threatpointer's profile picture. Foodie, backpacker, newbie blogger & Security Engineer @Microsoft~ Opinions expressed are personal!

Mohammed Tanveer

@threatpointer

Foodie, backpacker, newbie blogger & Security Engineer @Microsoft~ Opinions expressed are personal!

Wonderful meeting @spantzel and diving deep into GPU security — from architecture nuances to AI model execution risks. Exciting times ahead for security! 🔐⚡ #GPU #SecurityResearch #AI #BlueHatAsia @MSFTBlueHat @msftsecresponse

threatpointer's tweet image. Wonderful meeting  @spantzel and diving deep into GPU security — from architecture nuances to AI model execution risks.

Exciting times ahead for security! 🔐⚡
#GPU #SecurityResearch #AI #BlueHatAsia

@MSFTBlueHat @msftsecresponse

Hey @perplexity_ai seeing two issues on Chrome Access to script at pplx-next-static-public.perplexity.ai redirected to perplexity-ai.cloudflareaccess.com … CORS issue + Minified React error #185 (max depth exceeded) Looks like a restricted asset redirect via Cloudflare Access + retry loop in React.

threatpointer's tweet image. Hey @perplexity_ai seeing two issues on Chrome 
 Access to script at pplx-next-static-public.perplexity.ai redirected to perplexity-ai.cloudflareaccess.com …
CORS issue
+
Minified React error #185 (max depth exceeded)
Looks like a restricted asset redirect via Cloudflare Access + retry loop in React.

Mohammed Tanveer reposted

Free Malware Analysis Course, covers malware concepts, malware analysis, and black-box reverse engineering techniques class.malware.re

5mukx's tweet image. Free Malware Analysis Course, covers malware concepts, malware analysis, and black-box reverse engineering techniques

class.malware.re

Mohammed Tanveer reposted

CVE-2025-55680 cldflt.sys EoP exploited in TyphoonPWN 2025 A direct bypass of @tiraniddo 's bug from 2020 (project-zero.issues.chromium.org/issues/42451188) unpatched for 5 years

cplearns2h4ck's tweet image. CVE-2025-55680 cldflt.sys EoP exploited in TyphoonPWN 2025

A direct bypass of @tiraniddo 's bug from 2020 (project-zero.issues.chromium.org/issues/42451188) unpatched for 5 years

I just published Deconstructing CVE-2025–10585: Deep Dive into Chrome’s Latest V8 Zero-Day! medium.com/p/deconstructi… #infosec #browser #zerodayattack


Mohammed Tanveer reposted

“The largest supply chain compromise in npm, Inc. history just happened, packages with a total of 2 billion weekly downloads just got turned malicious” LinkedIn Post linkedin.com/posts/advocate… More info on hacker news news.ycombinator.com/item?id=451696…

cyb3rops's tweet image. “The largest supply chain compromise in npm, Inc. history just happened, packages with a total of 2 billion weekly downloads just got turned malicious”

LinkedIn Post
linkedin.com/posts/advocate…

More info on hacker news 
news.ycombinator.com/item?id=451696…
cyb3rops's tweet image. “The largest supply chain compromise in npm, Inc. history just happened, packages with a total of 2 billion weekly downloads just got turned malicious”

LinkedIn Post
linkedin.com/posts/advocate…

More info on hacker news 
news.ycombinator.com/item?id=451696…

🚀 Just launched ShadowSeek at Black Hat Arsenal 2025! This new AI-powered binary security analysis platform is set to change how we find vulnerabilities in closed-source code. Try here: github.com/threatpointer/… #BinaryAnalysis #ReverseEngineering #LLM #Ghidra #SecurityResearch


Mohammed Tanveer reposted

NVIDIA research just made LLMs 53x faster. 🤯 Imagine slashing your AI inference budget by 98%. This breakthrough doesn't require training a new model from scratch; it upgrades your existing ones for hyper-speed while matching or beating SOTA accuracy. Here's how it works:…

JacksonAtkinsX's tweet image. NVIDIA research just made LLMs 53x faster. 🤯

Imagine slashing your AI inference budget by 98%.

This breakthrough doesn't require training a new model from scratch; it upgrades your existing ones for hyper-speed while matching or beating SOTA accuracy.

Here's how it works:…

I am sure I need a better cooling system in place for the ML workloads but supper excited to be extacting every ounce of my GPU!

threatpointer's tweet image. I am sure I need a better cooling system in place for the ML workloads but supper excited to be extacting every ounce of my GPU!

Read “Leveraging .INI Files for Code Execution on Windows: Techniques Used by Malware and Adversaries“ on Medium: medium.com/@threatpointer…


I'm attending #BlueHat India. Hit me up if you are around!


Mohammed Tanveer reposted

SignToolEx - code sign things with expired (leaked) certificates without adjusting system clock using Microsoft Detours. github.com/hackerhouse-op…

hackerfantastic's tweet image. SignToolEx - code sign things with expired (leaked) certificates without adjusting system clock using Microsoft Detours. github.com/hackerhouse-op…

Mohammed Tanveer reposted

tmpout vol3 - article a day #14 "rain king - silent syscall hooking on arm64 linux via patching svc handler" wintermute shows us an interesting way of hooking syscalls that isn't commonly detected! read here: tmpout.sh/3/23.html

tmpout's tweet image. tmpout vol3 - article a day #14

"rain king - silent syscall hooking on arm64 linux via patching svc handler"

wintermute shows us an interesting way of hooking syscalls that isn't commonly detected!

read here: tmpout.sh/3/23.html

Mohammed Tanveer reposted

Hey Hackers, Here's the EDR and AV Bypass Content Thread! 🧵 👇 #infosec #Hacking #Pentesting #redteam


Mohammed Tanveer reposted

Check it out, it's tmp.0ut Volume 3! tmpout.sh/3/

tmpout's tweet image. Check it out, it's tmp.0ut Volume 3!

tmpout.sh/3/

Mohammed Tanveer reposted

🚨🚨🚨 Whatever you were thinking about CVE-2023-20198 (#Cisco IOS EX) it's 100x worst. We used @TalosSecurity IOC check and found ~30k implants. That's 30k devices infected (routers, switches, VPNs), under the control of threat actors. That's excluding rebooted devices.

leak_ix's tweet image. 🚨🚨🚨 Whatever you were thinking about CVE-2023-20198 (#Cisco IOS EX) it's 100x worst.

We used @TalosSecurity IOC check and found ~30k implants.

That's 30k devices infected (routers, switches, VPNs),  under the control of threat actors.

That's excluding rebooted devices.

Mohammed Tanveer reposted

Poor man's guide to de-obfuscating VMProtect's : Discovery: youtube.com/watch?v=ZhQUbj…… (1/3) Resolution: youtube.com/watch?v=uxOVbG…… (2/3) Import Recontruction: youtube.com/watch?v=GvWSa6…… (3/3)


Loading...

Something went wrong.


Something went wrong.