Trellix Advanced Research Center (@trellixarc) 's Twitter Profile
Trellix Advanced Research Center

@trellixarc

The Platform CISOs Trust.

ID: 156797347

linkhttp://www.Trellix.com calendar_today17-06-2010 23:52:45

18,18K Tweet

46,46K Followers

2,2K Following

Trellix Advanced Research Center (@trellixarc) 's Twitter Profile Photo

🚨 LockBit's admin panel hacked! Our analysis of the leaked data reveals surprising victimology (China & Taiwan), affiliate negotiation tactics, and the true — often inflated — earnings of a major RaaS operation. Read more by Jambul Tologonov. bit.ly/4mVKnbr

🚨 LockBit's admin panel hacked! Our analysis of the leaked data reveals surprising victimology (China &amp; Taiwan), affiliate negotiation tactics, and the true — often inflated — earnings of a major RaaS operation. Read more by <a href="/j_tologon/">Jambul Tologonov</a>. bit.ly/4mVKnbr
Trellix Advanced Research Center (@trellixarc) 's Twitter Profile Photo

🚨 Supply Chain Alert: Our team uncovered a sophisticated infection chain: weaponized jQuery Migrate delivered via Parrot TDS. Silent execution, critical data at risk. Deep dive into the malware's technical analysis, TDS mechanism, & defense strategies: bit.ly/4jZUb1E

🚨 Supply Chain Alert: Our team uncovered a sophisticated infection chain: weaponized jQuery Migrate delivered via Parrot TDS. Silent execution, critical data at risk.

Deep dive into the malware's technical analysis, TDS mechanism, &amp; defense strategies: bit.ly/4jZUb1E
Trellix Advanced Research Center (@trellixarc) 's Twitter Profile Photo

Where are the cyber weaknesses? 🤔 Our report highlights Enterprise, but also watch for dev, end-user & the growing OT risks! bit.ly/3Hyew0y

Where are the cyber weaknesses? 🤔 Our report highlights Enterprise, but also watch for dev, end-user &amp; the growing OT risks! bit.ly/3Hyew0y
Trellix Advanced Research Center (@trellixarc) 's Twitter Profile Photo

Iran's cyber capabilities are mature & diverse. With escalating geopolitical tensions, understanding them is crucial. John Fokker breaks down the latest in our new blog. bit.ly/4eiIIc7

Iran's cyber capabilities are mature &amp; diverse. With escalating geopolitical tensions, understanding them is crucial. <a href="/John_Fokker/">John Fokker</a> breaks down the latest in our new blog. bit.ly/4eiIIc7
Trellix Advanced Research Center (@trellixarc) 's Twitter Profile Photo

#OneClik APT: We found 3 variants using .NET loader & a Go backdoor ("RunnerBeacon") hidden in legit AWS! 🤯 Evasion tactics include ClickOnce abuse & AppDomainManager hijacking. Read our full analysis for the deep dive: bit.ly/4kYFblU

#OneClik APT: We found 3 variants using .NET loader &amp; a Go backdoor ("RunnerBeacon") hidden in legit AWS! 🤯 Evasion tactics include ClickOnce abuse &amp; AppDomainManager hijacking. Read our full analysis for the deep dive: bit.ly/4kYFblU
Trellix Advanced Research Center (@trellixarc) 's Twitter Profile Photo

Still the #1 threat: Phishing! 🎣 The latest CyberThreat Report highlights why it's crucial to keep your team sharp with security awareness training. bit.ly/4iJjrZu

Still the #1 threat: Phishing! 🎣 The latest CyberThreat Report highlights why it's crucial to keep your team sharp with security awareness training. bit.ly/4iJjrZu
Trellix Advanced Research Center (@trellixarc) 's Twitter Profile Photo

🚨 Our new blog reveals how #AIAgents enable hyper-realistic lures & advanced evasion in PhaaS campaigns. Stay informed, stay safe. Read it now: bit.ly/40qEqcT

🚨 Our new blog reveals how #AIAgents enable hyper-realistic lures &amp; advanced evasion in PhaaS campaigns. Stay informed, stay safe. Read it now: bit.ly/40qEqcT
Trellix Advanced Research Center (@trellixarc) 's Twitter Profile Photo

Reverse engineering tedious? Not anymore! Our new blog by Max 'Libra' Kersten reveals methods to #automagically slash time & boost accuracy, especially for #Ghidra users! ➡️ bit.ly/3I6bz7C

Reverse engineering tedious? Not anymore! Our new blog by <a href="/Libranalysis/">Max 'Libra' Kersten</a> reveals methods to #automagically slash time &amp; boost accuracy, especially for #Ghidra users!   

➡️ bit.ly/3I6bz7C
Trellix Advanced Research Center (@trellixarc) 's Twitter Profile Photo

Summer's heating up, and so is our June 2025 Bug Report! 🔥 We have the rundown on the most interesting vulnerabilities, from RCEs to router worms. Stay informed. Stay cool. Get the details! ➡️ bit.ly/4l8hnft

Trellix Advanced Research Center (@trellixarc) 's Twitter Profile Photo

What's the hottest cyber threat 🔥 on your radar this week? Our teams share the most critical threats in our latest weekly roundup. bit.ly/46JIoxB

What's the hottest cyber threat 🔥 on your radar this week? Our teams share the most critical threats in our latest weekly roundup. bit.ly/46JIoxB
Trellix Advanced Research Center (@trellixarc) 's Twitter Profile Photo

Massive spike in password spray attacks, especially on Cisco VPNs (+399%)! 🤯 More targeted attacks on individual orgs too. Is your security ready? bit.ly/4iJjrZu

Massive spike in password spray attacks, especially on Cisco VPNs (+399%)! 🤯 More targeted attacks on individual orgs too. Is your security ready? bit.ly/4iJjrZu
Trellix Advanced Research Center (@trellixarc) 's Twitter Profile Photo

DoNot APT is still active! Our new blog uncovers their latest campaign targeting European government entities, utilizing spear-phishing tactics with Google Drive links to deploy malware such as the YTY Framework and GEdit. Read more: bit.ly/4lrxapN

DoNot APT is still active! Our new blog uncovers their latest campaign targeting European government entities, utilizing spear-phishing tactics with Google Drive links to deploy malware such as the YTY Framework and GEdit. Read more: bit.ly/4lrxapN
Trellix Advanced Research Center (@trellixarc) 's Twitter Profile Photo

Level up your defenses vs. InfoStealers! 💪 User training, blocking odd files, strong MFA, EDR monitoring, and an IR playbook are key! Ale shares more in the report. bit.ly/44eB5Qv

Level up your defenses vs. InfoStealers! 💪 User training, blocking odd files, strong MFA, EDR monitoring, and an IR playbook are key! <a href="/lekz86/">Ale</a> shares more in the report. bit.ly/44eB5Qv