AuraInfoSec (@aurainfosec) 's Twitter Profile
AuraInfoSec

@aurainfosec

Aura provides a wide range of information security services to government and corporates in AU and NZ. Winner of iSANZ Best Security Company 2017 and 2018.

ID: 285278182

linkhttp://www.aurainfosec.com calendar_today20-04-2011 21:26:44

284 Tweet

395 Takipçi

79 Takip Edilen

CERT NZ (@certnz) 's Twitter Profile Photo

UPDATE: Kaseya has released a tool that users can run to check their VSA server for signs of compromise. For details in our updated advisory here cert.govt.nz/it-specialists…

CERT NZ (@certnz) 's Twitter Profile Photo

#CyberSmartWeek starts today – it’s time to Cyber UP NZ! Help us share the word this week to help kiwis UP their online defences! #CyberUPnz with CERT NZ cert.govt.nz/cybersmart

Kordia (@kordia_nz) 's Twitter Profile Photo

We’re pleased to partner with the GCSB on the new Malware Free Networks initiative, to enhance our ability to detect and disrupt malicious activity on our customers’ networks

AuraInfoSec (@aurainfosec) 's Twitter Profile Photo

New on Aura's research blog - Hacking the Hive: Discovering Vulnerabilities in Aerohive Devices research.aurainfosec.io/hacking-the-hi…

kawaiicon (@kawaiiconnz) 's Twitter Profile Photo

Our EMPEROR TAMARIN sponsors help us pay for the big things - like the venue, our lighting and sound rig, and most importantly our sparkle pyro. Thanks HEAPS to: Spark NZ Aura Information Security CyberCX Google ✨🐵🧔

AuraInfoSec (@aurainfosec) 's Twitter Profile Photo

New on the research blog. USB-C docks are commonplace in offices but may not be as innocuous as they appear... Aura's Lachlan Davidson demonstrates how these docks can be weaponised. Link to article below - research.aurainfosec.io/pentest/threat…

AuraInfoSec (@aurainfosec) 's Twitter Profile Photo

Our annual NZ cyber security business research report is out - 55% of businesses surveyed were subject to a cyber-attack, and 44% say they would consider paying a ransom to a cybercriminal. kordia.co.nz/news-and-views…

phish 🐟 (@dunderhay) 's Twitter Profile Photo

Published a write-up on successfully phishing a target using AD FS with MFA. Covers some of the challenges and how I finally got it working 🎣 research.aurainfosec.io/pentest/hook-l…

0xor0ne (@0xor0ne) 's Twitter Profile Photo

Excellent research on exploiting (RCE) Extreme Networks/Aerohive Wireless APs Credits Lachlan Davidson (Aura Information Security) research.aurainfosec.io/pentest/bee-yo… #embedded #iot #cybersecurity

Excellent research on exploiting (RCE) Extreme Networks/Aerohive Wireless APs
Credits Lachlan Davidson (<a href="/AuraInfoSec/">Aura Information Security</a>)

research.aurainfosec.io/pentest/bee-yo…

#embedded #iot #cybersecurity
AuraInfoSec (@aurainfosec) 's Twitter Profile Photo

Hotels are an excellent target for cybercriminals, says Aura Principal Consultant Alastair Miller in Hotel Magazine. Read the article here - hotelmagazine.co.nz/2023/09/28/ala…

AuraInfoSec (@aurainfosec) 's Twitter Profile Photo

New on the Aura research blog from Horatiu Petrescu - perfecting phishing simulations. research.aurainfosec.io/advisory/perfe…

AuraInfoSec (@aurainfosec) 's Twitter Profile Photo

New on the Aura research blog from Principal Chris McCurley - Directory Traversal, SQL Injection and Server-Side Request Forgery in SageCRM. research.aurainfosec.io/disclosure/sag…

React (@reactjs) 's Twitter Profile Photo

There is critical vulnerability in React Server Components disclosed as CVE-2025-55182 that impacts React 19 and frameworks that use it. A fix has been published in React versions 19.0.1, 19.1.2, and 19.2.1. We recommend upgrading immediately. react.dev/blog/2025/12/0…

Horizon3 Attack Team (@horizon3attack) 's Twitter Profile Photo

Today we are disclosing the details of CVE-2025-64155, an unauth argument injection leading to root remote code execution affecting the Fortinet FortiSIEM. Find the technical details, indicators of compromise, and proof-of-concept exploit in the blog. horizon3.ai/attack-researc…

CISA Cyber (@cisacyber) 's Twitter Profile Photo

🚨Malicious cyber actors are actively exploiting Fortinet authentication bypass vulnerability CVE-2026-24858, impacting FortiOS, FortiManager, FortiWeb, FortiProxy, & FortiAnalyzer. Review our Alert, check for IOCs, & apply vendor updates. More info: go.dhs.gov/iRT

Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

⚠️ Hackers Hijacked Notepad++ Update Servers to Redirect Users to Malicious Servers Source: cybersecuritynews.com/notepad-hijack… The developer of Notepad++ has confirmed that a targeted attack by a likely Chinese state-sponsored threat actor compromised the project's former shared hosting

⚠️ Hackers Hijacked Notepad++ Update Servers to Redirect Users to Malicious Servers 

Source: cybersecuritynews.com/notepad-hijack…

The developer of Notepad++ has confirmed that a targeted attack by a likely Chinese state-sponsored threat actor compromised the project's former shared hosting
AuraInfoSec (@aurainfosec) 's Twitter Profile Photo

If you're at BSides Ballarat this Saturday at 4:30pm, new to the Industry and looking for an understanding on the different types of roles in InfoSec, stop by and have a listen to our very own Lyal Collins, as he gives a quick overview of skills and career paths in IT Security.

Truffle Security (@trufflesec) 's Twitter Profile Photo

🚨 Google told devs: API keys aren't secrets. Gemini changed that. 😱 We found ~3,000 public keys silently authenticating to Gemini - exposing private files, cached data & charging for LLM usage 💥Even Google's own keys were vulnerable. 🔗 trufflesecurity.com/blog/google-ap…

🚨 Google told devs: API keys aren't secrets. Gemini changed that.

😱 We found ~3,000 public keys silently authenticating to Gemini -  exposing private files, cached data &amp;  charging for LLM usage

💥Even Google's own keys were vulnerable.

🔗 trufflesecurity.com/blog/google-ap…