Special K 's Avatar

Special K

@specialk3.bsky.social

Born Texan, cyber security/InfoSec solutioner love sports, and enjoy meeting new people...I've been told. Tweets are my own, beware...

175 Followers  |  333 Following  |  48 Posts  |  Joined: 06.11.2024  |  1.9316

Latest posts by specialk3.bsky.social on Bluesky

Post image

America's most notorious child rapist, Jeffrey Epstein, said this man was the worst person he'd ever met. Let that sink in.

14.11.2025 00:36 β€” πŸ‘ 26569    πŸ” 8929    πŸ’¬ 882    πŸ“Œ 410

This has been confirmed today: operation-endgame.com

Europol took down servers for the Rhadamanthys infostealer, the VenomRAT, and the Elysium botnet

13.11.2025 12:23 β€” πŸ‘ 28    πŸ” 7    πŸ’¬ 1    πŸ“Œ 0
Preview
New Danabot Windows version appears in the threat landscape after May disruption DanaBot returns after 6 months with a new Windows variant (v669), marking its comeback after being disrupted by Operation Endgame in May.

New Danabot Windows version appears in the threat landscape after May disruption

12.11.2025 19:42 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Russian broker pleads guilty to assisting US cyberattacks : Aleksei Volkov faces years in prison, may have been working with other crews

Russian broker pleads guilty to profiting from Yanluowang ransomware attacks

10.11.2025 15:36 β€” πŸ‘ 4    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
30.10.2025 16:53 β€” πŸ‘ 194    πŸ” 51    πŸ’¬ 20    πŸ“Œ 9
Preview
ICE Wants to Build a Shadow Deportation Network in Texas A new ICE proposal outlines a 24/7 transport operation run by armed contractorsβ€”turning Texas into the logistical backbone of an industrialized deportation machine.

A new ICE proposal outlines a 24/7 transport operation run by armed contractorsβ€”turning Texas into the logistical backbone of an industrialized deportation machine. www.wired.com/story/ice-is...

30.10.2025 16:53 β€” πŸ‘ 256    πŸ” 165    πŸ’¬ 25    πŸ“Œ 31

WOW! The Washington Post obtained the rest of the body cam footage showing that the drunk-driving ICE agent promised to check if the arresting officer's partner was Haitian. "I’m going to run some checks when I get back." He added that he would have him deported if "not legit."

29.10.2025 20:55 β€” πŸ‘ 5324    πŸ” 2047    πŸ’¬ 133    πŸ“Œ 136
Video thumbnail

Trump doesn't see the world like I do. He divides the world into strong /weak leaders and and those who praise him/don't. That is bad for America's national interests. Discussing the ideas in my new book Autocrats vs. Democrats on @lastword.msnbc.com

28.10.2025 18:09 β€” πŸ‘ 87    πŸ” 31    πŸ’¬ 1    πŸ“Œ 0

β€οΈβ€οΈβ€οΈπŸ†πŸ†πŸ₯‡πŸ₯‡πŸ†πŸ†πŸ₯‡πŸ₯‡πŸ’ͺπŸ’ͺπŸ’ͺπŸ’ͺ

29.10.2025 13:37 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Jordan: Load management never should happen Michael Jordan didn't hold back on load management in the NBA, saying on NBC: "It shouldn't be needed, first and foremost."

🐐 πŸ†πŸ†πŸ†πŸ†πŸ†πŸ†

β€œYou know, I never wanted to miss a game because it was an opportunity to prove. It was something that I felt like the fans are there that watch me play. I want to impress that guy way up on top who probably worked his [butt] off to get a ticket or to get money to buy the ticket."

29.10.2025 13:20 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 1
Preview
New Atroposia RAT with Stealthy Remote Desktop, Vulnerability Scanner and Persistence Mechanisms

New Atroposia RAT with Stealthy Remote Desktop, Vulnerability Scanner and Persistence Mechanisms

29.10.2025 13:33 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Hurricane Melissa tracker: mapping Jamaica’s category 5 storm Hurricane Melissa path tracker: updates and latest news today

Hurricane Melissa path tracker: Jamaican authorities have ordered mandatory evacuations as what is predicted to be the worst hurricane to ever hit the island closes in on land ⬇️

28.10.2025 08:31 β€” πŸ‘ 9    πŸ” 4    πŸ’¬ 0    πŸ“Œ 0
Post image

If they don't care about feeding hungry kids that are already here, stop calling them pro-life.

Cutting SNAP benefits is atrocious.

28.10.2025 07:42 β€” πŸ‘ 1368    πŸ” 451    πŸ’¬ 59    πŸ“Œ 21
Video thumbnail

Tim Walz: "People are gonna be lined up out here to get food, and we're talking about a damn ballroom. Don't lose the plot."

27.10.2025 15:34 β€” πŸ‘ 27296    πŸ” 8229    πŸ’¬ 499    πŸ“Œ 346
Post image

Trump is the only president to leave the country during a government shutdown

27.10.2025 17:53 β€” πŸ‘ 408    πŸ” 113    πŸ’¬ 45    πŸ“Œ 13
Preview
Ransomware profits drop as victims stop paying hackers The number of victims paying ransomware threat actors has reached a new low, with just 23% of the breached companies giving in to attackers' demands.

Ransomware profits drop as victims stop paying hackers #cybersecurity #hacking #news #infosec #security #technology #privacy

28.10.2025 03:08 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0

The entire Republican Party is in thrall to a 79-year-old whose behavior, if you saw it in a teenager, would cause you to believe they were emotionally unwell and would prompt intervention.

19.10.2025 22:15 β€” πŸ‘ 676    πŸ” 99    πŸ’¬ 14    πŸ“Œ 3
Preview
Clop Ransomware Group Claims Hack of Harvard University, Adds Institution to Data Leak Site The Clop ransomware group has claimed responsibility for hacking Harvard University, adding the prestigious institution to its data leak site on the Tor network. According to a report by Security Affairs, Clop has created a dedicated page for Harvard on its site and announced its intention to disclose the stolen data. However, no additional details about the nature of the compromised data or the specific impacts of the breach have been provided. Clop is known for its double-extortion tactics, where it encrypts victims' data and threatens to leak it if ransom demands are not met. The use of the Tor network for hosting the leak site underscores the group's commitment to maintaining anonymity and evading law enforcement. This incident highlights the increasing audacity of ransomware groups in targeting high-profile organizations. Universities, with their vast repositories of sensitive data, are particularly attractive targets. The potential impact of this breach could be severe, depending on the nature of the compromised data, which could range from sensitive research to personal information of students and staff. For cybersecurity professionals, this incident serves as a stark reminder of the evolving threat landscape. It underscores the need for robust cybersecurity measures, including regular security audits, employee training, and comprehensive incident response plans. Organizations should also monitor dark web and Tor sites for any signs of their data being leaked or sold. In response to such threats, institutions should consider implementing advanced endpoint protection, network segmentation, and regular data backups to mitigate the impact of ransomware attacks. Additionally, proactive threat hunting and intelligence sharing within the cybersecurity community can help in early detection and response to such incidents.

πŸ“Œ Clop Ransomware Group Claims Hack of Harvard University, Adds Institution to Data Leak Site https://www.cyberhub.blog/article/14337-clop-ransomware-group-claims-hack-of-harvard-university-adds-institution-to-data-leak-site

13.10.2025 19:20 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Alarming Surge in Ransomware Attacks: Akira and Crypto24 StrikeΒ Again Introduction: The Rising Threat of Ransomware Ransomware attacks continue to escalate globally, leaving businesses and institutions vulnerable to cybercriminals who exploit security gaps for financial gain. Recent intelligence from ThreatMon reveals that notorious ransomware groups β€œAkira” and β€œCrypto24” have recently targeted high-profile victims, highlighting the urgent need for heightened cybersecurity measures. These attacks underscore the persistent danger lurking in the dark web and the evolving tactics of cybercriminal networks.

Alarming Surge in Ransomware Attacks: Akira and Crypto24 StrikeΒ Again

Introduction: The Rising Threat of Ransomware Ransomware attacks continue to escalate globally, leaving businesses and institutions vulnerable to cybercriminals who exploit security gaps for financial gain. Recent intelligence…

03.10.2025 12:39 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

Tim Walz: "My god, we've got the White House threatening investigations and jail time because an escalator stopped? Walk up the damn stairs!"

02.10.2025 15:37 β€” πŸ‘ 44255    πŸ” 10020    πŸ’¬ 1026    πŸ“Œ 504

Daily Reminder: Social Security is OUR money!

03.10.2025 12:23 β€” πŸ‘ 709    πŸ” 211    πŸ’¬ 12    πŸ“Œ 4

They're cutting a lot of the sexual harassment training too, so I'm not sure this has anything to do with cyber so much as it has nothing to do with lethality.

03.10.2025 12:18 β€” πŸ‘ 26    πŸ” 4    πŸ’¬ 5    πŸ“Œ 0
Preview
New GhostSocks Malware-as-a-Service Enables Threat Actors to Convert Compromised Devices into Proxies

New GhostSocks Malware-as-a-Service Enables Threat Actors to Convert Compromised Devices into Proxies

03.10.2025 12:44 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
New XWorm V6 Variant Injects Malicious Code into a Legitimate Windows Program

New XWorm V6 Variant Injects Malicious Code into a Legitimate Windows Program

03.10.2025 12:45 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Volvo North America disclosed a data breach following a ransomware attack on IT provider MiljΓΆdata Volvo NA disclosed a data breach that exposed the personal data of its employees after a ransomware attack hit third-party supplier MiljΓΆdata.

Volvo North America disclosed a data breach following a ransomware attack on IT provider MiljΓΆdata

25.09.2025 17:21 β€” πŸ‘ 4    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Post image

LockBit 5.0 ransomware emerges with cross-platform capabilities, targeting Windows, Linux, and ESXi systems. Organizations must bolster defenses to counter this evolving threat. #CyberSecurity #Ransomware #LockBit5.0 Link: thedailytechfeed.com/lockbit-5-0-...

25.09.2025 15:14 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Cisco Warns of Actively Exploited SNMP Vulnerability Allowing RCE or DoS in IOS Software

Cisco Warns of Actively Exploited SNMP Vulnerability Allowing RCE or DoS in IOS Software

25.09.2025 08:27 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
New Domain-fronting Attack Uses Google Meet, YouTube, Chrome and GCP to Tunnel Traffic

New Domain-fronting Attack Uses Google Meet, YouTube, Chrome and GCP to Tunnel Traffic

25.09.2025 08:32 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
SolarWinds Releases Critical Patch for Web Help Desk Vulnerability (CVE-2025-26399) SolarWinds has released critical security patches to address a severe vulnerability in its Web Help Desk software. The vulnerability, tracked as CVE-2025-26399, has a CVSS score of 9.8, indicating its high severity. This flaw is related to untrusted data deserialization, which can lead to arbitrary command execution on affected systems. Deserialization vulnerabilities are particularly insidious because they can allow attackers to execute arbitrary code with the privileges of the application. In this case, the vulnerability could potentially allow unauthenticated attackers to take control of the affected systems. Given the widespread use of SolarWinds' Web Help Desk in enterprise environments, this vulnerability poses a significant risk to organizations that have not yet applied the patches. The impact of this vulnerability on the cybersecurity landscape is substantial. SolarWinds has been in the spotlight before due to the Sunburst attack, which was a sophisticated supply chain attack. While this vulnerability is different, it underscores the importance of maintaining robust security practices, especially for software that is widely used in enterprise IT environments. For cybersecurity professionals, the immediate action is to apply the hotfixes provided by SolarWinds. Additionally, organizations should conduct thorough reviews of their systems to ensure that no unauthorized access has occurred. It's also advisable to enhance monitoring for any signs of exploitation, such as unusual network traffic or unauthorized command execution. From a broader perspective, this vulnerability highlights the ongoing challenges in securing software supply chains. Deserialization vulnerabilities, in particular, are a reminder of the complexities involved in secure software development. Developers must be vigilant in validating and sanitizing all inputs, especially when dealing with serialized data. In conclusion, the discovery and patching of CVE-2025-26399 serve as a critical reminder of the importance of timely patch management and the need for continuous monitoring and incident response preparedness. Cybersecurity professionals should prioritize applying the patches and reviewing their security posture to mitigate the risks associated with this vulnerability.

πŸ“Œ SolarWinds Releases Critical Patch for Web Help Desk Vulnerability (CVE-2025-26399) https://www.cyberhub.blog/article/13601-solarwinds-releases-critical-patch-for-web-help-desk-vulnerability-cve-2025-26399

25.09.2025 08:40 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
European Airport Disruptions Caused by Ransomware: EU Cyber Office The EU's cybersecurity agency says the widespread disruptions at airports in Belgium, England, and Germany were the result of a ransomware attack on third-party on-boarding software from Collins Aerospace that was used at all three airports.

European Airport Disruptions Caused by Ransomware: EU Cyber Office

The EU's cybersecurity agency says the widespread disruptions at airports in Belgium, England, and Germany were the result of a ransomware attack on third-party on-boarding software from Collins Aerospace that wa…

#hackernews #news

23.09.2025 18:52 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

@specialk3 is following 18 prominent accounts