3rs
77 Followers 336 Following We're just here to spread neat hacking and cybersecurity related stickers.Threatscape Chronicle.. @threatscapenews
9 Followers 203 Following Studying for the Security+ || Cybersecurity #cybersecurityThomasineSwartz @SwartzThom58701
5 Followers 910 FollowingChinenye favour NWA f.. @favour65465
7 Followers 46 FollowingAbbas @Abbas4470537795
42 Followers 577 Followingt4jnn @l30nt4jnn
52 Followers 575 Following VMO0aQ Y2jhu4k Ymnhur90 beG7mXQ xJFp4buBdQ bMOgOg dMO0aQ Y2jhurNuZw Ymnhur90 Z8OsIA Y+G6oy4 | Server Reboot Engineer | Service Restart Engineerjevi @jevi_arse
3K Followers 3K Following Para los que por falta de recursos, desconocimiento o miedo a lo desconocido, no se atreven a adentrarse en el mundo on-line de la formación y los negocios.Amy Smilelove Yummy @amy_yummy17925
3 Followers 150 Followingdalton rios @daltonrios7
2 Followers 349 Followingulises suhr @28_ulises_28
37 Followers 95 FollowingLorenzo @Lorenzoo_Hacker
6 Followers 153 Following Cybersecurity Programming enthusiastic Javascript & python enthusiastic Computer system & operations 🎓Paul Kintu @thepaulkintu
176 Followers 429 Following I help B2B executives to swiftly detect and manage cyber security threats without tech overwhelm or high costs.Rodrigo Gothardi @RGothardi
8 Followers 82 FollowingBuehl @liberalMWer
25 Followers 210 Following Former CVT of @miraheze. インターネットにおける匿名化、知的財産の権利について興味があります。 Cybersecurity/Anonymization/CopyrightsJoel Dubin @dubinscybernews
154 Followers 885 Following Cybersecurity news from a polyglot consultant, reviewed security in the US, EMEA and Lat Am. Little Black Book of Computer Security 2E. Recovering PCI QSA.Tarik Oz @TarikOz36759043
2 Followers 303 Followingmaty || @𝒏𝒂𝒖.. @nauscopio
3K Followers 1K Following Vinyl rips: https://t.co/PvTPA9uB4T "Comment is free, but facts are sacred" - C. P. ScottAdinath Sawandkar @AdinathSaw66506
0 Followers 3 Followingsaiber.sek @SaiberSek
0 Followers 93 FollowingIDRIS AMINU EGYA @AMINUID58726511
178 Followers 2K Following A Cyber security analyst, Digital creator, affiliate marketer, counselor on health and fitness, badminton lover🏸❤, and a music addict.Axel Olivera @A0X0E0L_Olivera
72 Followers 2K FollowingFerney A13 @Ferne1314
19 Followers 708 Following ::Dame la voluntad para ser lo que fui y por lo que soy perdóname:::Benjamin @Benjami44510592
1 Followers 500 FollowingGeorge Grant @sholagrant
0 Followers 813 FollowingXiomara Quiroz @xquiroz82983610
163 Followers 2K Followinghttps://crazyhellvaul.. @CHVApp1
98 Followers 1K Following https://t.co/7WGskjRNeq [email protected] Comprehensives Extremely authentication Own intelligences methodsUSER04725852 @user04725841960
0 Followers 2K FollowingMd. Rasheidul Islam @md_rasheidul
254 Followers 421 Following Cyber Security Specialist | Ethical Hacker | Web Security Expert | Penetration Tester | #fiverr #upwork #cybersecurityMaria Antonella Rinal.. @AntiG991
2 Followers 37 FollowingPedro González @madrilleko
85 Followers 291 Following Vividor fracasado. Hablador, si hay ocasión Iluso, esperanzado, desencantado, FELIZ Agradecido a mi perro que me ha aguantado 13 años, por ahorasandeep sathwik @sandeepsathwik
26 Followers 173 FollowingRene Robles @robles50572
56 Followers 238 FollowingTania @Tania01779873
6 Followers 76 FollowingFaby @Kunan_0302
0 Followers 468 FollowingTantan Tuba @TantanTuba
2 Followers 285 FollowingLola Caramelo @Hey_Lolaaa
433 Followers 4K Following Inteligente,diabla, buena,sarcástica,divertida, altisonante,tierna, brava y no soy abstracta Consultora en normas ISO/Sistemas de Gestión de la Calidad.Karan Kumar Paanchal .. @karanrpanchal
763 Followers 5K Following Before leaving the scene, clear your desk and your screen.vx-underground @vxunderground
292K Followers 211 Following The largest collection of malware source code, samples, and papers on the internet. Password: infectedMalwareHunterTeam @malwrhunterteam
219K Followers 36 Following Official MHT Twitter account. Check out ID Ransomware (created by @demonslay335). More photos & gifs, less malware.Ptrace Security GmbH @ptracesecurity
53K Followers 883 Following Empowering IT Security Professionals through Hands-On Online Courses.Cyber Detective💙�.. @cyb_detective
43K Followers 3K Following Every day I write about #osint (Open Source Intelligence) tools and techniques. Also little bit about forensics and cybersecurity in general. Work in @netlas_ioexploitone @exploitone1
166 Followers 10 Following Exploit one covers infosec news, cyber security, data breaches, ethical hacking, mobile hacking, cryptocurrency, reverse Engineering & bug bounty news.Black Hat @BlackHatEvents
404K Followers 2K Following The World's Premier Technical Cybersecurity Conference SeriesAvast @Avast
162K Followers 3K Following Tired of your relationship with the internet? Avast helps you take control of your safety and privacy online.phishunt.io @phishunt_io
4K Followers 0 Following Sharing suspicious websites with details and screenshot.Fusion Intelligence C.. @stealthmole_int
122K Followers 3K Following StealthMole : #Criminal #Intelligence #Profiling #Investigation Platform, #OSINT #DarkWeb #DeepWeb #Leaked #DataBreach #Terror #Drugs #Cryptoassets #RansomwareAdvIntel @AdvIntel
3K Followers 1 Following World's First & Only Cybercrime & Adversarial Ransomware Disruption Platform | Launch of Adversary RiskRaj Samani @Raj_Samani
14K Followers 645 Following Chief Scientist @Rapid7 (ex @McAfee) | @cloudsa | Co-author of @CyberGridBook & CSA Guide to Cloud | Advisor @EC3Europol @[email protected]Michael Gillespie @demonslay335
37K Followers 67 Following Loves cats, bunnies, and coding. #Ransomware Hunter. Creator of the service ID Ransomware. Views expressed are my own.CERT-EU @CERTEU
15K Followers 450 Following Official account of the CERT for the EU institutions, bodies and agencies. Please use [email protected] for interaction.INTERPOL @INTERPOL_HQ
301K Followers 592 Following 196 member countries. 100 years of connecting police. #ForASaferWorld Follow our Secretary General ➡️ @INTERPOL_SGEuropol @Europol
140K Followers 901 Following The European Union Agency for Law Enforcement Cooperation #MakingEuropeSaferEC3 @EC3Europol
34K Followers 336 Following Official account of @Europol's European Cybercrime Centre (#EC3Europol), the EU Agency for Law Enforcement Cooperation. Our aim is to combat #cybercrime.INTERPOL_Cyber @INTERPOL_Cyber
112K Followers 545 Following INTERPOL Global Cybercrime Programme aims to reduce the global impact of cybercrime and protect communities for a safer world. #YouMayBeNextOWASP® Foundation @owasp
207K Followers 517 Following We improve the security of apps with community-led open source projects, 260 local chapters, and tens of thousands of members worldwide. Famous for OWASP Top 10WooYun Drops @wooyunsec
1K Followers 51 Following Drops is one of the greatest platforms for security-related blogs in China. we would be very honored if you could submit your atricles at [email protected].0day Exploit Database.. @inj3ct0r
50K Followers 2 Following #0day #Exploit #Vulnerability #Vulnerabilities #PrivilegeEscalation #ShellUpload #Shell #RCE #XSS #SQLi #Shellcode within mirror 🕵️♂️TOR 🌎 https://t.co/19yvgyQfj6Kaspersky @kaspersky
321K Followers 123 Following Kaspersky is the world’s largest privately held vendor of Internet security solutions for businesses and consumers. For support, visit https://t.co/enRPRUIwcmJulian Assange @JulianAssange_
223K Followers 87 Following USA, the world’s internet censor, uses; slurs, lies, deceit & ICANN to block WikiLeaks just like http://t.co/y6k7F5KjRR & 56 other websites blocked from viewingAnonymous Iberoaméri.. @IberoAnon
92K Followers 823 Following Nuestra mayor gloria no está en no haber caído nunca, sino en levantarnos cada vez que caemos. Chat https://t.co/g0dnWo8ogm #iberoamerica. Cuenta Oficialanonymous tounsi @anonymoustounsi
82 Followers 521 Following anonymous tounsi 3omri 17 ans n3ich fi tunsie :)The Tor Project @torproject
463K Followers 2K Following We're a nonprofit defending your privacy and freedom online. Download Tor Browser for protection against surveillance and censorship. https://t.co/ROuSDYAs6FAnonymous (AnonyOps) @AnonyOps
596K Followers 1K Following Anonymous. ACAB. Black Lives Matter. Anti-Fascist. This headless hydra supports whistleblowers, a free press, and is trans-inclusive. @[email protected]Anonymous ⎝⏠⏝�.. @OperationLeakS
57K Followers 89 Following We are Anonymous, We are legion, We never forgive, We never forget, Expect us.Anonymous @YourAnonNews
7.7M Followers 833 Following We are Anonymous, we are legion, we do not forgive, we do not forget. Expect us. It's a dirty job, but someone's gotta do it. #Anonymous #HackThePlanet@iicsorg Y a través de cualquier sistema crypto, ya que abrimos el melón. De paso revisemos ese mismo tema en los ángeles inversores y el funcionamiento de las compras de valores de bolsa. Que miramos el lavado de dinero como algo extraordinario y está más implantado de lo que parece.
How Living-off-the-land (LotL) technique is used to hack into power grids securitynewspaper.com/2023/11/10/how… @iicsorg #ICS #OTsecurity #RenewableEnergy
Esta técnica de Google Calendar permite hackear empresas sin ser detectado cibertip.com/tutoriales/est… 🗞️ @iicsorg #️⃣ #noticias #tecnología #ciberseguridad #GoogleCalendar #Hackeo
Is this a good thing or a bad thing? Well, OK, spying is definitely bad, but for the music portion of the hack, I suppose it depends on who's curating the playlist. securitynewspaper.com/2023/08/11/thi… (article from @iicsorg )
Hace unos fue WormGPT, ahora es FraudGPT…ha nacido otro chico malo en la IA ☠️
La nueva herramienta FraudGPT permite estafar y hackear fácilmente a las víctimas usando IA cibertip.com/ciberseguridad…
I didn't see this one coming. The only way toallow listing. from ransomware is allowlisting.
#infosec #cybersecurity Cyber security company Norton Lifelock, becomes victim of ransomware, who will protect the customers? securitynewspaper.com/2023/06/20/cyb…
Pasó en Rusia, podría pasar en cualquier otra parte. Los deepfakes no son sólo vídeos.
#infosec #cybersecurity Putin deepfake video showed on hacked Russian TV and radio stations exploitone.com/cyber-security…
@iicsorg Honestly I wouldn't be surprised if that was the case, it's not the first time it was revealed a government agency had installed backdoors on American tech products.
@iicsorg re: securitynewspaper.com/2021/12/08/inf… You use CVE-2021-3259 but that should likely be 2021-32591
Una solución tremendamente buena.!! extremely good solution..!
#infosec #cybersecurity How to Hack Google Cloud(GCP) Accounts via Ghost Token technique? exploitone.com/tutorials/how-…
Great story. It's all about the URL. #Hacking
#infosec #cybersecurity How the famous Argentinean Scammer " El Hacker or C14" was tracked and arrested by Police exploitone.com/cyber-security…
@iicsorg I'm okay with the death penalty for these guys. There is no cure.
These are the top 8 FREE tools for security testing & auditing your #K8s clusters in 2022. Thanks @iicsorg for recognizing our mission to make Kubescape the #1 #opensource tool to check that your K8s code complies with compliance standards & best practices securitynewspaper.com/2022/11/24/top…
This app is too shady
#infosec #cybersecurity YoWhatsApp, a mod for WhatsApp is actually a malware exploitone.com/cyber-security…
@iicsorg Backups have been ineffective against ransomware for at least 5 years. The problem is that backup still promotes its products as defense against ransomware.
Develop your Cyber Security skills and knowledge with these cool projects by David Luchi link.medium.com/ylsxKsUSgsb @davidbombal @ITJunkie @DojoCyber @iicsorg @Medium
Congrats @iicsorg Your blog has been selected as one of the Best Email Security Blogs on the web by @_feedspot blog.feedspot.com/email_security…
@iicsorg 2/2 ...and other software, into downloading malware. Here are tips on how to make sure you avoid installing pirated software bit.ly/3MBtcZr
@iicsorg 1/2 Cybercriminals have always tried to take advantage of popular brands to mislead their victims into downloading malware. The Avast Threat Labs has identified a crypto-stealing campaign that misleads users searching for cracked software versions e.g. CCleaner, Microsoft Office