ZeroBS_GmbH

1.6K posts

ZeroBS_GmbH banner
ZeroBS_GmbH

ZeroBS_GmbH

@zero_B_S

Information and data security. Leader in DDoS-Testing and Assessments in DACH/EU-Region. Full Spectrum Neuland 2.0 #DFIR #OSINT #DDOS #Cyberien

Kiel, Germany Katılım Nisan 2017
236 Takip Edilen677 Takipçiler
Sabitlenmiş Tweet
ZeroBS_GmbH
ZeroBS_GmbH@zero_B_S·
We analyzed 400 DDoS-Stresstests from 2022 and gathered very interesting insights into the current state of protection/mitigation-solutions, what works (well), what doesnt, and especially: WHY. zero.bs/optimization-o… #ddos #dfir #cybervandals
ZeroBS_GmbH tweet media
English
0
1
2
931
Mattias Wåhlén 🇪🇺🇺🇦🇨🇦
@ImposeCost AI will affect cybersecurity in 3 ways. It will speed up attacks, it will speed up defense and it will create entirely new attack surfaces. I am most worried about the last one.
English
2
0
3
79
Andrew Thompson
Andrew Thompson@ImposeCost·
See, there's real conversations about becoming better, faster, and stronger with AI to beat adversaries using AI, and I'm over here quietly thinking "so if those dudes are using these technologies to find the vulnerabilities, why aren't the friendly dudes using the same or similar technologies to find the vulnerabilities before they're ever put in front of an adversary... Like do all that BEFORE we're doing the get better at firefighting through agents....
Justin Elze@HackingLZ

@caseyjohnellis At least this go around defenders are getting new toys at the same time.

English
5
1
33
4.1K
ZeroBS_GmbH
ZeroBS_GmbH@zero_B_S·
What Akamai says ⬇️ The current SOTI-Report with detailed insights on shifting battlegrounds and new attack vectors (APIs & AI), but also useful mitigations/architecture advices akamai.com/resources/stat…
ZeroBS_GmbH tweet media
English
0
0
0
35
ZeroBS_GmbH retweetledi
Phil Venables
Phil Venables@philvenables·
Google just shifted PQC migration goal to 2029. Others likely to follow given projected advances of quantum computing capability toward a cryptographically relevant quantum computer (CRQC). blog.google/innovation-and… Will we see a CRQC by 2029? Most likely not, but to be safe you'll want to land your PQC migration more aggressively to cover that tail risk. And, focus more on authentication controls that secrecy controls. Time to get going. philvenables.com/post/post-quan…
English
1
7
20
1.9K
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
I use this graph in internal slides to better explain the concept
Florian Roth ⚡️ tweet media
English
2
21
86
9.4K
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
The #TeamPCP #LiteLLM compromise is a good example of where scalable detection still matters. Our internal Thunderstorm analysis flagged the malicious litellm-1.82.8 wheel with a high score and multiple signature matches on the embedded litellm_init.pth payload, before the incident was broadly written up publicly What I find interesting here is where different approaches fit: - AV-style engines are great at very high-volume scanning - LLM-based analysis is great when ambiguity starts and code needs deeper interpretation - in between, you need something that can process lots of packages and build artifacts, surface suspicious content reliably, and hand the interesting cases to humans or AI workflows for deeper investigation That middle layer has real value. It lets you inspect package repositories, build workflows and newly introduced dependencies continuously, at fixed cost and on your own infrastructure, instead of trying to send whole firehoses through token-priced analysis. In this case, old signatures were enough to surface something very real. Blogs opensourcemalware.com/blog/teampcp-l… securitylabs.datadoghq.com/articles/litel… Overview with IOCs ramimac.me/teampcp/
Florian Roth ⚡️ tweet mediaFlorian Roth ⚡️ tweet media
English
7
36
167
20.3K
ZeroBS_GmbH
ZeroBS_GmbH@zero_B_S·
Aisuru is know for hypervolumetric attacks up to 20 TB/s from last year we track this botnet here: #aisuru" target="_blank" rel="nofollow noopener">blog.kybervandals.com/tracking_botne…
English
0
0
0
25
ZeroBS_GmbH retweetledi
CyberKnow
CyberKnow@Cyberknow20·
Pro-Iran hacktivist activity continues daily, groups such as Keymous, Rippersec and team313 continue DDoS attacks, Pro-Russian groups continue sporadic targeting while many groups continue to claim network access and data leaks. Still not as many groups at the 12-day war.
GIF
English
0
2
8
1.4K
ZeroBS_GmbH
ZeroBS_GmbH@zero_B_S·
@IceSolst > why vendors can come up with inane bullshit Thats the reason our company is called "zeroBS", really
English
0
0
2
119
solst/ICE of Astarte
solst/ICE of Astarte@IceSolst·
There’s an astronomical skill gap between good security people, and the rest. There’s no mid. Accounts you see posting their research here are absolutely cracked, it’s not the norm. When you go out and talk to security folks that don’t go to conferences, don’t read up on research, you realize- holy shit. They have no fucking clue. The majority of the cybersecurity work force is absolutely incompetent. It’s partly why vendors can come up with inane bullshit as marketing material and it works on many CISOs. If you’re reading this, you’re most likely 1000x the skill level of the average person. Like I cannot emphasize enough how low the bar is when the sample size is the entire industry.
English
146
96
1.6K
173.9K
ZeroBS_GmbH retweetledi
CyberKnow
CyberKnow@Cyberknow20·
Looks like Killmilk is restarting Killnet. One of the most well-known pro-Russian hacktivist groups.
CyberKnow tweet media
English
2
7
29
4.9K
ZeroBS_GmbH retweetledi
CyberKnow
CyberKnow@Cyberknow20·
DieNet the first hacktivist group supporting Iran to expand DDoS attacks outside of the Gulf and US. Suggesting attacks on Cyprus, because they host a British base. The UK has had nothing to do with the current US/Israel- Iran fighting.
CyberKnow tweet media
English
0
5
14
3.8K
ZeroBS_GmbH retweetledi
CyberKnow
CyberKnow@Cyberknow20·
Breaking! Noname05716 has joined the cyber activity in support of Iran. You can expect groups part of their pro-Russian cluster to commence operations.
CyberKnow tweet media
English
2
24
56
6.6K
ZeroBS_GmbH retweetledi
Gadi Evron
Gadi Evron@gadievron·
We lost FX. A lot of people wrote about this so I feel comfortable sharing here too. I’m heartbroken. We’re heartbroken. At 8 am pacific today (Monday), we are gathering on Zoom to share memories of FX, as a community. Ping me for a link.
English
7
16
129
33.4K
ZeroBS_GmbH retweetledi
GreyNoise
GreyNoise@GreyNoiseIO·
GreyNoise observed a coordinated campaign probing SonicWall firewalls to identify which devices have SSL VPN enabled — the prerequisite step before credential attacks. Four infrastructure clusters, a commercial proxy service rotating thousands of IPs, and near-zero exploitation. This is target mapping. 🔗greynoise.io/blog/active-re…
GreyNoise tweet media
English
2
12
28
3.3K