Onlyweb3

733 posts

Onlyweb3 banner
Onlyweb3

Onlyweb3

@Onlyweb31

Web3

web3 انضم Ağustos 2022
1.2K يتبع49 المتابعون
Onlyweb3 أُعيد تغريده
Steakhouse Financial
Steakhouse Financial@SteakhouseFi·
🚨🚨Do not interact with the Steakhouse app until further notice. Our team has identified a phishing attack on Steakhouse domain (both app and website). No deposits are at risk. No contracts are affected. All Steakhouse depositors are safe. The issue may impact new users interacting with the malicious website served by the attacker. We are working to restore the frontend as soon as possible. We will communicate all updates asap.
English
32
78
274
130.3K
Kshitij Mishra | AI & Tech
Kshitij Mishra | AI & Tech@DAIEvolutionHub·
Become a full-stack Developer in 4 weeks 🧑💻 This PDF Includes: ✅ HTML ✅ CSS ✅ JavaScript ✅ React ✅ Node and Express ✅ MongoDB ✅ Font-end to Back-end Integration ✅ Deployment ✅ Testing ✅ Personal Project To get it: - Like, Retweet and Follow - Reply "Dev"
Kshitij Mishra | AI & Tech tweet media
English
76
46
85
7.8K
Onlyweb3 أُعيد تغريده
Web3 Antivirus
Web3 Antivirus@web3_antivirus·
WhatsApp users are being hit with a crypto trojan that looks like a harmless message from a friend or a chat you trust. The malware gets full access to your device via just a tap. It's built specifically to steal crypto. The moment you open Binance, OKX, Coinbase, MetaMask, Trust Wallet or any popular wallet or exchange app, the trojan starts harvesting data. The malware is targeting users in Brazil, but this method can affect anyone who uses WhatsApp.
Web3 Antivirus tweet media
English
1
4
12
1.1K
Onlyweb3 أُعيد تغريده
Nova
Nova@CryptoGirlNova·
1/ I was hacked this week for the first time in 8 years. Both my crypto wallets and entire socials were compromised. It didn't happen through clicking any obvious phishing links. I hired an expert and what he told me was shocking. Here's the untold story and how to avoid it 🧵👇
Nova tweet mediaNova tweet media
English
438
376
1.9K
788.7K
Onlyweb3 أُعيد تغريده
MistTrack🕵️
MistTrack🕵️@MistTrack_io·
Exciting New Toolkit Announcement! 🤗 Our highly requested Wallet Risk Assessment Tool (Beta Version) is now live! ✨ ✅ Try it here→misttrack.io/aml_risks/ So what can you do with this tool?👇 1. Check Risk Scores: Assess the risk score and funds of USDT on three major chains: TRON, ETH, and BSC. 2. Make Informed Decisions: Use the risk score to decide whether to interact with a specific wallet address. 3. Deep Analysis: Click "Deep Analysis" for more detailed information to track and monitor addresses. 4. Share Results: Easily share the risk status of addresses with friends and colleagues by clicking "Share."
English
4
12
27
134.4K
Onlyweb3 أُعيد تغريده
Vladimir S. | Officer's Notes
Vladimir S. | Officer's Notes@officer_secret·
Android malware (.apk) can be spread through a fake video by manipulating the @telegram file extension. @0x6rss showed how it is done in the video below! Keep in mind: 1. Data and Storage → Auto Download Media → Toggle off; 2. Never ever click on videos sent by strangers!
English
10
37
152
29K
Onlyweb3 أُعيد تغريده
Everclear
Everclear@EverclearOrg·
Connext is now ✨ Everclear: The First Clearing Layer ✨ Everclear coordinates the global settlement of liquidity between chains, solving fragmentation for modular blockchains. Learn more about Everclear and how it powers the Chain Abstraction Stack! 👇
GIF
English
113
500
1.3K
1.1M
Onlyweb3 أُعيد تغريده
Freedom Factory
Freedom Factory@FreedomFactory·
GM! Today’s the day! 🙌 The ethOS phone regular-order mint has arrived!
Freedom Factory tweet media
English
44
111
440
426.4K
Onlyweb3 أُعيد تغريده
smol
smol@smoldapp·
Smol announcement time 🔊 Smol v2 is live! A new hub for your blockchain chores! ✔️ Avoid address scams with your locally saved address book. ✔️ Send multiple tokens at once. ✔️ Disperse funds in a single tx Explore at smold.app and stay tuned for more apps.
English
9
37
134
16.5K
Onlyweb3 أُعيد تغريده
Vladimir S. | Officer's Notes
Vladimir S. | Officer's Notes@officer_secret·
The world is on fire... The flow of news is just endless at the moment, but how can you distinguish what is real and what is not? Evaluate the information for yourself. Studying my #OSINT manual is time-consuming, but it is worthwhile. officercia.mirror.xyz/Kfy7hVyHhwyBje…
English
2
9
36
4.3K
Onlyweb3 أُعيد تغريده
Gitcoin
Gitcoin@gitcoin·
DROP ALERT 🔥 GITCOIN 2.0 WHITEPAPER: GRANTS = GROWTH Written by @owocki & @meglister, this whitepaper illustrates how grants are pivotal for ecosystem growth and Gitcoin’s evolution from 1.0 to 2.0 🎉 Gitcoin 2.0 introduces diverse capital allocation mechanisms and embraces multiple EVM-based networks. The paper also explores Gitcoin’s modular solutions tech stack. Read the paper: gitcoin.co/whitepaper
Gitcoin tweet media
English
19
73
265
77.1K
Onlyweb3 أُعيد تغريده
Amir Ormu
Amir Ormu@AmirOrmu·
There has been an ongoing OTC scam recently, which has affected many legit teams and whales. $GBOT, $LINQ, $HMX teams and whales were targeted and unfortunately lost six figures! I will cover the scam method for $GBOT OTC incident, which caused a drama in Arbitrum space... 1/
Amir Ormu tweet media
English
42
36
193
219.9K
Onlyweb3 أُعيد تغريده
Justin Gardner
Justin Gardner@Rhynorater·
Ever wondered how people pop arbitrary account takeover vulns? I'll braindump some for ya. Here's what I got:
Justin Gardner tweet media
English
18
137
633
69K
Onlyweb3 أُعيد تغريده
Het Mehta
Het Mehta@hetmehtaa·
Checklist for SOC during Ransomware attack While dealing with a ransomware attack in a Security Operations Center (SOC), consider the following checklist: 1# Isolate Infected Systems: Immediately isolate affected systems from the network to prevent the ransomware from spreading further. 2#.Alert Management: Notify relevant stakeholders, including management, legal, and IT teams, about the attack. 3#.Gather Information: Document all available information about the attack, including the ransom note, malware samples, and affected systems. 4#. Engage the Incident Response Team: If available, involve your incident response team to lead the investigation and recovery efforts. 5#.Assessment: Determine the scope and impact of the attack on your systems and data. #6. Containment: Identify the ransomware variant and apply appropriate measures to contain the attack, such as disabling compromised accounts or network segments. 7# Data Backup Check: Verify the integrity of your data backups to ensure they are not compromised. Use clean backup data for recovery. #8. Communication Plan: Develop a communication plan for informing employees, customers, and partners about the situation, while adhering to legal and regulatory requirements. 9#. Malware Analysis: Conduct an analysis of the ransomware to understand its behavior, possible decryption methods, and potential vulnerabilities. 10# Engage Law Enforcement: If necessary, involve law enforcement agencies and share relevant information with them. 11#. Recovery Strategy: Develop a recovery strategy based on the nature of the attack, whether it's possible to decrypt files, or if you need to rebuild systems from scratch. 12#. Negotiation Consideration: Evaluate the risks and benefits of negotiating with the attackers for decryption keys. This is a complex decision with legal and ethical considerations. 13# User Education: Reinforce user education on cybersecurity practices to prevent future attacks. 14# Patch and Update: Identity and patch vulnerabilities that were exploited to deliver the ransomware. 15# Monitor and Analyze: Continuously monitor for signs of the ransomware reactivating or any new vulnerabilities being exploited. 16# Forensics: Conduct a thorough forensic analysis to understand how the attack occurred and whether any data was exfiltrated. 17# Post-Incident Review: After the attack is contained, conduct a review of the incident response process to identify areas for improvement. 18# Risk Mitigation: Implement security measures to prevent similar attacks in the future, such as endpoint detection and response (EDR) solutions, email filtering, and user training. Remember that each attack is unique, so the steps you take may vary. It's important to have a well-defined incident response plan in place and to collaborate closely with your incident response team and relevant stakeholders. #Infosec #SOC #Checklist #DataSecurity #Security #Cyber
English
11
203
733
132.6K
friend.tech
friend.tech@friendtech·
Here's some codes: ft-2sdi5u46 ft-p03arzmk ft-946wwxsg ft-dluvs3le ft-35nul88o ft-05uwurgv ft-6lfaafq8 ft-hisarn99 ft-lh2kfrf1 ft-ve6xuqaj ft-bh499gaw ft-9zhd6lge ft-tzjywqk6 ft-3uu1x6ci ft-pp81sivp ft-21vm496m ft-ngdmejya ft-3g5ix9ga ft-xqor7d5r ft-5pk2p00t
Indonesia
1.7K
125
713
349.2K