Tweets
- Tweets, current page.
- Tweets & replies
- Media
You blocked @Unit42_Intel
Are you sure you want to view these Tweets? Viewing Tweets won't unblock @Unit42_Intel
-
Visibility into file transfers is the key to avoiding data breaches. Learn about common risk factors for file transfers and how to mitigate. https://bit.ly/3egbQ6n pic.twitter.com/XieLIfVU3i
Thanks. Twitter will use this to make your timeline better. UndoUndo -
This report by
@CyberAlliance provides a high-level summary of the threat environment facing the 2020 Olympics with contributions from our experts. Get your free copy here: https://bit.ly/2SmeaQO pic.twitter.com/2swSFYHRbN
Thanks. Twitter will use this to make your timeline better. UndoUndo -
Get an overview of the Defray777 ransomware family and learn its indicators of compromise. https://bit.ly/2NuXjcE pic.twitter.com/e09VUG07kV
Thanks. Twitter will use this to make your timeline better. UndoUndo -
It's important to identify potentially abused domains as quickly as possible. Here's how a proactive detector works and how it can help. https://bit.ly/3aZTNPY pic.twitter.com/Uyj8Lj0Zz1
Thanks. Twitter will use this to make your timeline better. UndoUndo -
File transfers are vital for productivity, but without proper controls, they can lead to data theft or data loss. Learn common risk factors and how network traffic visibility can help mitigate them. https://bit.ly/3egbQ6n pic.twitter.com/UbUPVF3Tx3
Thanks. Twitter will use this to make your timeline better. UndoUndo -
Read the approach used to create a proactive detector for DNS Security that can identify malicious domains based on their registration records and other indicators. https://bit.ly/3aZTNPY pic.twitter.com/mZHj5PQEMA
Thanks. Twitter will use this to make your timeline better. UndoUndo -
WeSteal and WeControl are two new pieces of commodity malware marketed by their creators as a path to easy money. Read our analysis of the malware and how to protect against it. https://bit.ly/3nChbIw pic.twitter.com/OqMz1PCCeM
Thanks. Twitter will use this to make your timeline better. UndoUndo -
Get an overview of the GandCrab and REvil ransomware families and learn their indicators of compromise. https://bit.ly/38Rtri6 pic.twitter.com/gtiUgInH05
Thanks. Twitter will use this to make your timeline better. UndoUndo -
We are committed to sharing threat intelligence with the cybersecurity community and encourage others to share their knowledge for the benefit of the industry.https://twitter.com/CyberAlliance/status/1388131207825612803 …
Thanks. Twitter will use this to make your timeline better. UndoUndo -
This commodity malware author calls his product, "The leading way to make money in 2021." Read our analysis of the methods and tactics used to supply malware as a service. https://bit.ly/3nChbIw pic.twitter.com/4UjFyoZ3nT
Thanks. Twitter will use this to make your timeline better. UndoUndo -
A single source of threat intelligence and security advice makes it easier to protect your business against cyberattacks. Get insights, guidance, incident response and more all from the new Unit 42. Read the blog: https://bit.ly/3ehilEV pic.twitter.com/8DNzETnYUQ
Thanks. Twitter will use this to make your timeline better. UndoUndo -
This story from
@NPR on the current ransomware threat landscape includes commentary from Ryan Olson (VP of threat intelligence, Unit 42) and data from the 2021 Unit 42 Ransomware Threat Report.https://twitter.com/gregmyre1/status/1387777446720716806 …Thanks. Twitter will use this to make your timeline better. UndoUndo -
Voting for the 2021
@Advisen Cyber Risk Awards is now open! Unit 42 (on the ballot as Crypsis/Palo Alto) is honored to have been nominated for Event Response Team of the Year and Cyber Disruptor of the Year. Cast your vote for us here: https://bit.ly/3eAmsw2 pic.twitter.com/LRsdPhfP5P
Thanks. Twitter will use this to make your timeline better. UndoUndo -
2021-04-26 (Monday) -
#IcedID (#Bokbot) with#CobaltStrike from StolenImages_Evidence.zip - List of indicators available at: https://bit.ly/3eD6q4j - includes download links for malware samples, artifacts, and#pcap of infection trafficpic.twitter.com/5BCKdEVywi
Thanks. Twitter will use this to make your timeline better. UndoUndo -
A compromised Kubernetes cluster could give attackers access to significant resources and application data. Learn why properly configuring Kubernetes clusters can help. https://bit.ly/32IfQWN pic.twitter.com/RjZDfIQHhE
Thanks. Twitter will use this to make your timeline better. UndoUndo -
We discuss how malware and malicious activities can occur in unsecured Kubernetes instances and how better configuration can help. https://bit.ly/32IfQWN pic.twitter.com/dmzH6i9ufW
Thanks. Twitter will use this to make your timeline better. UndoUndo -
Get an overview of the Dharma ransomware family and learn its indicators of compromise. https://bit.ly/2QbIUmx pic.twitter.com/fXApWRuwXS
Thanks. Twitter will use this to make your timeline better. UndoUndo -
The new Unit 42 combines threat researchers and security consultants, making it easier to stop fast moving cyberattacks and bolster your defenses. Learn more: https://bit.ly/3ehilEV pic.twitter.com/6pxJ91yb5Y
Thanks. Twitter will use this to make your timeline better. UndoUndo -
2021-04-21 (Wednesday) -
#Lokibot malware distributed as RAR attachment to malicious spam - SHA256 hash: 99cf59c32e63c462f895449382f0243085f4a85f482b325d9457149bc7cfadd7pic.twitter.com/DlC01Q0qbt
Thanks. Twitter will use this to make your timeline better. UndoUndo -
When cyber threats get tough, our elite incident responders are here to help. The new Unit 42 combines threat intelligence and security consulting into one integrated team. Learn more: https://bit.ly/3ehilEV pic.twitter.com/cusTdhsykA
Thanks. Twitter will use this to make your timeline better. UndoUndo
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.