Jonathan Leitschuh - JLLeitschuh@infosec.exchange (@jlleitschuh) 's Twitter Profile
Jonathan Leitschuh - [email protected]

@jlleitschuh

First Dan Kaminsky Fellow | Security Researcher for the OSS Ecosystem | Speaker | Dropper of 0days (Responsibly) | @GitHub Star ⭐️ | Opinions=Mine | He/Him

ID: 146534354

linkhttps://stars.github.com/profiles/jlleitschuh/ calendar_today21-05-2010 17:38:07

2,2K Tweet

3,3K Followers

604 Following

Tib3rius (@0xtib3rius) 's Twitter Profile Photo

Do you look like John Hammond? Do you sound like John Hammond? Heck, can you just make yourself look like John Hammond? Come along to Feet Feud (hackertracker.app/event/?conf=DE…) at DEF CON 33 and compete with other Johnalikes to win prizes. The judge? John Hammond of course. 🤓

Do you look like John Hammond? Do you sound like John Hammond? Heck, can you just make yourself look like John Hammond?

Come along to Feet Feud (hackertracker.app/event/?conf=DE…) at DEF CON 33 and compete with other Johnalikes to win prizes.

The judge? <a href="/_JohnHammond/">John Hammond</a> of course. 🤓
Jonathan Leitschuh - JLLeitschuh@infosec.exchange (@jlleitschuh) 's Twitter Profile Photo

Hey Snyk, What happened to your CVE numbering authority team? Is [email protected] dead? Are you not doing CVE assignments for OSS anymore? You haven't responded to the last two CVE requests I've sent your way. snyk.io/vulnerability-…

Jonathan Leitschuh - JLLeitschuh@infosec.exchange (@jlleitschuh) 's Twitter Profile Photo

How is this blocked? Cloudflare this vulnerability impacts a localhost server Unless you've released a new locally running firewall that I didn't hear about, I'd say that you're customers are probably not safe against this This remains a critical RCE vulnerability

vx-underground (@vxunderground) 's Twitter Profile Photo

dawg, BobDaHacker 🏳️‍⚧️ | NB compromised McDonalds by finding one of their endpoints and ... REGISTERING AN ACCOUNT. That's all it took. It then sent a plaintext password via email. McDonalds did however apparently fix the problem when they reported it to them.

dawg, <a href="/BobDaHacker/">BobDaHacker 🏳️‍⚧️ | NB</a> compromised McDonalds by finding one of their endpoints and ... REGISTERING AN ACCOUNT. That's all it took. It then sent a plaintext password via email.

McDonalds did however apparently fix the problem when they reported it to them.
Socket (@socketsecurity) 's Twitter Profile Photo

🚨 Breaking: npm author Qix compromised. Malicious package versions published in projects that typically see hundreds of millions of downloads each week. Details: socket.dev/blog/npm-autho…

Socket (@socketsecurity) 's Twitter Profile Photo

🚨 Malicious update to @ctrl/tinycolor on npm is part of an active supply chain attack hitting 40+ packages across multiple maintainers. Audit & remove affected versions. Our analysis of the malware: socket.dev/blog/tinycolor… #NodeJS #JavaScript

Socket (@socketsecurity) 's Twitter Profile Photo

Today we’re publishing research on 80 confirmed fraudulent candidates who applied for Socket engineering roles in the past 2 months. They’re part of a coordinated campaign, including suspected North Korean operators, aiming to infiltrate hiring pipelines. socket.dev/blog/fraudulen…