Mroverflow's profile picture. Professor by Day, Cyber Security Researcher by Night. A Lifelong learner, and a Madridista. CRTP | CEH | CND and CEI  http://infosec.exchange/@Mroverflow

Haitham Alani

@Mroverflow

Professor by Day, Cyber Security Researcher by Night. A Lifelong learner, and a Madridista. CRTP | CEH | CND and CEI http://infosec.exchange/@Mroverflow

Fijado

Here's a free (For a limited time) coupon code for my course "Practical Internet of Things Hacking" udemy.com/course/practic…


Interesting

⚡ North Korean hackers just used the blockchain to hide malware — the first time ever seen. Google says they used EtherHiding to plant code inside smart contracts, making it nearly impossible to remove and easy to update for just $1.37 in gas fees. Full story ↓…

TheHackersNews's tweet image. ⚡ North Korean hackers just used the blockchain to hide malware — the first time ever seen.

Google says they used EtherHiding to plant code inside smart contracts, making it nearly impossible to remove and easy to update for just $1.37 in gas fees.

Full story ↓…


Haitham Alani reposteó

🛠️ New PoC Exploit Released for Sudo Chroot Privilege Escalation Vulnerability Read more: cybersecuritynews.com/poc-exploit-su… A critical vulnerability in the widely used Sudo utility has come under scrutiny following the public release of a proof-of-concept exploit, raising alarms for…

The_Cyber_News's tweet image. 🛠️ New PoC Exploit Released for Sudo Chroot Privilege Escalation Vulnerability 

Read more: cybersecuritynews.com/poc-exploit-su…

A critical vulnerability in the widely used Sudo utility has come under scrutiny following the public release of a proof-of-concept exploit, raising alarms for…

Haitham Alani reposteó

From Chaos to Clarity. Turning Raw Windows Logs into Executive Insights. Looking for Indicators of Compromise. github.com/Logisek/Threat…


Haitham Alani reposteó

Did you know you can run ngrok (without installing it) by using tunnel.us.ngrok.com as a reverse tunnel? Try this: ssh -R 80:localhost:80 http It's the equivalent of `ngrok http 80`

hakluke's tweet image. Did you know you can run ngrok (without installing it) by using tunnel.us.ngrok.com as a reverse tunnel?

Try this:
ssh -R 80:localhost:80  http

It's the equivalent of `ngrok http 80`

Haitham Alani reposteó

🔎 Top 21 Recursos de la Dark Web para Profesionales de OSINT Lista seleccionada de 21 motores de búsqueda, servicios de monitoreo, foros y herramientas de la dark web, útiles para trabajos de OSINT defensivo e inteligencia de amenazas — exclusivamente para investigaciones…

HackingTeam777's tweet image. 🔎 Top 21 Recursos de la Dark Web para Profesionales de OSINT

Lista seleccionada de 21 motores de búsqueda, servicios de monitoreo, foros y herramientas de la dark web, útiles para trabajos de OSINT defensivo e inteligencia de amenazas — exclusivamente para investigaciones…

Haitham Alani reposteó

Using a VPN lets you access your home network no matter where you are in the world. This has various benefits, like greater security - and @LifeofDanEL shows you how to set one up here. You'll use the open source Tailscale mesh VPN and host it on a Raspberry Pi. You'll even add…

freeCodeCamp's tweet image. Using a VPN lets you access your home network no matter where you are in the world.

This has various benefits, like greater security - and @LifeofDanEL shows you how to set one up here.

You'll use the open source Tailscale mesh VPN and host it on a Raspberry Pi. You'll even add…

Haitham Alani reposteó

Just read an x86 Assembly article that’s insanely simple and digestible, I literally enjoyed every single bit of it.

Abhishekcur's tweet image. Just read an x86 Assembly article that’s insanely simple and digestible, I literally enjoyed every single bit of it.

Haitham Alani reposteó

You can HACK AI with EMOJIS. Explained by @Jhaddix


Haitham Alani reposteó

To understand the OS fundamentals in a practical way, this might be a good resource. (Link Below)

zuhaitz_dev's tweet image. To understand the OS fundamentals in a practical way, this might be a good resource.

(Link Below)

Haitham Alani reposteó

Quick Linux tip💡 You can see the bad login attempts to your Linux serve with: $ lastb The command just reads data from /var/log/btmp and displays it in a pretty format.


This short video highlights and teaches two important things: why we still need cybersecurity experts in the age of AI, and why we should be very careful when feeding LLMs with our private and sensitive data.

0-click WARNING: ShadowLeak in Gmail Sponsored by Radware. ShadowLeak shows how a zero-click prompt injection can leak data when agents browse your Gmail. Learn the risk, the exfil path, and how OpenAI fixed it. Link to report: radware.com/blog/threat-in…



George Orwell saw this coming in the 40s

EU Politicians EXEMPT. You’re Not



Haitham Alani reposteó

tunnel any traffic over websockets to bypass firewalls and proxies

tom_doerr's tweet image. tunnel any traffic over websockets to bypass firewalls and proxies

Haitham Alani reposteó

⚡️🇵🇸🇮🇱 Remember when Israeli Jews disguised themselves as doctors to murder Palestinians in a hospital? Only Judaism allows this behavior. Demonic.

RedPillMediaX's tweet image. ⚡️🇵🇸🇮🇱 Remember when Israeli Jews disguised themselves as doctors to murder Palestinians in a hospital?

Only Judaism allows this behavior. Demonic.

Haitham Alani reposteó
Vinod_r108's tweet image.

Haitham Alani reposteó

في السعودية، تستطيع تسديد ديونك من أموال التركات المجهولة، حيث يوجد ملايين الريالات من التركات لأشخاص ماتوا بدون ورثة، وهذه التركات تدار من هيئة الأوقاف. في القانون الجعفري العراقي: #المرجع وارث من لا وارث له.


Haitham Alani reposteó

I predict “MCP Bloat” (just made it up) is going to cause privacy nightmares. Other than traditional supply chain risk, some folks will install an excessive number of MCPs, which significantly increases the chance of your data being unnecessarily or erroneously sent across many…


Haitham Alani reposteó

‘Death to Arabs!’: Israeli settlers storm bus and accost Palestinian passengers in the West Bank


Haitham Alani reposteó

🎯 Already skilled? Just need the cert to prove it? 🔗 bit.ly/41Qvq1r Certification Vouchers 50% off: 🔴 eJPT 🔴 eCPPT 🔴 eWPT 🔴 eWPTX 🔵 eEDA 🔵 eCDFP 🔴 eMAPT 🔵 eCTHP Code: 50CERTSAUG25 180 days to take it! ⚡

SecurityTube's tweet image. 🎯 Already skilled? Just need the cert to prove it?
🔗 bit.ly/41Qvq1r

Certification Vouchers 50% off:
🔴 eJPT
🔴 eCPPT
🔴 eWPT
🔴 eWPTX
🔵 eEDA
🔵 eCDFP
🔴 eMAPT
🔵 eCTHP

Code: 50CERTSAUG25 180 days to take it! ⚡

Apple just fixed a serious security flaw (CVE-2025-43300) in ImageIO, exploited by malicious images. Update to iOS 18.6.2, iPadOS, or macOS now to stay safe. A reminder that even images can pose risks.


Loading...

Something went wrong.


Something went wrong.