#infosec search results

New version of Kernel Pack, the only C2 framework on the market for cybersec professionals, with Kernel-level access. exploitpack.com/products/kerne… Bypasses VBS/HVCI/kCET, even with EDR/AV solutions enabled. #Kernel #RedTeam #InfoSec #CyberSecurity #Pentest #offsec #defender #VBS

Exploit_Pack's tweet image. New version of Kernel Pack, the only C2 framework on the market for cybersec professionals, with Kernel-level access. exploitpack.com/products/kerne… Bypasses VBS/HVCI/kCET, even with EDR/AV solutions enabled.

#Kernel #RedTeam #InfoSec #CyberSecurity #Pentest #offsec #defender #VBS

SMB share "Accounting Department" readable with guest creds. accounts.xlsx = Angela, Oscar, Kevin, sa all with plaintext passwords. MSSQLP@ssw0rd! got me SA on SQL Server. 🔑 #SMB #CredentialHarvesting #InfoSec #EthicalHacking

al1enr00t's tweet image. SMB share "Accounting Department" readable with guest creds. accounts.xlsx = Angela, Oscar, Kevin, sa  
all with plaintext passwords. 
MSSQLP@ssw0rd! got me SA on SQL Server. 🔑 

#SMB #CredentialHarvesting #InfoSec #EthicalHacking
al1enr00t's tweet image. SMB share "Accounting Department" readable with guest creds. accounts.xlsx = Angela, Oscar, Kevin, sa  
all with plaintext passwords. 
MSSQLP@ssw0rd! got me SA on SQL Server. 🔑 

#SMB #CredentialHarvesting #InfoSec #EthicalHacking

Remote-first working complicates identity governance. 🔗 tinyurl.com/hkzf9sz3 Fix it with human & non-human ownership mapping, detection of unused high-risk access, & automated revocation. #cybersecurity #infosec #itsecurity

TrustleSecurity's tweet image. Remote-first working complicates identity governance. 

🔗 tinyurl.com/hkzf9sz3

Fix it with human & non-human ownership mapping, detection of unused high-risk access, & automated revocation.

#cybersecurity #infosec #itsecurity

⚠️ MOBILE OPSEC — UNDER THE HOOD Think your phone isn’t tracking you? Apple & Google ecosystems collect more than most people realize. Know the system before it knows you. Follow for more threat intel. #CyberSecurity #OPSEC #Infosec #DataTracking #Surveillance


Even cybersecurity researchers are exposing secrets in their arXiv LaTeX source - helpnetsecurity.com/2026/04/28/cyb… - @IEEESSP #CyberSecurity #InfoSec #DataLeak #AcademicResearch #Privacy

helpnetsecurity's tweet image. Even cybersecurity researchers are exposing secrets in their arXiv LaTeX source - helpnetsecurity.com/2026/04/28/cyb… - @IEEESSP #CyberSecurity #InfoSec #DataLeak #AcademicResearch #Privacy

The news of a Cursor/Claude agent deleting a database in 9 seconds is a stark reminder: AI tool-use is the new perimeter. 🛡️ Govern your agent's tool-use at the local runtime to prevent silent breaches. Don't rely on cloud safety. #MCPSecurity #AISecurity #InfoSec #ClaudeCode


"Have you checked the logs?" – because 90% of the time, the answer is right there, screaming at you. The other 10%? Reboot anyway. 🔍📜 #CyberSecurity #InfoSec #ITSupport


Your SIEM shouldn’t be the weakest link.CVE-2026-40050 in CrowdStrike LogScale exposes sensitive files via unauthenticated access. Read: zyberwalls.com/2026/04/crowds… #CyberSecurity #InfoSec #ThreatIntel #Vulnerability


Yesterday I posted: knowledge before action. Today’s reminder: Sometimes systems aren’t broken… They’re just forgotten. Old subdomains. Test environments. Unused records. Many risks come from assets nobody is watching. #CyberSecurity #InfoSec #EthicalHacking


Cyble uncovers "Operation Trust Trap," a 16,800-domain network weaponizing *.gov trust to steal credentials. See how APT36 and others hijack the human eye. #TrustTrap #InfoSec #CyberSecurity #Phishing #APT36 #GovSecurity #Cyble #DNS securityonline.info/operation-trus…

the_yellow_fall's tweet image. Cyble uncovers "Operation Trust Trap," a 16,800-domain network weaponizing *.gov trust to steal credentials. See how APT36 and others hijack the human eye.

#TrustTrap #InfoSec #CyberSecurity #Phishing #APT36 #GovSecurity #Cyble #DNS 
securityonline.info/operation-trus…

❌ Fuite de données Udemy Udemy est l'une des dernières victimes du groupe de cybercriminels ShinyHunters. Les pirates ont publié une base de données contenant plus de 1,4 million d'enregistrements. Plus d'infos👇 - it-connect.fr/cyberattaque-u… #infosec #cybersecurite #dataleak

ITConnect_fr's tweet image. ❌  Fuite de données Udemy

Udemy est l'une des dernières victimes du groupe de cybercriminels ShinyHunters. Les pirates ont publié une base de données contenant plus de 1,4 million d'enregistrements.

Plus d'infos👇   
- it-connect.fr/cyberattaque-u…

#infosec #cybersecurite #dataleak

>_ No Hat 2026 CfP is OPEN! 👾 Do you wanna have a good excuse to travel to beautiful Italy next autumn? Submit your latest research work at: nohat.it/cfp Check out last year's vibes to see what you're getting into: youtube.com/watch?v=WoxuZR… #NoHat2026 #InfoSec #CFP

nohatcon's tweet card. BITM Hacklab

youtube.com

YouTube

BITM Hacklab


📌 Diving into Windows Internals Playlist Playlist Link🔗: youtube.com/playlist?list=… Credit: Nir Lichtman Channel Link🔗: youtube.com/@nirlichtman #WinInternals #InfoSec

0xfrost's tweet image. 📌 Diving into Windows Internals Playlist

Playlist Link🔗: youtube.com/playlist?list=…

Credit: Nir Lichtman

Channel Link🔗: youtube.com/@nirlichtman 

#WinInternals #InfoSec

🚀 From Zero to Ethical Hacker: A Clear Roadmap Stop consuming random content. Follow a structured path: Networking → OS → Programming → Security → Tools → Practice Consistency beats everything. #CyberSecurity #EthicalHacking #InfoSec

VivekIntel's tweet image. 🚀 From Zero to Ethical Hacker: A Clear Roadmap

Stop consuming random content. Follow a structured path:
Networking → OS → Programming → Security → Tools → Practice

Consistency beats everything.
#CyberSecurity #EthicalHacking #InfoSec

Elon Musk SCAM - alert #infosec -LoL

HackersOIHEC's tweet image. Elon Musk SCAM - alert #infosec -LoL

Low-effort obfuscation and in-memory execution techniques to build simple FUD stagers (@G3tSyst3m) g3tsyst3m.com/fud/Creative-a… #infosec


🔗 Most abused TLDs for #phishing today: - com: 139 - app: 13 - dev: 9 - cfd: 7 - cn: 4 Total: 204 | #infosec #cybersecurity phishstats.info


The Summit = TTPs (Tactics, Techniques & Procedures). Detecting how they act—not just what they use—is the game-changer. Force the adversary to quit because you've made their job too expensive. 🏆 #Infosec #CyberSecurity #MITRE


Chinese Silk Typhoon hacker extradited amid rising COVID research cyberattacks. Microsoft patches Entra ID flaw and warns of active Windows Shell exploit. Stay ahead with today’s CISO briefing. #CyberSecurity #CISO #InfoSec #Vulnerability news.infosecmadeeasy.com/2026/04/ciso-d…


SMB share "Accounting Department" readable with guest creds. accounts.xlsx = Angela, Oscar, Kevin, sa all with plaintext passwords. MSSQLP@ssw0rd! got me SA on SQL Server. 🔑 #SMB #CredentialHarvesting #InfoSec #EthicalHacking

al1enr00t's tweet image. SMB share "Accounting Department" readable with guest creds. accounts.xlsx = Angela, Oscar, Kevin, sa  
all with plaintext passwords. 
MSSQLP@ssw0rd! got me SA on SQL Server. 🔑 

#SMB #CredentialHarvesting #InfoSec #EthicalHacking
al1enr00t's tweet image. SMB share "Accounting Department" readable with guest creds. accounts.xlsx = Angela, Oscar, Kevin, sa  
all with plaintext passwords. 
MSSQLP@ssw0rd! got me SA on SQL Server. 🔑 

#SMB #CredentialHarvesting #InfoSec #EthicalHacking

La ingeniería social busca generar confianza en: 🔍 correos internos simulados 📞 llamadas convincentes 💬 mensajes coherentes En muchos casos, el vector de ataque más crítico es humano. 🔐 #Ciberseguridad #CyberSecurity #InfoSec #IngenieriaSocial #DolbuckAcademy


New version of Kernel Pack, the only C2 framework on the market for cybersec professionals, with Kernel-level access. exploitpack.com/products/kerne… Bypasses VBS/HVCI/kCET, even with EDR/AV solutions enabled. #Kernel #RedTeam #InfoSec #CyberSecurity #Pentest #offsec #defender #VBS

Exploit_Pack's tweet image. New version of Kernel Pack, the only C2 framework on the market for cybersec professionals, with Kernel-level access. exploitpack.com/products/kerne… Bypasses VBS/HVCI/kCET, even with EDR/AV solutions enabled.

#Kernel #RedTeam #InfoSec #CyberSecurity #Pentest #offsec #defender #VBS

A corrective control acts after a threat is detected to fix the problem. Since the antivirus automatically removes malware after detection, it’s performing a corrective action. #CyberSecurity #SecurityPlus #InfoSec


Stop scrolling if your business uses serial-to-IP converters ⚠️ 22 new flaws in Lantronix & Silex devices could let hackers hijack systems and tamper with data. Check exposure, patch firmware, isolate devices now. #CyberSecurity #InfoSec


Remote-first working complicates identity governance. 🔗 tinyurl.com/hkzf9sz3 Fix it with human & non-human ownership mapping, detection of unused high-risk access, & automated revocation. #cybersecurity #infosec #itsecurity

TrustleSecurity's tweet image. Remote-first working complicates identity governance. 

🔗 tinyurl.com/hkzf9sz3

Fix it with human & non-human ownership mapping, detection of unused high-risk access, & automated revocation.

#cybersecurity #infosec #itsecurity

>_ No Hat 2026 CfP is OPEN! 👾 Do you wanna have a good excuse to travel to beautiful Italy next autumn? Submit your latest research work at: nohat.it/cfp Check out last year's vibes to see what you're getting into: youtube.com/watch?v=WoxuZR… #NoHat2026 #InfoSec #CFP

nohatcon's tweet card. BITM Hacklab

youtube.com

YouTube

BITM Hacklab


new #phishing at hXXps://xan3ri[.]cfd/dulidpgo/PbkHGx/LTjfPu | 172.67.151.168 | None | Ascenty Data Centers e Telecomunicacoes SA | ASN AS52925 | #infosec #cybersecurity phishstats.info/search/6e9881a…

PhishStats's tweet image. new #phishing at hXXps://xan3ri[.]cfd/dulidpgo/PbkHGx/LTjfPu | 172.67.151.168 | None | Ascenty Data Centers e Telecomunicacoes SA | ASN AS52925 | #infosec #cybersecurity

phishstats.info/search/6e9881a…

Tuesday's CVE Brief is live: 🔴 11 actively exploited 🟠 32 critical 🟡 100 high priority Stay protected → cvebrief.com #cybersecurity #infosec #CVE #vulnerability

DailyCVEBrief's tweet image. Tuesday's CVE Brief is live:

🔴 11 actively exploited
🟠 32 critical
🟡 100 high priority

Stay protected → cvebrief.com

#cybersecurity #infosec #CVE #vulnerability

You receive a Google Docs link from someone you know, but it asks you to login again before viewing. What should you suspect? A. Session timeout B. Phishing attempt C. Server error D. DNS issue #CyberSecurity #InfoSec #Phishing #SecurityAwareness #TechTips


Bitwarden CLI v2026.4.0 was trojanized via a compromised GitHub Action on April 22 — bw1.js exfiltrated dev secrets to audit.checkmarx[.]cx in a 93-min npm window. Vaults safe; CI/CD is the breach surface. Pin deps. Audit runners. #SupplyChain #DevSecOps #InfoSec


Yesterday I posted: knowledge before action. Today’s reminder: Sometimes systems aren’t broken… They’re just forgotten. Old subdomains. Test environments. Unused records. Many risks come from assets nobody is watching. #CyberSecurity #InfoSec #EthicalHacking


Anyone open to a light snap bypass test on their account? Pure curiosity of my eyes only #infosec #snapGod #monekeyapp #ometv #snaphack

the_hackero's tweet image. Anyone open to a light snap bypass test on their account? Pure curiosity of my eyes only

#infosec #snapGod #monekeyapp #ometv #snaphack

Anyone open to a harmless breach simulation on their profile? Pure curiosity, nothing serious #accountsecurity #infosec #hacked #ometv #monkeyapp #omegle #snap

the_hackero's tweet image. Anyone open to a harmless breach simulation on their profile? Pure curiosity, nothing serious

#accountsecurity #infosec #hacked #ometv #monkeyapp #omegle #snap

15 types of cyber attacks you should know 🔐 Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual. Cybersecurity = business resilience. Credit: Cybersecurity Insights #CyberSecurity #InfoSec #CyberAttacks #TechRisk

ingliguori's tweet image. 15 types of cyber attacks you should know 🔐

Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual.

Cybersecurity = business resilience.

Credit: Cybersecurity Insights

#CyberSecurity #InfoSec #CyberAttacks #TechRisk

Every pentester should have these in their toolkit 👇🔥 From Shodan to crt.sh, this list covers servers, OSINT, attack surface, code search & threat intel Did I miss anything? Drop your favorite tools in the comments 👇 #BugBounty #CyberSecurity #Infosec

obscaries's tweet image. Every pentester should have these in their toolkit 👇🔥

From Shodan to crt.sh,  this list covers servers, OSINT, attack surface, code search & threat intel

Did I miss anything? Drop your favorite tools in the comments 👇

#BugBounty #CyberSecurity #Infosec

📢 Stay informed on the latest vulnerabilities with @CISAgov's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: cisa.gov/news-events/bu… #Cybersecurity #InfoSec #VulnerabilityManagement

CISACyber's tweet image. 📢 Stay informed on the latest vulnerabilities with @CISAgov's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: cisa.gov/news-events/bu… #Cybersecurity #InfoSec #VulnerabilityManagement

New Spring Boot flaws (CVSS 9.1) bypass security filters and enable RCE via timing attacks. Impacting versions 2.7.x to 4.0.x—secure your Java apps now. #SpringBoot #JavaSecurity #InfoSec #RCE #CyberSecurity #CVE202640976 #SpringFramework #PatchNow securityonline.info/spring-boot-vu…

the_yellow_fall's tweet image. New Spring Boot flaws (CVSS 9.1) bypass security filters and enable RCE via timing attacks. Impacting versions 2.7.x to 4.0.x—secure your Java apps now.

#SpringBoot #JavaSecurity #InfoSec #RCE #CyberSecurity #CVE202640976 #SpringFramework #PatchNow
securityonline.info/spring-boot-vu…

Finally @AnthropicAI approved my cyber use case in just 2h 25min upon submission For people getting rejected provide your profile: @Hacker0x01, @Bugcrowd, and a project with one of your github repos. Much appreciated, Anthropic team 🤎 #InfoSec #Anthropic #BugBounty

Tur24Tur's tweet image. Finally @AnthropicAI approved my cyber use case in just 2h 25min upon submission  For people getting rejected  provide your profile: @Hacker0x01, @Bugcrowd, and a project with one of your github repos. Much appreciated, Anthropic team 🤎 #InfoSec #Anthropic #BugBounty
Tur24Tur's tweet image. Finally @AnthropicAI approved my cyber use case in just 2h 25min upon submission  For people getting rejected  provide your profile: @Hacker0x01, @Bugcrowd, and a project with one of your github repos. Much appreciated, Anthropic team 🤎 #InfoSec #Anthropic #BugBounty

Banned from Claude Code in 30 Minutes The plan was simple: probe Claude Code APIs through Burp Suite (TLS checks off) and responsibly disclose anything interesting via HackerOne. My custom AI agent was also testing Claude Code's APIs in the background, so it was a joint effort

Tur24Tur's tweet image. Banned from Claude Code in 30 Minutes

The plan was simple: probe Claude Code APIs through Burp Suite (TLS checks off) and responsibly disclose anything interesting via HackerOne. My custom AI agent was also testing Claude Code's APIs in the background, so it was a joint effort


🚀 From Zero to Ethical Hacker: A Clear Roadmap Stop consuming random content. Follow a structured path: Networking → OS → Programming → Security → Tools → Practice Consistency beats everything. #CyberSecurity #EthicalHacking #InfoSec

VivekIntel's tweet image. 🚀 From Zero to Ethical Hacker: A Clear Roadmap

Stop consuming random content. Follow a structured path:
Networking → OS → Programming → Security → Tools → Practice

Consistency beats everything.
#CyberSecurity #EthicalHacking #InfoSec

Hunters 🚨 One resource you should definitely bookmark: bugbountyhunting.com Writeups. Resources. Real learning. No fluff. #BugBountyHunter #CyberSecurity #InfoSec #EthicalHacking

obscaries's tweet image. Hunters 🚨

One resource you should definitely bookmark:
 bugbountyhunting.com

Writeups. Resources. Real learning. No fluff.

#BugBountyHunter #CyberSecurity #InfoSec #EthicalHacking

🔐 RESOURCES: Secure Code Review(SCR) Learning Resources! YouTube SCR Series: youtube.com/playlist?list=… Rules: rules.sonarsource.com OWASP SCR Guide: owasp.org/www-project-co… Snippets: securitycipher.com/docs/security/… #infosec

mqst_'s tweet image. 🔐 RESOURCES: Secure Code Review(SCR) Learning Resources!

YouTube SCR Series: youtube.com/playlist?list=… Rules: rules.sonarsource.com
OWASP SCR Guide: owasp.org/www-project-co…
Snippets: securitycipher.com/docs/security/…

#infosec

📢 Stay informed on the latest vulnerabilities with @CISAgov's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: cisa.gov/news-events/bu… #Cybersecurity #InfoSec #VulnerabilityManagement

CISACyber's tweet image. 📢 Stay informed on the latest vulnerabilities with @CISAgov's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: cisa.gov/news-events/bu… #Cybersecurity #InfoSec #VulnerabilityManagement

Loading...

Something went wrong.


Something went wrong.