Cristian H. Ares (@cristianhares) 's Twitter Profile
Cristian H. Ares

@cristianhares

๐Ÿ‡ฆ๐Ÿ‡ท in ๐Ÿ‡ณ๐Ÿ‡ฟ. InfoSec professional, Cyber Security Architect, Dad. Opinions are my own.

ID: 150809057

calendar_today01-06-2010 22:01:52

4,4K Tweet

332 Followers

2,2K Following

Brian in Pittsburgh (@arekfurt) 's Twitter Profile Photo

A disturbing vulnerability bulletin from Fortinet. (I know: You might say that's not exactly rare. But SSO auth bypass....) If I were at an org that used Fortinent products I think I'd presume they were vulnerable except where I was certain otherwise. fortiguard.com/psirt/FG-IR-25โ€ฆ

A disturbing vulnerability bulletin from Fortinet. 

(I know: You might say that's not exactly rare. But SSO auth bypass....)

If I were at an org that used Fortinent products I think I'd presume they were vulnerable except where I was certain otherwise. fortiguard.com/psirt/FG-IR-25โ€ฆ
BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Notepad++ fixes flaw that let attackers push malicious update files - Lawrence Abrams bleepingcomputer.com/news/security/โ€ฆ bleepingcomputer.com/news/security/โ€ฆ

John Hammond (@_johnhammond) 's Twitter Profile Photo

"'ConsentFix', a browser-based ClickFix-style attack with OAuth consent grants" ... leveraging the Azure CLI app client to social engineer for easy access into Entra ID ๐Ÿ‘€ I got nerdsniped by this, so I played with it a bit and tried a drag-and-drop gesture! Video:

"'ConsentFix', a browser-based ClickFix-style attack with OAuth consent grants" ... leveraging the Azure CLI app client to social engineer for easy access into Entra ID ๐Ÿ‘€ I got nerdsniped by this, so I played with it a bit and tried a drag-and-drop gesture! Video:
The Hacker News (@thehackersnews) 's Twitter Profile Photo

๐Ÿ›‘ WARNING: CVE-2025-20393 is rated 10.0, with no patch available. Cisco confirmed active exploitation of an AsyncOS zero-day by a China-linked APT. The flaw allows root-level command execution on affected email security appliances and enables attackers to establish

๐Ÿ›‘ WARNING: CVE-2025-20393 is rated 10.0, with no patch available.

Cisco confirmed active exploitation of an AsyncOS zero-day by a China-linked APT.

The flaw allows root-level command execution on affected email security appliances and enables attackers to establish
spencer (@techspence) 's Twitter Profile Photo

Some of my favorite security capabilities that are not EDR: 1. User behavior monitoring Example: Suzie in accounting all of a sudden makes a bunch of SMB connections. Or when bobโ€™s Tier 0 account is now logged into a workstation somehow. UEBA (user entity behavior analytics)

Florian Roth โšก๏ธ (@cyb3rops) 's Twitter Profile Photo

MongoBleed (CVE-2025-14847) is basically Heartbleed for MongoDB - unauthenticated memory disclosure - public POC, trivial to exploit - leaks creds, tokens, cloud keys straight from RAM - huge exposed surface on the internet Good writeups and technical details here:

Florian Roth โšก๏ธ (@cyb3rops) 's Twitter Profile Photo

Rapid7 dropped a write-up on the Notepad++ update-chain abuse and - finally - it comes with real IOCs - update.exe downloaded from 95.179.213[.]0 after notepad++.exe -> GUP.exe - file hashes for update.exe / log.dll / BluetoothService.exe / conf.c / libtcc.dll - network IOCs

Rapid7 dropped a write-up on the Notepad++ update-chain abuse and - finally - it comes with real IOCs

- update.exe downloaded from 95.179.213[.]0 after notepad++.exe -> GUP.exe
- file hashes for update.exe / log.dll / BluetoothService.exe / conf.c / libtcc.dll
- network IOCs
Jordan Benzing - MVP (@jordantheitguy) 's Twitter Profile Photo

Those of you who are following the Notepad plus plus scenario. There was an update this morning. notepad-plus-plus.org/news/clarificaโ€ฆ The key takeaway is the *majority* of consumers should take from this message, was implied early on and now has been said definitely. "This was a highly

Windows Central (@windowscentral) 's Twitter Profile Photo

After 15 years, the original Secure Boot certificates that keep your PC safe during boot are expiring. Microsoft has announced that the original Secure Boot certificates that were issued when the feature first began shipping in 2011 are set to expire this June. PCs that are not

After 15 years, the original Secure Boot certificates that keep your PC safe during boot are expiring.

Microsoft has announced that the original Secure Boot certificates that were issued when the feature first began shipping in 2011 are set to expire this June.

PCs that are not
The Hacker News (@thehackersnews) 's Twitter Profile Photo

๐Ÿ”ฅ Anthropic is rolling out Claude Code Security, an AI tool that scans full codebases and suggests patches. In limited preview for Enterprise and Team users, it analyzes code like a human, traces data flows, and reduces false positives in a review dashboard. All fixes require

๐Ÿ”ฅ Anthropic is rolling out Claude Code Security, an AI tool that scans full codebases and suggests patches.

In limited preview for Enterprise and Team users, it analyzes code like a human, traces data flows, and reduces false positives in a review dashboard.

All fixes require
Merill Fernando (@merill) 's Twitter Profile Photo

Microsoft Authenticator is about to wipe work accounts from jailbroken/rooted phones automatically ๐Ÿ‘. No IT config needed. ๐Ÿ”ฅ 3-phase rollout starting Feb 2026: โš ๏ธ Warn โ†’ ๐Ÿšซ Block โ†’ ๐Ÿ—‘๏ธ Wipe Let your help desk and security teams know. ๐Ÿ”— support.microsoft.com/en-us/account-โ€ฆ

Microsoft Authenticator is about to wipe work accounts from jailbroken/rooted phones automatically ๐Ÿ‘.

No IT config needed. ๐Ÿ”ฅ

3-phase rollout starting Feb 2026:
โš ๏ธ Warn โ†’ ๐Ÿšซ Block โ†’ ๐Ÿ—‘๏ธ Wipe

Let your help desk and security teams know.

๐Ÿ”— support.microsoft.com/en-us/account-โ€ฆ
The Hacker News (@thehackersnews) 's Twitter Profile Photo

โš ๏ธ Veeam fixed multiple flaws in Backup & Replication, including 9.9-severity RCE bugs that let authenticated domain users run code on backup servers. Affected: all v12 builds before 12.3.2.4465. ๐Ÿ”— CVEs and patch details โ†’ thehackernews.com/2026/03/veeam-โ€ฆ

notEricaZelic (@iamericabooted) 's Twitter Profile Photo

If a Global Admin gets compromised, it should be treated like a scorched earth scenario. The possibilities for backdoor are endless, especially if they disabled the audit logs.

Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

If I told you there was a digital forensics and IR platform that gives security teams deep visibility into Windows, macOS, and Linux endpoints, would you believe me? What if I said itโ€™s open source, lightweight, scalable, and designed for flexible investigations? Welcome to

If I told you there was a digital forensics and IR platform that gives security teams deep visibility into Windows, macOS, and Linux endpoints, would you believe me?

What if I said itโ€™s open source, lightweight, scalable, and designed for flexible investigations?

Welcome to
BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

GlassWorm malware hits 400+ code repos on GitHub, npm, VSCode, OpenVSX bleepingcomputer.com/news/security/โ€ฆ bleepingcomputer.com/news/security/โ€ฆ

The Hacker News (@thehackersnews) 's Twitter Profile Photo

โš ๏ธ WARNING - An unpatched critical telnetd bug (CVE-2026-32746) lets attackers gain full system access with no credentials. One connection to port 23 is enough to trigger memory corruption and execute code as root. No patch yet. Prior telnet flaw is already exploited in the

โš ๏ธ WARNING - An unpatched critical telnetd bug (CVE-2026-32746) lets attackers gain full system access with no credentials.

One connection to port 23 is enough to trigger memory corruption and execute code as root.

No patch yet. Prior telnet flaw is already exploited in the
SpecterOps (@specterops) 's Twitter Profile Photo

GitHub isnโ€™t just a code platform anymore. Itโ€™s a security boundary. New from Jared Atkinson: how GitHub creates real attack paths into repos, secrets, CI/CD, and even cloud environments. Read more: ghst.ly/4cU3QHd

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

CISA urges US orgs to secure Microsoft Intune systems after Stryker breach bleepingcomputer.com/news/security/โ€ฆ bleepingcomputer.com/news/security/โ€ฆ

David das Neves (@david_das_neves) 's Twitter Profile Photo

๐—›๐—ฎ๐—ฟ๐—ฑ๐—ฒ๐—ป ๐—ฌ๐—ผ๐˜‚๐—ฟ ๐—œ๐—ป๐˜๐˜‚๐—ป๐—ฒ ๐—ก๐—ผ๐˜„! ๐Ÿ›ก๏ธ๐Ÿ’ป CISA urges hardening after #Stryker attack: ๐Ÿ”น Use Intune RBAC (Least Privilege) ๐Ÿ”น Phishing-resistant MFA ๐Ÿ”น Multi-Admin Approval for wipes ๐Ÿ”— buff.ly/4NMQ2Wy #InfoSec #shiftavenue

๐—›๐—ฎ๐—ฟ๐—ฑ๐—ฒ๐—ป ๐—ฌ๐—ผ๐˜‚๐—ฟ ๐—œ๐—ป๐˜๐˜‚๐—ป๐—ฒ ๐—ก๐—ผ๐˜„! ๐Ÿ›ก๏ธ๐Ÿ’ป

CISA urges hardening after #Stryker attack:

๐Ÿ”น Use Intune RBAC (Least Privilege)
๐Ÿ”น Phishing-resistant MFA
๐Ÿ”น Multi-Admin Approval for wipes

๐Ÿ”— buff.ly/4NMQ2Wy 

#InfoSec #shiftavenue