Karma-X (@karma_x_inc) 's Twitter Profile
Karma-X

@karma_x_inc

Does your EDR have Alert Dysfunction Disorder.. Karma-X can help! Our Protection goes great with your EDR’s False Negatives.

ID: 1731709431585329154

linkhttp://www.karma-x.io calendar_today04-12-2023 16:18:09

107 Tweet

42 Followers

49 Following

Karma-X (@karma_x_inc) 's Twitter Profile Photo

PTC Windchill's CVE‑2026‑4681: a critical deserialization flaw that can give attackers remote code execution—here's what you need to know. karma-x.io/blog/post/47/

Karma-X (@karma_x_inc) 's Twitter Profile Photo

Langflow’s public‑flow endpoint now a hotbed for RCE – patch or disable it immediately to stop attackers from hijacking your AI workflows. karma-x.io/blog/post/48/

Karma-X (@karma_x_inc) 's Twitter Profile Photo

Attackers are now actively disabling EDRs before ransomware hits—learn how to spot and stop the killers. karma-x.io/blog/post/49/

Karma-X (@karma_x_inc) 's Twitter Profile Photo

Windows Error Reporting LPE: CVE‑2026‑20817 PoC released—learn how attackers elevate to SYSTEM via ALPC. karma-x.io/blog/post/50/

Karma-X (@karma_x_inc) 's Twitter Profile Photo

CanisterWorm turns Kubernetes into a geopolitical weapon, wiping Iranian machines via ICP canisters—here’s how to stop it. karma-x.io/blog/post/51/

Karma-X (@karma_x_inc) 's Twitter Profile Photo

“CVE‑2026‑3888 turns a timing race between snap‑confine and systemd‑tmpfiles into a root‑level LPE on Ubuntu 24.04+. Patch now or harden manually.” karma-x.io/blog/post/52/

Karma-X (@karma_x_inc) 's Twitter Profile Photo

Discover how attackers use Windows Terminal to deploy Lumma Stealer via ClickFix – a deep dive into the latest file‑less, LOLBin attack chain. karma-x.io/blog/post/53/

Karma-X (@karma_x_inc) 's Twitter Profile Photo

Handala Hack exposes how Iranian actors leveraged Intune admin rights and Telegram C2 to wipe 200k systems—here’s the technical deep dive. karma-x.io/blog/post/56/

Karma-X (@karma_x_inc) 's Twitter Profile Photo

Telegram zero‑click RCE flaw (ZDI‑CAN‑30207) exposes users to full system compromise—update now or disable media auto‑download. karma-x.io/blog/post/57/

Karma-X (@karma_x_inc) 's Twitter Profile Photo

Uncover the decade‑long MSS‑backed campaign targeting Southeast Asian critical infrastructure—USBFect, Bronze Mohawk, and more. karma-x.io/blog/post/58/

Karma-X (@karma_x_inc) 's Twitter Profile Photo

Red Menshen’s upgraded BPFdoor backdoor embeds kernel-level sleeper cells in telecom networks worldwide. Here’s how it works and how to detect it. karma-x.io/blog/post/59/

Karma-X (@karma_x_inc) 's Twitter Profile Photo

A custom .NET RAT dubbed CTRL uses weaponized Windows shortcuts to hijack RDP sessions via FRP tunnels—here’s the full attack chain and how to defend against it. karma-x.io/blog/post/60/

Karma-X (@karma_x_inc) 's Twitter Profile Photo

Check Point found ChatGPT’s code sandbox could leak data via DNS. Separately, Codex’s branch name field allowed command injection to steal GitHub tokens. karma-x.io/blog/post/61/

Karma-X (@karma_x_inc) 's Twitter Profile Photo

Axios npm package compromised—attackers hijacked the maintainer’s account and injected a phantom dependency that dropped a cross-platform RAT. Here’s the full attack chain. karma-x.io/blog/post/62/

Karma-X (@karma_x_inc) 's Twitter Profile Photo

Trojanized LiteLLM releases on PyPI enabled data exfiltration with Kubernetes persistence—here’s the full attack chain and how to check if you’re affected. karma-x.io/blog/post/63/

Karma-X (@karma_x_inc) 's Twitter Profile Photo

In regards to BrowserGate, we looked a little bit deeper into LinkedIn surveillance infrastructure, especially as it relates to Firefox. Read more here: karma-x.io/blog/post/64/

Karma-X (@karma_x_inc) 's Twitter Profile Photo

Google DeepMind maps 6 categories of ‘AI Agent Traps’ — malicious web content that hijacks autonomous AI agents. Here’s how it works and how to defend against it. karma-x.io/blog/post/65/