Not Simon

@simontsui@infosec.exchange
1.2K Followers
112 Following
687 Posts
This is not Simon. Opinions are made by a screaming goat and do not express the views or opinions of his goatherder.

TrustedSec CTO Justin Elze shared CVE-2024-3400 exploit in the wild on Twitter yesterday, reports that 149.28.194.95 was attempting to exploit CVE-2024-3400

#CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #ProofofConcept #threatintel #IOC

U.S. State Department press release: Reward Offer for Information on ALPHV BlackCat-linked Cyber Actors Targeting U.S. Critical Infrastructure. State's Rewards for Justice (RFJ) program is offering a reward of up to $10 million for information leading to the identification or location of ALPHV BlackCat actors, their affiliates, activities, or links to a foreign government. 🔗 https://www.state.gov/rewards-for-justice-reward-offer-for-information-on-alphv-blackcat-linked-cyber-actors-targeting-u-s-critical-infrastructure/

#USStateDept #RewardsForJustice #BlackCat #ALPHV #threatintel

U.S. State Department Rewards for Justice (RFJ) program is offering a reward of up to $10 million for information leading to the identification or location of APT31, a collection of Chinese state-sponsored intelligence officers, contract hackers, and support staff that conduct malicious cyber operations on behalf of the Hubei State Security Department (HSSD), a provincial branch of the Ministry of State Security. 🔗 https://rewardsforjustice.net/rewards/apt31-wuhan-xiaoruizhi-science-technology-company-ltd/

#China #cyberespionage #StateDept #RewardsforJustice #APT31 #threatintel

APT31/Wuhan Xiaoruizhi Science & Technology Company, Ltd. – Rewards For Justice