Sabitlenmiş Tweet
Oppe ☣︎
771 posts


@mosalamandani Nice to see how they are terrified from us, that sneak like rats to do nasty shit. Lol, tell em we don't bite.
English

@nas_bench Guess what, and it actually works, with AI they're passing 100 of signature based detection which is heavily implemented, the other task is to know what to run and what not. Plus making gaps for EDR telemetry. Before AI they were doing less than that and it works
English

@vxunderground Lol, US care more about spending billions on wars and trillions for Israel than spending some money for its civilians lives
English

🚨🌍 INTERPOL carried out Operation Ramz, the first cyber operation in the MENA region with 201 arrests, 382 additional suspects identified, 3,867 victims, and 53 servers seized across 13 countries.
The operation ran from October 2025 to February 28, 2026, and targeted phishing, malware, and cyber scam infrastructure. Around 8,000 pieces of data and intelligence were shared between participating countries: Algeria, Bahrain, Egypt, Iraq, Jordan, Lebanon, Libya, Morocco, Oman, Palestine, Qatar, Tunisia, and UAE.
Jordanese Police pinpointed a computer running fraudulent "trading platform" scams. A raid found 15 people running the scams, but investigators determined they were victims of human trafficking, recruited under false employment promises from Asia, passports confiscated on arrival, and forced into the scheme. Two suspects orchestrating the operation were arrested.
Other notable hits:
- Algeria dismantled a phishing-as-a-service operation, with one arrest and a server, computer, phone, and hard drives seized
- Morocco seized devices containing banking data and phishing tools, with three individuals in judicial proceedings
- Qatar identified compromised devices whose owners were themselves cyberattack victims unknowingly spreading malware
- Oman disabled a private-residence server holding sensitive information that had been infected with malware
Private-sector partners included Group-IB, Kaspersky, Shadowserver Foundation, Team Cymru, and TrendAI.




English

@jcatblackhat @WeirdQuadratic He keep posting about it for two years about hating it and traveling now he want to sell exploits for ur ID and verification. He's a fed. All of this was just a show. Cheap fed techniques
English

@Oppenheim3r @WeirdQuadratic Hates mcsft what can ya do
It's no different than one of us getting back at a company, govt, etc
English

@WeirdQuadratic I was happy when I read the first words, then got disappointed at (if my username) just do it
English

@WeirdQuadratic I don't find exploits and I don't yap, most importantly I don't fake
English

@SBousseaden Because a rule was added lol, average log collector would do that easily once rule added
English

MiniPlasma LPE exploit works perftectly. Elastic Defend behavior protection catches the exploit primitives involved in the chain, providing detection coverage even against fresh public exploit.
github.com/Nightmare-Ecli…


English

My new hate is this flurry of people now becoming l33t 0day researchers overnight. "I found this 0day"... no... you AND THE AI found the 0day. This industry has always had people taking credit for others work. Be open and honest people, it's fine to admit that AI is playing a part (call out this BS where you see it!).
GIF
English

@Oppenheim3r Hunger makes everybody angry.
Go and eat
English

@LxlxIxlxlxL @standa_t DO NOT SHOW PITY, you can't afford it, then accept that fact and learn harder to be beyond. You don't need that trash, you can look up the course appendix and search each one independently, the you will realize you wouldn't spend a dime for anything to learn, it's all free.
English

@standa_t Oh I know you are great at your work but I can't afford it because I don't have any budget to afford this unfortunately, but seeing you in the field still inspires me Satoshi!! Maybe at the next years I'll have a budget and can take lessons from you (I wish...)

English

Excited to announce that registration for my remote hypervisor class in October is open! tandasat.github.io
The class teaches you how hypervisors can be used for security and research, including hardening, fuzzing and reversing, as well as common designs and vulnerabilities

English












