Anthony (@antferg006) 's Twitter Profile
Anthony

@antferg006

All about security

ID: 1503528612183609349

calendar_today15-03-2022 00:29:16

1,1K Tweet

75 Followers

442 Following

Watch This Space (@wtsdev) 's Twitter Profile Photo

I found out that *two* PoC's I submitted were incomplete because I forgot to include some key files in the ZIP files. A bit embarrassing, lol.

DARKNAVY (@darknavyorg) 's Twitter Profile Photo

We triggered WhatsApp 0-click on iOS/macOS/iPadOS. CVE-2025-55177 arises from missing validation that the [Redacted] message originates from a linked device, enabling specially crafted DNG parsing that triggers CVE-2025-43300. Analysis of Samsung CVE-2025-21043 is also ongoing.

L0Psec (@l0psec) 's Twitter Profile Photo

Today, we found another one of these homebrew lookalikes: homebrewfaq[.]us Also, shoutout to Mikhail Kasimov for sharing their findings related to these.

Today, we found another one of these homebrew lookalikes: homebrewfaq[.]us
Also, shoutout to <a href="/500mk500/">Mikhail Kasimov</a> for sharing their findings related to these.
Alex Plaskett (@alexjplaskett) 's Twitter Profile Photo

A great write-up of a VMware Workstation guest-to-host escape (CVE-2023-20870/CVE-2023-34044 and CVE-2023- 20869) exploit by Alex Zaviyalov has just been published!

A great write-up of a VMware Workstation guest-to-host escape (CVE-2023-20870/CVE-2023-34044 and CVE-2023-
20869) exploit by Alex Zaviyalov has just been published!
LaurieWired (@lauriewired) 's Twitter Profile Photo

Virtual Machines render fonts. It’s kind of insane. TrueType has its own instruction set, memory stack, and function calls. You can debug it like assembly. It’s also exploitable:

Virtual Machines render fonts. It’s kind of insane.
 
TrueType has its own instruction set, memory stack, and function calls.
 
You can debug it like assembly. It’s also exploitable:
Hunt.io (@huntio) 's Twitter Profile Photo

🚩 Google Project Zero Details ASLR Bypass on Apple Devices cybersecuritynews.com/aslr-bypass-on… A researcher from Project Zero has unveiled a clever serialization attack that leaks memory addresses on macOS and iOS, undermining Apple’s ASLR. The exploit leverages how NSDictionary

watchTowr (@watchtowrcyber) 's Twitter Profile Photo

The watchTowr Labs team is back, providing our full analysis of the Oracle E-Business Suite Pre-Auth RCE exploit chain (CVE-2025-61882). Enjoy with us (or cry, your choice..) labs.watchtowr.com/well-well-well…

Windows Latest (@windowslatest) 's Twitter Profile Photo

BREAKING: Microsoft says it'll block you from setting up Windows 11 with a local account. A Microsoft account is now a requirement during OOBE (out of the box experience). Microsoft says a local account does not allow Windows 11 to set up properly, and users skip "critical

BREAKING: Microsoft says it'll block you from setting up Windows 11 with a local account.

A Microsoft account is now a requirement during OOBE (out of the box experience).

Microsoft says a local account does not allow Windows 11 to set up properly, and users skip "critical
Ozgur Alp (@ozgur_bbh) 's Twitter Profile Photo

While it still has some good points (especially in soft skills), some update is needed especially in AI age. So I am planning to make a blog post about it within my updated experiences, up-to-date technologic developments and my my predictions for the future. Stay tuned!

Tavis Ormandy (@taviso) 's Twitter Profile Photo

A personal update... after nearly 20 years at Google, today is my last day! I'm going to be working on independent research for the foreseeable future, then who knows! I've worked with so many talented people, made so many friends and seen incredible research over the years 🫡

zack0x01 (@zack0x01) 's Twitter Profile Photo

Hey everyone! 👋 Just dropped a new YouTube video! about "My Bug bounty methodology" Check it out 🤔: #BugBounty #bugbountytips #CyberSec #cybersecurityjourney #Hacking #cybersecurity #linux youtube.com/watch?v=OIP-kf…

Michele Campa (@s1ckb017) 's Twitter Profile Photo

A zero day I found last year has been patched on October (CVE-2025-55680) :(, it was a nice and easy patch bypass. Here the write-up blog.exodusintel.com/2025/10/20/mic…