
Securityblog
@Securityblog
There are 10 types of people in the world. Those who understand binary, and those who don't. All opinions and views are my own. #BsidesDub organizer
قد يعجبك
⚠️ WARNING: Oracle just confirmed a new vulnerability (CVE-2025-61884) in E-Business Suite. No login required. Full data access possible. Even worse—similar flaws were just exploited by Cl0p-linked actors. Read the latest news here → thehackernews.com/2025/10/new-or…
Run this command, and drop your most used command in the comments 👇 ⌨️ fc -l -n 1 | awk '{print $1}' | sort | uniq -c | sort -nr | head I'll go first: echo

🚨New Oracle E-Business Suite Bug🚨:CVE-2025-61884 : Oracle Warns of Unauthenticated Vulnerability in E-Business Suite 📰Refer:thehackernews.com/2025/10/new-or… securityonline.info/oracle-warns-o…
🚨Alert🚨:CVE-2025-61882:CL0P Extortion: Google/Mandiant Expose Zero-Day RCE in Oracle E-Business Suite 🧐Deep Dive: 1.cloud.google.com/blog/topics/th… 2.labs.watchtowr.com/well-well-well… 📊11.8K Services are found on the hunter.how yearly. 🔗Hunter Link:hunter.how/list?searchVal… 👇Query…


Blog post: How to Automatically Update Apps in #Intune with Dynamic Win32 App Deployment msendpointmgr.com/2024/04/21/how… #Win32Apps

Fake AI app, signed "Đoàn Quốc Bảo Khánh" App, tries to kill all browsers, then exfils over Telegram. f0eada6645d7befc0993ebb0ff550019d13bec8bc66d3c479ffacde7d8127d82 h/t @malwrhunterteam

Exploiting a Use-After-Free vulnerability in the Linux network packet schedule (CVE-2025-38001) syst3mfailure.io/rbtree-family-… Credits @cor_ctf #infosec #Linux

📖Fantastic weekend read: Code auditing 101 Blog: blog.rodolpheg.xyz/posts/code-aud… author: Rodolphe Ghio



Amazing slide from @ValoSecurity: Companies that have had their Salesforce systems breached in 2025.

Idea: RMMs enforce naming conventions for their silent installers. - you're called einvite.exe, statement.exe, ssa-x.exe, invoice.exe? Sorry that's not gonna fly because it's clearly someone abusing your RMM. At least have an easy way for me to report your product being abused!
Your ex isn’t the only one looking for you online 😉 A new Challenge Category is here! Tackle 10 hands-on Challenges that teach real-world OSINT: social profiling, domain enumeration, geolocation, metadata analysis, dark-web tracing, and more. Start now on #HTB Labs:…

Rumours about the seizure of panels on the infamous AMOS (Atomic MacOS Stealer) More information to unveil 📝 Panel with banner seizure: /peperinty.com 🎯🍎?

Proud to have @st424204 @n0psledbyte @Peterpan980927 presenting their research at CodeBlue with 2 different talks. Kudos to our intern, @rainbowpigeon_ who made contributions to one of the presentations. We are committed to sharing knowledge and advancing the security community


A student booted the empty SARIOT lab, followed our method, ran selective fuzzing — and found a real vulnerability on the spot. Now he’s chasing the ROP chain. Hands-on labs = game changer. 🎯🔎 fuzzsociety.org/fuzzsociety-co… #youaretheexploit #fuzzing #VulnResearch

Today we are having fun tackling Mac malware with the boss @patrickwardle 🫡😍 #OBTS v8.0 @objective_see 🫶

My presentation on Hunting Linux Stealth Rootkits I gave at the Oslo FIRST Cold Incident Response Conference is now available. We used the recently leaked Chinese rootkit in Phrack as an example of how to find and decloak this attack by searching for: - Data Leaks -…

Teardown of a hardware wallet: Breaking the bootloader and iris module of OneKey Touch. 📟⚒️🐉🥷🏼📜 More details on: LinkedIn: linkedin.com/posts/dlaskov_… Substack: it4sec.substack.com/p/teardown-of-…

kernel hackers go serverless ring0 → cloud 9 ☁️ ?? brb pwning yr gpu nodes ✨
Multiple phish w/ signed payload "Tax audit documents.exe" Signed "Chengdu Lingxu Technology Co., Ltd." Tencent app to sideload file 953d354a77dd1c6ae6aa4b9993613e0de99731e7e4720d9500887fd59f239167 Another stage from: 38[.]60.203.110:50505/244.dat 🔗🧵 h/t @malwrhunterteam
![SquiblydooBlog's tweet image. Multiple phish w/ signed payload
"Tax audit documents.exe"
Signed "Chengdu Lingxu Technology Co., Ltd."
Tencent app to sideload file 953d354a77dd1c6ae6aa4b9993613e0de99731e7e4720d9500887fd59f239167
Another stage from: 38[.]60.203.110:50505/244.dat
🔗🧵
h/t @malwrhunterteam](https://pbs.twimg.com/media/G3DlhL6bcAAsy04.png)
![SquiblydooBlog's tweet image. Multiple phish w/ signed payload
"Tax audit documents.exe"
Signed "Chengdu Lingxu Technology Co., Ltd."
Tencent app to sideload file 953d354a77dd1c6ae6aa4b9993613e0de99731e7e4720d9500887fd59f239167
Another stage from: 38[.]60.203.110:50505/244.dat
🔗🧵
h/t @malwrhunterteam](https://pbs.twimg.com/media/G3D9ds2bUAAIjv6.jpg)
Dear M365 admins: ALL OF YOU Are you using Power Platform? If you can't answer that, KEEP READING. There are still things you need to do. Here are some absolute basics that most organizations miss. You license comes with Power Apps and Power Automate functionality and a…


Enough SQLI's for today ( part 2 ) Thanks @intigriti <3 #BugBounty #BugBountyLife #EthicalHacking #CyberSecurity #InfoSec #SQLi #WebSecurity #KeepHacking

United States الاتجاهات
- 1. Branch 37K posts
- 2. Chiefs 112K posts
- 3. Red Cross 53.4K posts
- 4. Exceeded 5,832 posts
- 5. Binance DEX 5,129 posts
- 6. Mahomes 34.8K posts
- 7. #njkopw 7,707 posts
- 8. Rod Wave 1,656 posts
- 9. Air Force One 57.5K posts
- 10. #LaGranjaVIP 83K posts
- 11. Eitan Mor 17.1K posts
- 12. #TNABoundForGlory 59.7K posts
- 13. #LoveCabin 1,380 posts
- 14. Ziv Berman 20K posts
- 15. Alon Ohel 17.7K posts
- 16. Tel Aviv 59.2K posts
- 17. Matan Angrest 16K posts
- 18. Omri Miran 16.3K posts
- 19. Bryce Miller 4,607 posts
- 20. Tom Homan 81.4K posts
قد يعجبك
-
Pierluigi Paganini - Security Affairs
@securityaffairs -
Marcello
@byt3bl33d3r -
hasherezade
@hasherezade -
Sean Metcalf
@PyroTek3 -
Joshua Wright
@joswr1ght -
Dodge This Security
@shotgunner101 -
Cliff Vazquez
@cliffvazquez -
Mike Felch (Stay Ready)
@ustayready -
Constantin Milos ♏@Tinolle infosec.exchange
@Tinolle1955 -
Cn33liz
@Cneelis -
x0rz
@x0rz -
Paul Asadoorian @[email protected]
@securityweekly -
Sean Wright
@SeanWrightSec -
DebugPrivilege
@DebugPrivilege -
Robin
@digininja
Something went wrong.
Something went wrong.