Digital Warfare

607 posts

Digital Warfare banner
Digital Warfare

Digital Warfare

@Digital_Warfare

OUR SERVICES: Penetration Testing, Web Application Penetration Testing (UI & API), Vulnerability Assessments, Risk Management, Code Reviews, Compliance, vCISO

United States Katılım Ocak 2018
210 Takip Edilen58 Takipçiler
Sabitlenmiş Tweet
Digital Warfare
Digital Warfare@Digital_Warfare·
Our Senior Principal, James Knight, spoke with Daily Mail about the recent Cloudflare outage that disrupted major online services across the globe. In the interview, James discussed the importance of redundancy, operational transparency.....Read more: dailymail.co.uk/sciencetech/ar…?
English
1
0
0
260
Digital Warfare
Digital Warfare@Digital_Warfare·
🚨 The malware is designed for persistence and surveillance rather than immediate disruption. 🎧 Full breakdown in today’s Digital Warfare Daily Brief. open.spotify.com/episode/24hV90… To strengthen endpoint visibility and reduce identity-driven compromise, visit DigitalWarfare.com.
Digital Warfare tweet media
English
0
0
0
2
Digital Warfare
Digital Warfare@Digital_Warfare·
🔴 node-ipc supply chain attack • Credential stealer deployed • npm ecosystem targeted • CI/CD exposure risk 👉 Discover why enterprises trust Digitalwarfare.com to test software supply chain and developer infrastructure attack paths. Read more: linkedin.com/pulse/node-ipc…
Digital Warfare tweet media
English
0
0
0
11
Digital Warfare
Digital Warfare@Digital_Warfare·
🚨 Researchers uncovered a malicious npm package impersonating the trusted Tanstack ecosystem. 🎧 Full breakdown in today’s Digital Warfare Daily Brief. open.spotify.com/episode/1svSDj… To strengthen software supply chain security and reduce developer risk, visit Digitalwarfare.com
Digital Warfare tweet media
English
0
0
0
20
Digital Warfare
Digital Warfare@Digital_Warfare·
🔴 TrickMo banking trojan • Mobile session hijacking • OTP theft 👉 Discover why enterprises trust Digitalwarfare.com to test mobile identity and authentication attack paths before Android malware becomes enterprise compromise. Read more: linkedin.com/pulse/trickmo-…
Digital Warfare tweet media
English
0
0
0
13
Digital Warfare
Digital Warfare@Digital_Warfare·
🔴 Vidar infostealer • Session cookie theft • Browser credential harvesting 👉 Discover why enterprises trust Digitalwarfare.com to test identity and session attack paths before infostealers become enterprise breaches. Read more:linkedin.com/pulse/vidar-ma…
Digital Warfare tweet media
English
0
0
0
10
Digital Warfare
Digital Warfare@Digital_Warfare·
🎵 New episode out. 🚨 Threat actors linked to ShinyHunters allegedly attempted to sell the stolen information online. 🎧 Listen to the full briefing here: open.spotify.com/episode/6TyGVD… To strengthen vendor risk management and reduce third-party exposure, visit DigitalWarfare.com.
Digital Warfare tweet media
English
0
0
1
64
Digital Warfare
Digital Warfare@Digital_Warfare·
🔴 Ollama memory leak • Bleeding Llama flaw • Remote unauthenticated risk 👉 Partner with Digitalwarfare.com today and discover why enterprises trust us to test AI infrastructure before local inference becomes enterprise data exposure. Read more: linkedin.com/pulse/ollama-m…
Digital Warfare tweet media
English
0
0
0
26
Digital Warfare
Digital Warfare@Digital_Warfare·
🔴 TCLBANKER malware • WhatsApp hijacking • Outlook phishing 👉 Discover why enterprises trust Digitalwarfare.com to test identity and communication attack paths before trusted channels become malware infrastructure. Read more: linkedin.com/pulse/tclbanke…
Digital Warfare tweet media
English
0
0
0
10
Digital Warfare
Digital Warfare@Digital_Warfare·
🔴Dirty Frag exploit • Linux root access • Kernel flaw 👉 Partner with Digitalwarfare.com today and discover why enterprises trust us to test Linux and cloud attack paths before privilege escalation becomes infrastructure compromise. Read more: linkedin.com/pulse/dirty-fr…
Digital Warfare tweet media
English
0
0
0
68
Digital Warfare
Digital Warfare@Digital_Warfare·
🚨 Researchers uncovered Quasar Linux (QLNX), a stealth Linux RAT targeting developers and DevOps environments for credential theft and supply chain compromise 🎧 Full breakdown in today’s Digital Warfare Daily Brief. open.spotify.com/episode/6F8I13…
Digital Warfare tweet media
English
0
0
0
15
Digital Warfare
Digital Warfare@Digital_Warfare·
🔴 vm2 sandbox flaws • Sandbox escape • Remote code execution 👉 Discover why enterprises trust Digitalwarfare.com to test runtime isolation and cloud attack paths before sandbox failures become infrastructure compromise. Read more: linkedin.com/pulse/vm2-node…
Digital Warfare tweet media
English
0
0
0
17
Digital Warfare
Digital Warfare@Digital_Warfare·
🔴 Russian ransomware case • Initial access broker • Yanluowang links 👉 Partner with Digitalwarfare.com today and discover why enterprises trust us to test ransomware attack paths before stolen access becomes enterprise compromise. Read more: linkedin.com/pulse/russian-…
Digital Warfare tweet media
English
0
0
0
17
Digital Warfare
Digital Warfare@Digital_Warfare·
🚨 Researchers demonstrated how Azure AD Conditional Access could be bypassed using phantom device registration and Primary Refresh Token abuse. 🎧 Full breakdown in today’s Digital Warfare Daily Brief. open.spotify.com/episode/1eWU5o…
Digital Warfare tweet media
English
0
0
0
16