#vulnerabilityexploits arama sonuçları

#VulnerabilityExploits, Not Phishing, Are the Top Cyberattack Vector for Initial Compromise Jai Vijayan lnkd.in/eQMVi_d6


@Verizon DBIR reveals 180% #vulnerabilityexploits increase as initial vector. There's an urgent need for hyperautomated solutions that can address #softwarevulnerabilities. #Hyperautomation in #ITsecurity isn't just a choice; it's becoming a necessity. bit.ly/49X3slT


#NEWSABOUTCYBER #SHAREANDFOLLOWUS The PurpleFox botnet has refreshed its arsenal with new #vulnerabilityexploits and dropped payloads, now also leveraging WebSockets for C2 bidirectional communication. bleepingcomputer.com/news/security/…


@Verizon DBIR reveals 180% #vulnerabilityexploits increase as initial vector. There's an urgent need for hyperautomated solutions that can address #softwarevulnerabilities. #Hyperautomation in #ITsecurity isn't just a choice; it's becoming a necessity. bit.ly/49X3slT


#VulnerabilityExploits, Not Phishing, Are the Top Cyberattack Vector for Initial Compromise Jai Vijayan lnkd.in/eQMVi_d6


"#vulnerabilityexploits" için sonuç bulunamadı

Do you want to find more vulnerabilities with recon? 🤑 Open this thread (step-by-step guide)! 🧵 👇

intigriti's tweet image. Do you want to find more vulnerabilities with recon? 🤑

Open this thread (step-by-step guide)! 🧵 👇

Hackers 🔥 This code contains at least 2 serious vulnerabilities. Can you spot them? 😋 What would be your exploit? 🤔

chux13786509's tweet image. Hackers 🔥
This code contains at least 2 serious vulnerabilities.
Can you spot them? 😋
What would be your exploit? 🤔

Path Traversal Vulnerability POC: https://redacted/lib///....//....//....//....//....//....//....//....//etc//passwd #bugbountytips #lfi #bugbountywriteups #bugbounty #infosec

NullSecurityX's tweet image. Path Traversal Vulnerability  

POC:
https://redacted/lib///....//....//....//....//....//....//....//....//etc//passwd

#bugbountytips #lfi #bugbountywriteups #bugbounty #infosec

Digging up old path traversal vulnerabilities? 🕵️‍♂️ I built this scanner for CVE-2022-37122 to help you find these classic bugs on your authorized targets: Github Tool: github.com/bughuntar/CVE-… #Cybersecurity #VulnerabilityScanner #BugBounty #bugbountytips #professor #the

bughuntar's tweet image. Digging up old path traversal vulnerabilities? 🕵️‍♂️

I built this scanner for CVE-2022-37122 to help you find these classic bugs on your authorized targets:

Github Tool: github.com/bughuntar/CVE-…

#Cybersecurity #VulnerabilityScanner #BugBounty  #bugbountytips #professor #the…

A look at file system and sandbox tricks from @theevilbit & @gergely_kalman #OBTS

0xmachos's tweet image. A look at file system and sandbox tricks from @theevilbit & @gergely_kalman #OBTS
0xmachos's tweet image. A look at file system and sandbox tricks from @theevilbit & @gergely_kalman #OBTS
0xmachos's tweet image. A look at file system and sandbox tricks from @theevilbit & @gergely_kalman #OBTS

Want to find more vulnerabilities using BurpSuite match & replace rules? 🤑 Open this thread! 🧵 👇

intigriti's tweet image. Want to find more vulnerabilities using BurpSuite match & replace rules? 🤑 

Open this thread! 🧵 👇

Just found a vulnerability using @coffinxp7 tool. Absolute legend 🙌

developer_ali15's tweet image. Just found a vulnerability using @coffinxp7 tool. Absolute legend 🙌

New XINTRA course‼️ Advanced IIS Post Exploitation, Detection & Evasion Modern APT groups are actively weaponizing ToolShell and fileless IIS tradecraft to compromise Exchange, SharePoint, ASP workloads. If your detection and response capabilities lag exposure, this course…

inversecos's tweet image. New XINTRA course‼️
Advanced IIS Post Exploitation, Detection & Evasion

Modern APT groups are actively weaponizing ToolShell and fileless IIS tradecraft to compromise Exchange, SharePoint, ASP workloads.

If your detection and response capabilities lag exposure, this course…
inversecos's tweet image. New XINTRA course‼️
Advanced IIS Post Exploitation, Detection & Evasion

Modern APT groups are actively weaponizing ToolShell and fileless IIS tradecraft to compromise Exchange, SharePoint, ASP workloads.

If your detection and response capabilities lag exposure, this course…

Lenovo CVE-2025-8061: PoC for popping a system shell against the LnvMSRIO.sys driver GitHub: github.com/symeonp/Lenovo…

DarkWebInformer's tweet image. Lenovo CVE-2025-8061: PoC for popping a system shell against the LnvMSRIO.sys driver

GitHub: github.com/symeonp/Lenovo…
DarkWebInformer's tweet image. Lenovo CVE-2025-8061: PoC for popping a system shell against the LnvMSRIO.sys driver

GitHub: github.com/symeonp/Lenovo…

Hackers just turned GitHub into their command center. When police take down their servers, the malware just… reboots itself from GitHub. The twist? It hides configs inside images using steganography. This isn’t a glitch — it’s resilience by design. Read how it works →…

TheHackersNews's tweet image. Hackers just turned GitHub into their command center.

When police take down their servers, the malware just… reboots itself from GitHub.

The twist? It hides configs inside images using steganography. This isn’t a glitch — it’s resilience by design.

Read how it works →…

‼️ Iranian nation-state APT CharmingKitten exposed on GitHub: Episode 3! - BellaCiao malware samples - Google Drive phishing guides - Malware usage guides - Malware specification sheets & MORE!

IntCyberDigest's tweet image. ‼️ Iranian nation-state APT CharmingKitten exposed on GitHub: Episode 3!

- BellaCiao malware samples
- Google Drive phishing guides
- Malware usage guides
- Malware specification sheets
     & MORE!

⚠️#INCIBEaviso | Múltiples vulnerabilidades en EPMM y MDM de #Ivanti incibe.es/incibe-cert/al… #AvisosDeSeguridad #TI

incibe_cert's tweet image. ⚠️#INCIBEaviso | Múltiples vulnerabilidades en EPMM y MDM de #Ivanti

incibe.es/incibe-cert/al…

#AvisosDeSeguridad #TI

Exploiting a Use-After-Free vulnerability in the Linux network packet schedule (CVE-2025-38001) syst3mfailure.io/rbtree-family-… Credits @cor_ctf #infosec #Linux

0xor0ne's tweet image. Exploiting a Use-After-Free vulnerability in the Linux network packet schedule (CVE-2025-38001)

syst3mfailure.io/rbtree-family-…

Credits @cor_ctf

#infosec #Linux

A popular NPM package got compromised, attackers updated it to run a post-install script that steals secrets But the script is a *prompt* run by the user's installation of Claude Code. This avoids it being detected by tools that analyze code for malware You just got vibepwned

zack_overflow's tweet image. A popular NPM package got compromised, attackers updated it to run a post-install script that steals secrets

But the script is a *prompt* run by the user's installation of Claude Code. This avoids it being detected by tools that analyze code for malware

You just got vibepwned

🚨 keep reporting these obsessed antis defaming 🐯 with lies do hate, th, harm (codes incitement) multiple times on all accounts x.com/rubychlla x.com/sabrinamenchild (+ CSE)

vsecurevv's tweet image. 🚨 keep reporting these obsessed antis defaming 🐯 with lies

do hate, th, harm (codes incitement) multiple times on all accounts

x.com/rubychlla
x.com/sabrinamenchild (+ CSE)

🚨Reset Password Vulnerabilities Testing Method🚨 📥Download PDF scarlet-ianthe-20.tiiny.site . . #bugbounty #bugbountytips #penetrationtesting #password

wtf_brut's tweet image. 🚨Reset Password Vulnerabilities Testing Method🚨

📥Download PDF scarlet-ianthe-20.tiiny.site
.
.
#bugbounty #bugbountytips #penetrationtesting #password
wtf_brut's tweet image. 🚨Reset Password Vulnerabilities Testing Method🚨

📥Download PDF scarlet-ianthe-20.tiiny.site
.
.
#bugbounty #bugbountytips #penetrationtesting #password
wtf_brut's tweet image. 🚨Reset Password Vulnerabilities Testing Method🚨

📥Download PDF scarlet-ianthe-20.tiiny.site
.
.
#bugbounty #bugbountytips #penetrationtesting #password

Loading...

Something went wrong.


Something went wrong.


United States Trends