twelvesec (@twelvesec) 's Twitter Profile
twelvesec

@twelvesec

Information security , knowledge sharing, community supporter.

ID: 110700737

linkhttp://www.twelvesec.com calendar_today02-02-2010 13:35:18

15,15K Tweet

1,1K Followers

714 Following

twelvesec (@twelvesec) 's Twitter Profile Photo

ESET researchers have discovered #PrompLock, a generative AI-powered #ransomware implant. #Cybersecurity #infosec buff.ly/Fa25ONE

ESET researchers have discovered #PrompLock, a generative AI-powered #ransomware implant.
#Cybersecurity #infosec
buff.ly/Fa25ONE
twelvesec (@twelvesec) 's Twitter Profile Photo

Global Salt Typhoon #hacking campaigns have been linked to Chinese tech firms. #Cybersecurity #infosec #cyberespionage #privacy #hacking ift.tt/KJM4HE7

Global Salt Typhoon #hacking campaigns have been linked to Chinese tech firms.
#Cybersecurity #infosec #cyberespionage #privacy #hacking
ift.tt/KJM4HE7
twelvesec (@twelvesec) 's Twitter Profile Photo

The state of Nevada confirms a #ransomware #cyberattack. #Cybersecurity #infosec #cybercrime #privacy #hacking buff.ly/6wqNJm6

The state of Nevada confirms a #ransomware #cyberattack.
#Cybersecurity #infosec #cybercrime #privacy #hacking
buff.ly/6wqNJm6
twelvesec (@twelvesec) 's Twitter Profile Photo

A #cyberattack on Miljödata, an IT systems supplier for roughly 80% of Sweden’s municipal systems, has caused accessibility problems in more than 200 regions of the country. #Cybersecurity #infosec #cybercrime #privacy #hacking ift.tt/tChevrw

A #cyberattack on Miljödata, an IT systems supplier for roughly 80% of Sweden’s municipal systems, has caused accessibility problems in more than 200 regions of the country.
#Cybersecurity #infosec #cybercrime #privacy #hacking
ift.tt/tChevrw
twelvesec (@twelvesec) 's Twitter Profile Photo

The financially motivated threat actor known as Storm-0501 has been observed refining its tactics to conduct data exfiltration and extortion attacks targeting cloud environments. #Cybersecurity #infosec #cybercrime #privacy #hacking ift.tt/1E7qla6

The financially motivated threat actor known as Storm-0501 has been observed refining its tactics to conduct data exfiltration and extortion attacks targeting cloud environments.
#Cybersecurity #infosec #cybercrime #privacy #hacking
ift.tt/1E7qla6
twelvesec (@twelvesec) 's Twitter Profile Photo

The Sangoma FreePBX Security Team is warning about an actively exploited FreePBX zero-day vulnerability that impacts systems with the Administrator Control Panel is exposed to the internet. #Cybersecurity #infosec ift.tt/SCcDjR2

The Sangoma FreePBX Security Team is warning about an actively exploited FreePBX zero-day vulnerability that impacts systems with the Administrator Control Panel is exposed to the internet.
#Cybersecurity #infosec
ift.tt/SCcDjR2
twelvesec (@twelvesec) 's Twitter Profile Photo

Malicious Nx packages in 's1ngularity' attack leaked 2,349 GitHub, Cloud, and AI credentials. #Cybersecurity #infosec #cybercrime #privacy #hacking ift.tt/dWrL5jU

Malicious Nx packages in 's1ngularity' attack leaked 2,349 GitHub, Cloud, and AI credentials.
#Cybersecurity #infosec #cybercrime #privacy #hacking
ift.tt/dWrL5jU
twelvesec (@twelvesec) 's Twitter Profile Photo

TransUnion has suffered a data breach, which has impacted the personal information of nearly 4.5m Americans. #Cybersecurity #infosec #cybercrime #privacy #hacking buff.ly/QyasTCH

TransUnion has suffered a data breach, which has impacted the personal information of nearly 4.5m Americans.
#Cybersecurity #infosec #cybercrime #privacy #hacking
buff.ly/QyasTCH
twelvesec (@twelvesec) 's Twitter Profile Photo

Dutch intelligence agencies have revealed that the Chinese #hacking group Salt Typhoon targeted organisations in the Netherlands. #Cybersecurity #infosec #cyberespionage buff.ly/4gqHLoC

Dutch intelligence agencies have revealed that the Chinese #hacking group Salt Typhoon targeted organisations in the Netherlands.
#Cybersecurity #infosec #cyberespionage
buff.ly/4gqHLoC
twelvesec (@twelvesec) 's Twitter Profile Photo

#Cybersecurity researchers have discovered a new #phishing campaign linked to the #ScarCruft North Korea hacking group to deliver the #RokRAT #malware. ift.tt/5S6Bjxi

#Cybersecurity researchers have discovered a new #phishing campaign linked to the #ScarCruft North Korea hacking group to deliver the #RokRAT #malware.
ift.tt/5S6Bjxi
twelvesec (@twelvesec) 's Twitter Profile Photo

#Cybercriminals are abusing #Meta’s advertising platforms with fake offers of a free #TradingView Premium app that spreads the #Brokewell #malware for #Android. ift.tt/AbDUNyX

#Cybercriminals are abusing #Meta’s advertising platforms with fake offers of a free #TradingView Premium app that spreads the #Brokewell #malware for #Android.
ift.tt/AbDUNyX
twelvesec (@twelvesec) 's Twitter Profile Photo

#Cybersecurity researchers are calling attention to a new shift in the #Android #malware landscape where dropper apps, that are usually used to deliver #banking #trojans, to also distribute simpler #malware such as SMS stealers and basic #spyware. ift.tt/N3PbBED

#Cybersecurity researchers are calling attention to a new shift in the #Android #malware landscape where dropper apps, that are usually used to deliver #banking #trojans, to also distribute simpler #malware such as SMS stealers and basic #spyware.
ift.tt/N3PbBED
twelvesec (@twelvesec) 's Twitter Profile Photo

The Pennsylvania’s Office of Attorney General has made public that it has been the victim of a #ransomware #cyberattack, causing delays to civil and criminal court cases. #Cybersecurity #Infosec #Hacking buff.ly/LlVYVYE

The Pennsylvania’s Office of Attorney General has made public that it has been the victim of a #ransomware #cyberattack, causing delays to civil and criminal court cases.
#Cybersecurity #Infosec #Hacking
buff.ly/LlVYVYE
twelvesec (@twelvesec) 's Twitter Profile Photo

#Cybersecurity researchers have discovered a malicious #npm package that comes with stealthy features to inject malicious code into desktop apps for #cryptocurrency wallets like #Atomic and #Exodus on #Windows systems. buff.ly/bR2i1Jr

#Cybersecurity researchers have discovered a malicious #npm package that comes with stealthy features to inject malicious code into desktop apps for #cryptocurrency wallets like #Atomic and #Exodus on #Windows systems.
buff.ly/bR2i1Jr
twelvesec (@twelvesec) 's Twitter Profile Photo

Amazon managed to disrupt the Russian Midnight Blizzard #hackers targeting #Microsoft 365 accounts and data. #Cybersecurity #Infosec #Hacking buff.ly/k1lAfzs

Amazon managed to disrupt the Russian Midnight Blizzard #hackers targeting #Microsoft 365 accounts and data.
#Cybersecurity #Infosec #Hacking
buff.ly/k1lAfzs
twelvesec (@twelvesec) 's Twitter Profile Photo

The Silver Fox group has been exploiting signed Drivers to deploy the #ValleyRAT #backdoor. #Cybersecurity #Infosec #Hacking buff.ly/DwtdudM

The Silver Fox group has been exploiting signed Drivers to deploy the #ValleyRAT #backdoor.
#Cybersecurity #Infosec #Hacking
buff.ly/DwtdudM
twelvesec (@twelvesec) 's Twitter Profile Photo

#Cybersecurity company #Zscaler warns it suffered a data breach after #hackers gained access to its #Salesforce instance and stole customer information, including the contents of support cases. ift.tt/udckGJo

#Cybersecurity company #Zscaler warns it suffered a data breach after #hackers gained access to its #Salesforce instance and stole customer information, including the contents of support cases.
ift.tt/udckGJo
twelvesec (@twelvesec) 's Twitter Profile Photo

Big European airports continue to grapple with the aftermath of the #cyberattack on Collins Aerospace. #Cybersecurity #infosec #cybercrime #hacking ift.tt/bBAOJQ7

Big European airports continue to grapple with the aftermath of the #cyberattack on Collins Aerospace.
#Cybersecurity #infosec #cybercrime #hacking
ift.tt/bBAOJQ7