User Overview

Followers and Following



Total Followers - Last Year
Daily Follower Change - Last Year
Daily Tweets - Last Year

Tweet Stats

Analysed 73 tweets, tweets from the last 116 weeks.
Tweets Day of Week (UTC)
Tweets Hour of Day (UTC)
Tweets Day and Hour Heatmap (UTC)


Last 50 tweets from @CNMF_CyberAlert
🚨 Active scanning of Apache HTTP Server CVE-2021-41773 & CVE-2021-42013 is ongoing and expected to accelerate, likely leading to exploitation. Please patch immediately if you haven’t already—this cannot wait until after the weekend. Read more:…
Mass exploitation of Atlassian Confluence CVE-2021-26084 is ongoing and expected to accelerate. Please patch immediately if you haven’t already— this cannot wait until after the weekend.
Three common sources of compromise in #Kubernetes are supply chain risks, malicious threat actors, and insider threats. #KnowingIsHalfTheBattle💪

#KubernetesClusters #Cybersecurity #OpenSource
NSA and @CISAgov share Kubernetes configurations and recommendations to harden environments against compromise. Understanding the options for building and maintaining a secure Kubernetes cluster is key to protecting your data & resources.…
NEW: Valuable insight released from @NSAGov @CISAgov @FBI on almost 100 Chinese Tactics, Techniques and Procedures.
We collaborated with @CISAgov & @FBI on our #cybersecurity advisory, detailing Chinese state-sponsored actor #TTPs used against U.S. and allied networks. For a thorough understanding of this cyberthreat, read our overview, observed TTPs & mitigations.…
Exploitation in the wild has been observed (h/t @GossiTheDog). Please patch immediately!
.@CISAgov is aware of the likelihood that cyber threat actors are attempting to exploit CVE-2021-21985, a remote code execution vulnerability in VMware vCenter Server and VMware Cloud Foundation. Learn more at
Do you have that #FridayFeeling you’re being hacked? Read @CISAgov’s Best Practices for @MITREattack Mapping to better understand adversary behavior and defend your networks.
Updated eviction guidance released by @CISAgov. Follow these steps to effectively remove known APT actor from networks.
🚨 We have released eviction guidance related to the ongoing SolarWinds Orion incident and related campaign activities affecting U.S. government agency networks, CI entities, and private sector organizations.

View our updated guidance:
#ICYMI @NSACyber released a Potential Threat Vectors to 5G Infrastructure analysis paper along with partners @ODNIgov, @CISAgov & industry to enhance understanding of risks introduced by #5G.…
Excellent report from @CISAgov and @FBI highlighting SVR tactics, including recent shift to third-party access mechanisms.
"Russian Foreign Intelligence Service (SVR) Cyber Operations: Trends and Best Practices for Network Defenders" -- Joint Cybersecurity Advisory today from @FBI, @DHSgov, and @CISAgov. See:…
.@CISAgov, @FBI, @CNMF_CyberAlert link Russian SVR/APT 29 actors to network infiltration through #SolarWinds supply chain compromise and GoldenSAML exploitation of M365. Read the report here:…
Replying to @CNMF_CyberAlert
.@CNMF_Cyberalert, @CISAGov released 8 files attributed to Russian SVR/APT 29. Upload includes new malware variants of GoldMax, GoldFinder, Sibot and associated files which were used to compromise a single victim network. #SolarWinds…
.@CISAgov, @FBI, @CNMF_CyberAlert link Russian SVR/APT 29 actors to network infiltration through #SolarWinds supply chain compromise and GoldenSAML exploitation of M365. Read the report here:…
Russian Foreign Intelligence Service (SVR) cyber actors are exploiting five publicly known vulnerabilities to target U.S. and allied critical networks. Review our joint #cybersecurity guidance with @CISAgov and @FBI and apply the mitigations to stop them:…
Microsoft has released #security updates for #vulnerabilities found in Exchange Server 2013, Exchange Server 2016, and Exchange Server 2019.
NSA urges applying critical Microsoft patches released today, as exploitation of these #vulnerabilities could allow persistent access and control of enterprise networks.…
.@FBI and @CISAgov have information indicating APT actors are using multiple CVEs to exploit Fortinet
FortiOS vulnerabilities. Recommend immediate action.
APT actors are scanning for vulnerabilities with Fortinet FortiOS to gain access to multiple government, commercial, and technology services networks – read our joint cybersecurity advisory with the @FBI:
“Foreign malign influence is an enduring challenge facing our country,” said Director of National Intelligence Avril Haines. “These efforts by U.S. adversaries seek to exacerbate divisions and undermine confidence in our democratic institutions." @ODNIgov…
Microsoft has released a new, one-click mitigation tool, the Microsoft Exchange On-Premises Mitigation Tool, to help customers who do not have dedicated security or IT teams to apply security updates for Microsoft Exchange Server. Learn more:
❗ NEWLY ISSUED GUIDANCE is available on @CISAgov’s Microsoft Exchange Vulnerabilities web page. Visit to review the latest guidance and resources from Microsoft for remediating the exploitation of Exchange vulnerabilities.
#Cybersecurity #InfoSec #IT
Anyone that has Exchange on-prem exposed to the internet on 80/443 should consider checking into CVE-2021-27065 immediately. I received the patch KB5000871 & installed at 16:30EST but still saw a box popped. Box was hit on the 28th of Feb so this HAS been happening awhile. 1 of 2
Patches released by @MsftSecIntel for multiple Exchange #CVE. Immediate action is critical, as some are currently being exploited in the wild. Exploits enable unauthenticated RCE when chained.…
In reply to @CISAgov
@CISAgov, @FBI, & @USTreasury released a joint cybersecurity alert summarizing malicious cyber activity by #DPRK APT #LazarusGroup using #AppleJeus #malware to target individuals, #cryptocurrency exchanges and financial service companies.
⚠️ North Korean cyber actors are using #AppleJeus #malware variants to carry out an ongoing cryptocurrency theft scheme. Our joint advisory with the @FBI & @USTreasury gives details behind seven identified versions: #Cybersecurity #InfoSec #HIDDENCOBRA
#BendyBear malware suspected to have compromised several East Asian governments through actions similar to BlackTech #WaterBear incidents in the past
Today, we exposed "BendyBear," one of the most sophisticated, well-engineered and difficult-to-detect samples of shellcode employed by an APT, says the Unit 42 researcher who analyzed it.
Multiple agencies collaborated to untether victim computers from #Emotet, effectively disrupting the botnet responsible for hundreds of millions of dollars in damage worldwide. Great job!
One of the world’s most dangerous malware botnet #Emotet disrupted in international cyber operation

@USAO_MDNC @FBI @FBICharlotte @Europol @Eurojust @bka @PolitieLE @GStA_FFM_ZIT…
We recommend applying patches as soon as available. This is a far more dangerous #Sudo vulnerability than seen in the rescent past.
Got Root? You do now with CVE-2021-3156 privilege escalation in SUDO. Exploitable Heap-based buffer overflow in a utility that is available in almost all major linux/unix OS versions.
Russian state-sponsored cyber actors are exploiting #vulnerability CVE-2020-4006 affecting VMware Workspace ONE Access.
Russian state-sponsored cyber actors are exploiting #vulnerability CVE-2020-4006 affecting VMware Workspace ONE Access. We recommend patching immediately. Read our latest #cybersecurity advisory for details, including detection and mitigation actions:…
"The National Cyber Force is a joint Defence and @GCHQ capability, giving the UK a world class ability to conduct cyber operations." -Defence Secretary Ben Wallace…
.@US_CYBERCOM warmly welcomes our newest partners in cyber operations: the UK National Cyber Force. We look forward to working with the NCF against cyber threats.
⚠️ New malware variant – Zebrocy – identified by @CISAgov and @CNMF_CyberAlert. Learn more at
#Zebrocy #Cybersecurity #InfoSec #Malware
.@CNMF_CyberAlert and @CISAgov identified #Zebrocy implant used to target victims in Eastern Europe and Central Asia, including embassies and ministries of foreign affairs.

View samples on @CNMF_CyberAlert's Virus Total:… and MAR at…
⚠️ New malware variant – ComRAT – identified by @CISAgov and @CNMF_CyberAlert. Learn more at
#ComRAT #Cybersecurity #InfoSec #Malware
An implant dropper dubbed #ComRATv4 recently attributed by @CISAgov and @FBI to Russian sponsored APT, Turla. It was likely used to target ministries of foreign affairs and national parliament.

@CNMF_CyberAlert continues to disclose #malware samples on:…
The public and private sectors are united against ransomware, especially those actors targeting medical facilities during a pandemic. This report is just one example of the work being done to address the current threat.
.@CNMF_CyberAlert, @CISAgov and @FBI released the Kimsuky Cybersecurity Advisory, a summary of #DPRK malicious cyber acitivity posing as Google, Yahoo mail services, and South Korean reporters, targeting Japan, South Korea, and the United States.…
.U.S. networks are constantly being scanned, targeted, and exploited by Chinese state-sponsored cyber actors. Take action and mitigate against these exploits used in their hacking operations.
In reply to @FBI
@FBI & @TheJusticeDept charged 6 Russian GRU officers (Unit 74455 #Sandworm) for carrying out cyber-attacks against innocent victims as recent as the 2019 cyber-attack against the country of Georgia, 2018 Olympic Destroyer malware, & 2017 global #NotPetya malware campaign.
The #SlothfulMedia implant has the ability to run commands, kill processes, invoke a remote shell, add and delete registry values, take screen shots and interact with the file system.

For more info see @CISAgov's MAR…
🚨 @CISAgov and @CNMF_CyberAlert have a released a Malware Analysis Report on SLOTHFULMEDIA—this remote access trojan is used by a sophisticated cyber actor. Check out the report at for more information, including #IOCs.
#Malware #Cybersecurity #InfoSec
A relatively new implant, which we have dubbed #SlothfulMedia, has been used to target victims in a number of countries, including: India, Kazakhstan, Kyrgyzstan, Malaysia, Russia and Ukraine.

See more on @US_CYBERCOM's Virus Total page:…
Hackers Said Pourkarim Arabi, Mohammad Reza Espargham and Mohammad Bayati charged for engaging in a computer intrusion campaign targeting aerospace and satellite industries to steal sensitive info on behalf of the IRCG.

Visit @TheJusticeDept for more:…
.@FBI and @TheJusticeDept charged 2 Chinese Nationals and arrested 2 individuals in Malaysia involved in APT-41 malicious cyber activities.
Seven International Cyber Defendants, Including "Apt41" Actors, Charged In Connection With Computer Intrusion Campaigns Against More Than 100 Victims Globally…
PIONEER KITTEN's reckless actions, recently uncovered by

As reported, Iranian Gov't-aligned actors attempted to steal user credentials and sell network access to generate funds despite likely negative impacts to potential intelligence collection.
Learn about #cyber threat activity in July 2020 from PIONEER KITTEN, an Iran-based adversary with a suspected nexus to the Iranian government -- this adversary focuses on gaining access to entities that have sensitive intelligence information.
#ICYMI 2 new samples of #FASTCASH and 9, recently attributed, samples of DPRK's #ECCENTRICBANDWAGON and #VIVACIOUSGIFT malware uploaded to Virus Total.

For more infomation go to @US_CYBERCOM's… #HIDDENCOBRA #cybersecurity
Millions in cryptocurrency stolen and laundered through Chinese over-the-counter (OTC) cryptocurrency traders.

@US_CYBERCOM enbled @TheJusticeDept and partners to disrupt North Korean actors' efforts to illicitly generate revenue, imposing money and access costs on #DPRK
United States Files Complaint to Forfeit 280 Cryptocurrency Accounts Tied to Hacks of Two Exchanges by North Korean Actors…
North Korean cyber actors are using #malware variants to conduct an ATM cash-out scheme to steal money from banking systems. Read more about the threat in a joint press release the #FBI, @CISAgov, @USTreasury, and @US_CYBERCOM published at
#CNMF’s collaborative analysis supported @US_CYBERCOM, @TheJusticeDept, @USTreasury, and @CISAgov efforts to expose BeagleBoyz illegal cyber activity targeting the international banking system, since 2015.

For more info on these malware samples visit:…
BeagleBoyz malicous cyber operations used #FASTCASH, #ECCENTRICBANDWAGON and #VIVACIOUSGIFT #malware to steal💰millions of dollars from international banks to fund the North Korean regime.

Read more about FASTCash 2.0 on…

#Infosec #Cybersecurity
BeagleBoyz malicous cyber operations used #FASTCASH, #ECCENTRICBANDWAGON and #VIVACIOUSGIFT #malware to steal💰millions of dollars from international banks to fund the North Korean regime.

Read more about FASTCash 2.0 on…

#Infosec #Cybersecurity
GRU 85th #FancyBear or #APT28 leverages Drovorub to ensure stealthy, persistent access on high-value Linux systems. Detection methodologies in the advisory should be implemented with urgency.
The Russian GRU 85th GTsSS, sometimes publicly known as #APT28 or #FancyBear, is using a previously undisclosed #Linux malware called Drovorub for cyber espionage operations.

For full details and mitigations, review our #cybersecurity advisory with @FBI:…
.@StateDept is offering up to $10M, if you have information leading to the identification or location of any person who, acting at the direction of a foreign government, interferes with US elections.

#protect2020 #election2020
In reply to @RFJ_USA
To provide information, text Rewards for Justice via Telegram, Signal, or WhatsApp at 001-202-999-5113, or, at @RFJ_Election_Bot on Telegram.
#RussiaDisinfo has created an ecosystem of disinformation meant to deceive and confuse, but the GEC at the @StateDept and the whole USG refuses to accept this weaponizing of information and is exposing their malicious intent in a new report.…
.@SecPompeo discusses the @realDonaldTrump administration’s work to secure our democracy.
China’s #Taidoor malware has been compromising systems since 2008.

For more info on Taidoor, see @CISAgov and @FBI’s MAR…
and @US_CYBERCOM’s Virus Total.…
CVE-2020-10713 poses significant risk to Linux and Windows systems. Follow the mitigations in our #Cybersecurity Advisory to protect against this GRUB2 #BootHole vulnerability.…
Keep following #CNMF for more malware disclosures, adversary attribution and exposure of malign cyber activity…coming soon! #Defend2020 #SecureElections
With our IC counterparts we will strive to update Americans on the evolving election threat landscape. “We’re currently concerned with China, Russia, and Iran.” –Ms. Pierson @ODNIgov
Free access is provided to the 8 hour timeframe for this page.

A Trendsmap Explore subscription provides full access to all available timeframes

Find out more

This account is already logged in to Trendsmap.
Your subscription allows access for one user. If you require access for more users, you can create additional subscriptions.
Please Contact us if you are interested in discussing discounts for 3+ users for your organisation, or have any other queries.