Andre M. DiMino

6.2K posts

Andre M. DiMino banner
Andre M. DiMino

Andre M. DiMino

@sempersecurus

Researcher w/ DeepEnd Research == DFIR, cybercrime, threat intelligence, malware & exploit studies. 1:Thess. 5:15 ✝ Open DMs

Katılım Eylül 2008
1.1K Takip Edilen7.3K Takipçiler
Andre M. DiMino
Andre M. DiMino@sempersecurus·
@tlansec Sunsetted the legacy plans and introduced new $$$$$ plans.
English
0
0
0
184
Andre M. DiMino
Andre M. DiMino@sempersecurus·
Goodbye Maltego. It's been nice knowing you
English
1
0
1
1K
Andre M. DiMino
Andre M. DiMino@sempersecurus·
Operation Winter SHIELD (Securing Homeland Infrastructure by Enhancing Layered Defense) distills the FBI’s 10 most impactful actions organizations can take to improve resilience against cyber intrusions. These recommendations were developed with domestic and international partners and draw on recent investigations to reflect adversary behavior and defensive gaps. fbi.gov/investigate/cy…
English
0
0
1
202
Andre M. DiMino retweetledi
Lucas Valbuena
Lucas Valbuena@NotLucknite·
I've just ran @OpenClaw (formerly Clawdbot) through ZeroLeaks. It scored 2/100. 84% extraction rate. 91% of injection attacks succeeded. System prompt got leaked on turn 1. This means if you're using Clawdbot, anyone interacting with your agent can access and manipulate your full system prompt, internal tool configurations, memory files... everything you put in SOUL.md, AGENTS.md, your skills, all of it is accessible and at risk of prompt injection. For agents handling sensitive workflows or private data, this is a real problem. cc @steipete Full analysis: zeroleaks.ai/reports/opencl…
Lucas Valbuena tweet media
English
358
802
5.1K
955.8K
Andre M. DiMino retweetledi
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
MongoBleed (CVE-2025-14847) is basically Heartbleed for MongoDB - unauthenticated memory disclosure - public POC, trivial to exploit - leaks creds, tokens, cloud keys straight from RAM - huge exposed surface on the internet Good writeups and technical details here: doublepulsar.com/merry-christma… ox.security/blog/attackers… blog.ecapuano.com/p/hunting-mong… Patch fast, rotate secrets, and assume exposed instances were scanned(!)
English
41
612
3.4K
652.5K
Andre M. DiMino retweetledi
Andre M. DiMino retweetledi
Doug Burks
Doug Burks@dougburks·
OhMyDebn 2.1.0 now available with many improvements! - You can now launch @iamdothash's amazing Aether theme builder by pressing Ctrl-Shift-A - When you apply the theme, you will get a new starship prompt config that leverages the terminal's dynamic colors (thanks @saeed_vz for the idea!)
Doug Burks tweet media
English
2
4
9
981
Amy
Amy@20th_Centurygal·
Some songs lift us up, other songs bring us down. What's the most depressing song you can think of...😩🎶
English
768
15
326
37.3K
Andre M. DiMino
Andre M. DiMino@sempersecurus·
"Prosecutors allege incident response pros used ALPHV/BlackCat to commit string of ransomware attacks" The trio are accused of carrying out the conspiracy from May 2023 through April 2025 cyberscoop.com/incident-respo…
English
0
0
1
156
Mambo Italiano
Mambo Italiano@mamboitaliano__·
By chance, in a fleeting moment Today, I took this photo A ray of sunlight a book Autumn🍂 So much resilience the choice not to fall like the leaves Sitting strong with composure with pride How beautiful life becomes even when it’s less than beautiful with the right attitude
Mambo Italiano tweet media
English
7
8
172
6.2K
Andre M. DiMino
Andre M. DiMino@sempersecurus·
The Smishing Triad's extensive, global phishing campaign exploits SMS messages to impersonate critical sectors - Campaign targets U.S. residents, expanding globally since April 2024. - Over 194,000 malicious domains identified, using decentralized infrastructure. - Aims to collect sensitive information such as National Identification Numbers (such as Social Security numbers), home addresses, payment details and login credentials. unit42.paloaltonetworks.com/global-smishin…
English
0
0
0
137
Andre M. DiMino retweetledi
Homeland Security
Homeland Security@DHSgov·
Today, the @SecretService announced the dismantling of a network of electronic devices—located within 35 miles of the United Nations General Assembly—used to carry out a wide range of telecommunications attacks. The potential for disruption to our country’s telecommunications posed by this network of devices cannot be overstated. The U.S. Secret Service’s protective mission is all about prevention, and this investigation makes it clear to potential bad actors that imminent threats to our protectees will be immediately investigated, tracked down and dismantled.
English
959
7.7K
29.7K
860.4K
Andre M. DiMino retweetledi
U.S. Secret Service
U.S. Secret Service@SecretService·
The Secret Service dismantled a network of more than 300 SIM servers and 100,000 SIM cards in the New York-area that were capable of crippling telecom systems and carrying out anonymous telephonic attacks, disrupting the threat before world leaders arrived for the UN General Assembly. 📰 Read more about this at secretservice.gov/newsroom/relea…
U.S. Secret Service tweet mediaU.S. Secret Service tweet mediaU.S. Secret Service tweet media
English
3.7K
20.6K
90.7K
12.9M
Andre M. DiMino retweetledi
U.S. Secret Service
U.S. Secret Service@SecretService·
As we do every year, it is with a heavy heart that we pause to honor the lives lost and the families forever changed September 11, 2001. However, we are always grateful for the courage of first responders and the unity of our Nation in the face of unthinkable tragedy. #NeverForget
U.S. Secret Service tweet media
English
301
1.1K
6.7K
140.2K
Andre M. DiMino retweetledi
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
People on here act like someone decides not to patch. Like there’s a guy who knows the service is vulnerable, knows it runs in prod, and just shrugs. That’s maybe 1% of the cases. The rest is messier: - No idea the service exists (no inventory) - No idea it’s vulnerable (no vuln reporting) - Afraid to break stuff (downtime, legacy crap) - No one owns it (silos, shadow IT) - No time (small team, constant firefighting) - Bad processes (manual patching, approvals, etc) - Patching tools suck (yep, that too) It’s rarely negligence. It’s usually chaos.
English
45
99
611
87.4K
Andre M. DiMino retweetledi
Monnappa K A
Monnappa K A@monnappa22·
A few days back at #DEFCON, I released the Garuda Threat Hunting Framework — crafted for manual threat hunting & detection. Here is the link: github.com/monnappa22/Gar… When integrated with LLMs, it enables AI-powered autonomous threat hunting. youtu.be/Sk_c5w1CEiY
YouTube video
YouTube
English
1
19
36
4K