#infosec search results
FIRESTARTER backdoor hit a US federal agency's Cisco Firepower — survives firmware updates and reboots; only a hard power cycle removes it. CISA/NCSC link it to UAT-4356 via CVE-2025-20333/20362. Patching is not remediation. #Cybersecurity #InfoSec #APT
NICKEL ALLEY strategy: Fake it ‘til you make it - Victimizing software developers via fake companies, jobs, and code repositories to steal cryptocurrency dlvr.it/TSDFVR #cyber #threathunting #infosec
🚨 STARTING IN 15 MINUTES at #CloudVillage at @BSidesCharm ! Don't let attackers bypass your AI oversight. We’re diving into "Signing Your Agent's Homework" to show how cryptographic trust secures agent approvals. 🤖⚡️ Join the crew now! #BSidesCharm #InfoSec #AI
Pic of the Day #infosec #cybersecurity #cybersecuritytips #pentesting #cybersecurityawareness #informationsecurity
Pic of the Day #infosec #cybersecurity #cybersecuritytips #pentesting #cybersecurityawareness #informationsecurity
Security basics are often ignored… until it’s too late ⚠️ • Encryption → protect data • Strong passwords → reduce risk • Access control → limit users • Lock devices → prevent misuse • Disable unused services Security starts with basics. #CyberSecurity #InfoSec
The @CISAgov adds another Cisco SD-WAN flaw to its list of known exploited vulnerabilities, warning of active exploit chains. Agencies must patch by April 23 as attackers link bugs to gain full control of networks. #cybersecurity #CISO #infosec bit.ly/42nkDvC
DirtyFree: systematic Linux kernel DOP exploitation via the arbitrary free primitive (paper) leeyoochan.github.io/assets/pdf/Dir… #Linux #infosec
The rise of Local LLM + MCP for offensive security (like the Drift project for Caido) highlights a critical shift: the MCP server is the new perimeter. 🛡️ Don't rely on cloud-side safety; govern every tool action at the runtime. #MCPSecurity #AISecurity #InfoSec
In 5 minutes? Dump credentials, establish persistence, disable logging, and pivot to your backup systems. Breach doesn't need hours—just enough time to plant a quiet backdoor for later. ⏱️🔓 #CyberSecurity #IncidentResponse #InfoSec #ThreatHunting
Filed a low-severity bug just to test triage speed. Program: approved + bounty ($$$ CHF) Me: …okay, we’ll take that. 😄 #BugBounty #InfoSec #CyberSecurity #EthicalHacking #Recon #BugHunter #Pentesting #RedTeam #AppSec #WebSecurity #InfosecCommunity #Hackers #BountyHunter
Pic of the Day #infosec #cybersecurity #cybersecuritytips #pentesting #cybersecurityawareness #informationsecurity
.@owasp reports that AI-driven attacks are scaling fast — hitting governments, cloud agents, and supply chains as attackers exploit identity, automation, and misconfigurations to breach critical systems. #cybersecurity #CISO #infosec #AI bit.ly/4ubhxqA
Npm Supply Chain Malware Attack Targets Developers With Worm-Like Propagation infosecurity-magazine.com/news/npm-suppl… #cybersecurity #infosec #hacking
If you’re also learning cybersecurity, what’s something you’ve realized so far? 👇 #CyberSecurity #InfoSec #LearnInPublic #TechTwitter
SecLeaf Q2 CTF 2026 is now open for 𝘀𝗽𝗼𝗻𝘀𝗼𝗿𝘀. Position your brand in front of a highly engaged cybersecurity community and connect with top talent. 𝗔𝗽𝗽𝗹𝘆 𝗵𝗲𝗿𝗲: forms.gle/6DR463XjzgR4ak… #CyberSecurity #CTF #InfoSec #Sponsorship #TechCommunity #SecLeaf #Q2CTF
Microsoft Teams is under siege. Learn how hackers use privilege escalation to steal your data silently. Don’t ignore this critical security warning for your organization. #CyberSecurity #MicrosoftTeams #InfoSec #DataProtection #ByteSizedbalance #BSB #fyp #pourtoi #viral #tiktok #
Go-based backdoors abusing legit services means your proxy logs are useless for C2 detection. China-Linked APT GopherWhisper Abuses Legitimate Services in… → securityweek.com/china-linked-a… #cybersecurity #infosec
What's your patch cadence for critical CVEs? 👇 Full breakdown + checklist below 👇 #Cybersecurity #DevSecOps #infosec
What's your patch cadence for critical CVEs? 👇 Full breakdown + checklist below 👇 #Cybersecurity #DevSecOps #infosec
💥 📹 A must watch for those aspiring to work at Amazon. 📹 💥 #aws #infosec #linux #webdev #devops #devsecops #database The Leadership Principles explained by Amazon CEO Andy Jassy. ❤️ tech life youtube.com/watch?v=My-2-M…
youtube.com
YouTube
Inside Amazon
NICKEL ALLEY strategy: Fake it ‘til you make it - Victimizing software developers via fake companies, jobs, and code repositories to steal cryptocurrency dlvr.it/TSDFVR #cyber #threathunting #infosec
🚨 STARTING IN 15 MINUTES at #CloudVillage at @BSidesCharm ! Don't let attackers bypass your AI oversight. We’re diving into "Signing Your Agent's Homework" to show how cryptographic trust secures agent approvals. 🤖⚡️ Join the crew now! #BSidesCharm #InfoSec #AI
CVE-2026-41898 in rust-openssl is under active exploitation—attackers can leak adjacent memory from OpenSSL, risking data confidentiality. Patch now to protect sensitive info. #NerdieNews #CyberSecurity #InfoSec #Vulnerability #CloudSecurity #AWS #OpenSource
CVE-2026-3844 (CVSS 9.8) in Breeze Cache WP plugin: unauth file upload via fetch_gravatar_from_remote. 400K installs; Wordfence logged 170+ attacks. Only exploitable if 'Host Gravatars Locally' is on. securityaffairs.com/191267/uncateg… #infosec #WordPress #CVE
Great session on the front lines of CTF ops at #CloudVillage at @BSidesCharm! 🙌 Huge thanks to Ryan Nolette for sharing the Kiro secrets used at major conferences. We hope these operational best practices help your next big deployment! 🛡️☁️ #AWS #InfoSec
The jump from SOC Analyst to SOC Manager is a shift from tickets to leadership: people, strategy, and security posture. Read the full article here: acsmi.org/blogs/from-soc… #asmit #cybersecurity #infosec #SocialMediaMarketing #socmanager #IncidentResponse
Just found a site hiding 64,680 spam pages from its owner. Cloaked from visitors. Indexed by Google. Invisible to every "security scanner" that only checks the homepage. Run a proper scan: unpwned.io #infosec #SEO
Namastex npm packages hit in CanisterWorm attack, stealing secrets and spreading via stolen credentials across npm and PyPI ecosystems, @SocketSecurity reported. #cybersecurity #CISO #infosec bit.ly/4mNHCJH
Indikasi paparan SNMP tanpa autentikasi masih ada pada sebagian infrastruktur ISP di Indonesia. Mitigasi terlihat parsial dan belum menyeluruh, berpotensi mempermudah pemetaan jaringan. Terbuka untuk koordinasi via DM #CyberSecurity #InfoSec #Indonesia
Security Tip: Stop chasing every CVE at once. 🛡️ Use a risk-based approach to patch management by prioritizing vulnerabilities with active exploits or high EPSS scores. Stay informed: cvedatabase.com #InfoSec #CyberSecurity #CVE
cvedatabase.com
CVEDatabase.com - Search CVE Vulnerabilities & Get AI Remediation
Search and analyze CVE vulnerabilities with CVSS scores and AI-powered remediation guidance.
If you’re also learning cybersecurity, what’s something you’ve realized so far? 👇 #CyberSecurity #InfoSec #LearnInPublic #TechTwitter
Vigilance.fr #Vulnerability of #WebSphere AS Liberty: weak encryption via Hard-coded Cryptographic Key. #infosec vigilance.fr/vulnerability/…
Vigilance.fr #Vulnérabilité de #WebSphere AS Liberty : chiffrement faible via Hard-coded Cryptographic Key. #infosec vigilance.fr/vulnerabilite/…
15 types of cyber attacks you should know 🔐 Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual. Cybersecurity = business resilience. Credit: Cybersecurity Insights #CyberSecurity #InfoSec #CyberAttacks #TechRisk
Ethical Hacking Roadmap 🔥 Telegram: t.me/hackinarticles #CyberSecurity #InfoSec #PenetrationTesting #EthicalHacking #BugBounty #ThreatIntelligence #RedTeam #BlueTeam #CloudSecurity #DataSecurity #CyberSecurityAwareness #AI
Red Team | Cyber Security | Linux 🔥 Telegram: t.me/hackinarticles #CyberSecurity #InfoSec #PenetrationTesting #EthicalHacking #BugBounty #ThreatIntelligence #RedTeam #BlueTeam #CloudSecurity #DataSecurity #CyberSecurityAwareness #AI
The critical "Pack2TheRoot" flaw (CVE-2026-41651) in PackageKit gives root access on Linux. It went undetected for 12 years. Update to version 1.3.5 now! #Pack2TheRoot #LinuxSecurity #InfoSec #CyberSecurity #CVE202641651 #RootAccess #TechAlert securityonline.info/pack2theroot-p…
15 types of cyber attacks you should know 🔐 Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual. Cybersecurity = business resilience. Credit: Cybersecurity Insights #CyberSecurity #InfoSec #CyberAttacks #TechRisk
Security properties of the Linux kernel pipe_buffer object for building exploit primitives by @a13xp0p0v a13xp0p0v.github.io/2026/04/20/pip… #infosec
Finally @AnthropicAI approved my cyber use case in just 2h 25min upon submission For people getting rejected provide your profile: @Hacker0x01, @Bugcrowd, and a project with one of your github repos. Much appreciated, Anthropic team 🤎 #InfoSec #Anthropic #BugBounty
Banned from Claude Code in 30 Minutes The plan was simple: probe Claude Code APIs through Burp Suite (TLS checks off) and responsibly disclose anything interesting via HackerOne. My custom AI agent was also testing Claude Code's APIs in the background, so it was a joint effort
Every pentester should have these in their toolkit 👇🔥 From Shodan to crt.sh, this list covers servers, OSINT, attack surface, code search & threat intel Did I miss anything? Drop your favorite tools in the comments 👇 #BugBounty #CyberSecurity #Infosec
Pic of the Day #infosec #cybersecurity #cybersecuritytips #pentesting #cybersecurityawareness #informationsecurity
TREVEX: A Black-Box Detection Framework For Data-Flow Transient Execution Vulnerabilities (paper, '26) d-we.me/papers/trevex_… #infosec
Apache Log4j 2.25.4 fixes 4 "silent" flaws, including TLS bypasses and log injection. Secure your infrastructure—upgrade now to prevent data loss. #Log4j #CyberSecurity #InfoSec #Vulnerability #Java #ThreatIntel securityonline.info/log4j-2-vulner…
Running unsigned code during the UEFI boot process (CVE-2025-3052) binarly.io/blog/another-c… Credits @binarly_io #infosec
Pic of the Day #infosec #cybersecurity #cybersecuritytips #pentesting #cybersecurityawareness #informationsecurity
Pic of the Day #infosec #cybersecurity #cybersecuritytips #pentesting #cybersecurityawareness #informationsecurity
This one right here… insane value 💀🔥 🔗 pentester.land/writeups/ Real bugs. Real reports. Real hacker mindset. If you're serious about bug bounty, you NEED to study this. #BugBounty #CyberSecurity #Infosec #Hacking
Something went wrong.
Something went wrong.
United States Trends
- 1. Cleetus N/A
- 2. Kilgore N/A
- 3. ARCA N/A
- 4. Duren N/A
- 5. Emmett Johnson N/A
- 6. Tyree Wilson N/A
- 7. #WeWantKairi N/A
- 8. Bryan Woo N/A
- 9. Andy J N/A
- 10. Paul Reed N/A
- 11. Kyle Louis N/A
- 12. Gyokeres N/A
- 13. Will Wilson N/A
- 14. Harold Perkins N/A
- 15. Tony Brothers N/A
- 16. Isaiah Stewart N/A
- 17. Sam Hecht N/A
- 18. Chandler Rivers N/A
- 19. Nick Singleton N/A
- 20. Bryce Lance N/A