Shah Sheikh(@shah_sheikh) 's Twitter Profileg
Shah Sheikh

@shah_sheikh

Cybersecurity Professional / Enthusiast / Founder.

ID:340491651

linkhttps://www.dts-solution.com calendar_today22-07-2011 19:52:59

160,4K Tweets

1,9K Followers

183 Following

Shah Sheikh(@shah_sheikh) 's Twitter Profile Photo

City of Wichita disclosed a data breach after the recent ransomware attack: The City of Wichita disclosed a data breach after the ransomware attack that hit the Kansas’s city earlier this month. On May 5th, 2024, the City of Wichita, Kansas, was the… securityaffairs.com/163300/cyber-c…

City of Wichita disclosed a data breach after the recent ransomware attack: The City of Wichita disclosed a data breach after the ransomware attack that hit the Kansas’s city earlier this month. On May 5th, 2024, the City of Wichita, Kansas, was the… securityaffairs.com/163300/cyber-c…
account_circle
Shah Sheikh(@shah_sheikh) 's Twitter Profile Photo

New Android Banking Trojan Mimics Google Play Update App: A new banking Trojan targeting Android devices shows multifaceted capabilities infosecurity-magazine.com/news/android-b…

New Android Banking Trojan Mimics Google Play Update App: A new banking Trojan targeting Android devices shows multifaceted capabilities infosecurity-magazine.com/news/android-b…
account_circle
Shah Sheikh(@shah_sheikh) 's Twitter Profile Photo

How a new wave of deepfake-driven cybercrime targets businesses: As deepfake attacks on businesses dominate news headlines, detection experts are gathering valuable insights into how these attacks came into being and the vulnerabilities they exploit.… securityintelligence.com/posts/new-wave…

How a new wave of deepfake-driven cybercrime targets businesses: As deepfake attacks on businesses dominate news headlines, detection experts are gathering valuable insights into how these attacks came into being and the vulnerabilities they exploit.… securityintelligence.com/posts/new-wave…
account_circle
Shah Sheikh(@shah_sheikh) 's Twitter Profile Photo

New XM Cyber Research: 80% of Exposures from Misconfigurations, Less Than 1% from CVEs: A new report from XM Cyber has found – among other insights - a dramatic gap between where most organizations focus their security efforts, and where the most serious… thehackernews.com/2024/05/new-xm…

New XM Cyber Research: 80% of Exposures from Misconfigurations, Less Than 1% from CVEs: A new report from XM Cyber has found – among other insights - a dramatic gap between where most organizations focus their security efforts, and where the most serious… thehackernews.com/2024/05/new-xm…
account_circle
Shah Sheikh(@shah_sheikh) 's Twitter Profile Photo

China-Linked Hackers Adopt Two-Stage Infection Tactic to Deploy Deuterbear RAT: Cybersecurity researchers have shed more light on a remote access trojan (RAT) known as Deuterbear used by the China-linked BlackTech hacking group as part of a cyber… thehackernews.com/2024/05/china-…

China-Linked Hackers Adopt Two-Stage Infection Tactic to Deploy Deuterbear RAT: Cybersecurity researchers have shed more light on a remote access trojan (RAT) known as Deuterbear used by the China-linked BlackTech hacking group as part of a cyber… thehackernews.com/2024/05/china-…
account_circle
Shah Sheikh(@shah_sheikh) 's Twitter Profile Photo

Accessing Secure Client Cloud Management after the SecureX EoL: Secure Client Management capabilities aren’t going away with the SecureX EOL, the functionality is simply migrating to the Cisco Security Cloud Control service. feedpress.me/link/23535/166…

Accessing Secure Client Cloud Management after the SecureX EoL: Secure Client Management capabilities aren’t going away with the SecureX EOL, the functionality is simply migrating to the Cisco Security Cloud Control service. feedpress.me/link/23535/166…
account_circle
Shah Sheikh(@shah_sheikh) 's Twitter Profile Photo

New ‘Antidot’ Android Trojan Allows Cybercriminals to Hack Devices, Steal Data: The Antidot Android banking trojan snoops on users and steals their credentials, contacts, and SMS messages.

The post New ‘Antidot’ Android Trojan Allows Cybercriminals to… securityweek.com/new-antidot-an…

New ‘Antidot’ Android Trojan Allows Cybercriminals to Hack Devices, Steal Data: The Antidot Android banking trojan snoops on users and steals their credentials, contacts, and SMS messages. The post New ‘Antidot’ Android Trojan Allows Cybercriminals to… securityweek.com/new-antidot-an…
account_circle
Shah Sheikh(@shah_sheikh) 's Twitter Profile Photo

Microsoft Quick Assist Tool Abused for Ransomware Delivery: The Black Basta group abuses remote connection tool Quick Assist in vishing attacks leading to ransomware deployment.

The post Microsoft Quick Assist Tool Abused for Ransomware Delivery… securityweek.com/microsoft-quic…

Microsoft Quick Assist Tool Abused for Ransomware Delivery: The Black Basta group abuses remote connection tool Quick Assist in vishing attacks leading to ransomware deployment. The post Microsoft Quick Assist Tool Abused for Ransomware Delivery… securityweek.com/microsoft-quic…
account_circle
Shah Sheikh(@shah_sheikh) 's Twitter Profile Photo

US exposes scheme enabling North Korean IT workers to bypass sanctions: The US Justice Department had unsealed charges against a US woman and an Ukranian man who, along with three unidentified foreign nationals, have allegedly helped North Korean IT… helpnetsecurity.com/2024/05/17/nor…

US exposes scheme enabling North Korean IT workers to bypass sanctions: The US Justice Department had unsealed charges against a US woman and an Ukranian man who, along with three unidentified foreign nationals, have allegedly helped North Korean IT… helpnetsecurity.com/2024/05/17/nor…
account_circle
Shah Sheikh(@shah_sheikh) 's Twitter Profile Photo

FBI Seizes BreachForums Website: The FBI has seized the BreachForums website, used by ransomware criminals to leak stolen corporate data.

If law enforcement has gained access to the hacking forum’s backend data, as they claim, they would have email… schneier.com/blog/archives/…

account_circle
Shah Sheikh(@shah_sheikh) 's Twitter Profile Photo

CISA adds D-Link DIR router flaws to its Known Exploited Vulnerabilities catalog: CISA adds two D-Link DIR-600 and DIR-605 router vulnerabilities to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency… securityaffairs.com/163289/securit…

CISA adds D-Link DIR router flaws to its Known Exploited Vulnerabilities catalog: CISA adds two D-Link DIR-600 and DIR-605 router vulnerabilities to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency… securityaffairs.com/163289/securit…
account_circle
Shah Sheikh(@shah_sheikh) 's Twitter Profile Photo

Norway Recommends Replacing SSLVPN/WebVPN to Stop Cyber Attacks: A very important message from the Norwegian National Cyber Security Centre (NCSC) says that Secure Socket Layer/Transport Layer Security (SSL/TLS) based VPN solutions, like SSLVPN and… gbhackers.com/norway-sslvpn-…

Norway Recommends Replacing SSLVPN/WebVPN to Stop Cyber Attacks: A very important message from the Norwegian National Cyber Security Centre (NCSC) says that Secure Socket Layer/Transport Layer Security (SSL/TLS) based VPN solutions, like SSLVPN and… gbhackers.com/norway-sslvpn-…
account_circle
Shah Sheikh(@shah_sheikh) 's Twitter Profile Photo

Patient Data at Risk in MediSecure Ransomware Attack: Electronic prescriptions provider MediSecure said the attack originated from a third-party vendor, and has impacted individuals’ personal and health information infosecurity-magazine.com/news/patient-d…

Patient Data at Risk in MediSecure Ransomware Attack: Electronic prescriptions provider MediSecure said the attack originated from a third-party vendor, and has impacted individuals’ personal and health information infosecurity-magazine.com/news/patient-d…
account_circle
Shah Sheikh(@shah_sheikh) 's Twitter Profile Photo

New Linux Backdoor Attacking Linux Users Via Installation Packages: Linux is widely used in numerous servers, cloud infrastructure, and Internet of Things devices, which makes it an attractive target for gaining unauthorized access or spreading malware. … gbhackers.com/linux-backdoor…

New Linux Backdoor Attacking Linux Users Via Installation Packages: Linux is widely used in numerous servers, cloud infrastructure, and Internet of Things devices, which makes it an attractive target for gaining unauthorized access or spreading malware. … gbhackers.com/linux-backdoor…
account_circle
Shah Sheikh(@shah_sheikh) 's Twitter Profile Photo

ViperSoftX Malware Uses Deep Learning Model To Execute Commands: ViperSoftX malware, known for stealing cryptocurrency information, now leverages Tesseract, an open-source OCR engine, to target infected systems, which extracts text from images, and the… gbhackers.com/vipersoftx-dee…

ViperSoftX Malware Uses Deep Learning Model To Execute Commands: ViperSoftX malware, known for stealing cryptocurrency information, now leverages Tesseract, an open-source OCR engine, to target infected systems, which extracts text from images, and the… gbhackers.com/vipersoftx-dee…
account_circle
Shah Sheikh(@shah_sheikh) 's Twitter Profile Photo

Woman Accused of Helping North Korean IT Workers Infiltrate Hundreds of US Firms: The US government has announced charges, seizures, arrests and rewards as part of an effort to disrupt a scheme that generates revenue for North Korea.

The post Woman… securityweek.com/woman-accused-…

Woman Accused of Helping North Korean IT Workers Infiltrate Hundreds of US Firms: The US government has announced charges, seizures, arrests and rewards as part of an effort to disrupt a scheme that generates revenue for North Korea. The post Woman… securityweek.com/woman-accused-…
account_circle
Shah Sheikh(@shah_sheikh) 's Twitter Profile Photo

C/side Emerges From Stealth Mode With $1.7 Million Investment: C/side has emerged from stealth mode with $1.7 million in pre-seed funding from Scribble Ventures and angel investors

The post C/side Emerges From Stealth Mode With $1.7 Million Investment… securityweek.com/c-side-emerges…

C/side Emerges From Stealth Mode With $1.7 Million Investment: C/side has emerged from stealth mode with $1.7 million in pre-seed funding from Scribble Ventures and angel investors The post C/side Emerges From Stealth Mode With $1.7 Million Investment… securityweek.com/c-side-emerges…
account_circle
Shah Sheikh(@shah_sheikh) 's Twitter Profile Photo

The importance of access controls in incident response: The worst time to find out your company doesn’t have adequate access controls is when everything is on fire. The worst thing that can happen during an incident is that your development and… helpnetsecurity.com/2024/05/17/inc…

The importance of access controls in incident response: The worst time to find out your company doesn’t have adequate access controls is when everything is on fire. The worst thing that can happen during an incident is that your development and… helpnetsecurity.com/2024/05/17/inc…
account_circle
Shah Sheikh(@shah_sheikh) 's Twitter Profile Photo

Kimsuky APT Deploying Linux Backdoor Gomir in South Korean Cyber Attacks: The Kimsuky (aka Springtail) advanced persistent threat (APT) group, which is linked to North Korea's Reconnaissance General Bureau (RGB), has been observed deploying a Linux… thehackernews.com/2024/05/kimsuk…

Kimsuky APT Deploying Linux Backdoor Gomir in South Korean Cyber Attacks: The Kimsuky (aka Springtail) advanced persistent threat (APT) group, which is linked to North Korea's Reconnaissance General Bureau (RGB), has been observed deploying a Linux… thehackernews.com/2024/05/kimsuk…
account_circle
Shah Sheikh(@shah_sheikh) 's Twitter Profile Photo

CISA adds Google Chrome zero-days to its Known Exploited Vulnerabilities catalog: CISA adds two Chrome zero-day vulnerabilities to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added [1,2]… securityaffairs.com/163285/cyber-c…

CISA adds Google Chrome zero-days to its Known Exploited Vulnerabilities catalog: CISA adds two Chrome zero-day vulnerabilities to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added [1,2]… securityaffairs.com/163285/cyber-c…
account_circle