Maverc Technologies

82 posts

Maverc Technologies banner
Maverc Technologies

Maverc Technologies

@Maverctech

Cyber Security consultants here to pilot you through the complex security maze .

Miami, Florida เข้าร่วม Nisan 2021
106 กำลังติดตาม14 ผู้ติดตาม
Maverc Technologies
Maverc Technologies@Maverctech·
@LBHTShow Context is important when you make these types of hot takes ! 2015 we led league the league in injuries 18 players went on ir: including Terrell Suggs out for the season Joe Flacco out for the season Steve smith Starting Tackles Dennis pitta The first two running backs.
English
1
0
1
100
Lunch Break Hot Take
Lunch Break Hot Take@LBHTShow·
This right here would have gotten just about any coach fired. Lamar extended his stay longer than it should have been. #ravensflock
Lunch Break Hot Take tweet media
English
124
313
3.3K
274.9K
Nick Sortor
Nick Sortor@nicksortor·
🚨 #BREAKING: CHAOS has broken out at the White House Press Briefing as Karine Jean-Pierre REFUSES to say why a world-renowned Parkinson’s expert has REPEATEDLY visited the White House in recent months KJP is a shameless LIAR
English
2.5K
6.2K
29.8K
2M
Maverc Technologies
Maverc Technologies@Maverctech·
Cyber Threat Advisory: A financially motivated cybercriminal organization recently used a zero-day vulnerability in the widely used file compression tool WinRAR to launch cyberattacks against traders and brokers, aiming to steal their digital currency. conta.cc/3Paj9h9
English
0
0
0
73
Maverc Technologies รีทวีตแล้ว
ARCHIVED: Jen Easterly
ARCHIVED: Jen Easterly@CISAJen·
🚨More than 40 vulnerabilities were routinely exploited by malicious cyber actors targeting orgs across the globe. An annual fan favorite --> Protect your org by diving into the 2022 Top Routinely Exploited Vulnerabilities: go.dhs.gov/o4a
ARCHIVED: Jen Easterly tweet media
English
3
55
115
37.6K
Maverc Technologies รีทวีตแล้ว
Aakash Gupta
Aakash Gupta@aakashgupta·
🚨 BREAKING: Code Interpreter is FINALLY rolling out to all ChatGPT Plus users. It's the most powerful feature OpenAI has released since GPT-4. It makes everyone a data analyst. Here are 15 mind-blowing use cases of Code Interpreter:
Aakash Gupta tweet media
English
243
2.2K
11.9K
4.1M
Maverc Technologies รีทวีตแล้ว
Armando Seay
Armando Seay@aseaytech·
The ransomware gang claimed the cyber attack on Siemens Energy and four other organizations including Schneider Electric and the University of California Los Angeles. #cybersecurity lnkd.in/ehJwzvjk
English
0
2
0
216
Maverc Technologies รีทวีตแล้ว
Armando Seay
Armando Seay@aseaytech·
The agenda is forming, speakers are getting vetted, sponsors are working their process and ICS Miami Training Day is about to announce a number of hands on training options. Registration: ICS-Miami.com @DigitalTrends @INDOPACOM @BlueTeamCon @INL @FIU @Amtrak @NATO_MARCOM @Southcom #Cyber @Grid32InfoSec #OT @razorsecure @ICSSecurityGeek @FLChamberFDN @FLManufacturers @Claroty @TXOneNetworks #ICS #SCADA
Hollywood, FL 🇺🇸 English
0
1
1
126
Maverc Technologies รีทวีตแล้ว
Technology Advancement Center (TAC)
DreamPort hosted the Joint Cyber Warfighting Architecture (JCWA) technical exchange meeting this week, which examined the need to illuminate capability shortfalls. The keynote speaker was Khoi Nguyen, Command Acquisition Executive and J9 for U.S. Cyber Command. #cybersecurity
Technology Advancement Center (TAC) tweet media
English
0
1
1
78
Maverc Technologies รีทวีตแล้ว
ReliaQuest
ReliaQuest@ReliaQuest·
A critical vulnerability was discovered in the secure file transfer service MOVEit Transfer. The ReliaQuest Threat Research team is monitoring the situation closely. Read more here for what you should know and immediate mitigation steps: bit.ly/3ITx2hE
English
0
1
1
201
Maverc Technologies รีทวีตแล้ว
GreyNoise
GreyNoise@GreyNoiseIO·
GreyNoise has observed scanning activity for the login page of MOVEit Transfer as early as March 3rd, 2023. While we have not observed activity directly related to exploitation, all of the 5 IPs we have observed attempting to discover the location of MOVEit installations were marked as “Malicious” by GreyNoise for prior activities. greynoise.io/blog/progress-…
English
2
29
80
32.4K
Maverc Technologies รีทวีตแล้ว
vx-underground
vx-underground@vxunderground·
Today Kaspersky announced they were a victim of an iOS zero-click 0day exploit. The exploit delivered spyware targetting Kaspersky middle and upper management. They named the attack 'Operation Triangulation' More info: usa.kaspersky.com/blog/triangula…
English
16
306
1.2K
563.7K
Maverc Technologies รีทวีตแล้ว
Cybersecurity and Infrastructure Security Agency
Cross-Sector Cybersecurity Performance Goals (CPGs) can help all organizations, regardless of size or industry, prioritize the steps they need to take to mitigate risk of potential threats from sophisticated cyber threat actors. Learn more: cisa.gov/cpg
Cybersecurity and Infrastructure Security Agency tweet media
English
1
20
38
9K
Maverc Technologies รีทวีตแล้ว
Armando Seay
Armando Seay@aseaytech·
The critical infrastructure #cybersecurity one day C-Suite Conference. Subject matter expert presentations Use case and solutions from asset owners Announcing Dr. Michael Mylrea as subject matter expert presenter and moderator. Website launch is eminent.
Armando Seay tweet media
English
0
1
1
53
Maverc Technologies รีทวีตแล้ว
BleepingComputer
BleepingComputer@BleepinComputer·
Microsoft announces a new GPT-4 powered AI assistant known as Security Copilot to help with incident response and threat hunting bleepingcomputer.com/news/microsoft…
English
1
49
112
28.1K
Maverc Technologies รีทวีตแล้ว
Justin Elze
Justin Elze@HackingLZ·
CyberChefGPT is what we really want
English
11
36
286
27.3K
Maverc Technologies รีทวีตแล้ว
Gi7w0rm
Gi7w0rm@Gi7w0rm·
Critical #0day in #Outlook fixed. CVE-2023-23397 exploited by #FancyBear to breach government, military, energy, and transportation orgs. Reported by CERT-UA so probably used in Russia's war against Ukraine. The flaw can be used to steal NTLM Hashes of victims. To cite: Threat actors can exploit it by sending messages with extended MAPI properties containing UNC paths to an SMB share (TCP 445) under their control. "The attacker could exploit this vulnerability by sending a specially crafted email which triggers automatically when it is retrieved and processed by the Outlook client. This could lead to exploitation BEFORE the email is viewed in the Preview Pane," Microsoft says in a security advisory published today. "The connection to the remote SMB server sends the user's NTLM negotiation message, which the attacker can then relay for authentication against other systems that support NTLM authentication," Redmond explains added in a separate blog post. CVE-2023-23397 impacts all supported versions of Microsoft Outlook for Windows but doesn't affect Outlook for Android, iOS, or macOS versions. Additionally, since online services like Outlook on the web and Microsoft 365 do not support NTLM authentication, they are not vulnerable to attacks exploiting this NTLM relay vulnerability. Patches are out so #Patch now! #infosec #vulnerabilty #news
English
1
76
150
71.3K
Maverc Technologies รีทวีตแล้ว
Microsoft Security Response Center
Microsoft Security Response Center@msftsecresponse·
Microsoft has released CVE-2023-23397 to address the critical elevation of privilege (EoP) vulnerability affecting Microsoft Outlook for Windows. We strongly recommend all customers update Microsoft Outlook for Windows to remain secure. Learn more ⬇️ msft.it/6018504d4
English
7
123
232
61K