7thGensec's profile picture. 7th GenSecurity is a forward-thinking security company dedicated to tackling the evolving threats of the digital age. With a keen focus on next-generation

7thGensec

@7thGensec

7th GenSecurity is a forward-thinking security company dedicated to tackling the evolving threats of the digital age. With a keen focus on next-generation

🛠️ PEAS Exploitation Toolkit - Access Microsoft Exchange via ActiveSync and dump emails Offensive library and CLI for running commands on ActiveSync servers. Try: github.com/glynx/peas


Manual app management slows onboarding and creates security blind spots. Extending identity governance and administration (IGA) to every app — cloud or on-prem — closes compliance gaps, secures access, and saves IT time. #cybersecurity #CISO #infosec scworld.com/resource/how-t…


New @CheckPointSW research shows attackers exploiting Microsoft Teams flaws to impersonate execs, alter messages, and spoof alerts. Patch fast, verify devices, and train users to detect spoofed messages. #cybersecurity #infosec #CISO #ITsecurity scworld.com/news/microsoft…


A cluster of cybercriminal activity linked to organized crime has been observed in North America conducting cyber-enabled cargo theft, according to @proofpoint research. #cybersecurity #infosec #ITsecurity #CISO scworld.com/news/cyber-ena…


“AI isn’t taking your job — it’s changing it.” At @owasp's Global AppSec conference, Daniel Miessler showed how AI agents like Claude Code can increase productivity tenfold when humans learn to orchestrate them. #cybersecurity #AI #infosec #CISO scworld.com/resource/owasp…


China-linked threat group Storm-1849 (ArcaneDoor) spent October exploiting @Cisco ASA zero-days targeting U.S. defense, finance & government orgs. Even after the @CISAgov ’s patch order, attacks persisted. #cybersecurity #CISO #infosec #ITsecurity scworld.com/news/china-lin…


Cloud transformation isn’t just about saving costs — it’s about agility, innovation, and security at business speed. @Optiv’s Rommy Hijazi and Derek Nash discuss a blueprint for secure cloud success in our on-demand webcast. #CISO #cybersecurity scworld.com/resource/a-blu…


Heard about the OWASP Top 10:2025 latest update Read more about it here owasp.org/www-project-to

7thGensec's tweet image. Heard about the OWASP Top 10:2025 latest update 

Read more about it here

owasp.org/www-project-to…

Every org has “ghosts” in the machine: forgotten devices, legacy systems, and exposed credentials. True #cybersecurity starts with real visibility: continuous, contextual and cross-team, . #infosec #CISO scworld.com/perspective/re…


A now-patched security flaw in Samsung Galaxy Android devices was exploited as a zero-day to deliver a "commercial-grade" Android spyware dubbed LANDFALL in targeted attacks in the Middle East. thehackernews.com/2025/11/samsun… 📷


A single image file could hijack Galaxy phones. Attackers hid a ZIP inside DNG photos sent over WhatsApp, exploiting a zero-day in Samsung’s image codec (CVE-2025-21042). The implant — called LANDFALL — gave full spyware access. thehackernews.com/2025/11/samsun…


Unit 42 uncovered LANDFALL, previously unknown Android spyware that exploited a zero-day vulnerability CVE-2025-21042 in Samsung Android’s image processing library. This is the first public analysis of the campaign and the implant. Read more: bit.ly/47rwbS0

7thGensec's tweet image. Unit 42 uncovered LANDFALL, previously unknown Android spyware that exploited a zero-day vulnerability CVE-2025-21042 in Samsung Android’s image processing library. This is the first public analysis of the campaign and the implant. Read more: bit.ly/47rwbS0

Google Threat Intelligence Group details the ways threat actors are misusing AI tools, including how they are generating and executing AI-enabled malware. 🔗 Read this latest report on our blog: bit.ly/47EzWCq


United States Trends

Loading...

Something went wrong.


Something went wrong.