#codingvulnerabilities wyniki wyszukiwania

Interested in learning how to shore up exposure from #CodingVulnerabilities and prove #Resilience against #AppSec risks? Register for our March 7th webinar to learn how to build cyber capabilities across application development teams: hubs.ly/Q02mcMVN0

immersivelabs's tweet image. Interested in learning how to shore up exposure from #CodingVulnerabilities and prove #Resilience against #AppSec risks? 

Register for our March 7th webinar to learn how to build cyber capabilities across application development teams: 
hubs.ly/Q02mcMVN0

A shocking 79% of code goes out with known vulnerabilities! That’s why you need Codebashing to: 🔐Secure your code and open source components 📈Track, manage, and remediate at scale 💪Empower developers with training #CodingVulnerabilities #SecureCode #SecurityFirst

Codebashings's tweet image. A shocking 79% of code goes out with known vulnerabilities! That’s why you need Codebashing to:
🔐Secure your code and open source components 
📈Track, manage, and remediate at scale 
💪Empower developers with training

#CodingVulnerabilities #SecureCode #SecurityFirst

79% of code is shipped with known vulnerabilities. That’s why you need Codebashing to: 📈Gain full control and visibility 👨🏻‍🎓Identify areas that need improvement 💡Tailor secure code training to your needs #CodingVulnerabilities #Codebashing #FlexibleTrainingProgram


Interested in learning how to shore up exposure from #CodingVulnerabilities and prove #Resilience against #AppSec risks? Register for our March 7th webinar to learn how to build cyber capabilities across application development teams: hubs.ly/Q02mcMVN0

immersivelabs's tweet image. Interested in learning how to shore up exposure from #CodingVulnerabilities and prove #Resilience against #AppSec risks? 

Register for our March 7th webinar to learn how to build cyber capabilities across application development teams: 
hubs.ly/Q02mcMVN0

Brak wyników dla „#codingvulnerabilities”

Today I used a technique that’s probably not widely known in the community. In what cases could code like this lead to a vulnerability? ->

slonser_'s tweet image. Today I used a technique that’s probably not widely known in the community.
In what cases could code like this lead to a vulnerability? ->

0x4152e26fe66547415579e6205aa6dffacba920af

Log100x's tweet image. 0x4152e26fe66547415579e6205aa6dffacba920af

🚨This repository contain a lot of web and api vulnerability checklist🚨 📥lots of vulnerability ideas and tips from twitter✅ 📥Source github.com/Az0x7/vulnerab… #bugbountytip #bugbountytips #ethicalhacking #CyberSecurity #Pentesting #sqli #xss #CyberSecurityAwareness

wtf_brut's tweet image. 🚨This repository contain a lot of web and api vulnerability checklist🚨

📥lots of vulnerability ideas and tips from twitter✅

📥Source github.com/Az0x7/vulnerab…

#bugbountytip #bugbountytips #ethicalhacking #CyberSecurity #Pentesting #sqli #xss #CyberSecurityAwareness

Hackers 🔥 This code contains at least 2 serious vulnerabilities. Can you spot them? 😋 What would be your exploit? 🤔

chux13786509's tweet image. Hackers 🔥
This code contains at least 2 serious vulnerabilities.
Can you spot them? 😋
What would be your exploit? 🤔

Vulnerability checklist: 📓⚔️ This repository contains a lot of web and API vulnerability checklist, a lot of vulnerability ideas, and tips from twitter - github.com/Az0x7/vulnerab… #infosec #cybersec #bugbountytips

0x0SojalSec's tweet image. Vulnerability checklist: 📓⚔️

This repository contains a lot of web and API vulnerability checklist, a lot of vulnerability ideas, and tips from twitter

- github.com/Az0x7/vulnerab…

#infosec #cybersec #bugbountytips

🔔New paper: Can reasoning models hide their reasoning? We stress-tested Chain-of-Thought (CoT) monitoring and found that while monitors detect ~96% of hidden malicious intent under normal conditions, ⚠️detection can collapse to ~10% under strong obfuscation pressure. 🧵

imwendering's tweet image. 🔔New paper: Can reasoning models hide their reasoning?
We stress-tested Chain-of-Thought (CoT) monitoring and found that while monitors detect ~96% of hidden malicious intent under normal conditions, ⚠️detection can collapse to ~10% under strong obfuscation pressure.  🧵

hey hi hello we've been seeing summa dat WSUS sussy baka CVE-2025-59287 remote code execution exploitation windows servers with WSUS ports 8530 & 8531 exposed ( -- why?) getting point-and-shoot popped from a POC already public huntress.com/blog/exploitat… prolly limited ITW…

_JohnHammond's tweet image. hey hi hello

we've been seeing summa dat WSUS sussy baka CVE-2025-59287 remote code execution exploitation

windows servers with WSUS ports 8530 & 8531 exposed ( -- why?) getting point-and-shoot popped from a POC already public

huntress.com/blog/exploitat…

prolly limited ITW…

🛡️ We added Adobe CVE-2025-54236 and Microsoft CVE-2025-59287 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q & apply mitigations to protect your org from cyberattacks. #Cybersecurity #InfoSec

CISACyber's tweet image. 🛡️ We added Adobe CVE-2025-54236 and Microsoft CVE-2025-59287 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q & apply mitigations to protect your org from cyberattacks. #Cybersecurity #InfoSec

🔥Find critical vulnerabilities in js files✨ Looks inside this JS files: 🔍main, app, runtime, bundle, polyfills, auth, config, settings, local, dev, data, api, session, user,core, client, server, utils, base Read the full method 👇🏼 t.me/ShellSec/176

darkshadow2bd's tweet image. 🔥Find critical vulnerabilities in js files✨
Looks inside this JS files:

🔍main, app, runtime, bundle, polyfills, auth, config, settings, local, dev, data, api, session, user,core, client, server, utils, base
Read the full method 👇🏼 t.me/ShellSec/176

⚠️ 35K+ VS Code installs hit by GlassWorm malware. Trusted tools turned into attack vectors. 🧠 Discover unseen risks → DigitalWarfare.com 🔗 linkedin.com/pulse/invisibl…

DigitalWarCorp's tweet image. ⚠️ 35K+ VS Code installs hit by GlassWorm malware.
Trusted tools turned into attack vectors.
🧠 Discover unseen risks → DigitalWarfare.com
🔗 linkedin.com/pulse/invisibl…

When you're building APIs in Node.js, there are some security best practices you should follow. These will help you harden your APIs and protect them from common threats. In this guide, Manish shows you how to use environment variables, validate input, rate limit your…

freeCodeCamp's tweet image. When you're building APIs in Node.js, there are some security best practices you should follow.

These will help you harden your APIs and protect them from common threats.

In this guide, Manish shows you how to use environment variables, validate input, rate limit your…

Day 23 of #100DaysOfCyberSecurity 🤭 A single bug. A million-dollar breach. That’s how software vulnerabilities are born. They start small. A missed validation, a buffer that spills over, a developer too confident to double-check. Then one day, someone finds the gap. @ireteeh

sexy__yute's tweet image. Day 23 of #100DaysOfCyberSecurity 🤭

A single bug. A million-dollar breach. That’s how software vulnerabilities are born.

They start small. A missed validation, a buffer that spills over, a developer too confident to double-check. 
Then one day, someone finds the gap.
@ireteeh

Day 22 of #100DaysOfCyberSecurity 🤭 Imagine locking your house, only to find out the walls themselves were whispering your secrets. That’s what Meltdown and Spectre did to computers. As promised yesterday, here's more on Hardware vulnerabilities! ⤵️ @ireteeh

sexy__yute's tweet image. Day 22 of #100DaysOfCyberSecurity 🤭
Imagine locking your house, only to find out the walls themselves were whispering your secrets. That’s what Meltdown and Spectre did to computers.

As promised yesterday, here's more on Hardware vulnerabilities! ⤵️

@ireteeh
sexy__yute's tweet image. Day 22 of #100DaysOfCyberSecurity 🤭
Imagine locking your house, only to find out the walls themselves were whispering your secrets. That’s what Meltdown and Spectre did to computers.

As promised yesterday, here's more on Hardware vulnerabilities! ⤵️

@ireteeh


Hackers 🔥 This code is from an unpatched WordPress plugin 🤯 Can you see the vulnerability? 🔎

chux13786509's tweet image. Hackers 🔥
This code is from an unpatched WordPress plugin 🤯
Can you see the vulnerability? 🔎

🚨CVE-2025-62641: Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.12 and 7.2.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where…

DarkWebInformer's tweet image. 🚨CVE-2025-62641: Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.12 and 7.2.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where…

Ever wonder how deserialization bugs like CVE-2025-59287 turn your update server into a hacker’s playground? It’s when untrusted data gets unpacked into code—boom, remote execution. Simple fix? Validate inputs religiously. #Hacking #Vulnerability #CyberSec

cr34t0r_Cyxac's tweet image. Ever wonder how deserialization bugs like CVE-2025-59287 turn your update server into a hacker’s playground? It’s when untrusted data gets unpacked into code—boom, remote execution. Simple fix? Validate inputs religiously.
#Hacking #Vulnerability #CyberSec

Hackers 🔥 What could go wrong with this code? 🤔

chux13786509's tweet image. Hackers 🔥
What could go wrong with this code? 🤔

Top 10 exploited vulnerabilities in 2022. 🧵👇 #bugbounty #infosec #cybersecurity #CVE #hacking

thebinarybot's tweet image. Top 10 exploited vulnerabilities in 2022.

🧵👇

#bugbounty #infosec #cybersecurity #CVE #hacking

I am proud to share the announcement about our CodeMender project at @GoogleDeepMind, an agent that can automatically fix a range of code security vulnerabilities. From only a modest-compute run, our agent submitted 72 high-quality fixes to vulnerable code in popular codebases,…

ralucaadapopa's tweet image. I am proud to share the announcement about our CodeMender project at @GoogleDeepMind, an agent that can automatically fix a range of code security vulnerabilities.  From only a modest-compute run, our agent submitted 72 high-quality fixes to vulnerable code in popular codebases,…

Bad binder(CVE-2019-2215) exploit on x86_64 Android github.com/ameetsaahu/Ker…

ameetsaahu's tweet image. Bad binder(CVE-2019-2215) exploit on x86_64 Android
github.com/ameetsaahu/Ker…

Loading...

Something went wrong.


Something went wrong.


United States Trends