Mateusz Olejarka (@molejarka) 's Twitter Profile
Mateusz Olejarka

@molejarka

OSWE, HTTP requests forger, Head of Web Security @SecuRingPL

ID: 2995537431

calendar_today24-01-2015 10:05:37

1,1K Tweet

786 Takipçi

259 Takip Edilen

Securing (@securingpl) 's Twitter Profile Photo

Web Push Notifications are a good marketing tool, but are they #secure? In this article by Dawid Nastaj, you will discover why and how Web Push Notifications can be malicious and used for user-targeted attacks. #itsecurity #cybersec securing.pl/en/web-push-no…

TyphoonCon🌪️ (@typhooncon) 's Twitter Profile Photo

🌪️Broken isolation - draining your credentials from popular macOS password managers by Wojciech Reguła at #TyphoonCon24! You still have a few more hours to submit your talk and join Wojciech in Seoul! Submit your talk at: typhooncon.com/call-for-paper…

🌪️Broken isolation - draining your credentials from popular macOS password managers by <a href="/_r3ggi/">Wojciech Reguła</a> at #TyphoonCon24!

You still have a few more hours to submit your talk and join Wojciech in Seoul!
Submit your talk at: typhooncon.com/call-for-paper…
Securing (@securingpl) 's Twitter Profile Photo

Today, Securing turns 21! 🎉 We are thrilled to have you join us on this adventure of growth and sharing IT security knowledge!

Today, Securing turns 21! 🎉 

We are thrilled to have you join us on this adventure of growth and sharing IT security knowledge!
Securing (@securingpl) 's Twitter Profile Photo

How to discover vulnerabilities in code quickly and prevent security issues at your company? Security #Code #Review can improve the quality of your code, make it more secure and significantly reduce the number of vulnerabilities. securing.pl/en/service/app…

How to discover vulnerabilities in code quickly and prevent security issues at your company? 
 
Security #Code #Review can improve the quality of your code, make it more secure and significantly reduce the number of vulnerabilities.

securing.pl/en/service/app…
Securing (@securingpl) 's Twitter Profile Photo

We are hiring Junior IT Security Specialists that are eager to advance their web and iOS skills. If you are searching for a #pentester career opportunity, check this job offer out! 🚀 securing.pl/en/job/junior-…

We are hiring Junior IT Security Specialists that are eager to advance their web and iOS skills. If you are searching for a #pentester career opportunity, check this job offer out! 🚀

securing.pl/en/job/junior-…
Wojciech Reguła (@_r3ggi) 's Twitter Profile Photo

⚠️ Important iOS Security Suite 2.0.0 update: * new EULA license! * a new iOS 16+ lockdown mode module detector * privacy manifest compliance (thx LongXiangGuo) github.com/securing/IOSSe…

⚠️ Important iOS Security Suite 2.0.0 update:
* new EULA license! 
* a new iOS 16+ lockdown mode module detector
* privacy manifest compliance (thx LongXiangGuo)
github.com/securing/IOSSe…
confidenceconf (@confidenceconf) 's Twitter Profile Photo

Do you use mObywatel? Are you sure you should? 👀 Szymon Chadam’s lecture includes an analysis of the security of the new mObywatel 2.0 and a live presentation of how the app can be used in practice in red-team operations. Join us: confidence-conference.org 🎫#CONFidenceConf

Do you use mObywatel? Are you sure you should? 👀 

Szymon Chadam’s lecture includes an analysis of the security of the new mObywatel 2.0 and a live presentation of how the app can be used in practice in red-team operations.

Join us: confidence-conference.org 🎫#CONFidenceConf
Securing (@securingpl) 's Twitter Profile Photo

Does your company have a secure #Azure #SSO architecture? 🚨 This case study by Natalia Trojanowska will show you when an SSO misconfiguration becomes a vulnerability and how to prevent it 👇 securing.pl/en/azure-singl…

Does your company have a secure #Azure #SSO architecture? 🚨

This case study by Natalia Trojanowska will show you when an SSO misconfiguration becomes a vulnerability and how to prevent it 👇

securing.pl/en/azure-singl…
Securing (@securingpl) 's Twitter Profile Photo

Join us at @TyphoonCon in Seoul on May 27-31! Wojciech Reguła will talk about broken isolation and draining credentials from popular macOS password managers. #typhooncon #itsec #cybersec typhooncon.com/blog/conitems/…

Join us at @TyphoonCon in Seoul on May 27-31!

<a href="/_r3ggi/">Wojciech Reguła</a> will talk about broken isolation and draining credentials from popular macOS password managers.

#typhooncon #itsec #cybersec

typhooncon.com/blog/conitems/…
Mateusz Olejarka (@molejarka) 's Twitter Profile Photo

That’s hard - stopping the #pentest because you have the deadline and not being sure that you did everything and checked everywhere. Detailed scope and checklists help a bit but it’s still hard.

Oh My Hack (@omhconf) 's Twitter Profile Photo

Uwierzytelnienie użytkownika to sprawa trudna. Ostatnie lata przyniosły nam wysyp i coraz większą adopcję rozwiązań Single Sign On. 🔒 To i dobrze, i źle. Dlaczego? O tym dokładniej opowie Mateusz Mateusz Olejarka! Jego wykład zobaczycie już 26 listopada 🔜 omhconf.pl

Uwierzytelnienie użytkownika to sprawa trudna. Ostatnie lata przyniosły nam wysyp i coraz większą adopcję rozwiązań Single Sign On. 🔒 To i dobrze, i źle. Dlaczego? O tym dokładniej opowie Mateusz <a href="/molejarka/">Mateusz Olejarka</a>!

Jego wykład zobaczycie już 26 listopada 🔜 omhconf.pl
Nagli (@galnagli) 's Twitter Profile Photo

🚨The new unauthenticated RCE affecting Aviatrix Controllers (CVE-2024-50603) is the real deal - with a single POST request 🫠 and a super trivial exploit, it takes less than 30 seconds to: 1. Collect all Aviatrix Controllers over the internet 2. Validate exploitability with

🚨The new unauthenticated RCE affecting Aviatrix Controllers (CVE-2024-50603) is the real deal - with a single POST request 🫠 and a super trivial exploit, it takes less than 30 seconds to:

1. Collect all Aviatrix Controllers over the internet
2. Validate exploitability with
CISA Cyber (@cisacyber) 's Twitter Profile Photo

🛡️ We added #Aviatrix Controller OS command injection vulnerability CVE-2024-50603 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q & apply mitigations to protect your org from cyberattacks. #Cybersecurity #InfoSec

🛡️ We added #Aviatrix Controller OS command injection vulnerability CVE-2024-50603 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q &amp; apply mitigations to protect your org from cyberattacks. #Cybersecurity #InfoSec