What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
knowbe4.jpg 2023-11-28 14:00:00 CyberheistNews Vol 13 #48 Bloomberg Crypto Channel Hack Exposes Discord Users to Phishing Attacks (lien direct) CyberheistNews Vol 13 #48 ★★
Blog.png 2023-11-28 13:55:33 Ethyrial: Echoes of Yore Hit by Ransomware, Player Accounts Deleted (lien direct) >By Deeba Ahmed The victim company, Gellyberry Studios, an independent game studio, developed Ethyrial: Echoes of Yore. This is a post from HackRead.com Read the original post: Ethyrial: Echoes of Yore Hit by Ransomware, Player Accounts Deleted ★★
RecordedFuture.png 2023-11-28 13:35:00 English council spent £1.1 million recovering from ransomware attack (lien direct) Gloucester City Council in the West Midlands of England was forced to spend more than £1.1 million ($1.39 million) to recover from a ransomware attack in December 2021, according to the published agenda of a council meeting that took place on Monday. The meeting followed the council receiving a formal reprimand by the Information Commissioner's ★★
BBC.png 2023-11-28 13:15:24 Ransomware hackers \'wreaking havoc\' arrested in Ukraine (lien direct) Cyber police carry out raids to dismantle gang responsible for hacking hundreds of organisations. ★★★
datasecuritybreach.png 2023-11-28 13:00:41 LA FCC ADOPTE DE NOUVELLES RÈGLES PERMETTANT AUX FOURNISSEURS DE SERVICES SANS FIL DE CONTRÔLER L\'ÉCHANGE DE CARTES SIM (lien direct) La Federal Communications Commission (FCC) a pris une mesure décisive pour combattre la fraude par échange de cartes SIM, une pratique qui a causé des pertes financières considérables et continue de sévir dans le monde de la cybercriminalité. ★★★
Checkpoint.png 2023-11-28 13:00:25 Reasons your WAN is Failing You, and What You Can You Do about It (lien direct) >According to Gartner® by 2026, 70% of enterprises will have implemented SD-WAN[1] with adoption growing at a CAGR of 26%[2]. The move to cloud-based services and cloud-based infrastructure is leading organizations to rethink their networking infrastructure. Biggest WAN Limitations Here are some current limitations you may be experiencing in light of the shift to online and cloud services: 1. Latency Issues Latency is the time it takes a data packet to travel from its source to its destination, and it can significantly impact the user experience and overall productivity. Traditional WAN infrastructure often leads to extremely high latency as all […] ★★
TroyHunt.png 2023-11-28 12:56:49 Hackers spent 2+ years looting secrets of chipmaker NXP before being detected (lien direct) Chipmaker claims breach had no "material adverse effect." Hack ★★★★
ComputerWeekly.png 2023-11-28 12:47:00 timing attack (lien direct) Chipmaker claims breach had no "material adverse effect."
bleepingcomputer.png 2023-11-28 12:09:29 DP World confirms data stolen in cyberattack, no ransomware used (lien direct) International logistics giant DP World has confirmed that data was stolen during a cyber attack that disrupted its operations in Australia earlier this month. However, no ransomware payloads or encryption was used in the attack. [...]
SocRadar.webp 2023-11-28 12:08:27 Exploitation Attempts Observed for Critical ownCloud Vulnerability (CVE-2023-49103) (lien direct) >Exploitation activity targeting ownCloud with the CVE-2023-49103 vulnerability has been observed, raising concerns within the... Vulnerability ★★★
SocRadar.webp 2023-11-28 12:08:27 Exploitation Attempts Observed for Critical ownCloud Vulnerabilities (CVE-2023-49103, CVE-2023-49104, CVE-2023-49105) (lien direct) Exploitation activity targeting ownCloud with the CVE-2023-49103 vulnerability has been observed, raising concerns within the... Vulnerability ★★
zataz.png 2023-11-28 12:00:51 CYBERATTAQUE MAJEURE CONTRE CTS : DES CENTAINES DE CABINETS D\'AVOCATS BRITANNIQUES IMPACTÉS (lien direct) CTS, un fournisseur de services gérés (MSP) essentiel pour les cabinets d'avocats au Royaume-Uni, a subi une cyberattaque exploitant une faille Citrix. L'entreprise a annoncé avoir lancé une "enquête urgente" après avoir détecté une perturbation majeure de ses services....
Amnesty.webp 2023-11-28 12:00:00 Serbia: Civil society threatened by spyware (lien direct) >Together with civil society partners the SHARE Foundation, Access Now, and the Citizen Lab, Amnesty International can reveal that sophisticated spyware is being used to target civil society in yet another European country  – Serbia. Last month, Apple shared a new round of threat notifications globally, notifying iPhones users who may have been targeted by […] ★★★★
silicon.fr.png 2023-11-28 11:50:55 IA : 18 pays signent un accord pour une cybersécurité by design (lien direct) Les États-Unis, le Royaume-Uni, la France et plus d'une douzaine pays ont signé un accord visant à renforcer la cybersécurité de l'intelligence artificielle (IA). ★★★
InfoSecurityMag.png 2023-11-28 11:40:00 Cybercriminals Hesitant About Using Generative AI (lien direct) An analysis of dark web forums revealed many threat actors are skeptical about using tools like ChatGPT to launch attacks ★★
InfoSecurityMag.png 2023-11-28 11:00:00 Americans Receive Two Billion Spam Calls Per Month (lien direct) Truecaller warns malicious calls make up the majority ★★
Dragos.png 2023-11-28 11:00:00 OT Cybersecurity Best Practices for SMBs: System Hardening for an OT Environment (lien direct) >Dragos OT-CERT would like to thank Sarah Formwaldt for authoring this blog while working at Dragos. This is our monthly... The post OT Cybersecurity Best Practices for SMBs: System Hardening for an OT Environment first appeared on Dragos. Guideline Industrial ★★★
AlienVault.png 2023-11-28 11:00:00 For want of a cyber nail the kingdom fell (lien direct) An old proverb, dating to at least the 1360’s, states: "For want of a nail, the shoe was lost, for want of a shoe, the horse was lost, for want of a horse, the rider was lost, for want of a rider, the battle was lost, for want of a battle, the kingdom was lost, and all for the want of a horseshoe nail," When published in Ben Franklin’s Poor Richard’s Almanack in 1768, it was preceded by the cautionary words: “a little neglect may breed great mischief”. This simple proverb and added comment serve as emblematic examples of how seemingly inconsequential missteps or neglect can lead to sweeping, irreversible, catastrophic losses. The cascade of events resonates strongly within the increasingly complex domain of cybersecurity, in which the omission of even the most elementary precaution can result in a spiraling series of calamities. Indeed, the realm of cybersecurity is replete with elements that bear striking resemblance to the nail, shoe, horse, and rider in this proverb. Consider, for example, the ubiquitous and elementary software patch that may be considered the proverbial digital "nail." In isolation, this patch might seem trivial, but its role becomes crucial when viewed within the broader network of security measures. The 2017 WannaCry ransomware attack demonstrates the significance of such patches; an unpatched vulnerability in Microsoft Windows allowed the malware to infiltrate hundreds of thousands of computers across the globe. It wasn't just a single machine that was compromised due to this overlooked 'nail,' but entire networks, echoing how a lost shoe leads to a lost horse in the proverb. This analogy further extends to the human elements of cybersecurity. Personnel tasked with maintaining an organization's cyber hygiene play the role of the "rider" in our metaphorical tale. However, the rider is only as effective as the horse they ride; likewise, even the most skilled IT professional cannot secure a network if the basic building blocks—the patches, firewalls, and antivirus software—resemble missing nails and shoes. Numerous reports and studies have indicated that human error constitutes one of the most common causes of data breaches, often acting as the 'rider' who loses the 'battle'. Once the 'battle' of securing a particular network or system is lost, the ramifications can extend much further, jeopardizing the broader 'kingdom' of an entire organization or, in more extreme cases, critical national infrastructure. One glaring example that serves as a cautionary tale is the Equifax data breach of 2017, wherein a failure to address a known vulnerability resulted in the personal data of 147 million Americans being compromised. Much like how the absence of a single rider can tip the scales of an entire battle, this singular oversight led to repercussions that went far beyond just the digital boundaries of Equifax, affecting millions of individuals and shaking trust in the security of financial systems. As with any ★★
TechRepublic.png 2023-11-28 10:34:39 Australian SMBs Feel the Cyber Security Heat: Here\'s What IT Pros Can Do to Help (lien direct) 60% of Australian small businesses don't survive a cyber breach. What can the overworked IT pros in small businesses do with limited budgets against the cyber crime wave? ★★
ESET.png 2023-11-28 10:30:00 Retail at risk: Top threats facing retailers this holiday season (lien direct) While it may be too late to introduce wholesale changes to your security policies, it doesn't hurt to take a fresh look at where the biggest threats are and which best practices can help neutralize them ★★
globalsecuritymag.png 2023-11-28 10:27:25 Vigilance.fr - Cisco Wireless LAN Controller AireOS: memory leak via Multiple Clients Connecting, analyzed on 28/09/2023 (lien direct) An attacker can create a memory leak of Cisco Wireless LAN Controller AireOS, via Multiple Clients Connecting, in order to trigger a denial of service. - Security Vulnerability Vulnerability ★★
The_Hackers_News.png 2023-11-28 10:24:00 N. Korean Hackers \'Mixing\' macOS Malware Tactics to Evade Detection (lien direct) The North Korean threat actors behind macOS malware strains such as RustBucket and KANDYKORN have been observed "mixing and matching" different elements of the two disparate attack chains, leveraging RustBucket droppers to deliver KANDYKORN. The findings come from cybersecurity firm SentinelOne, which also tied a third macOS-specific malware called ObjCShellz to the RustBucket campaign. ★★
globalsecuritymag.png 2023-11-28 10:23:48 CPX launches groundbreaking AI-powered cyber threat detection service (lien direct) CPX launches groundbreaking AI-powered cyber threat detection service Unlike conventional Security Information and Event Management (SIEM) systems, the new service focuses on behavior over time, ensuring more accurate threat detection. - Product Reviews ★★
InfoSecurityMag.png 2023-11-28 10:15:00 CISA Warns Congress on Chemical Industry Terror Attacks (lien direct) Security agency wants to resume critical CFATS inspections ★★★
SecurityWeek.png 2023-11-28 09:53:13 Ardent Hospitals Diverting Patients Following Ransomware Attack (lien direct) >Ransomware attack forces Ardent hospitals to shut down systems, impacting clinical and financial operations. Medical ★★
InfoSecurityMag.png 2023-11-28 09:45:00 Ukraine Police Dismantle Major Ransomware Group (lien direct) Affiliate deployed LockerGoga, MegaCortex, Hive and Dharma Legislation ★★★
Korben.png 2023-11-28 09:00:00 Sécurisez vos données avec Leviia et Veeam – Le backup 3-2-1-1-0 accessible et efficace (lien direct) L'auteur discute de l'utilisation du service de stockage Object Storage (S3) de Leviia pour mettre en œuvre la règle d'or de sauvegarde 3-2-1-1-0. Comparé à Amazon S3, il trouve Leviia supérieur en termes de tarifs, de facilité d'utilisation, de sécurité, et d'emplacement de stockage des données en France. Il recommande Leviia pour les personnes soucieuses de la confidentialité de leurs informations. ★★
globalsecuritymag.png 2023-11-28 08:28:12 Etude Trellix : 63% des organisations sont victimes de cyberattaques répétées (lien direct) L'appui de la direction demeure essentiel afin d'aider les RSSI à faire face à la récurrence des cyberattaques. Une nouvelle étude Trellix révèle que 63% des organisations sont victimes de cyberattaques répétées. - Malwares Studies ★★★
News.png 2023-11-28 08:24:06 Ukraine cyber spies claim Putin\'s planes are in peril as sanctions bite (lien direct) Aeroflot fleet still has a smoking section, but not for tobacco Ukrainian government cyber snoops claim they've infiltrated the computer systems of Russia's federal air transport agency Rosaviatsiya, and stolen data that shows the invading nation's civil aviation sector is on the "verge of collapse."… ★★★
Korben.png 2023-11-28 08:00:00 HopToDesk – Une solution gratuite de prise de contrôle d\'ordinateur à distance (lien direct) HopToDesk est une solution gratuite de bureau à distance, disponible sur diverses plateformes, avec des fonctionnalités telles que sécurité, chat en direct, personnalisation et transfert de fichiers. Idéal pour gérer les besoins de bureau à distance et faciliter la vie numérique. ★★★
ComputerWeekly.png 2023-11-28 07:40:00 Scope of British Library data breach widens (lien direct) HopToDesk est une solution gratuite de bureau à distance, disponible sur diverses plateformes, avec des fonctionnalités telles que sécurité, chat en direct, personnalisation et transfert de fichiers. Idéal pour gérer les besoins de bureau à distance et faciliter la vie numérique. ★★
ComputerWeekly.png 2023-11-28 06:47:00 Volume of unique malware samples threatens to overwhelm defenders (lien direct) HopToDesk est une solution gratuite de bureau à distance, disponible sur diverses plateformes, avec des fonctionnalités telles que sécurité, chat en direct, personnalisation et transfert de fichiers. Idéal pour gérer les besoins de bureau à distance et faciliter la vie numérique. ★★
ProofPoint.png 2023-11-28 06:05:24 Proofpoint Appoints Sumit Dhawan as Chief Executive Officer (lien direct) We are delighted to announce that Sumit Dhawan has been appointed as Proofpoint's chief executive officer, effective immediately. Rémi Thomas, Proofpoint's chief financial officer who has been acting as Proofpoint's interim CEO since October 25th, will continue to serve as the company's CFO. Sumit is a highly respected and seasoned technology leader with a proven track record of building market-leading security, cloud and end-user computing businesses. In his most recent role as president of VMware, Sumit was responsible for driving over $13B of revenue and led the company's go-to-market functions including worldwide sales, customer success and experience, strategic ecosystem, industry solutions, marketing, and communications. Before VMware, he was chief executive officer of Instart, a cybersecurity business delivering innovative web application security services. Having held senior executive and general management roles at both VMware and Citrix, Sumit brings over 25 years of experience building category-leading businesses at scale.  Commenting on his appointment, Sumit said: “Over the years, Proofpoint has built an exceptional company and is trusted by some of the world's leading organizations as their cybersecurity partner of choice. I'm honored to join a leader at the forefront of cybersecurity innovation and to shepherd its continuing and unwavering commitment to helping organizations across the globe protect people and defend data.” Seth Boro, managing partner at Thoma Bravo added: “The Proofpoint board of directors could not be more excited to partner with Sumit as he joins Proofpoint to usher in a new stage of growth. Sumit brings a wealth of valuable experience and expertise in building category-leading scaled companies and businesses. We are confident his customer-centric passion and strong legacy of leadership will continue to carry Proofpoint's mission forward in providing people-centric cybersecurity solutions that address some of the most challenging risks facing organizations today.” You can read Proofpoint's announcement about this appointment here. ★★
News.png 2023-11-28 04:45:08 X/Twitter booted out of Australia\'s disinformation-fighting club (lien direct) Ghosted authorities after complaint during hotly contested referendum Australia's Digital Industry Group (DIGI), the industry association for organizations that invest in online safety, privacy, and cyber security, has decided to withdraw X's place in the voluntary code that oversees efforts to stop the spread of misinformation.… ★★
The_State_of_Security.png 2023-11-28 03:32:42 QR Code Phishing –What Is It? (lien direct) Phishing is a longstanding danger of the digital world that most people are aware of. Whether it happens via email, text message, social media, or any other means, phishing presents a risk to all users. In recent years, the growing popularity of QR codes for all manner of operations has created an environment ripe for cybercriminals to take advantage of. All of the dangers of other sorts of phishing are just as present in the case of QR phishing , and the relative novelty of this particular type of attack means that targets are less likely to be wary of scanning QR codes from unknown sources...
The_State_of_Security.png 2023-11-28 03:27:26 How Does NIST\'s AI Risk Management Framework Affect You? (lien direct) While the EU AI Act is poised to introduce binding legal requirements, there's another noteworthy player making waves-the National Institute of Standards and Technology's (NIST) AI Risk Management Framework (AI RMF) , published in January 2023. This framework promises to reshape the future of responsible AI uniquely and voluntarily, setting it apart from traditional regulatory approaches. Let's delve into the transformative potential of the NIST AI RMF and its global implications. Global Impact of the NIST AI Risk Management Framework NIST, a respected entity within the United States... ★★
WiredThreatLevel.png 2023-11-28 01:17:54 23 Best Cyber Monday TV Deals (2023): OLED, QLED, and More (lien direct) Many of our favorite TVs are on sale for Cyber Monday, along with Hulu's almost unbelievable annual $1 sale.
kovrr.png 2023-11-28 00:00:00 Investigating the Risk of Compromised Credentials and Internet-Exposed Assets Explore the report revealing industries and company sizes with the highest rates of compromised credentials and internet-exposed assets. Read More (lien direct) IntroductionIn this report, Kovrr collected and analyzed data to better understand one of the most common initial access vectors (1) - the use of compromised credentials (Valid Accounts - T1078) (2) to access internet-exposed assets (External Remote Services - T113) (3). The toxic combination of these two initial access vectors can allow malicious actors to gain a foothold in company networks before moving on to the next stage of their attack, which can be data theft, ransomware, denial of service, or any other action. There are numerous examples of breaches perpetrated by many attack groups that have occurred using this combination, for example, breaches by Lapsus (4) and APT39 (5), among others. ‍This report seeks to demonstrate which industries and company sizes have the highest percentage of compromised credentials and number of internet-exposed assets and face a higher risk of having their networks breached by the toxic combination of the initial access vectors mentioned above.‍It should be noted that having an asset exposed to the internet does not inherently pose a risk or indicate that a company has poor security. In our highly digitized world, companies are required to expose services to the internet so their services can be accessed by customers, vendors, and remote employees. These services include VPN servers, SaaS applications developed by the company, databases, and shared storage units. However, there are some common cases when having an asset exposed to the internet can be extremely risky, for example:‍When a company unintentionally exposes an asset due to misconfiguration.When a malicious third party obtains compromised credentials of a legitimate third party and accesses an exposed asset.  ‍To limit unnecessary internet exposure, companies should employ the following possible mitigations:‍Use Multi-Factor Authentication (MFA) for any services or assets that require a connection so that compromised credentials on their own will not be enough to breach an exposed asset.Limit access to the asset to only specific accounts, domains, and/or IP ranges.Segment the internal company network and isolate critical areas so that even if a network is breached through access to an external asset, attackers will not be able to use that access to reach wider or more sensitive areas of the company network. ‍Summary‍The following are the main findings from the collected data:‍The Services industry is by far the most exposed to attackers. Companies from that industry have the highest percentage of compromised credentials (74%). However, they have a relatively low amount of internet-exposed assets per company (34%). However, given that an average cyber loss in this industry has been shown to be about $45M, this is highly concerning (6). The Services industry (SIC Division I) is followed by Division E (Transportation, Communications, Electric, Gas, and Sanitary Services, with an average loss of around $58M), which is followed by Division D (Manufacturing, with an average loss of around $25M). The revenue range for companies with the highest number of compromised credentials is $1M-$10M, followed by $10M-$50M. A similar trend is also observed when evaluating company size by the number of employees. Indeed, companies with fewer employees have a higher share of compromised credentials. On average, the larger the company (both in terms of revenue and number of employees (7)), the greater the number of internet-exposed assets.There is a correlation between the industries and revenue ranges of companies targeted by ransomware and those with the highest share of compromised credentials.   ‍Methodology‍The data for this research was collected as follows:‍Data regarding compromised credentials was first collected from Hudson Rock, a provider of various cybercrime data. Data was collected for the previous six months, beginning March 2023. This data Studies ★★★
The_Hackers_News.png 2023-11-27 23:27:00 How to Handle Retail SaaS Security on Cyber Monday (lien direct) If forecasters are right, over the course of today, consumers will spend $13.7 billion. Just about every click, sale, and engagement will be captured by a CRM platform. Inventory applications will trigger automated re-orders; communication tools will send automated email and text messages confirming sales and sharing shipping information.  SaaS applications supporting retail efforts will host ★★
DarkReading.png 2023-11-27 23:16:00 Cyber Threats to Watch Out for in 2024 (lien direct) As cyber threats evolve in 2024, organizations must prepare for deepfakes, extortion, cloud targeting, supply chain compromises, and zero day exploits. Robust security capabilities, employee training, and incident response plans are key. ★★
DarkReading.png 2023-11-27 22:54:00 CISA, NCSC Offer a Road Map, Not Rules, in New Secure AI Guidelines (lien direct) US and UK authorities issued new recommendations for companies that build and rely on AI, but they stop short of laying down the law. ★★
TechWorm.webp 2023-11-27 22:09:04 Police Urging Parents To Disable “NameDrop” Feature On iPhone (lien direct) Multiple police social media pages on Facebook are warning parents to disable a new feature, “NameDrop,” that was rolled out in the iOS 17.1 update earlier this year. This new iPhone feature, which is enabled by default with the iOS 17.1 update, can automatically exchange contact information, including pictures, phone numbers, email addresses, and more, by just holding your iPhone next to another iPhone or Apple Watch close together. Over the weekend, the Middletown Division of Police in Ohio posted a warning on Facebook urging parents to turn off the “NameDrop” feature on their children’s iPhones to prevent the transfer of personal information, such as phone number or email address, and name, to keep them safe. “PARENTS: Don't forget to change these settings on your child's phone to help keep them safe as well,” the Middletown Division of Police wrote in its Facebook post. Even the Oakland County Sheriff's Office in Michigan and the Watertown CT Police Department warned users about the “NameDrop” feature rolled out with the new update. “And yes, we know that it allows you to share it and you can refuse but many people do not check their settings and realize how their phone works,” the Oakland County Sheriff's office wrote in its post. According to Apple's support page on NameDrop, the exchange of information doesn't get completed, if the two iPhone devices are locked or moved away from each other before the NameDrop transfer completes. The Cupertino giant also added on its support page that NameDrop only works for sending new contact information, and not updating an existing contact in the iPhone. To disable the “NameDrop” feature on your iPhone or your kid’s iPhone, you need to go to Settings > General > AirDrop > Bringing Devices Together and turn off the toggle switch.
DarkReading.png 2023-11-27 22:00:00 The Role of the CISO in Digital Transformation (lien direct) A successful CISO should play a leading role in digital transformation and cloud migration initiatives in their organization. The CISO is responsible for making sure technical security controls are designed and implemented appropriately, and changes are properly managed, with security in mind from the very start. ★★
RecordedFuture.png 2023-11-27 22:00:00 AI systems \'subject to new types of vulnerabilities,\' British and US cyber agencies warn (lien direct) British and U.S. cybersecurity authorities published guidance on Monday about how to develop artificial intelligence systems in a way that will minimize the risks they face from mischief-makers through to state-sponsored hackers. “AI systems are subject to new types of vulnerabilities,” the 20-page document warns - specifically referring to machine-learning tools. The new guidelines have ★★★
WiredThreatLevel.png 2023-11-27 21:42:55 4 Cyber Monday Vacuum Deals That Totally Suck (In a Good Way) (lien direct) There are so many reasons not to spend several hundred dollars on a vacuum. But your house is very, very dirty. Now's your chance. ★★
RecordedFuture.png 2023-11-27 21:37:00 Suspected Hamas-linked hackers target Israel with new version of SysJoker malware (lien direct) Hackers possibly linked to the Palestinian militant group Hamas are targeting Israeli critical industry sectors with a new version of the SysJoker backdoor malware, according to cybersecurity researchers. SysJoker was previously used against Israel's educational institutions in 2021. However, since then, the hackers have almost entirely rewritten its code and improved the malware's capabilities. The ★★
DarkReading.png 2023-11-27 21:35:00 Ardent Health Hospitals Disrupted After Ransomware Attack (lien direct) More than two dozen hospitals have been impacted by the breach and are diverting emergency care for patients to other healthcare facilities. Medical ★★★
CyberWarzone.jpg 2023-11-27 21:03:08 Man Sentenced to Four Months in Prison for Offering Phishing Panels via Telegram (lien direct) The Netherlands – A man who offered phishing panels via Telegram has been sentenced today by a magistrate to a four-month prison term, two of [more...] Legislation ★★
DarkReading.png 2023-11-27 20:55:00 General Electric, DARPA Hack Claims Raise National Security Concerns (lien direct) Weapons systems data, AI research, and other classified information may be up for sale, not to mention access to other government agencies. ★★
WiredThreatLevel.png 2023-11-27 20:11:37 18 Best Cyber Monday Pet Deals (2023): Automatic Litter Boxes, Dog Beds (lien direct) Fido needs new treats. Check your furry friends off your gift list with these Cyber Monday deals.
Last update at: 2023-11-29 20:10:01
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter