Falcon8x

1.7K posts

Falcon8x banner
Falcon8x

Falcon8x

@flacon8x

Chasing dreams by night. Occasionally, I even chase after my own shadow.

::1 Katılım Eylül 2019
357 Takip Edilen128 Takipçiler
Falcon8x retweetledi
Dominic Alvieri
Dominic Alvieri@AlvieriD·
Udemy online educational platform has been breached by ShinyHunters 1.4 million alleged student records containing PII are being claimed @udemy
Dominic Alvieri tweet media
English
12
67
275
103.2K
Falcon8x retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
🚨 Apple has finally patched the notification storage vulnerability that retained deleted messages for 30+ days, leaving them accessible to law enforcement extraction. Happy to have contributed to this together with you, my followers, by making this go viral. 💪
International Cyber Digest tweet media
International Cyber Digest@IntCyberDigest

🚨 BREAKING: The FBI has successfully extracted deleted Signal messages from a suspect's iPhone via notification storage, the place where all your notifications are stored for up to one month. Notification storage stores data from all messaging apps, it's a big flaw in iOS. But there's a way to turn it off...

English
19
258
1.6K
229.6K
Falcon8x
Falcon8x@flacon8x·
This is why Signal also offers features like disappearing messages and a separate Signal PIN/screen lock within the app: they're mitigations for exactly this endpoint-compromise reality, not part of the E2EE guarantee itself. Were you still able to read data with Signal Pin enabled?
English
0
0
0
13
Nana Sei Anyemedu
Nana Sei Anyemedu@RedHatPentester·
We now have access to signal messages when the message is at rest on the receiver’s phone⚡️
English
5
7
44
21.8K
Falcon8x retweetledi
Nana Sei Anyemedu
Nana Sei Anyemedu@RedHatPentester·
The SILENT WITNESS ON YOUR COMPUTER WAITING FOR YOU TO GET INTO TROUBLE. Most people believe that deleting a folder, clearing recent files, or wiping their history is enough to hide their tracks on a computer. What they don’t realize is that Windows quietly keeps a hidden record of the folders they open, even after those folders are deleted or the drive is removed. These records are called Shellbags, and they are one of the most powerful and incriminating artifacts available to forensic investigators. Shellbags appear inside two registry hives NTUSER.DAT and USRCLASS.DAT and they store detailed information about a user’s folder-browsing activity. This includes local folders, USB drives, external hard drives, network shares, and even directories that no longer exist. Each time a user opens a folder in Windows Explorer, the system automatically creates or updates a Shellbag entry. These entries contain timestamps, folder paths, the hierarchy of subfolders, the order in which a folder was accessed, and even the specific view settings used by the user. Because of this, Shellbags reconstruct a user’s exact navigation trail long after the person believes the evidence is gone. What makes Shellbags truly dangerous is the fact that they survive actions that users typically rely on to cover their tracks. Deleting a folder does not delete the Shellbag. Formatting a drive does not delete it. Even privacy tools and cleaners like CCleaner or BleachBit cannot reliably erase Shellbag data, because the information is deeply embedded within registry hives that standard cleaning utilities do not touch. The only way to remove Shellbags is through advanced forensic wiping, and attempting such wiping is, in itself, a sign of suspicious behavior. Forensic examiners rely heavily on Shellbags because they expose the truth even when a suspect tries to lie. If a person denies ever accessing a directory, the Shellbags can show when that folder was opened, how many times it was accessed, and whether it was located on an internal drive, an external USB, or a deleted partition. This makes Shellbags extremely valuable in investigations involving insider threats, data theft, fraud, child exploitation, unauthorized data access, and corporate disputes. In many cases, Shellbags become the deciding factor that disproves a suspect’s story. In the screenshot, the highlighted red section shows three important keys inside the registry. When all of this information is combined, Shellbags become a silent witness that never forgets. They reconstruct a hidden story of user activity that the person cannot deny, overwrite, or talk their way out of. This is why Shellbags remain one of the most feared artifacts for anyone attempting to conceal their actions on a Windows computer. You can delete the folder… but Shellbags still show it existed Even if you format a drive or delete the directory, Windows has already logged: 1. The folder name 2. Its full path 3. When it was opened 4. How many times it was opened 5. The view settings (icon mode, window size) 6. The order in which folders were browsed This means forensic investigators can prove someone accessed: “Secret” directories Hidden folder structures USB drives or removable media Folder paths used for storage of illicit or suspicious Folder paths used for storage of illicit or suspicious data even if the folders are long gone.
Nana Sei Anyemedu tweet media
English
387
2.3K
13.8K
1.5M
Falcon8x retweetledi
FalconFeeds.io
FalconFeeds.io@FalconFeedsio·
🚨 Ransomware Alert: 🇯🇲 JOH Investments Limited (myjohgroup.com), a Jamaica-based financial services company, has reportedly fallen victim to the Payload ransomware group. 📝 NB: The group intends to publish it within 5-6 days. 🔎 Key Details: 👥 Threat Actor: Payload 📅 Reported on: 21-04-2026 📦 Data Compromised: 30 GB
FalconFeeds.io tweet media
English
0
11
11
4.3K
Falcon8x retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
Go to iOS Settings → Notifications → [App Name] → Show Previews and set it to Never. You can also do this globally under Settings → Notifications → Show Previews → Never
International Cyber Digest tweet media
English
22
303
2.2K
399.1K
Falcon8x retweetledi
mRr3b00t
mRr3b00t@UK_Daniel_Card·
Cyber Tweeps, check this out: From CISA, Mobile Communications Best Practice Guidance 'Do not use a personal virtual private network (VPN). Personal VPNs simply shift residual risks from the internet service provider (ISP) to the VPN provider, often increasing the attack surface. Many free and commercial VPN providers have questionable security and privacy policies. However, if your organization requires a VPN client to access its data, that is a different use case.' cisa.gov/sites/default/…
mRr3b00t tweet media
English
15
22
136
14.4K
Falcon8x retweetledi
ALI TAJRAN
ALI TAJRAN@alitajran·
Microsoft introduces Backup and Recovery for Microsoft Entra ID! Entra Backup and Recovery solution enables you to quickly recover from malicious attacks or accidental changes by reverting your core tenant objects to any previous state within the last 5 days. With automated backups and granular recovery capabilities, it ensures minimal downtime and supports your business continuity in the face of unexpected disruptions. Entra automatically generates one backup per day, retaining the last 5 days of backup history. You can recover key properties of the following core tenant objects: - Users - Groups - Applications - Conditional access policies - Service principals - Organization - Authentication methods - Authorization policy - Named locations #EntraID #Microsoft365 #Microsoft
ALI TAJRAN tweet media
English
14
139
619
92.2K
Falcon8x retweetledi
Dark Web Intelligence
Dark Web Intelligence@DailyDarkWeb·
United States 🇺🇸 - LexisNexis has allegedly been breached, exposing 400,000 user profiles, federal judge and DOJ accounts, plaintext AWS secrets, customer passwords, and internal IT infrastructure maps. dailydarkweb.net/lexisnexis-inv…
Dark Web Intelligence tweet media
English
128
1.4K
4.5K
442.8K
Falcon8x retweetledi
Will
Will@BushidoToken·
ICYMI: This is the TTP that hit the UK retailers Scattered Spider mounts a virtualized domain controller (DC)’s VMDK as a drive to a new or decommissioned VM. This effectively allows the adversary to copy the AD database ntds.dit from an unmanaged host. go.crowdstrike.com/rs/281-OBQ-266…
Will tweet media
Will@BushidoToken

ICYMI: Was just perusing the latest CrowdStrike 2025 Threat Hunting report (crowdstrike.com/en-us/resource…) and check this wild timeline for Scattered Spider - from account takeover to Entra ID bulk user export in <5 minutes 👀

English
2
71
258
55.1K
Falcon8x retweetledi
CrowdStrike
CrowdStrike@CrowdStrike·
🚨 The CrowdStrike 2026 Global Threat Report is here. In the age of AI, even less sophisticated threat actors can execute complex attacks, and advanced adversaries have become dramatically more dangerous. This year’s report exposes the latest tradecraft of the evasive adversary, who is supercharging attacks with AI and posing an unprecedented threat. Attacks by AI-enabled adversaries increased by 89% in 2025. The average eCrime breakout time plummeted to just 29 minutes. That’s a 65% increase in speed from 2024. And with adversaries using AI to accelerate their attacks and move fluidly across domains, they are evading detection more effectively than ever. Get the latest threat intel findings here: crowdstrike.com/global-threat-…
English
15
40
143
19.5K
Falcon8x
Falcon8x@flacon8x·
@CableCarDom Which quarter of the year will this open? I’m planning a trip but would like to schedule during the time it’s slated to open so I can experience this.
English
0
0
0
5
Dominica Cable Car
Dominica Cable Car@CableCarDom·
This New Year, let the journey lift you. The Dominica Cable Car is more than a ride, it’s a passage through forests, clouds, and possibility. Wishing everyone a grounded yet elevated 2026. Know more - dominicacablecar.com
Dominica Cable Car tweet media
English
1
0
2
33
Falcon8x retweetledi
Evan You
Evan You@evanyou·
.@1Password browser extension is injecting Prism.js *globally* on every page, which then applies its syntax highlighting logic on all blocks matching [lang=*] regardless of whether it’s meant to be compatible, thus breaking original highlighting. Terrible negligence and even more so that this made to prod while already flagged during beta. Been a user for a long time but this will def push me to an alternative if not fixed soon.
English
117
207
2.7K
812.9K
Falcon8x retweetledi
Nick VanGilder
Nick VanGilder@nickvangilder·
Amazon measuring deviations in employee keystroke times from pre-established baselines probably shouldn’t surprise us at this point. Seems on brand, actually. “Keystroke data from the laptop of a worker who was supposed to be in US should have taken tens of milliseconds to reach Amazon’s Seattle headquarters. Instead, the flow from this machine was more than 110 milliseconds…” Lovely.
Nick VanGilder tweet media
English
155
871
12.2K
1.3M
Falcon8x retweetledi
Nana Sei Anyemedu
Nana Sei Anyemedu@RedHatPentester·
WhatsApp End-to-End Encryption vs. Forensic Extraction Although WhatsApp uses end-to-end encryption to protect messages, calls, and shared media during transmission, this protection only applies while the data is moving between devices. Once the content reaches the device, it is stored unencrypted within WhatsApp’s local databases and media folders. Out of the volumes of content, such as 733,543 WhatsApp messages, along with videos, audios, images, and documents. I was able to get a conversation between my kid sister @ama_Anyemedu in November 11, 2020. The chat preview shows a typical WhatsApp conversation recovered from a mobile forensic extraction. At the top of the chat, WhatsApp displays the standard banner “Messages are now secured with end-to-end encryption.” This banner simply means that when messages are being transmitted between two devices, WhatsApp’s servers cannot read them because they are protected by encryption keys stored only on the users’ devices. However, end-to-end encryption does NOT protect data stored on the device itself. Mobile forensics work by accessing the phone’s internal storage, not by intercepting messages from WhatsApp servers. Once a device is unlocked or decrypted by the lawful extraction process, the tool can read the local WhatsApp databases stored on the device (usually the `msgstore.db` and related SQLite databases). This is why, despite the presence of the "end-to-end encryption" banner, the forensic tool is still able to extract: * Full chat history * Timestamps * Participants * Message contents * Attachments * Deleted messages (if still recoverable in the database) End-to-end encryption protects data in transit, not data *at rest* on the device. Forensic tools exploit lawful access to the device’s decrypted file system, enabling them to parse and display the stored WhatsApp database, which is why you can see the complete message timeline, content, and timestamps on the right side.
Nana Sei Anyemedu tweet mediaNana Sei Anyemedu tweet media
English
104
617
2.6K
301.6K
Falcon8x retweetledi
Huntress
Huntress@HuntressLabs·
ClickFix just got a shady upgrade. Our analysts uncovered a campaign hiding infostealers inside PNG pixel data, delivered through fake CAPTCHA and Windows Update screens. 👀 Get the full breakdown so you can shut it down: okt.to/jkr2JW
English
3
23
93
8.7K
Falcon8x retweetledi
DANΞ
DANΞ@cryps1s·
As part of our commitment to security and transparency, we’ve published details on a recent security incident involving one of our vendors, Mixpanel. This was not a breach of OpenAI’s systems. No chats, API requests, files, keys, credentials, payment details, or government IDs were compromised or exposed. Full details on the incident can be found in our blog: openai.com/index/mixpanel…
English
13
15
128
29.5K
Falcon8x retweetledi
Riley Walz
Riley Walz@rtwlz·
We cloned Gmail, except you're logged in as Epstein and can see his emails
Riley Walz tweet media
English
1K
10.6K
132.4K
23M