Posted By
- @ClubTeleMatique@mstdn.social
- @feeds@cysec.social
- @ninjaowl@mastodon.social
- @percepticon@ioc.exchange
- @thehackernews@social.tchncs.de
- @youranonriots@kolektiva.social
Tags
- A
- Acro
- Across
- Alternative
- An
- Attack
- Booby trap
- Cabinet of Israel
- Campaign
- Capture
- Chain
- Cobalt
- Come
- Computer security
- Conduit
- Connect
- Connects
- Containment
- Custom
- Cyber-attack
- Dedicated
- Deliver
- Delivery
- Deployment
- Deployment environment
- Disclosure
- Disk
- Docs
- DONUT
- Download
- Drive By
- Drive-by download
- Drop
- Dropbox
- Economy of France
- Employment
- End
- Entities
- Feels Like
- Framework
- Frameworks
- French
- Generation
- Goal
- Google Docs, Sheets and Slides
- Government agency
- Grasshopper
- Hard disk drive
- Hooks
- Impersonator
- Infection
- Infrastructure
- Israeli
- Keys
- Known
- Lab
- Labs
- Last week
- Legitimacy
- Leverage
- Macro
- Malware
- Mechanism
- Microsoft Excel
- Monitor
- Multistage rocket
- Nature
- Need
- Notability
- Obfuscation
- Open-source model
- Operator
- Payload
- Payload delivery
- Penetration
- Penetration test
- Persistence
- Put
- Question
- Realism
- Realistic
- Registry
- Research
- Researcher
- Scheme
- Server
- Set
- Shellcode
- Sites
- Sliver
- Some
- SonicWall
- Spreadsheet
- Staging
- Starting Point
- Stay
- Strike
- Surrounding
- Target
- Targeted
- Targets
- The campaign
- The end
- The Operator
- The Operators
- Theory
- The work
- Trojan
- Unknown
- Unrelated
- Variety
- VBA
- Vertical
- VHD
- Via
- Virtual
- Well known
- Window
- Windows
- Windows Registry
- WordPress
- Write-in candidate