amriunix's profile picture. Security

Oussama

@amriunix

Security

Pump it !

onboarding the masses takes time, but they are coming… Daily Active Users on the pump fun mobile app are up over 450% over the past 90 days 🔥 the future of @solana is on pump fun.

Pumpfun's tweet image. onboarding the masses takes time, but they are coming…

Daily Active Users on the pump fun mobile app are up over 450% over the past 90 days 🔥

the future of @solana is on pump fun.


Ascend

just 1 day after the announcement of Project Ascend, we've already seen: - $2,402,294 in creator fee claims - thousands of new streams - over 200,000 daily stream viewers this is just one small step towards MASSIVELY disrupting the global creator economy Ascend.

Pumpfun's tweet image. just 1 day after the announcement of Project Ascend, we've already seen:

- $2,402,294 in creator fee claims
- thousands of new streams
- over 200,000 daily stream viewers

this is just one small step towards MASSIVELY disrupting the global creator economy

Ascend.


Oussama 님이 재게시함

introducing Project Ascend, a series of updates that will 100x the pump fun ecosystem by making coins more sustainable & aligned with their communities to start: - 10x more creator earnings via Dynamic Fees - 10x faster processing of CTO Creator Fee applications learn more 👇



After 3 amazing years with one of the best teams I’ve worked with @phantom 👻, it’s time for a new chapter. Thrilled to be joining @pumpdotfun to help secure the Web3 ecosystem, and secure some memes along the way. Let’s build 🛡️💻


SMS-based MFA is consistently unreliable for security

What would you do if you could spy on SMS messages? @theredguild and @opsek_io have identified SLOVENLY COMET, a threat actor which has been intercepting OTP codes and other credentials sent over SMS to certain regions since as early as February 7, 2025 More info below 🔗

_SEAL_Org's tweet image. What would you do if you could spy on SMS messages? @theredguild and @opsek_io have identified SLOVENLY COMET, a threat actor which has been intercepting OTP codes and other credentials sent over SMS to certain regions since as early as February 7, 2025

More info below 🔗


This isn’t just a glitch—it’s a blueprint for future CI/CD attacks. thehackernews.com/2025/03/github… Why does it matter now? Thousands of developers still rely on infected actions. The exploit may have been removed, but the attack method remains.


🚨 Security Alert: A new RAT (StilachiRAT) is targeting crypto wallets by stealing private keys and credentials via clipboard monitoring. 🔒 To protect yourself: ✅ Install and update antivirus software ✅ Avoid running unknown software ✅ Use a hardware wallet for better…

Microsoft Incident Response researchers uncovered a novel remote access trojan (RAT) that demonstrates sophisticated techniques to evade detection, persist in the target environment, and exfiltrate sensitive data. msft.it/6013qVXAl



Say goodbye to sneaky extensions! Google Chrome’s upcoming version 117 is set to introduce an innovative security feature. This feature will promptly alert users and automatically remove any installed extensions that turn malicious. androidpolice.com/hrome-117-deve….


Glad to share with you my recently discovered CVE-2020-25728 cve.mitre.org/cgi-bin/cvenam… A full write-up can be found here : amriunix.com/post/alfresco-… #CVE #cybersecurity #Alfresco


Oussama 님이 재게시함

Oussama 님이 재게시함

🤔

LiveOverflow's tweet image. 🤔

Oussama 님이 재게시함

padding-oracle-attacker : CLI tool and library to execute padding oracle attacks easily (with support for concurrent network requests) : github.com/KishanBagaria/… cc @KishanBagaria


Corona or no corona, staying away from people is always a good idea 😂👌


Due to Corona virus all the TCP application will be transformed to UDP to avoid handshakes 🤔🤔🤔


Oussama 님이 재게시함

My Advanced Cyber Threat Intelligence course is now available on @cybraryIT --> app.cybrary.it/browse/course/…


Oussama 님이 재게시함

XSS Challenge ended Solution: <?><svg onload=alert()> (see reply for explanation)

#XSS Challenge 👉🏻 vulnerableweb.site/xss/xss.php DM me if you solved it :)



"from read@GLIBC to RCE in X86_64" I write a new post showing new technique of binary exploitation. amriunix.com/post/from-read…


CVE-2019-18276 - Suidbash - Walkthrough amriunix.com/post/cve-2019-… big thanks to @LiveOverflow


United States 트렌드

Loading...

Something went wrong.


Something went wrong.