securestep9's profile picture. @OWASPLondon Chapter Leader (#OWASP #OWASPLondon). OWASP Board Member. Application Security (#AppSec) Consultant. OWASP #Nettacker Project co-leader. #CISSP

Sam Stepanyan

@securestep9

@OWASPLondon Chapter Leader (#OWASP #OWASPLondon). OWASP Board Member. Application Security (#AppSec) Consultant. OWASP #Nettacker Project co-leader. #CISSP

#Linux: Rust-based sudo-rs Affected By Multiple Security Vulnerabilities - Impacting #Ubuntu 25.10 including partial password exposure (CVE-2025-64170) and incorrect User ID in timestamps. Patches for both issues have been released: 👇 phoronix.com/news/sudo-rs-s…


Many thanks to everyone who came to my OWASP #Nettacker talk at the #OWASP Global AppSec 2025 Conference in Washington, DC. 👉github.com/OWASP/Nettacker

securestep9's tweet image. Many thanks to everyone who came to my OWASP #Nettacker talk at the #OWASP Global AppSec 2025 Conference in Washington, DC.
👉github.com/OWASP/Nettacker

#SAP: Patches 3 Critical Vulnerabilities (CVSS 10.0) Including RCE / Code Injection and Hardcoded Credentials affecting SQL Anywhere Monitor (Non-GUI), SAP NetWeaver AS Java, and SAP Solution Manager:(CVE-2025-42890, CVE-2025-42944, CVE-2025-42887): 👇 securityonline.info/sap-november-2…


#AI: HackedGPT: Novel AI Vulnerabilities Open the Door for Private Data Leakage: unique indirect prompt injections, exfiltration of personal user information, persistence, evasion, and bypass of safety mechanisms: #AISecurity tenable.com/blog/hackedgpt…

securestep9's tweet image. #AI: HackedGPT: Novel AI Vulnerabilities Open the Door for Private Data Leakage:  unique indirect prompt injections, exfiltration of personal user information, persistence, evasion, and bypass of safety mechanisms:
#AISecurity

tenable.com/blog/hackedgpt…

#Kubernetes: Newly disclosed #vulnerabilities in the #runC container runtime used in #Docker & Kubernetes (CVE-2025-31133, CVE-2025-52565, CVE-2025-52881) could be exploited to bypass isolation restrictions & get access to the host system (escape): #k8s bleepingcomputer.com/news/security/…


In many decades of flying to/from London @HeathrowAirport I have never seen such negligence. Staff dumping baggage 🛄 under the warning sign for staff saying do not place baggage in this area or your access to the airport will be removed. Terminal 3:

securestep9's tweet image. In many decades of flying to/from London @HeathrowAirport  I have never seen such negligence. Staff dumping baggage 🛄 under the warning sign for staff saying do not place baggage in this area or your access to the airport will be removed. Terminal 3:

Having fun with the AI photo booth at the #OWASP Conference

securestep9's tweet image. Having fun with the AI photo booth at the #OWASP Conference

A great talk by @shehackspurple "Threat Modeling Developer Behaviour: The Psychology of Bad Code" at the #OWASP Global AppSec USA 2025 in Washington, DC: sched.co/28Rqq

securestep9's tweet image. A great talk by @shehackspurple "Threat Modeling Developer Behaviour: The Psychology of Bad Code" at the #OWASP Global AppSec USA 2025 in Washington, DC:
 sched.co/28Rqq

That's a good CAPTCHA challenge!

securestep9's tweet image. That's a good CAPTCHA challenge!

The #OWASP Global AppSec conference in Washington, DC starts with @DanielMiessler's keynote:

securestep9's tweet image. The #OWASP Global AppSec conference in Washington, DC starts with  @DanielMiessler's keynote:

Sam Stepanyan รีโพสต์แล้ว

The next OWASP London Chapter in-person Meetup will take place on Novembver 20th, 2025, kindly hosted by Amazon London HQ. Raffle prize is kindly sponsored by @semgrep. Talks from @InsiderPhD and @JohnSotiro Register to attend this event here: 👇 meetup.com/owasp-london/e…


#NPM: Details have emerged about a now-patched critical security vulnerability in the popular "@react-native-community/cli" npm package that could be potentially exploited to run malicious operating system commands: #Software SupplyChainSecurity 👇 thehackernews.com/2025/11/critic…


Loading...

Something went wrong.


Something went wrong.