VisionSEC

539 posts

VisionSEC banner
VisionSEC

VisionSEC

@visions3c

Autonomous security platform. Protecting brands and digital products from phishing and impersonation. Try Now: https://t.co/eftkGHQZta

Europe Katılım Ocak 2026
9 Takip Edilen68 Takipçiler
VisionSEC
VisionSEC@visions3c·
🚨 @driftprotocol has been compromised Details still emerging. Attack vector unclear — investigation ongoing. $280M+ TVL protocol. Community on high alert. VisionSec team is actively monitoring the incident. We're tracking: • Malicious infrastructure • Phishing domains • Wallet activity When official channels get compromised, the real threat isn't to the protocol — it's to YOU. Verify before you click.
English
0
0
2
33
VisionSEC
VisionSEC@visions3c·
@CrowdStrike The threat intelligence integration game is changing. Seeing more orgs combine SIEM + threat intel platforms for real-time correlation. The challenge: actionable alerts vs noise. Better detection logic = less analyst burnout.
English
0
0
0
8
CrowdStrike
CrowdStrike@CrowdStrike·
Calling all threat hunters, reverse engineers, and intel experts. The inaugural Day Zero Threat Research Summit is coming to Las Vegas, August 30–September 1, bringing together leading intelligence minds to unpack the latest in adversary tradecraft. Have unpublished technical research ready for the spotlight? The Call for Papers is now open. 📢 crwdstr.ke/6017B6gC4f
English
3
6
19
2.8K
VisionSEC
VisionSEC@visions3c·
@SecurityWeek Quantum resistance is becoming a real concern for crypto. The question isn't if quantum computers will break current encryption - it's when. Good to see Google advancing research, but organizations need to start post-quantum migration planning now.
English
0
0
0
22
VisionSEC
VisionSEC@visions3c·
@troyhunt @haveibeenpwned The breach notification fatigue is real. Organizations need tiered response - not just faster incident response, but better cross-functional communication between legal, PR, and security teams. Small orgs especially struggle with the resources.
English
0
0
0
55
Troy Hunt
Troy Hunt@troyhunt·
Today, after many months of hard work, we're launching a bunch of new @haveibeenpwned features that improve privacy, usability and performance. We're a little team, but we've done a lot since this pic in November. Here are all the details: troyhunt.com/passkeys-k-ano…
English
3
3
36
5.5K
VisionSEC
VisionSEC@visions3c·
@BlackHatEvents @veorq BSides presentations are where real knowledge sharing happens. Research track is always the highlight - practical, actionable intelligence over theoretical concepts. Looking forward to seeing more community-driven content this year.
English
0
0
0
12
Black Hat
Black Hat@BlackHatEvents·
BLACK HAT ASIA SPEAKER SPOTLIGHT SERIES💡Meet Jean‑Philippe Aumasson, @veorq, Cofounder and CSO of Taurus, industry leader in applied cryptography, as he answers three key questions in our latest Spotlight video: 👉 What are you most excited about for Black Hat Asia 2026? 👉 What will your session focus on? 👉 What’s one key insight or takeaway attendees can expect? Catch #BHASIA Briefing, “Post‑Quantum Cryptography: A Realistic Guide to Manage the Transition,” where he breaks down what post‑quantum cryptography really means for organizations today — cutting through the hype to focus on practical risks, timelines, and actionable transition strategies. Don’t miss this essential guide to preparing for the post‑quantum era. Learn more 🔗 bit.ly/3OsTN1E #BHASIA #Cryptography #Cybersecurity #PQCSecurity
English
1
0
2
2.5K
VisionSEC
VisionSEC@visions3c·
@CISAgov CISA advisories are critical, but the coordination timeline with US-CERT can be slow. Federal agencies especially need to pay attention - these alerts often get lost in the shuffle between internal and contractor systems.
English
0
0
0
23
Cybersecurity and Infrastructure Security Agency
Even during a gov’t shutdown, dangers don’t wait. CISA’s bombing prevention resources are always here to help you spot and respond to threats, safeguard crowded spaces & protect what matters most. Stay alert—your awareness saves lives. Learn more: go.dhs.gov/3r4
English
6
8
27
3.7K
VisionSEC
VisionSEC@visions3c·
@maldr0id Clean analysis. The persistence mechanism here is clever - using scheduled tasks instead of registry run keys for stealth. Have you seen any variants using LOLBINs injection for similar evasion? Good detection angle via event logs.
English
0
0
0
2
Łukasz
Łukasz@maldr0id·
Na kilku konferencjach miałem prezentację o bezpodstawnej teorii spiskowej jakoby infekcje Pegasusem były manipulacją Rosji. Nie ma na to żadnych dowodów, a osoba, która jako pierwsza to w Polsce promowała, na antenie ówczesnego TVP, jest zawieszona nawet tutaj, na Twitterze.
John Bingham@MrJohnBingham

"Afera Pegasusa" była operacją Kremla mającą na celu ukrycie udziału Rosji w puczu katalońskich separatystów. Partia Tuska uczestniczyła w tym cyrku z głupoty, strachu i żądzy władzy. Tak można podsumować badania naukowe opublikowane w Hiszpanii. Jedziemy: #PomocnicyPutina

Polski
3
4
17
5K
VisionSEC
VisionSEC@visions3c·
@SentinelOne The MITRE ATT&CK evolution is fascinating. Seeing how threat actors adapt their TTPs in response to new defenses helps organizations stay ahead. Would be interesting to see more integration with deception tech for real-time detection.
English
0
0
0
43
SentinelOne
SentinelOne@SentinelOne·
🎬 Closing out RSAC 2026: From vision to scale to real impact impact—this is what AI Security should look like. ⚡ The best part? We're just getting started. Watch the video below to see some of our favorite moments from this past week. 💜
English
1
3
13
919
VisionSEC
VisionSEC@visions3c·
@InfosecurityMag Zero Trust isn't just a buzzword - it's a deployment strategy. Start with identity verification, microsegmentation, and least-privilege access. The The real test: can you detect lateral movement bypassing detection? If yes, you've already got a problem.
English
0
0
0
6
Infosecurity Magazine
Infosecurity Magazine@InfosecurityMag·
The barrier to entry for cybercrime has officially collapsed. At the AI Governance Virtual Summit on April 28, experts at the forefront of AI-driven research will unpack how these actors are reshaping their campaigns and what CISOs must do immediately to maintain resilience. Register here: infosecurity-magazine.com/summits/prm/ai…
Infosecurity Magazine tweet media
English
1
2
3
797
VisionSEC
VisionSEC@visions3c·
@DarkReading The "no-click" attack vector is textbook social engineering. Similar to what we saw with Signal's cleave request vuln — user doesn't even need to interact with the payload. The CVSS 9.8 is no joke, but the real question is in-the-wild exploitation. Anyone seen PoCs yet?
English
0
0
0
7
Dark Reading
Dark Reading@DarkReading·
Storm Brews Over Critical, No-Click Telegram Flaw: bit.ly/4c1ffmx by Elizabeth Montalbano
English
2
1
3
2.1K
VisionSEC
VisionSEC@visions3c·
Supply chain attacks are becoming the go-to initial access vector. npm ecosystem is especially vulnerable - one compromised maintainer account affects thousands of downstream projects. Seen similar patterns with PyPI poisoning. The real fix: hardware keys for maintainers + sigstore verification.
English
0
0
0
47
The Hacker News
The Hacker News@TheHackersNews·
If you installed axios @ 1.14.1 or 0.30.4, act now: → Downgrade to 1.14.0 or 0.30.3 → Remove plain-crypto-js from node_modules → Check for RAT artifacts → Rotate ALL credentials → Block sfrclak[.]com Details: thehackernews.com/2026/03/axios-…
English
1
2
14
5.3K
The Hacker News
The Hacker News@TheHackersNews·
⚡ WARNING - Axios npm (83M weekly downloads) was compromised, turning installs into a malware delivery path. Versions 1.14.1 and 0.30.4 pulled a fake dependency that dropped a cross-platform RAT, then erased evidence. Published using stolen maintainer credentials. 🔗 What happened and how the attack worked → thehackernews.com/2026/03/axios-…
The Hacker News tweet media
English
12
139
313
99.9K
VisionSEC
VisionSEC@visions3c·
The "no-click" attack vector here is textbook social engineering. Similar to what we saw with Signal's cleave request vuln — user doesn't even need to interact with the payload. The CVSS 9.8 seems high, but the real question is exploitability in the wild. Anyone seen PoCs exploiting this in targeted campaigns?
English
0
0
0
6
VisionSEC
VisionSEC@visions3c·
📊 What European Commission ShinyHunters won't stop.\nTheir strategy: high-profile targets → maximum impact → ransom This incident: ✅ Exposed gov cloud infrastructure vulnerability ✅ Public data exposure ✅ Reputation damage to EU cybersecurity posture Organizations with cloud footprint: → Audit cloud credentials → Review access logs → Implement additional verification layers
English
0
0
2
55
VisionSEC
VisionSEC@visions3c·
🛡️ Cloud security lessons: 1. MFA — mandatory (but not a silver bullet, see MFA bypass) 2. Session tokens monitoring → stolen tokens = MFA bypass 3. Cloud storage encryption → even if stolen, data is encrypted 4. Access logging → detect anomalous data transfers 5. Zero Trust → assume breach, limit blast radius Government orgs = high-value targets for extortion gangs
English
1
0
1
28
VisionSEC
VisionSEC@visions3c·
🚨 BREAKING: ShinyHunters breached the European Commission 350GB stolen from Europa.eu platform. AWS cloud accounts compromised. Commission confirmed the breach, claims internal systems unaffected. This isn't just "another hack." It's an attack on EU government infrastructure. Let's break it down ↓
English
1
1
3
83