Securityblog's profile picture. There are 10 types of people in the world. Those who understand binary, and those who don't. All opinions and views are my own. #BsidesDub organizer

Securityblog

@Securityblog

There are 10 types of people in the world. Those who understand binary, and those who don't. All opinions and views are my own. #BsidesDub organizer

Securityblog أعاد

⚠️ WARNING: Oracle just confirmed a new vulnerability (CVE-2025-61884) in E-Business Suite. No login required. Full data access possible. Even worse—similar flaws were just exploited by Cl0p-linked actors. Read the latest news here → thehackernews.com/2025/10/new-or…


Securityblog أعاد

Run this command, and drop your most used command in the comments 👇 ⌨️ fc -l -n 1 | awk '{print $1}' | sort | uniq -c | sort -nr | head I'll go first: echo

Bugcrowd's tweet image. Run this command, and drop your most used command in the comments 👇

⌨️ fc -l -n 1 | awk '{print $1}' | sort | uniq -c | sort -nr | head

I'll go first: echo

Securityblog أعاد

🚨New Oracle E-Business Suite Bug🚨:CVE-2025-61884 : Oracle Warns of Unauthenticated Vulnerability in E-Business Suite 📰Refer:thehackernews.com/2025/10/new-or… securityonline.info/oracle-warns-o…

🚨Alert🚨:CVE-2025-61882:CL0P Extortion: Google/Mandiant Expose Zero-Day RCE in Oracle E-Business Suite 🧐Deep Dive: 1.cloud.google.com/blog/topics/th… 2.labs.watchtowr.com/well-well-well… 📊11.8K Services are found on the hunter.how yearly. 🔗Hunter Link:hunter.how/list?searchVal… 👇Query…

HunterMapping's tweet image. 🚨Alert🚨:CVE-2025-61882:CL0P Extortion: Google/Mandiant Expose Zero-Day RCE in Oracle E-Business Suite
🧐Deep Dive:
1.cloud.google.com/blog/topics/th…
2.labs.watchtowr.com/well-well-well…
📊11.8K Services are found on the hunter.how yearly.
🔗Hunter
Link:hunter.how/list?searchVal…
👇Query…
HunterMapping's tweet image. 🚨Alert🚨:CVE-2025-61882:CL0P Extortion: Google/Mandiant Expose Zero-Day RCE in Oracle E-Business Suite
🧐Deep Dive:
1.cloud.google.com/blog/topics/th…
2.labs.watchtowr.com/well-well-well…
📊11.8K Services are found on the hunter.how yearly.
🔗Hunter
Link:hunter.how/list?searchVal…
👇Query…


Securityblog أعاد

Blog post: How to Automatically Update Apps in #Intune with Dynamic Win32 App Deployment   msendpointmgr.com/2024/04/21/how… #Win32Apps

MSEndpointMgr's tweet image. Blog post:  How to Automatically Update Apps in #Intune with Dynamic Win32 App Deployment   msendpointmgr.com/2024/04/21/how… #Win32Apps

Securityblog أعاد

Fake AI app, signed "Đoàn Quốc Bảo Khánh" App, tries to kill all browsers, then exfils over Telegram. f0eada6645d7befc0993ebb0ff550019d13bec8bc66d3c479ffacde7d8127d82 h/t @malwrhunterteam

SquiblydooBlog's tweet image. Fake AI app, signed "Đoàn Quốc Bảo Khánh"
App, tries to kill all browsers, then exfils over Telegram.

f0eada6645d7befc0993ebb0ff550019d13bec8bc66d3c479ffacde7d8127d82

h/t @malwrhunterteam

Securityblog أعاد

Exploiting a Use-After-Free vulnerability in the Linux network packet schedule (CVE-2025-38001) syst3mfailure.io/rbtree-family-… Credits @cor_ctf #infosec #Linux

0xor0ne's tweet image. Exploiting a Use-After-Free vulnerability in the Linux network packet schedule (CVE-2025-38001)

syst3mfailure.io/rbtree-family-…

Credits @cor_ctf

#infosec #Linux

Securityblog أعاد

📖Fantastic weekend read: Code auditing 101 Blog: blog.rodolpheg.xyz/posts/code-aud… author: Rodolphe Ghio

mqst_'s tweet image. 📖Fantastic weekend read: Code auditing 101

Blog: blog.rodolpheg.xyz/posts/code-aud…

author: Rodolphe Ghio
mqst_'s tweet image. 📖Fantastic weekend read: Code auditing 101

Blog: blog.rodolpheg.xyz/posts/code-aud…

author: Rodolphe Ghio
mqst_'s tweet image. 📖Fantastic weekend read: Code auditing 101

Blog: blog.rodolpheg.xyz/posts/code-aud…

author: Rodolphe Ghio

Securityblog أعاد

Amazing slide from @ValoSecurity: Companies that have had their Salesforce systems breached in 2025.

mikko's tweet image. Amazing slide from @ValoSecurity: 
Companies that have had their Salesforce systems breached in 2025.

Securityblog أعاد

Idea: RMMs enforce naming conventions for their silent installers. - you're called einvite.exe, statement.exe, ssa-x.exe, invoice.exe? Sorry that's not gonna fly because it's clearly someone abusing your RMM. At least have an easy way for me to report your product being abused!


Securityblog أعاد

Your ex isn’t the only one looking for you online 😉 A new Challenge Category is here! Tackle 10 hands-on Challenges that teach real-world OSINT: social profiling, domain enumeration, geolocation, metadata analysis, dark-web tracing, and more. Start now on #HTB Labs:…

hackthebox_eu's tweet image. Your ex isn’t the only one looking for you online 😉
A new Challenge Category is here! Tackle 10 hands-on Challenges that teach real-world OSINT: social profiling, domain enumeration, geolocation, metadata analysis, dark-web tracing, and more. Start now on #HTB Labs:…

Securityblog أعاد

Rumours about the seizure of panels on the infamous AMOS (Atomic MacOS Stealer) More information to unveil 📝 Panel with banner seizure: /peperinty.com 🎯🍎?

g0njxa's tweet image. Rumours about the seizure of panels on the infamous AMOS (Atomic MacOS Stealer) 

More information to unveil 📝

Panel with banner seizure:
/peperinty.com

🎯🍎?

Securityblog أعاد

Proud to have @st424204 @n0psledbyte @Peterpan980927 presenting their research at CodeBlue with 2 different talks. Kudos to our intern, @rainbowpigeon_ who made contributions to one of the presentations. We are committed to sharing knowledge and advancing the security community

starlabs_sg's tweet image. Proud to have @st424204 @n0psledbyte @Peterpan980927 presenting their research at CodeBlue with 2 different talks. Kudos to our intern, @rainbowpigeon_ who made contributions to one of the presentations. We are committed to sharing knowledge and advancing the security community
starlabs_sg's tweet image. Proud to have @st424204 @n0psledbyte @Peterpan980927 presenting their research at CodeBlue with 2 different talks. Kudos to our intern, @rainbowpigeon_ who made contributions to one of the presentations. We are committed to sharing knowledge and advancing the security community

Securityblog أعاد

A student booted the empty SARIOT lab, followed our method, ran selective fuzzing — and found a real vulnerability on the spot. Now he’s chasing the ROP chain. Hands-on labs = game changer. 🎯🔎 fuzzsociety.org/fuzzsociety-co… #youaretheexploit #fuzzing #VulnResearch

fuzzsociety_org's tweet image. A student booted the empty SARIOT lab, followed our method, ran selective fuzzing — and found a real vulnerability on the spot.
Now he’s chasing the ROP chain.
Hands-on labs = game changer. 🎯🔎
 fuzzsociety.org/fuzzsociety-co…
#youaretheexploit #fuzzing #VulnResearch

Securityblog أعاد

Today we are having fun tackling Mac malware with the boss @patrickwardle 🫡😍 #OBTS v8.0 @objective_see 🫶

osint_barbie's tweet image. Today we are having fun tackling Mac malware with the boss @patrickwardle 🫡😍 
#OBTS v8.0

@objective_see 🫶

Securityblog أعاد

My presentation on Hunting Linux Stealth Rootkits I gave at the Oslo FIRST Cold Incident Response Conference is now available. We used the recently leaked Chinese rootkit in Phrack as an example of how to find and decloak this attack by searching for: - Data Leaks -…

CraigHRowland's tweet image. My presentation on Hunting Linux Stealth Rootkits I gave at the Oslo FIRST Cold Incident Response Conference is now available. We used the recently leaked Chinese rootkit in Phrack as an example of how to find and decloak this attack by searching for: 

- Data Leaks
-…

Securityblog أعاد

Teardown of a hardware wallet: Breaking the bootloader and iris module of OneKey Touch. 📟⚒️🐉🥷🏼📜 More details on: LinkedIn: linkedin.com/posts/dlaskov_… Substack: it4sec.substack.com/p/teardown-of-…

it4sec's tweet image. Teardown of a hardware wallet: Breaking the bootloader and iris module of OneKey Touch. 📟⚒️🐉🥷🏼📜

More details on:
LinkedIn: linkedin.com/posts/dlaskov_…
Substack: it4sec.substack.com/p/teardown-of-…

Securityblog أعاد

kernel hackers go serverless ring0 → cloud 9 ☁️ ?? brb pwning yr gpu nodes ✨


Securityblog أعاد

Multiple phish w/ signed payload "Tax audit documents.exe" Signed "Chengdu Lingxu Technology Co., Ltd." Tencent app to sideload file 953d354a77dd1c6ae6aa4b9993613e0de99731e7e4720d9500887fd59f239167 Another stage from: 38[.]60.203.110:50505/244.dat 🔗🧵 h/t @malwrhunterteam

SquiblydooBlog's tweet image. Multiple phish w/ signed payload
"Tax audit documents.exe"
Signed "Chengdu Lingxu Technology Co., Ltd."

Tencent app to sideload file 953d354a77dd1c6ae6aa4b9993613e0de99731e7e4720d9500887fd59f239167

Another stage from: 38[.]60.203.110:50505/244.dat
🔗🧵
h/t @malwrhunterteam
SquiblydooBlog's tweet image. Multiple phish w/ signed payload
"Tax audit documents.exe"
Signed "Chengdu Lingxu Technology Co., Ltd."

Tencent app to sideload file 953d354a77dd1c6ae6aa4b9993613e0de99731e7e4720d9500887fd59f239167

Another stage from: 38[.]60.203.110:50505/244.dat
🔗🧵
h/t @malwrhunterteam

Securityblog أعاد

Dear M365 admins: ALL OF YOU Are you using Power Platform? If you can't answer that, KEEP READING. There are still things you need to do. Here are some absolute basics that most organizations miss. You license comes with Power Apps and Power Automate functionality and a…

IAMERICAbooted's tweet image. Dear M365 admins: ALL OF YOU

Are you using Power Platform?  If you can't answer that, KEEP READING.  There are still things you need to do.

Here are some absolute basics that most organizations miss.

You license comes with Power Apps and Power Automate functionality and a…
IAMERICAbooted's tweet image. Dear M365 admins: ALL OF YOU

Are you using Power Platform?  If you can't answer that, KEEP READING.  There are still things you need to do.

Here are some absolute basics that most organizations miss.

You license comes with Power Apps and Power Automate functionality and a…

Securityblog أعاد
5hady_'s tweet image. Enough SQLI's for today ( part 2 ) 
Thanks @intigriti <3

#BugBounty #BugBountyLife #EthicalHacking #CyberSecurity #InfoSec #SQLi #WebSecurity #KeepHacking

Loading...

Something went wrong.


Something went wrong.