User Overview

Followers and Following

Followers
Following
Trendsmap

History

Total Followers - Last Year
Daily Follower Change - Last Year
Daily Tweets - Last Year

Tweet Stats

Analysed 2,958 tweets, tweets from the last 127 weeks.
Tweets Day of Week (UTC)
Tweets Hour of Day (UTC)
Key:
Tweets
Retweets
Quotes
Replies
Tweets Day and Hour Heatmap (UTC)

Tweets

Last 50 tweets from @780thC
SafeBreach security researchers took a closer look at an Iranian threat actor targeting Farsi-speaking victims, mostly in the US. | bitdefender.com/blog/hotforsec… @Bitdefender
Replying to @780thC
New PowerShortShell Stealer Exploits Recent Microsoft MSHTML Vulnerability to Spy on Farsi Speakers | safebreach.com/blog/2021/new-… @safebreach
 
 
According to Google, North Korean state-sponsored hackers posed as Samsung recruiters and sent fake job offers to employees at South Korean security companies that sell anti-malware software | therecord.media/north-korean-h… @TheRecord_Media
 
According to Google, North Korean state-sponsored hackers posed as Samsung recruiters and sent fake job offers to employees at South Korean security companies that sell anti-malware software | therecord.media/north-korean-h… @TheRecord_Media
 
In reply to @CISAJen
@CISAJen joked that she often ribs USCYBERCOM Chief Gen. Paul Nakasone that he has a “much easier” job defending the DoD’s networks than CISA does overseeing the networks of 102 different Federal and tribal agencies and departments. meritalk.com/articles/cisas…
 
Many folks are traveling today... and this might be a day early, but safe travels and a Happy Thanksgiving to all of you (yes, even you).
 
A recent report by Cardiff University showed that pro-Russian trolls have been busy targeting 32 European media outlets, such as Le Figaro (France), Die Welt (Germany) and La Stampa (Spain). lawfareblog.com/france-doubles… @lawfareblog
Replying to @780thC
How a Kremlin-Linked Influence Operation is Systematically Manipulating Western Media to Construct & Communicate Disinformation (Part 1): cardiff.ac.uk/__data/assets/… @cardiffuni
 
A recent report by Cardiff University showed that pro-Russian trolls have been busy targeting 32 European media outlets, such as Le Figaro (France), Die Welt (Germany) and La Stampa (Spain). lawfareblog.com/france-doubles… @lawfareblog
France Doubles Down on Countering Foreign Interference Ahead of Key
lawfareblog.com
 
In reply to @CISAJen
@CISAJen thank you for being the @Avenger_Con keynote speaker; being instrumental in the @780thC and 781 MI BN development -- 1st photo on the Vanguard command board -- and for the incredible work you and the @CISAgov team do everyday. Go Army! Beat Navy!
📸 Behind the scenes of @Avenger_Con. @780thC, are you ready for this!? #AvengerConVI pic.twitter.com/q0OwHH0PM1
 
“Every day our adversary gets up and attempts to execute operations against the United States. They're not going to stop and neither are we.” Maj. Gen. Joe Hartman, deputy commanding general of U.S. Cyber Command | abcnews.go.com/Politics/top-n… @ABC
 
Hackers with suspected links to the Pyongyang dictatorship have been going after Chinese security researchers in an apparent attempt to steal their hacking techniques and use them as their own | thedailybeast.com/north-korean-h… @thedailybeast @shanvav
North Korean Hackers Caught Snooping on Chinas Cyber Squad
thedailybeast.com
 
As part of a two-year $18.5 million grant from the NSA, Norwich will lead the DoD Cyber Institute, which trains students in cybersecurity at Norwich, The Citadel, Univ. of North Georgia, Virginia Tech, Texas A&M, & Virginia Military Institute | vermontbiz.com/news/2021/nove… @vermontbiz
 
“We normally don’t operate off of anything that’s less than top secret … but if our partners are all operating within the confines of unclassified networks, why aren’t we there, too?” Gen. Paul Nakasone, director of NSA and U.S. Cyber Command scmagazine.com/analysis/apt/n… @SCMagazine
 
'What's at stake is obviously the security of our nation,' NSA chief says of defending US from cyberattacks abcnews.go.com/Politics/whats… @ABC
 
In reply to @sansecio
@sansecio discovered a new malicious agent “linux_avp” that hides as system process on eCommerce servers. It is being deployed around the world since last week and takes commands from a control server in Beijing | bleepingcomputer.com/news/security/… @BleepinComputer
 
For the first time in two years, the United Kingdom and United States militaries conducted an in-person headquarters-level forum to discuss combined cyberspace campaigns and capabilities, called the Cyber Management Review | nsa.gov/Press-Room/Pre… @NSAGov
2021 Cyber Management Review Hosted at Fort Meade
nsa.gov
 
According to @Venafi freelance Chinese APT group is actively managing a library of compromised code-signing digital certificates to support cyber-espionage attacks targeting supply chain vendors | infosecurity-magazine.com/news/chinas-ap… @InfosecurityMag
Chinas APT41 Manages Library of Breached Certificates
infosecurity-magazine.com
 
Proofpoint has tracked ongoing credential theft campaigns from TA406, an actor associated with the Democratic People’s Republic of Korea (DPRK). proofpoint.com/us/blog/threat… @proofpoint
 
There's some unusual activity brewing on Russian-speaking cybercrime forums, where hackers appear to be reaching out to Chinese counterparts for collaboration. bleepingcomputer.com/news/security/… @BleepinComputer
Replying to @780thC
Flashpoint has observed an increase in recent weeks of Mandarin and Chinese-speaking threat actors on RAMP as well as other illicit communities across the deep and dark web. flashpoint-intel.com/blog/ramp-rans… @FlashpointIntel
 
There's some unusual activity brewing on Russian-speaking cybercrime forums, where hackers appear to be reaching out to Chinese counterparts for collaboration. bleepingcomputer.com/news/security/… @BleepinComputer
 
“The dawn of the digital age made clear that the oceans no longer afforded the physical protection Americans previously enjoyed,” Gen. Paul Nakasone | “I do think that there is a realization that we can't do this alone...” nextgov.com/cybersecurity/… @Nextgov
NSA Director: Evolving Cyber Threats Require Deeper Public-Private Partnerships
nextgov.com
 
The #FBI, @CISAgov, @CyberGovAU, and @NCSC warn of Iranian government-sponsored advanced persistent threat (APT) actors using #Microsoft and #Fortinet vulnerabilities to target U.S. critical infrastructure, including hospitals. Visit go.usa.gov/xe9rH to read our alert.
 
In reply to @smithp17
The reason lies in a story written by Sean Gallagher when he was w/ are Technica. arstechnica.com/information-te…
Replying to @780thC @smithp17 and 4 others
"It's such great experience just being a part of the [hacker] community, the things you learn, things you get to try, it gets you excited. And we were like, 'We wish that the soldiers could get that.'" Capt. Skyler Onken and Capt. Steve Rogacki
 
 
In reply to @780thC
How do you access?
Replying to @smithp17 @thepacketrat and 3 others
If you do not have a .gov or .mil email address, but would like to attend AvengerCon because you support the U.S. Cyber Command mission, you can still register. avengercon.tech/conference/reg…
 
In reply to @780thC
How do you access?
Replying to @smithp17 @thepacketrat and 3 others
AvengerCon is a free security event hosted every fall by Maryland Innovation and Security Institute to benefit the hackers of the CYBERCOM community & 780 MI BDE. The event is open to all service members and employees of CYBERCOM and DoD personnel supporting cyberspace missions.
 
We are honored to welcome four experts from the greater infosec community to our AvengerCon VI "Ransomware Cyber Kill Chain" panel discussion!
• Sean Gallagher (@thepacketrat)
• Azim Khodjibaev (@AShukuhi)
• Lesley Carhart (@hacks4pancakes)
• Dmitry Smilyanets (@ddd1ms)
Replying to @780thC
The panel discussion is currently scheduled for 1310 EST on 30 November 2021. avengercon.tech/panel/ @Avenger_Con
 
We are honored to welcome four experts from the greater infosec community to our AvengerCon VI "Ransomware Cyber Kill Chain" panel discussion!
• Sean Gallagher (@thepacketrat)
• Azim Khodjibaev (@AShukuhi)
• Lesley Carhart (@hacks4pancakes)
• Dmitry Smilyanets (@ddd1ms)
 
"When I think about Russia - we prioritize them behind China, but let's not kid ourselves, here: Russia is a menace..." Lieutenant General Scott Berrier, director of the Defense Intelligence Agency | cbsnews.com/news/china-rus… @CBSNews
 
New Federal Government Cybersecurity Incident and Vulnerability Response Playbooks | us-cert.cisa.gov/ncas/current-a… @CISAgov
Replying to @780thC
Federal Government Cybersecurity Incident and Vulnerability Response Playbooks: cisa.gov/sites/default/… @CISAgov
 
New Federal Government Cybersecurity Incident and Vulnerability Response Playbooks | us-cert.cisa.gov/ncas/current-a… @CISAgov
 
Anne Neuberger, deputy national security adviser for cyberspace and emerging technology, credited Japan for joining the U.S. and other allies in July in accusing China of attacking Microsoft email servers. asia.nikkei.com/Politics/Inter… @NikkeiAsia
 
 
Jen Easterly @CISAJen recently sat down for a great, relaxed, and open discussion with Dave DeWalt, the former CEO of FireEye and McAfee. blog.zimperium.com/qa-with-cisas-… @ZIMPERIUM
 
Many of the people on the FBI's cyber most wanted list are Russian. If they left Russia they'd be arrested - but at home they appear to be given free rein. bbc.com/news/technolog… @BBC
 
Mandiant assesses with high confidence that UNC1151, which provides technical support to the Ghostwriter information operations campaign, is linked to the Belarusian government. mandiant.com/resources/unc1… @Mandiant
 
Since September 2020, MSTIC has observed six Iranian threat groups deploying ransomware to achieve their strategic objectives. These ransomware deployments were launched in waves every six to eight weeks on average. microsoft.com/security/blog/… | @MsftSecIntel
 
Report recommends the U.S. government and social media platform leaders take a series of immediate steps to curb the “crisis of trust and truth” stemming from online disinformation and misinformation. thehill.com/policy/cyberse… @thehill
 
Report recommends the U.S. government and social media platform leaders take a series of immediate steps to curb the “crisis of trust and truth” stemming from online disinformation and misinformation. thehill.com/policy/cyberse… @thehill
Bipartisan commission urges US take immediate steps to curb online
thehill.com
 
While the act of “mixing” cryptocurrency is not itself an illegal practice, these platforms aren’t widely used by the vast majority of crypto-enthusiasts. intel471.com/blog/cryptomix… @Intel471Inc
How cryptomixers allow cybercriminals to clean their ransoms
intel471.com
 
 
 
On Veterans Day we honor our military veterans who have served in the United States Armed Forces. Thank you for your service! #praetorians @Artemis6_CPB @ARCYBER @ArmyChiefCyber @CG_CyberForge @Cyber__7 @US_CYBERCOM @BrigadeCyber
 
Happy Veterans Day to anyone that has worn the uniform with honor and pride. Thanks for what you do for your nation.
 
Cyber-security firm Trend Micro has published a 46-page report detailing the history and activity of a hacker-for-hire group that has been advertising its services in the cybercrime underworld and conducting on-demand intrusions since the mid-2010s therecord.media/cyber-mercenar…
Cyber-mercenary group Void Balaur has been hacking companies for years
therecord.media
 
US Cyber Command said that its “hunt-forward” operations have been “very effective” in blending offensive and defensive cyber operations, revealing the command has conducted more than a couple dozen of the operations… breakingdefense-com.cdn.ampproject.org/c/s/breakingde… @BreakingDefense
CYBERCOM has conducted 'hunt-forward' ops in 14 countries, deputy says - Breaking Defense
breakingdefense-com.cdn.ampproject.org
 
Metabase Q noticed three Dridex campaigns in Mexico starting in April of this year | Russia-based cybercriminal organization calling itself Evil Corp, which is also linked to several types of ransomware and Dridex. govinfosecurity.com/dridex-banking… @ISMG_News
 
Metabase Q noticed three Dridex campaigns in Mexico starting in April of this year | Russia-based cybercriminal organization calling itself Evil Corp, which is also linked to several types of ransomware and Dridex. govinfosecurity.com/dridex-banking… @ISMG_News
Dridex Banking Malware Turns Up in Mexico
govinfosecurity.com
 
Researchers have provided a deep dive into the activities of Lyceum, an Iranian threat group focused on infiltrating the networks of telecoms companies and internet service providers (ISPs). zdnet.com/article/meet-l… @ZDNet
 
Researchers have provided a deep dive into the activities of Lyceum, an Iranian threat group focused on infiltrating the networks of telecoms companies and internet service providers (ISPs). zdnet.com/article/meet-l… @ZDNet
 
 
Free access is provided to the 8 hour timeframe for this page.

A Trendsmap Explore subscription provides full access to all available timeframes

Find out more

This account is already logged in to Trendsmap.
Your subscription allows access for one user. If you require access for more users, you can create additional subscriptions.
Please Contact us if you are interested in discussing discounts for 3+ users for your organisation, or have any other queries.