Peter C (@itspeterc) 's Twitter Profile
Peter C

@itspeterc

Security Engineer

Black Lives Matter

ID: 424312230

linkhttps://peterc.ollins.me calendar_today29-11-2011 16:32:19

784 Tweet

1,1K Followers

597 Following

Dane Knecht 🦭 (@dok2001) 's Twitter Profile Photo

2026 prediction: an Ashley Madison-level breach from an AI app. Millions have handed their most personal thoughts, or all their corporate IP, to startups with 18 months of runway and a privacy policy nobody read.

Yuval Avrahami (@yuvalavra) 's Twitter Profile Photo

We hacked the AWS JavaScript SDK, a core library powering the entire @AWScloud ecosystem - including the AWS Console itself 🤯 How did we do it? Just two missing characters was all it took. This is the story of #CodeBreach 🧵👇

We hacked the AWS JavaScript SDK, a core library powering the entire @AWScloud ecosystem - including the AWS Console itself 🤯

How did we do it? Just two missing characters was all it took.

This is the story of #CodeBreach 🧵👇
Graham Helton (@grahamhelton3) 's Twitter Profile Photo

Excited to disclose my research allowing RCE in Kubernetes It allows running arbitrary commands in EVERY pod in a cluster using a commonly granted "read only" RBAC permission. This is not logged and and allows for trivial Pod breakout. Unfortunately, this will NOT be patched.

Excited to disclose my research allowing RCE in Kubernetes

It allows running arbitrary commands in EVERY pod in a cluster using a commonly granted "read only" RBAC permission.  This is not logged and and allows for trivial Pod breakout.

Unfortunately, this will NOT be patched.
Simo (@simokohonen) 's Twitter Profile Photo

Fortinet CVE-2026-24858.. is this even real life anymore? ”An attacker’s valid FortiCloud session, tied to their own device, gets accepted as legitimate for other users’ devices.”

Fortinet CVE-2026-24858.. is this even real life anymore? 

”An attacker’s valid FortiCloud session, tied to their own device, gets accepted as legitimate for other users’ devices.”
Jamieson Vincent O'Reilly (@theonejvo) 's Twitter Profile Photo

I've been trying to reach moltbook for the last few hours. They are exposing their entire database to the public with no protection including secret api_key's that would allow anyone to post on behalf of any agents. Including yours Andrej Karpathy Karpathy has 1.9 million followers

I've been trying to reach <a href="/moltbook/">moltbook</a> for the last few hours. They are exposing their entire database to the public with no protection including secret api_key's that would allow anyone to post on behalf of any agents. Including yours <a href="/karpathy/">Andrej Karpathy</a> 

Karpathy has 1.9 million followers
OmerAF (@omer_asfu) 's Twitter Profile Photo

👼GatewayToHeaven (CVE-2025-13292). I discovered a cross-tenant vulnerability in @GoogleCloud's #Apigee, allowing me to access other organizations' data (and sometimes even plaintext JWTs of end users). Below is the full breakdown of the exploit chain⛓️

👼GatewayToHeaven (CVE-2025-13292).

I discovered a cross-tenant vulnerability in @GoogleCloud's #Apigee, allowing me to access other organizations' data (and sometimes even plaintext JWTs of end users).

Below is the full breakdown of the exploit chain⛓️
Travis Whitaker (hs/acc) (@travismwhitaker) 's Twitter Profile Photo

We spent years and billions of dollars inserting a C compiler into a lossy hash table. Here’s how we spent two weeks getting it back out with a Markov process.

Trail of Bits (@trailofbits) 's Twitter Profile Photo

Two AES libraries ship a default IV that guarantees key reuse. 700K+ repos depend on aes-js alone. A developer flagged the problem years ago, but it was never fixed. 🧵

Trail of Bits (@trailofbits) 's Twitter Profile Photo

Before launch, Perplexity hired us to test the security of Comet, their AI browser assistant. We demonstrated how four prompt injection techniques could extract users' private information from Gmail. 🧵

Claude (@claudeai) 's Twitter Profile Photo

Introducing Claude Code Security, now in limited research preview. It scans codebases for vulnerabilities and suggests targeted software patches for human review, allowing teams to find and fix issues that traditional tools often miss. Learn more: anthropic.com/news/claude-co…

Truffle Security (@trufflesec) 's Twitter Profile Photo

🚨 Google told devs: API keys aren't secrets. Gemini changed that. 😱 We found ~3,000 public keys silently authenticating to Gemini - exposing private files, cached data & charging for LLM usage 💥Even Google's own keys were vulnerable. 🔗 trufflesecurity.com/blog/google-ap…

🚨 Google told devs: API keys aren't secrets. Gemini changed that.

😱 We found ~3,000 public keys silently authenticating to Gemini -  exposing private files, cached data &amp;  charging for LLM usage

💥Even Google's own keys were vulnerable.

🔗 trufflesecurity.com/blog/google-ap…
Infoblox (@infoblox) 's Twitter Profile Photo

We discovered a phishing actor that is abusing .arpa to host content on domains that should not resolve to an IP address. The actor uses free services to create domain names from reverse DNS strings for IPv6 tunnels that use the .arpa top level domain. 🧵

We discovered a phishing actor that is abusing .arpa to host content on domains that should not resolve to an IP address. The actor uses free services to create domain names from reverse DNS strings for IPv6 tunnels that use the .arpa top level domain. 🧵
Nick Frichette (@frichette_n) 's Twitter Profile Photo

"permitted a single ECS task role "read access to every secret in the account, including the production Redshift master credential."" There is a lot going on with this (even if not all of it can be believed). Properly scoping IAM is critical! bleepingcomputer.com/news/security/…

Addy Osmani (@addyosmani) 's Twitter Profile Photo

Introducing the Google Workspace CLI: github.com/googleworkspac… - built for humans and agents. Google Drive, Gmail, Calendar, and every Workspace API. 40+ agent skills included.