S2W

393 posts

S2W banner
S2W

S2W

@S2W_Official

AI-powered Data Intelligence

South Korea Katılım Ekim 2019
2 Takip Edilen1.3K Takipçiler
Sabitlenmiş Tweet
S2W
S2W@S2W_Official·
S2W TALON analyzed global #ransomware activity in H2 2025. The report analyzes victim trends by country and industry, ransomware group activity, and highlights the most high-risk groups through TALON’s risk assessment. 👉 Learn more: s2w.inc/en/resource/de…
S2W tweet media
English
0
0
2
218
S2W
S2W@S2W_Official·
#Beast ransomware, first identified in June 2025, gained attention after attacking three South Korean companies in Feb 2026. The group is known to perform initial access through phishing emails and compromised RDP endpoints. 👉 Learn more: s2w.inc/en/resource/de…
S2W tweet media
English
0
0
3
138
S2W
S2W@S2W_Official·
🇫🇷 France - Threat actor is selling credit card data belonging to French users of the streaming platform N******. - Date: March 29, 2026 - Threat Actor: blackhat1717 - Industry: Entertainment 👉 SUBSCRIBE to <S2W Daily Brief News> on Telegram: t.me/s2wdailybrief
S2W tweet media
English
0
0
1
119
S2W
S2W@S2W_Official·
We’re excited to share that we’ll be exhibiting at @INCYBER_Europe in Lille, from March 31 to April 2. Visit us at Booth G10 to explore how we’re advancing the field of cyber threat intelligence and cybercrime intelligence. 👉 Learn more: s2w.inc/en/product/pd0…
S2W tweet media
English
0
1
3
237
S2W
S2W@S2W_Official·
- Date: March 23, 2026 - Threat Actor: Qilin - Victim Information: Groupe S*** - Industry: Manufacturing - Region: Europe - Country: 🇫🇷 France For more details, please contact us through the link below. 👉 Contact us: bit.ly/teldb
English
0
0
1
43
S2W
S2W@S2W_Official·
The group demonstrated highly active operations, uploading 710 victim companies to its DLS during the second half of 2025. Its collaborations with other cybercrime groups, including DragonForce and LockBit, also suggest an expansion of its attack ecosystem.
English
1
0
1
65
S2W
S2W@S2W_Official·
🇫🇷 France - Groupe S***, a locking equipment and systems company with approximately €600 million in annual revenue, was posted on Qilin ransomware leak site with sample data disclosed on March 23, 2026.
S2W tweet media
English
1
0
1
160
S2W
S2W@S2W_Official·
The #cyberwarfare between #Israel and #Iran is escalating rapidly. S2W Threat Intelligence Center TALON has published a report analyzing the detailed cyberwarfare between Iran and Israel/USA. 👉 Learn more: s2w.inc/en/resource/de…
S2W tweet media
English
0
0
1
112
S2W
S2W@S2W_Official·
🇵🇱 Poland - An internet service provider was listed by Katarinka in a post describing alleged database exports, helpdesk records, invoices, contracts, IDs, and installation-related files. 👉 SUBSCRIBE to <S2W Daily Brief News> on Telegram: t.me/s2wdailybrief
S2W tweet media
English
0
1
1
210
S2W
S2W@S2W_Official·
The #OpenClaw Ban Wave: Why are organizations restricting the AI Agent? S2W TALON has published a new report on OpenClaw, analyzing its rapid spread and the critical security issues. 👉 Learn more: s2w.inc/en/resource/de…
S2W tweet media
English
0
1
2
219
S2W
S2W@S2W_Official·
🇧🇷 Brazil - V***, a telecom provider offering mobile and internet services, is facing difficulties after 557,892 customer account records including emails, phone numbers, and passwords were leaked. 👉 SUBSCRIBE to <S2W Daily Brief News> on Telegram: t.me/s2wdailybrief
S2W tweet media
English
0
0
1
174
S2W
S2W@S2W_Official·
For attacks against South Korea, they utilize tools including "MegaMedusa" (custom-built) and "Zeus Stresser" (a commercial DDoS service). For a detailed analysis, check out the full report from S2W Threat Intelligence Center TALON. [4/4] s2w.inc/en/resource/de…
English
0
0
2
103
S2W
S2W@S2W_Official·
The group conducts DDoS attacks and targets SCADA systems. By providing easy-to-use tools to various participants, they are lowering the barrier to entry. This expands their organizational scale, leading to increased attack frequency and heightened potential threats. [3/4]
English
1
0
1
91
S2W
S2W@S2W_Official·
🚨 Amid escalating U.S.-Iran tensions, groups like #RipperSec are gaining attention for their cyber activities linked to geopolitical conflicts. S2W Threat Intelligence Center TALON has released a profiling report on RipperSec. [1/4] 👉 Learn more: s2w.inc/en/resource/de…
English
1
0
7
216
S2W
S2W@S2W_Official·
🤖 AI-generated #malware is now a reality. S2W TALON analyzed '#VoidLink', a sophisticated Linux malware developed in just 1 week using an AI-driven IDE (TRAE). 👉 Learn more: s2w.inc/en/resource/de…
S2W tweet media
English
0
2
6
1.1K
S2W
S2W@S2W_Official·
Cartel-style ransomware in action: #DragonForce. Active since Dec 2023, the group operates as #RaaS, targeted 363 companies, and expanded its influence across dark web forums. S2W TALON breaks down its ecosystem & TTPs. 👉 Learn more: s2w.inc/en/resource/de…
S2W tweet media
English
0
0
2
294
S2W
S2W@S2W_Official·
New TALON report: Critical vulnerabilities in #n8n workflow automation. CVE-2025-68613 and CVE-2026-21858 could be chained to increase security risk. 👉 Learn more: s2w.inc/en/resource/de…
S2W tweet media
English
0
0
1
234