Raul Onitza-Klugman (@supriza0) 's Twitter Profile
Raul Onitza-Klugman

@supriza0

Security researcher at @snyksec. Web, binary and organic vegetable growing.

ID: 1140644182039638016

calendar_today17-06-2019 15:35:39

26 Tweet

34 Followers

231 Following

Ekoparty | Hacking everything (@ekoparty) 's Twitter Profile Photo

¿Qué charlas habrá este año en el Main Track de la #Eko2021?🚀🌕 💥1-CLICK TO INFILTRATE YOUR ORGANIZATION VIA VULNERABLE VS CODE EXTENSIONS by Raul Onitza-Klugman & Kirill Efimov Para leer la descripción y comprar tu entrada 👉 bit.ly/3b7CY59

¿Qué charlas habrá este año en el Main Track de la #Eko2021?🚀🌕

💥1-CLICK TO INFILTRATE YOUR ORGANIZATION VIA VULNERABLE VS CODE EXTENSIONS
by  <a href="/supriza0/">Raul Onitza-Klugman</a> &amp; <a href="/byte89/">Kirill Efimov</a>

Para leer la descripción y comprar tu entrada 👉   bit.ly/3b7CY59
Raul Onitza-Klugman (@supriza0) 's Twitter Profile Photo

First meetup ever - check! First sticker on my laptop - check! (Liran Tal was told yours is waiting for you in the desert) Thanks #NegevWebDevelopers and Yanai Edri for having me.

First meetup ever - check! First sticker on my laptop - check! (<a href="/liran_tal/">Liran Tal</a> was told yours is waiting for you in the desert)
Thanks #NegevWebDevelopers and <a href="/yanaiEdri/">Yanai Edri</a> for having me.
Snyk (@snyksec) 's Twitter Profile Photo

🚨 A malicious actor targeting a still unknown company is using an internal #JS package "gxm-reference-web-auth-server". If your company uses this package, make sure to inform your #AppSec team. More info here. 👇 #npm #JavaScript snyk.co/uewZH

Khaled Yakdan (@khaledyakdan) 's Twitter Profile Photo

Do you have ideas how to find new classes of bugs with fuzzing? Now you can get a reward of over $11K for every detector. Great initiative by Google's OSS-Fuzz team to foster the work on exploring the potential of #fuzzing beyond memory corruption bugs. security.googleblog.com/2022/09/fuzzin…

Raul Onitza-Klugman (@supriza0) 's Twitter Profile Photo

Created a repo that shows how to find the latest #OpenSSL CVE-2022-3602 buffer overflow using libFuzzer. github.com/supriza/openss…

Raul Onitza-Klugman (@supriza0) 's Twitter Profile Photo

#FetchtheFlag 2022 is a wrap! Had loads of fun creating some of the challenges and running it. Time to do some research 🕵️

Snyk (@snyksec) 's Twitter Profile Photo

🚨 BREAKING 🚨The Snyk research team has uncovered 4 critical security vulnerabilities (#LeakyVessels) impacting core container tech including Docker, runc & related cloud infrastructure like Kubernetes. Get more details, including mitigation tips here 👉 snyk.co/ugxMU

Snyk (@snyksec) 's Twitter Profile Photo

Unveiling the mysteries of ComfyUI Custom Node Vulnerabilities with our latest blog post! 🕵️‍♂️ Dive deeper into plugin ecosystem security with our seclabs team's in-depth exploration. Don't miss it! ⚡ #AppSec #AIsecurity #ComfyUI More here: snyk.co/uhPWq

Aviad (@_0xffd) 's Twitter Profile Photo

🚨 New twist in the tj-actions attack: A complex story unfolding — started 3 months earlier than publicly known, slipping in through SpotBugs before spreading across orgs. More details here ⬇️ unit42.paloaltonetworks.com/github-actions…

🚨 New twist in the tj-actions attack: A complex story unfolding — started 3 months earlier than publicly known, slipping in through SpotBugs before spreading across orgs.  

More details here ⬇️

unit42.paloaltonetworks.com/github-actions…
Snyk (@snyksec) 's Twitter Profile Photo

We just dropped a deep dive on a series of vulnerabilities the Snyk Security Labs team found in NixOS! When chained together, they allow for a full privilege escalation from any user to root on a default installation. #NixOS #Linux #infosec #vulnerability