#infosec search results

FIRESTARTER backdoor hit a US federal agency's Cisco Firepower — survives firmware updates and reboots; only a hard power cycle removes it. CISA/NCSC link it to UAT-4356 via CVE-2025-20333/20362. Patching is not remediation. #Cybersecurity #InfoSec #APT


NICKEL ALLEY strategy: Fake it ‘til you make it - Victimizing software developers via fake companies, jobs, and code repositories to steal cryptocurrency dlvr.it/TSDFVR #cyber #threathunting #infosec


🚨 STARTING IN 15 MINUTES at #CloudVillage at @BSidesCharm ! Don't let attackers bypass your AI oversight. We’re diving into "Signing Your Agent's Homework" to show how cryptographic trust secures agent approvals. 🤖⚡️ Join the crew now! #BSidesCharm #InfoSec #AI


Security basics are often ignored… until it’s too late ⚠️ • Encryption → protect data • Strong passwords → reduce risk • Access control → limit users • Lock devices → prevent misuse • Disable unused services Security starts with basics. #CyberSecurity #InfoSec


The @CISAgov adds another Cisco SD-WAN flaw to its list of known exploited vulnerabilities, warning of active exploit chains. Agencies must patch by April 23 as attackers link bugs to gain full control of networks. #cybersecurity #CISO #infosec bit.ly/42nkDvC


DirtyFree: systematic Linux kernel DOP exploitation via the arbitrary free primitive (paper) leeyoochan.github.io/assets/pdf/Dir… #Linux #infosec

0xor0ne's tweet image. DirtyFree: systematic Linux kernel DOP exploitation via the arbitrary free primitive (paper)

leeyoochan.github.io/assets/pdf/Dir…

#Linux #infosec

The rise of Local LLM + MCP for offensive security (like the Drift project for Caido) highlights a critical shift: the MCP server is the new perimeter. 🛡️ Don't rely on cloud-side safety; govern every tool action at the runtime. #MCPSecurity #AISecurity #InfoSec


In 5 minutes? Dump credentials, establish persistence, disable logging, and pivot to your backup systems. Breach doesn't need hours—just enough time to plant a quiet backdoor for later. ⏱️🔓 #CyberSecurity #IncidentResponse #InfoSec #ThreatHunting


Filed a low-severity bug just to test triage speed. Program: approved + bounty ($$$ CHF) Me: …okay, we’ll take that. 😄 #BugBounty #InfoSec #CyberSecurity #EthicalHacking #Recon #BugHunter #Pentesting #RedTeam #AppSec #WebSecurity #InfosecCommunity #Hackers #BountyHunter

sagar_dh31's tweet image. Filed a low-severity bug just to test triage speed.
Program: approved + bounty ($$$ CHF)
Me: …okay, we’ll take that. 😄

#BugBounty #InfoSec #CyberSecurity #EthicalHacking #Recon #BugHunter #Pentesting #RedTeam #AppSec #WebSecurity #InfosecCommunity #Hackers #BountyHunter

.@owasp reports that AI-driven attacks are scaling fast — hitting governments, cloud agents, and supply chains as attackers exploit identity, automation, and misconfigurations to breach critical systems. #cybersecurity #CISO #infosec #AI bit.ly/4ubhxqA


If you’re also learning cybersecurity, what’s something you’ve realized so far? 👇 #CyberSecurity #InfoSec #LearnInPublic #TechTwitter


SecLeaf Q2 CTF 2026 is now open for 𝘀𝗽𝗼𝗻𝘀𝗼𝗿𝘀. Position your brand in front of a highly engaged cybersecurity community and connect with top talent. 𝗔𝗽𝗽𝗹𝘆 𝗵𝗲𝗿𝗲: forms.gle/6DR463XjzgR4ak… #CyberSecurity #CTF #InfoSec #Sponsorship #TechCommunity #SecLeaf #Q2CTF

secleafofficial's tweet image. SecLeaf Q2 CTF 2026 is now open for 𝘀𝗽𝗼𝗻𝘀𝗼𝗿𝘀.

Position your brand in front of a highly engaged cybersecurity community and connect with top talent.

𝗔𝗽𝗽𝗹𝘆 𝗵𝗲𝗿𝗲: forms.gle/6DR463XjzgR4ak…

#CyberSecurity #CTF #InfoSec #Sponsorship #TechCommunity #SecLeaf #Q2CTF

Microsoft Teams is under siege. Learn how hackers use privilege escalation to steal your data silently. Don’t ignore this critical security warning for your organization. #CyberSecurity #MicrosoftTeams #InfoSec #DataProtection #ByteSizedbalance #BSB #fyp #pourtoi #viral #tiktok #


Go-based backdoors abusing legit services means your proxy logs are useless for C2 detection. China-Linked APT GopherWhisper Abuses Legitimate Services in… → securityweek.com/china-linked-a… #cybersecurity #infosec

paul_fregonese's tweet image. Go-based backdoors abusing legit services means your proxy logs are useless for C2 detection.

China-Linked APT GopherWhisper Abuses Legitimate Services in… → securityweek.com/china-linked-a…

#cybersecurity #infosec

What's your patch cadence for critical CVEs? 👇 Full breakdown + checklist below 👇 #Cybersecurity #DevSecOps #infosec


What's your patch cadence for critical CVEs? 👇 Full breakdown + checklist below 👇 #Cybersecurity #DevSecOps #infosec


💥 📹 A must watch for those aspiring to work at Amazon. 📹 💥 #aws #infosec #linux #webdev #devops #devsecops #database The Leadership Principles explained by Amazon CEO Andy Jassy. ❤️ tech life youtube.com/watch?v=My-2-M…

infosec_coder's tweet card. Inside Amazon

youtube.com

YouTube

Inside Amazon


NICKEL ALLEY strategy: Fake it ‘til you make it - Victimizing software developers via fake companies, jobs, and code repositories to steal cryptocurrency dlvr.it/TSDFVR #cyber #threathunting #infosec


🚨 STARTING IN 15 MINUTES at #CloudVillage at @BSidesCharm ! Don't let attackers bypass your AI oversight. We’re diving into "Signing Your Agent's Homework" to show how cryptographic trust secures agent approvals. 🤖⚡️ Join the crew now! #BSidesCharm #InfoSec #AI


CVE-2026-41898 in rust-openssl is under active exploitation—attackers can leak adjacent memory from OpenSSL, risking data confidentiality. Patch now to protect sensitive info. #NerdieNews #CyberSecurity #InfoSec #Vulnerability #CloudSecurity #AWS #OpenSource

NewsNerdie's tweet image. CVE-2026-41898 in rust-openssl is under active exploitation—attackers can leak adjacent memory from OpenSSL, risking data confidentiality. Patch now to protect sensitive info.

#NerdieNews #CyberSecurity #InfoSec #Vulnerability #CloudSecurity #AWS #OpenSource

CVE-2026-3844 (CVSS 9.8) in Breeze Cache WP plugin: unauth file upload via fetch_gravatar_from_remote. 400K installs; Wordfence logged 170+ attacks. Only exploitable if 'Host Gravatars Locally' is on. securityaffairs.com/191267/uncateg… #infosec #WordPress #CVE


Exploited Vulnerability Exposes Nginx Servers to Hacking dlvr.it/TSDCqp #InfoSec #CyberSecurity

lopezunwired's tweet image. Exploited Vulnerability Exposes Nginx Servers to Hacking dlvr.it/TSDCqp #InfoSec #CyberSecurity

Great session on the front lines of CTF ops at #CloudVillage at @BSidesCharm! 🙌 Huge thanks to Ryan Nolette for sharing the Kiro secrets used at major conferences. We hope these operational best practices help your next big deployment! 🛡️☁️ #AWS #InfoSec

cloudvillage_dc's tweet image. Great session on the front lines of CTF ops at #CloudVillage at @BSidesCharm! 🙌

Huge thanks to Ryan Nolette for sharing the Kiro secrets used at major conferences. We hope these operational best practices help your next big deployment! 🛡️☁️

#AWS #InfoSec
cloudvillage_dc's tweet image. Great session on the front lines of CTF ops at #CloudVillage at @BSidesCharm! 🙌

Huge thanks to Ryan Nolette for sharing the Kiro secrets used at major conferences. We hope these operational best practices help your next big deployment! 🛡️☁️

#AWS #InfoSec
cloudvillage_dc's tweet image. Great session on the front lines of CTF ops at #CloudVillage at @BSidesCharm! 🙌

Huge thanks to Ryan Nolette for sharing the Kiro secrets used at major conferences. We hope these operational best practices help your next big deployment! 🛡️☁️

#AWS #InfoSec

The jump from SOC Analyst to SOC Manager is a shift from tickets to leadership: people, strategy, and security posture. ⁠ Read the full article here:⁠ acsmi.org/blogs/from-soc…⁠ ⁠ #asmit #cybersecurity #infosec #SocialMediaMarketing #socmanager #IncidentResponse


Just found a site hiding 64,680 spam pages from its owner. Cloaked from visitors. Indexed by Google. Invisible to every "security scanner" that only checks the homepage. Run a proper scan: unpwned.io #infosec #SEO

azulay_raz's tweet image. Just found a site hiding 64,680 spam pages from its owner.

Cloaked from visitors. Indexed by Google. Invisible to every "security scanner" that only checks the homepage.

Run a proper scan: unpwned.io

#infosec #SEO

Namastex npm packages hit in CanisterWorm attack, stealing secrets and spreading via stolen credentials across npm and PyPI ecosystems, @SocketSecurity reported. #cybersecurity #CISO #infosec bit.ly/4mNHCJH


Indikasi paparan SNMP tanpa autentikasi masih ada pada sebagian infrastruktur ISP di Indonesia. Mitigasi terlihat parsial dan belum menyeluruh, berpotensi mempermudah pemetaan jaringan. Terbuka untuk koordinasi via DM #CyberSecurity #InfoSec #Indonesia


Security Tip: Stop chasing every CVE at once. 🛡️ Use a risk-based approach to patch management by prioritizing vulnerabilities with active exploits or high EPSS scores. Stay informed: cvedatabase.com #InfoSec #CyberSecurity #CVE

cvedatabase.com

CVEDatabase.com - Search CVE Vulnerabilities & Get AI Remediation

Search and analyze CVE vulnerabilities with CVSS scores and AI-powered remediation guidance.


If you’re also learning cybersecurity, what’s something you’ve realized so far? 👇 #CyberSecurity #InfoSec #LearnInPublic #TechTwitter


15 types of cyber attacks you should know 🔐 Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual. Cybersecurity = business resilience. Credit: Cybersecurity Insights #CyberSecurity #InfoSec #CyberAttacks #TechRisk

ingliguori's tweet image. 15 types of cyber attacks you should know 🔐

Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual.

Cybersecurity = business resilience.

Credit: Cybersecurity Insights

#CyberSecurity #InfoSec #CyberAttacks #TechRisk

The critical "Pack2TheRoot" flaw (CVE-2026-41651) in PackageKit gives root access on Linux. It went undetected for 12 years. Update to version 1.3.5 now! #Pack2TheRoot #LinuxSecurity #InfoSec #CyberSecurity #CVE202641651 #RootAccess #TechAlert securityonline.info/pack2theroot-p…

the_yellow_fall's tweet image. The critical "Pack2TheRoot" flaw (CVE-2026-41651) in PackageKit gives root access on Linux. It went undetected for 12 years. Update to version 1.3.5 now!

#Pack2TheRoot #LinuxSecurity #InfoSec #CyberSecurity #CVE202641651 #RootAccess #TechAlert
securityonline.info/pack2theroot-p…

15 types of cyber attacks you should know 🔐 Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual. Cybersecurity = business resilience. Credit: Cybersecurity Insights #CyberSecurity #InfoSec #CyberAttacks #TechRisk

ingliguori's tweet image. 15 types of cyber attacks you should know 🔐

Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual.

Cybersecurity = business resilience.

Credit: Cybersecurity Insights

#CyberSecurity #InfoSec #CyberAttacks #TechRisk

Security properties of the Linux kernel pipe_buffer object for building exploit primitives by @a13xp0p0v a13xp0p0v.github.io/2026/04/20/pip… #infosec

0xor0ne's tweet image. Security properties of the Linux kernel pipe_buffer object for building exploit primitives by @a13xp0p0v

a13xp0p0v.github.io/2026/04/20/pip…

#infosec

Finally @AnthropicAI approved my cyber use case in just 2h 25min upon submission For people getting rejected provide your profile: @Hacker0x01, @Bugcrowd, and a project with one of your github repos. Much appreciated, Anthropic team 🤎 #InfoSec #Anthropic #BugBounty

Tur24Tur's tweet image. Finally @AnthropicAI approved my cyber use case in just 2h 25min upon submission  For people getting rejected  provide your profile: @Hacker0x01, @Bugcrowd, and a project with one of your github repos. Much appreciated, Anthropic team 🤎 #InfoSec #Anthropic #BugBounty
Tur24Tur's tweet image. Finally @AnthropicAI approved my cyber use case in just 2h 25min upon submission  For people getting rejected  provide your profile: @Hacker0x01, @Bugcrowd, and a project with one of your github repos. Much appreciated, Anthropic team 🤎 #InfoSec #Anthropic #BugBounty

Banned from Claude Code in 30 Minutes The plan was simple: probe Claude Code APIs through Burp Suite (TLS checks off) and responsibly disclose anything interesting via HackerOne. My custom AI agent was also testing Claude Code's APIs in the background, so it was a joint effort

Tur24Tur's tweet image. Banned from Claude Code in 30 Minutes

The plan was simple: probe Claude Code APIs through Burp Suite (TLS checks off) and responsibly disclose anything interesting via HackerOne. My custom AI agent was also testing Claude Code's APIs in the background, so it was a joint effort


Every pentester should have these in their toolkit 👇🔥 From Shodan to crt.sh, this list covers servers, OSINT, attack surface, code search & threat intel Did I miss anything? Drop your favorite tools in the comments 👇 #BugBounty #CyberSecurity #Infosec

obscaries's tweet image. Every pentester should have these in their toolkit 👇🔥

From Shodan to crt.sh,  this list covers servers, OSINT, attack surface, code search & threat intel

Did I miss anything? Drop your favorite tools in the comments 👇

#BugBounty #CyberSecurity #Infosec

TREVEX: A Black-Box Detection Framework For Data-Flow Transient Execution Vulnerabilities (paper, '26) d-we.me/papers/trevex_… #infosec

0xor0ne's tweet image. TREVEX: A Black-Box Detection Framework For Data-Flow Transient Execution Vulnerabilities (paper, '26)

d-we.me/papers/trevex_…

#infosec

Apache Log4j 2.25.4 fixes 4 "silent" flaws, including TLS bypasses and log injection. Secure your infrastructure—upgrade now to prevent data loss. #Log4j #CyberSecurity #InfoSec #Vulnerability #Java #ThreatIntel securityonline.info/log4j-2-vulner…

the_yellow_fall's tweet image. Apache Log4j 2.25.4 fixes 4 "silent" flaws, including TLS bypasses and log injection. Secure your infrastructure—upgrade now to prevent data loss.

#Log4j #CyberSecurity #InfoSec #Vulnerability #Java #ThreatIntel
securityonline.info/log4j-2-vulner…

Running unsigned code during the UEFI boot process (CVE-2025-3052) binarly.io/blog/another-c… Credits @binarly_io #infosec

0xor0ne's tweet image. Running unsigned code during the UEFI boot process (CVE-2025-3052)

binarly.io/blog/another-c…

Credits @binarly_io

#infosec

This one right here… insane value 💀🔥 🔗 pentester.land/writeups/ Real bugs. Real reports. Real hacker mindset. If you're serious about bug bounty, you NEED to study this. #BugBounty #CyberSecurity #Infosec #Hacking

obscaries's tweet image. This one right here… insane value 💀🔥

🔗 pentester.land/writeups/

Real bugs. Real reports. Real hacker mindset.

If you're serious about bug bounty, you NEED to study this.

#BugBounty #CyberSecurity #Infosec #Hacking

Loading...

Something went wrong.


Something went wrong.