Securityblog (@securityblog) 's Twitter Profile
Securityblog

@securityblog

There are 10 types of people in the world. Those who understand binary, and those who don't. All opinions and views are my own. #BsidesDub organizer

ID: 9170162

linkhttp://www.securityblog.it calendar_today30-09-2007 10:13:47

248,248K Tweet

12,12K Takipçi

13,13K Takip Edilen

SpecterOps (@specterops) 's Twitter Profile Photo

How attackers move between AD domains via trusts depends on trust type & config. We're replacing TrustedBy edge in BloodHound with new trust edges for better attack path mapping. Check out Jonas Bülow Knudsen's blog post to learn more. ghst.ly/4lj9C5T

Nasreddine Bencherchali (@nas_bench) 's Twitter Profile Photo

Btw, I'm here once again to remind detection platform owners that stealing sigma rules is not cool. Never contributing back is not cool. Adding FP filters privately or adding a new string doesn't make you an author or owner of said rules. Converting sigma rules into a

Gray Hats (@the_yellow_fall) 's Twitter Profile Photo

CISA warns of critical flaws in ControlID iDSecure On-premises, including SQL Injection (CVSS 9.1), auth bypass, and SSRF, risking vehicle access control systems. Update to 4.7.50.0. #ControlID #AccessControl #Cybersecurity #SQLi #CISA securityonline.info/cisa-warns-of-…

Shailendra Singh (@shailendra_1701) 's Twitter Profile Photo

I need to build an SSH tunnel between my two laptops they both don't have any publicly addressable IPs and both are at different places, how can I do that ?

Virus Bulletin (@virusbtn) 's Twitter Profile Photo

Check Point Research look into an ongoing spear-phishing campaign targeting Israeli journalists, high-profile cybersecurity experts, and computer science professors from leading Israeli universities. research.checkpoint.com/2025/iranian-e…

Check Point Research look into an ongoing spear-phishing campaign targeting Israeli journalists, high-profile cybersecurity experts, and computer science professors from leading Israeli universities.  research.checkpoint.com/2025/iranian-e…
JAMESWT (@jameswt_wt) 's Twitter Profile Photo

#booking #fakecaptcha #clickfix 👇 booking.extranet-get-reserve.]com booking.extranet-find.]com 👇 h1dd-page.]com/km77qnz/trails.exe C2 #AsyncRat ⛔️185.156.72.]25:6565 ✅AnyRun app.any.run/tasks/6b2b75ce… ✅Samples bazaar.abuse.ch/browse/tag/h1d… cc Kelsey Mikhail Kasimov ܛܔܔܔܛܔܛܔܛ

#booking #fakecaptcha #clickfix 
👇
booking.extranet-get-reserve.]com
booking.extranet-find.]com
👇
h1dd-page.]com/km77qnz/trails.exe

C2 #AsyncRat 
⛔️185.156.72.]25:6565

✅AnyRun
app.any.run/tasks/6b2b75ce…

✅Samples
bazaar.abuse.ch/browse/tag/h1d…

cc <a href="/k3dg3/">Kelsey</a> <a href="/500mk500/">Mikhail Kasimov</a> <a href="/skocherhan/">ܛܔܔܔܛܔܛܔܛ</a>
Yashraj Solanki (@rustynoob619) 's Twitter Profile Photo

Our team has just released the 2025 CTI Report. The key focus has been on tracking adversary infrastructure and is packed with our threat research insights alongside an in-depth view into the changing information stealers & ransomware ecosystems 🐧 Link: bridewell.com/insights/white…

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Microsoft 365 'Direct Send' abused to send phishing as internal users - Lawrence Abrams bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

James Kettle (@albinowax) 's Twitter Profile Photo

Concerned about LLMs replacing pentesters? We've made enhancing your own workflow with AI easier than ever - you can now build your own AI features directly inside Repeater with Custom Actions. Here's one I built for myself which guesses param meanings:

Concerned about LLMs replacing pentesters? We've made enhancing your own workflow with AI easier than ever - you can now build your own AI features directly inside Repeater with Custom Actions. Here's one I built for myself which guesses param meanings:
The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 Cisco just patched two 10.0 CVSS flaws in ISE and ISE-PIC—unauthenticated RCE as root. Attackers only need a crafted API call or file upload. No workaround. If you're running 3.3+ or 3.4, patch now. Details here → thehackernews.com/2025/06/critic…

Hunt.io (@huntio) 's Twitter Profile Photo

⚠️ TP‑Link Router Flaw CVE‑2023‑33538 Exploited in the Wild thehackernews.com/2025/06/tp-lin… A critical command‑injection vulnerability in older TP‑Link models (WR940N, WR841N, WR740N) is being actively abused, allowing attackers to execute system commands remotely via the ssid1 HTTP

BApp Store (@bapp_store) 's Twitter Profile Photo

New in the BApp Store: AWS cURL Command Streamline AWS API testing with this extension: 🔐 Converts HTTP requests into AWS SigV4-signed curl commands 📋 Copies ready-to-use commands directly to your clipboard 🧰 Ideal for reproducing requests and debugging AWS APIs

New in the BApp Store: AWS cURL Command

Streamline AWS API testing with this extension:
🔐 Converts HTTP requests into AWS SigV4-signed curl commands
📋 Copies ready-to-use commands directly to your clipboard
🧰 Ideal for reproducing requests and debugging AWS APIs
vx-underground (@vxunderground) 's Twitter Profile Photo

New lore update on IntelBroker a/k/a Kai West - Did swatting and bomb threats as a teenager - Was raided by NCA UK - NCA enrolls Mr. West in a cybersecurity trainee program (steer him in positive direction) - Less than 2 years later he returns to cyber-crime

New lore update on IntelBroker a/k/a Kai West

- Did swatting and bomb threats as a teenager
- Was raided by NCA UK
- NCA enrolls Mr. West in a cybersecurity trainee program (steer him in positive direction)
- Less than 2 years later he returns to cyber-crime