Ionut Ilascu (@ionut_ilascu) 's Twitter Profile
Ionut Ilascu

@ionut_ilascu

security news reporter @BleepinComputer


🐘: infosec.exchange/@tila

ID: 140413119

linkhttps://www.bleepingcomputer.com/author/ionut-ilascu/ calendar_today05-05-2010 12:34:07

4,4K Tweet

5,5K Followers

179 Following

Ionut Ilascu (@ionut_ilascu) 's Twitter Profile Photo

Google says that it removed the ads and took action against associate accounts. Company added that it sees bad actors working on a larger scale and with more sophistication to evade detection. So we're likely gonna see more of these bleepingcomputer.com/news/security/…

Germán Fernández (@1zrr4h) 's Twitter Profile Photo

🚨 POR FAVOR, MÁXIMA DIFUSIÓN. Joven madre se quita la vida por extorsiones y amenazas luego de instalar App para el "préstamo de dinero" 😰 (t13.cl/noticia/nacion…). Lamentablemente, hay muchos casos como este ocurriendo en LATAM y otras partes del mundo. No instalen ninguna

Ionut Ilascu (@ionut_ilascu) 's Twitter Profile Photo

With Operation Cronos LEA did not just take down down LockBit - the longest running RaaS to date, they did it in style. Using LockBit's site to publish pressos, decryption keys, recovery tools, and what will happen next is simply🤌with sparkles on top. bleepingcomputer.com/news/security/…

Félix Aimé (@felixaime) 's Twitter Profile Photo

❗️ERRATUM: I despise spreading misinformation. Contrary to what I stated on Saturday, the Predator infrastructure that we follow at Sekoia.io is still active (47: UP - 37: DOWN - 16: TO CHECK). This was due to a bug in our tracking app... on Saturday morning. Mistakes happen🤬

Thomas Roccia 🤘 (@fr0gger_) 's Twitter Profile Photo

I tried to make sense of the backdoor mechanism this time and summarized it in a one-page overview. 😵‍💫 There's obviously more technical detail to uncover, but you'll get a general understanding of the complexity and the stealthy mechanisms used to remain undetected. 🧐 Thanks

I tried to make sense of the backdoor mechanism this time and summarized it in a one-page overview. 😵‍💫

There's obviously more technical detail to uncover, but you'll get a general understanding of the complexity and the stealthy mechanisms used to remain undetected. 🧐

Thanks
Is Now on VT! (@now_on_vt) 's Twitter Profile Photo

Crowdstrike C-00000291-*.sys files on VT: 9ca565965198cf1a5073ce974c5826d14aa3ac3cf574b3d2d2e7f80624b9ed90 ad492bc8b884f9c9a5ce0c96087e722a2732cdb31612e092cdbf4a9555b44362 e69363ef6ffae9efb75f77467313390cd630b1c83b39eb79058c3e4ca2786fae

Ionut Ilascu (@ionut_ilascu) 's Twitter Profile Photo

"I think they need to stop saying that this is not a cybersecurity incident. They are a cybersecurity company with a cybersecurity product that caused an incident. Therefore it IS a cybersecurity incident."

Haifei Li (@haifeili) 's Twitter Profile Photo

Personal update: if you need a guy who is passionate on innovative in-the-wild zero-day exploit detection and advanced vulnerability research, please let me know. DM open. :)

Ionut Ilascu (@ionut_ilascu) 's Twitter Profile Photo

Time-sensitive fundraiser to help a cybersecurity expert and family with legal, visa, and travel expenses required to flee a hostile country. gofund.me/61a14535

Piffd0s (@piffd0s) 's Twitter Profile Photo

I read Nir Chako 's research on finding lolbas and wrote a script to do this with ida batch processing. The default will find binaries that make http requests and have file write capabilities but you can edit the script to find any lol win api you want github.com/piffd0s/automa…

GrapheneOS (@grapheneos) 's Twitter Profile Photo

We've published a response with corrections to iFixit article presenting a highly insecure and non-private option as being the best choice for people who care about privacy: discuss.grapheneos.org/d/24134-device… Not bundling Google Mobile Services doesn't mean a device/OS has good privacy.