shah_sheikh Profile Banner
Shah Sheikh Profile
Shah Sheikh

@shah_sheikh

Followers
2K
Following
17
Statuses
171K

Cybersecurity Professional / Enthusiast / Founder.

Dubai, United Arab Emirates
Joined July 2011
Don't wanna be here? Send us removal request.
@shah_sheikh
Shah Sheikh
22 minutes
[Security Affairs] China-linked APTs’ tool employed in RA World Ransomware attack. A November 2024 RA World ransomware attack on an Asian software firm used a tool linked to China-linked threat actors. Broadcom researchers reported that threat actors...
0
0
0
@shah_sheikh
Shah Sheikh
34 minutes
[TheHackersNews] Hackers Use CAPTCHA Trick on Webflow CDN PDFs to Bypass Security Scanners. A widespread phishing campaign has been observed leveraging bogus PDF documents hosted on the Webflow content delivery network (CDN) with an aim to steal...
0
0
0
@shah_sheikh
Shah Sheikh
43 minutes
[Graham Cluley] US Coast Guard told to improve its cybersecurity, after warning raised that hacked ports could cost $2 billion per day. The US Coast Guard has been urged to improve the cybersecurity infrastructure of the Maritime Transportation...
0
0
0
@shah_sheikh
Shah Sheikh
1 hour
[Dark Reading] How Public & Private Sectors Can Better Align Cyber Defense. With investment in cybersecurity capabilities and proactive measures to address emerging challenges, we can work together to navigate the complexities of combating cybercrime.
0
0
0
@shah_sheikh
Shah Sheikh
2 hours
[TheHackersNews] North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks. A nation-state threat actor with ties to North Korea has been linked to an ongoing campaign targeting South Korean business, government, and...
0
0
0
@shah_sheikh
Shah Sheikh
2 hours
[HelpNet] Palo Alto Networks Cortex Cloud applies AI-driven insights to reduce risk and prevent threats. Palo Alto Networks introduced Cortex Cloud, the next version of Prisma Cloud, that natively brings together new releases of its cloud detection...
0
0
0
@shah_sheikh
Shah Sheikh
2 hours
[Security Intelligence] How red teaming helps safeguard the infrastructure behind AI models. Artificial intelligence (AI) is now squarely on the frontlines of information security. However, as is often the case when the pace of technological...
0
0
0
@shah_sheikh
Shah Sheikh
3 hours
[HelpNet] Sandworm APT’s initial access subgroup hits organizations accross the globe. A subgroup of Russia’s Sandworm APT has been working to achieve initial and persistent access to the IT networks of organizations working in economic sectors...
0
0
0
@shah_sheikh
Shah Sheikh
3 hours
[Dark Reading] Content Credentials Technology Verifies Image, Video Authenticity. The open technology tackles disinformation by verifying whether the image is real or has been modified. The standard, created to document the provenance of photos and...
0
0
0
@shah_sheikh
Shah Sheikh
3 hours
[Security Affairs] Russia-linked APT Seashell Blizzard is behind the long running global access operation BadPilot campaign. A subgroup of the Russia-linked Seashell Blizzard APT group (aka Sandworm) ran a global multi-year initial access operation...
0
0
0
@shah_sheikh
Shah Sheikh
3 hours
[TheHackersNews] Fast Deployments, Secure Code: Watch this Learn to Sync Dev and Sec Teams. Ever felt like your team is stuck in a constant battle? Developers rush to add new features, while security folks worry about vulnerabilities. What if you...
0
0
0
@shah_sheikh
Shah Sheikh
4 hours
[TheHackersNews] Hackers Exploited PAN-OS Flaw to Deploy Chinese Malware in Ransomware Attack. An RA World ransomware attack in November 2024 targeting an unnamed Asian software and services company involved the use of a malicious tool exclusively...
0
0
0
@shah_sheikh
Shah Sheikh
4 hours
[TheHackersNews] AI and Security - A New Puzzle to Figure Out. AI is everywhere now, transforming how businesses operate and how users engage with apps, devices, and services. A lot of applications now have some Artificial Intelligence inside,...
0
0
0
@shah_sheikh
Shah Sheikh
4 hours
[The Register - Security] North Korea targets crypto developers via NPM supply chain attack. Yet another cash grab from Kim's cronies and an intel update from Microsoft North Korea has changed tack: its latest campaign targets the NPM registry and...
0
0
0
@shah_sheikh
Shah Sheikh
4 hours
[Schneier on Security] DOGE as a National Cyberattack. In the span of just weeks, the US government has experienced what may be the most consequential security breach in its history—not through a sophisticated cyberattack or an act of foreign...
0
0
0
@shah_sheikh
Shah Sheikh
5 hours
[Wired - Security] The Loneliness Epidemic Is a Security Crisis. Romance scams cost victims hundreds of millions of dollars a year. As people grow increasingly isolated, and generative AI helps scammers scale their crimes, the problem could get worse.
0
0
0
@shah_sheikh
Shah Sheikh
5 hours
[HelpNet] PAN-OS authentication bypass hole plugged, PoC is public (CVE-2025-0108). Palo Alto Networks has fixed a high-severity authentication bypass vulnerability (CVE-2025-0108) in the management web interface of its next-gen firewalls, a...
0
0
0
@shah_sheikh
Shah Sheikh
5 hours
[TheHackersNews] Palo Alto Networks Patches Authentication Bypass Exploit in PAN-OS Software. Palo Alto Networks has addressed a high-severity security flaw in its PAN-OS software that could result in an authentication bypass. The vulnerability,...
0
1
0
@shah_sheikh
Shah Sheikh
7 hours
[TheHackersNews] FINALDRAFT Malware Exploits Microsoft Graph API for Espionage on Windows and Linux. Threat hunters have shed light on a new campaign targeting the foreign ministry of an unnamed South American nation with bespoke malware capable of...
0
0
0
@shah_sheikh
Shah Sheikh
7 hours
[Graham Cluley] US woman faces years in federal prison for running laptop farm for N Korean IT workers. Christian Marie Chapman, of Litchfield Park, Arizona, helped generate over US $17 million for North Korea after over 300 US companies unwittingly...
0
0
0