Dadicke

64.8K posts

Dadicke banner
Dadicke

Dadicke

@Dadicke

Auch wenn sie öffentlich sind, bleiben die Tweets, Kommentare und Retweets meine private Meinung

加入时间 Mart 2020
160 关注179 粉丝
Eduard Habsburg
Eduard Habsburg@EduardHabsburg·
My son, eternal nerd, as usually overdoes it with the Easter Eggs🥚
Eduard Habsburg tweet mediaEduard Habsburg tweet media
English
42
55
1.7K
22.2K
Dadicke 已转推
VulDB 🛡
VulDB 🛡@vuldb·
The severity is increased for this new vulnerability affecting Tenda AC10 (CVE-2026-5550) vuldb.com/vuln/355314
English
0
1
1
66
Dadicke
Dadicke@Dadicke·
Thx4posting
Kriegsforscher@kriegsforscherD

It is extremely important (first of all for NATO countries) to understand how Russia fights right now and how they will fight in the future (spoiler alert: without so-called «infiltration»). @RALee85 and I published another article about Russian experiments with «drone line» tactics. Subscription, honest opinion and remarks are welcomed🔽 Russia’s Drone Line Experiment: twomarines.substack.com/p/russias-dron…

English
0
0
0
15
Dadicke 已转推
OSINT Industries
OSINT Industries@OSINTindustries·
🛑 26 investigators. 8 ASEAN countries. One mission. @palenath delivered specialist OSINT training to fight online child exploitation, enabling teams to trace predators and uncover networks. Read more: osint.industries/training-log-p…
OSINT Industries tweet mediaOSINT Industries tweet mediaOSINT Industries tweet media
English
2
6
24
1.8K
Dadicke 已转推
ICE Houston
ICE Houston@EROHouston·
🚨In the past 5 days, ICE @EROHouston arrested nearly 150 dangerous criminal aliens including: - 5 Child Predators - 2 Drug Traffickers - 14 Thieves - 62 Violent Offenders - 1 Arsonist - 7 Hit-&-Run DWIs - 9 aliens convicted of a combined 31 DWIs Among those arrested were:👇
English
173
762
4.3K
61.4K
Dadicke 已转推
Dark Web Informer
Dark Web Informer@DarkWebInformer·
‼️ CVE-2026-4698: JIT miscompilation in Firefox's JavaScript Engine CVSS: 8.8 Affected versions: → Firefox < 149 → Firefox ESR < 115.34 / < 140.9 → Thunderbird < 149 / < 140.9 Credit: @maxpl0it via Trend Micro ZDI Patch now: mozilla.org/security/advis…
Dark Web Informer tweet media
English
0
4
24
4.4K
Dadicke 已转推
DarkFeed
DarkFeed@ido_cohen2·
🚨 NEW THREAT ACTOR: KRYBIT is now under active monitoring by DarkFeed. The cyber world doesn't stop, and we don't either. 🔹 3 victims already listed on their site. 🔹 Multi-national targeting. 🔹 Real-time alerts now live for subscribers. Don't wait for the breach to happen. Stay ahead of the curve with DarkFeed. 🛡️ Full details & victim profiles here: 👇 Darkfeed.io #CyberSecurity #ThreatIntel #KRYBIT #Ransomware #BreakingNews #DarkWeb
DarkFeed tweet media
English
1
3
8
965
Dadicke 已转推
Bug Bounty Center
Bug Bounty Center@BugBountyCenter·
English
0
58
220
6K
Dadicke 已转推
IT Guy
IT Guy@T3chFalcon·
Process Hollowing Imagine a criminal walking into a bank dressed as a security guard. Everyone sees the uniform and lets them in, but no one checks who is really inside. This is what process hollowing does on your computer. It is one of the most clever disguise tricks malware creators have come up with, used in everything from banking trojans to nation-state spyware. The operating system shows an innocent program name, but the computer is actually running the attacker's code. Here is how the trick works, step by step: Step 1 → picking a disguise The malware does not run on its own because that would be easy to detect. Instead, it chooses a trusted Windows program to impersonate, like explorer.exe or system processes. Step 2 → open but freeze The malware starts the real explorer.exe, but secretly tells Windows to freeze it before it does anything. The program now exists on your system, has a valid process ID, and looks completely real. It is just frozen and waiting. Step 3 →replace Now comes the main trick. The malware goes into the frozen process's memory and removes all the real Windows code. Then it fills that empty space with its own malicious code. The process still has the same trusted name and process ID, but now it contains the attacker's instructions. Step 4 → resume, undetected Before resuming execution, the malware adjusts the process’s execution flow so that it starts from the injected payload instead of the original program entry point. Then the process is resumed. To the operating system and monitoring tools, it still looks like a normal, trusted application. Why this is so dangerous Your antivirus, firewall, and Task Manager usually judge programs by their name. For example, explorer.exe is a real program that runs many times on any Windows PC, so seeing another one does not seem unusual. By using that trusted name, malware can connect to the internet without setting off firewall alerts, read files and steal passwords without warning antivirus, and stay hidden on a system for weeks or months. How defenders catch it today Modern security tools no longer rely on process names alone. Instead, they analyze what is happening inside the process. Detection techniques include: Comparing the memory of a running process with the original file on disk Monitoring for suspicious memory operations like image unmapping and rewriting Detecting unusual execution flow (e.g., threads starting in unexpected memory regions) Behavioral analysis, such as unexpected network activity or access to sensitive data If a process like explorer.exe, notepad.exe or svchost.exe behaves in ways that do not match its normal profile, it raises a strong signal for compromise. Malware works best when it blends in, and process hollowing is one of the most effective ways to achieve this.
IT Guy tweet media
English
0
19
80
4.3K
Dadicke 已转推
Michael Bauer
Michael Bauer@Bundesheerbauer·
#militärundsprache; G: Gefahr im Verzug. Titus Livius spricht von „periculum in mora“, also „Gefahr bei Verzögerung“ und meint damit eine gefährliche Situation die durch Abwarten oder Inaktivität entsteht.
Deutsch
11
2
38
1.6K
Dadicke 已转推
FalconFeeds.io
FalconFeeds.io@FalconFeedsio·
📢 Ransomware Alert: 🇺🇸 Community College of Beaver County (ccbc.edu), a U.S.-based public community college that operates in the education industry, offering associate degrees, certificates, workforce training, and continuing education programs has reportedly fallen victim to INTERLOCK Ransomware. 🔍Key Details: 🛡️Threat actor: INTERLOCK 📅 Reported on: 03/03/26 ⚠ Data Compromised: 780 GB
FalconFeeds.io tweet media
English
0
1
7
859