Ryan Dewhurst (@ethicalhack3r) 's Twitter Profile
Ryan Dewhurst

@ethicalhack3r

Founder of @_WPScan_ (acquired by Automattic) | Founder of DVWA | Ethical Hacking Graduate | Currently: CyberAlerts.io

ID: 45911684

linkhttps://cyberalerts.io calendar_today09-06-2009 19:00:23

3,3K Tweet

21,21K Followers

710 Following

Thomas Roccia 🤘 (@fr0gger_) 's Twitter Profile Photo

🤓 If you want to learn more about MCP attacks or vulnerabilities, check out this project called Damn Vulnerable MCP. It allows you to experiment on MCP server security through 10 challenges, from basic prompt injection to multi-vector attacks. github.com/harishsg993010…

🤓 If you want to learn more about MCP attacks or vulnerabilities, check out this project called Damn Vulnerable MCP.

It allows you to experiment on MCP server security through 10 challenges, from basic prompt injection to multi-vector attacks.

github.com/harishsg993010…
FBI (@fbi) 's Twitter Profile Photo

ALERT—The FBI has recently observed the cybercriminal group Scattered Spider expanding its targeting to include the airline sector. These actors rely on social engineering techniques, often impersonating employees or contractors to deceive IT help desks into granting access.

ALERT—The FBI has recently observed the cybercriminal group Scattered Spider expanding its targeting to include the airline sector. These actors rely on social engineering techniques, often impersonating employees or contractors to deceive IT help desks into granting access.
James Woolley (@xtrato) 's Twitter Profile Photo

I recently created a VNC honeypot. Many people asked me how I went about setting it up, so I've created a blog post describing the process. You can read about it at: ja.meswoolley.co.uk/vnc-honeypot/

I recently created a VNC honeypot. Many people asked me how I went about setting it up, so I've created a blog post describing the process. You can read about it at:

ja.meswoolley.co.uk/vnc-honeypot/
watchTowr (@watchtowrcyber) 's Twitter Profile Photo

Are we bleeding out? Enjoy our analysis of CitrixBleed 2, aka CVE-2025-5777 - the "new" Citrix NetScaler Memory Leak vulnerability. We've been using this mechanism to identify vulnerable systems, and hope it helps the teams that need it.. enjoy! labs.watchtowr.com/how-much-more-…

watchTowr (@watchtowrcyber) 's Twitter Profile Photo

We’re thrilled to welcome Ryan Dewhurst (Ryan Dewhurst) to the @watchTowr team as Head of Threat Intelligence! 🚀 Ryan will lead the evolution of our Proactive Threat Intel capabilities - helping clients stay ahead of inevitable breaches and emerging threats.

We’re thrilled to welcome <a href="/ethicalhack3r/">Ryan Dewhurst</a> (Ryan Dewhurst) to the @watchTowr team as Head of Threat Intelligence! 🚀

Ryan will lead the evolution of our Proactive Threat Intel capabilities - helping clients stay ahead of inevitable breaches and emerging threats.
watchTowr (@watchtowrcyber) 's Twitter Profile Photo

Happy Friday! We're ending the week by publishing our analysis of Fortinet's FortiWeb CVE-2025-25257.... labs.watchtowr.com/pre-auth-sql-i…

Lex Fridman (@lexfridman) 's Twitter Profile Photo

Here's my 6 hour conversation with DHH, a legendary programmer, creator of Ruby on Rails, author, and race car driver. This was a fun and inspiring conversation on everything from the future of programming & AI to the nature of happiness & productivity to the value of family,

Elmo (@elmo) 's Twitter Profile Photo

On Sunday, Elmo’s X account was briefly hacked by an outside party, in spite of the security measures in place. We strongly condemn the abhorrent antisemitic and racist content, and the account has since been secured. These posts in no way reflect the values of Sesame Workshop

On Sunday, Elmo’s X account was briefly hacked by an outside party, in spite of the security measures in place.

We strongly condemn the abhorrent antisemitic and racist content, and the account has since been secured.

These posts in no way reflect the values of Sesame Workshop
watchTowr (@watchtowrcyber) 's Twitter Profile Photo

🚨A SharePoint zero-day (CVE-2025-53770) is under active exploitation, with attackers stealing MachineKey secrets to forge __VIEWSTATE and maintain RCE. No patch exists. If you expose SharePoint to the Internet, assume breach. Reach out to via our website if you need support.

🚨A SharePoint zero-day (CVE-2025-53770) is under active exploitation, with attackers stealing MachineKey secrets to forge __VIEWSTATE and maintain RCE. No patch exists.

If you expose SharePoint to the Internet, assume breach. Reach out to via our website if you need support.
Security Response (@msftsecresponse) 's Twitter Profile Photo

Update on CVE-2025-53770: Microsoft has released a security update for SharePoint Subscription Edition to mitigate active attacks targeting on-premises servers. SharePoint Online is not affected. Customers should apply the update immediately. We are actively working on updates

Jerry Gamblin (@jgamblin) 's Twitter Profile Photo

2025 CVE Stats Update (July 31st, 2025) Total Number of CVEs: 27,447 Average CVEs Per Day: 129.47 Average CVSS Score: 6.62 YOY Growth: 17.32% or +4053 (23,394 CVEs in 2024)

2025 CVE Stats Update (July 31st, 2025)
Total Number of CVEs: 27,447
Average CVEs Per Day: 129.47
Average CVSS Score: 6.62
YOY Growth: 17.32% or +4053 (23,394 CVEs in 2024)
watchTowr (@watchtowrcyber) 's Twitter Profile Photo

we grew up in #phrack - so a huge thank you to our friends @ Phrack Staff for offering us the privilege to be on the back cover of Phrack 72. Did the scene die? Who knows ;-)

we grew up in #phrack - so a huge thank you to our friends @ Phrack Staff for offering us the privilege to be on the back cover of Phrack 72.

Did the scene die? Who knows ;-)
watchTowr (@watchtowrcyber) 's Twitter Profile Photo

Should security solutions be secure? We're beginning to feel wrong. Enjoy some unscheduled programming - our analysis of CVE-2025-25256, a pre-auth Command Injection in Fortinet's FortiSIEM labs.watchtowr.com/should-securit…

watchTowr (@watchtowrcyber) 's Twitter Profile Photo

Focus for roles, with hands on capability spans: * Threat Intelligence/Engineering (no bed time stories) * Vuln. Research * Security Automation Engineering