SharkFunding (@chillreader1x) 's Twitter Profile
SharkFunding

@chillreader1x

FOREX | CRYPTO | STOCK
The decision is up to you.

ID: 1309754818051715072

calendar_today26-09-2020 07:21:08

1,1K Tweet

639 Takipçi

1,1K Takip Edilen

Defused (@defusedcyber) 's Twitter Profile Photo

🚨CVE-2026-21962 (CVSS 10.0 critical unauth RCE) disclosed in various Oracle products (HTTP Server, Weblogic Proxy plugin) No POCs exists as of right now - perfect time to deploy some honeypots! We've added a Oracle HTTP Server stream into Defused 🍯 console.defusedcyber.com/signup

🚨CVE-2026-21962  (CVSS 10.0 critical unauth RCE) disclosed in various Oracle products (HTTP Server, Weblogic Proxy plugin)

No POCs exists as of right now - perfect time to deploy some honeypots!

We've added a Oracle HTTP Server stream into Defused 🍯 console.defusedcyber.com/signup
Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

🛠️ Microsoft Launches Open-Source WinApp CLI to Streamline Windows App Development Source: cybersecuritynews.com/microsoft-wina… Microsoft has unveiled the public preview of WinApp CLI (winapp), a new open-source command-line tool designed to simplify Windows app development for developers

🛠️ Microsoft Launches Open-Source WinApp CLI to Streamline Windows App Development 

Source: cybersecuritynews.com/microsoft-wina…

Microsoft has unveiled the public preview of WinApp CLI (winapp), a new open-source command-line tool designed to simplify Windows app development for developers
Dark Web Informer - Cyber Threat Intelligence (@darkwebinformer) 's Twitter Profile Photo

‼️CVE-2026-24061: Telnet RCE Exploit GitHub: github.com/SafeBreach-Lab… This script exploits the CVE-2026-24061 vulnerability in Telnet servers using a malformed USER environment variable. CVSS: 9.8 Usage: python telnet_rce.py <host> [-p <port>] Arguments: host: Target IP

‼️CVE-2026-24061: Telnet RCE Exploit

GitHub: github.com/SafeBreach-Lab…

This script exploits the CVE-2026-24061 vulnerability in Telnet servers using a malformed USER environment variable.

CVSS: 9.8

Usage:

python telnet_rce.py &lt;host&gt; [-p &lt;port&gt;]

Arguments:

host: Target IP
watchTowr (@watchtowrcyber) 's Twitter Profile Photo

🚨 The watchTowr team is rapidly reacting to CVE-2026-1281 & CVE-2026-1340 - unauth RCE vulnerabilities within Ivanti's Endpoint Manager Mobile (EPMM). Active watchTowr Platform clients have been made aware of their exposure - reach out via the watchTowr website for support.

🚨 The watchTowr team is rapidly reacting to CVE-2026-1281 &amp; CVE-2026-1340 - unauth RCE vulnerabilities within Ivanti's Endpoint Manager Mobile (EPMM).

Active watchTowr Platform clients have been made aware of their exposure - reach out via the watchTowr website for support.
Defused (@defusedcyber) 's Twitter Profile Photo

🚨 Ivanti has released fixes for 2 critical EPMM vulns (CVE-2026-1281, CVE-2026-1340) enabling unauthenticated remote command execution. Active exploitation already observed. Track exploit activity live via our Ivanti EPMM honeypot intel feed 👉 console.defusedcyber.com/intel

🚨 Ivanti has released fixes for 2 critical EPMM vulns (CVE-2026-1281, CVE-2026-1340) enabling unauthenticated remote command execution. 

Active exploitation already observed.

Track exploit activity live via our Ivanti EPMM honeypot intel feed 👉 console.defusedcyber.com/intel
Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

⚠️ FortiOS Authentication Bypass Vulnerability Lets Attackers Bypass LDAP Authentication Source: cybersecuritynews.com/fortios-ldap-a… Fortinet has disclosed a high-severity authentication bypass vulnerability in FortiOS, tracked as CVE-2026-22153 (FG-IR-25-1052), that could allow

⚠️ FortiOS Authentication Bypass Vulnerability Lets Attackers Bypass LDAP Authentication 

Source: cybersecuritynews.com/fortios-ldap-a…

Fortinet has disclosed a high-severity authentication bypass vulnerability in FortiOS, tracked as CVE-2026-22153 (FG-IR-25-1052), that could allow
Phato (@phatofx) 's Twitter Profile Photo

imho Trade Workstation is the best FREE Trading Journal in the industry right now Free forever No 14 day trial bullshit Modern clean UI. And this isn’t even the final form Give it a few months, it’s going to look stupidly next level. use for FREE: app.tradeworkstation.com

NiNi (@terrynini38514) 's Twitter Profile Photo

I found a vulnerability in Oracle VirtualBox (CVE-2026-21957) back in September 2025. It can be turned into AAR/AAW, and then escaping the VM is pretty easy. I originally planned to find a vulnerability for Pwn2Own, but since I found the vuln in September, sitting on a practical

FalconFeeds.io (@falconfeedsio) 's Twitter Profile Photo

Cyber Islamic Resistance channel is claiming the formation of an alliance involving multiple hacktivist groups (incl. RipperSec, Cyb3rDrag0nzz, APT IRAN, Cyber Fattah, and others). As of this post, many of these groups appear inactive, but the announcement suggests potential

Cyber Islamic Resistance channel is claiming the formation of an alliance involving multiple hacktivist groups (incl. RipperSec, Cyb3rDrag0nzz, APT IRAN, Cyber Fattah, and others).

As of this post, many of these groups appear inactive, but the announcement suggests potential
KHUN (@khun101010) 's Twitter Profile Photo

อะไรที่ทำให้​ อิสราเอลถึงสามารถรู้ตำแหน่งท่านคาเมเนอี​ ผู้นำ​สูงสุด​ของ​อิหร่าน​ได้แบบ​ real time​ ก่อนที่จะส่งขีปนาวุธ​ยิงถล่มอาคารที่จัดประชุมลับ​ ทั้งที่ควรจะเป็นความลับสุดยอด​ นักวิเคราะห์มอง​ เกิดจาก 3 ปัจจัยหลัก ​1. มี "หนอนบ่อนไส้" ระดับสูงภายใน​ IRGC

อะไรที่ทำให้​ อิสราเอลถึงสามารถรู้ตำแหน่งท่านคาเมเนอี​ ผู้นำ​สูงสุด​ของ​อิหร่าน​ได้แบบ​ real time​ ก่อนที่จะส่งขีปนาวุธ​ยิงถล่มอาคารที่จัดประชุมลับ​ ทั้งที่ควรจะเป็นความลับสุดยอด​ นักวิเคราะห์มอง​ เกิดจาก 3 ปัจจัยหลัก
​1. มี "หนอนบ่อนไส้" ระดับสูงภายใน​ IRGC
Gray Hats (@the_yellow_fall) 's Twitter Profile Photo

Proofpoint reveals Iran-aligned TA453 is exploiting Operation Epic Fury to launch targeted credential phishing campaigns against U.S. think tanks. #OperationEpicFury #TA453 #CharmingKitten #APT42 #CyberEspionage securityonline.info/iran-aligned-t…

Proofpoint reveals Iran-aligned TA453 is exploiting Operation Epic Fury to launch targeted credential phishing campaigns against U.S. think tanks.
#OperationEpicFury #TA453 #CharmingKitten #APT42 #CyberEspionage
securityonline.info/iran-aligned-t…
Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

🚨 FortiGate Firewalls Exploited in Wave of Attacks to Breach Networks & Steal Credentials Source: cybersecuritynews.com/fortigate-fire… A series of intrusions in early 2026 in which threat actors compromised FortiGate Next-Generation Firewalls (NGFW) to establish persistent footholds

🚨 FortiGate Firewalls Exploited in Wave of Attacks to Breach Networks &amp; Steal Credentials 

Source: cybersecuritynews.com/fortigate-fire…

A series of intrusions in early 2026 in which threat actors compromised FortiGate Next-Generation Firewalls (NGFW) to establish persistent footholds
Dark Web Informer - Cyber Threat Intelligence (@darkwebinformer) 's Twitter Profile Photo

FBI Watchdog 3.0.0: A multi-layered domain monitoring tool that detects law enforcement seizures, DNS changes, HTTP fingerprint shifts, WHOIS record mutations, and IP address changes across clearnet domains and Tor onion sites. github.com/DarkWebInforme…

FBI Watchdog 3.0.0: A multi-layered domain monitoring tool that detects law enforcement seizures, DNS changes, HTTP fingerprint shifts, WHOIS record mutations, and IP address changes across clearnet domains and Tor onion sites.

github.com/DarkWebInforme…
Vasileiadis A. (Cyberkid) (@anastasis_king) 's Twitter Profile Photo

🚨 Bug Bounty / Red Team Tip CVE-2026-21643 — Critical Pre-Auth SQL Injection (CVSS 9.1) in FortiClient EMS 7.4.4 (multi-tenant mode only) Unauthenticated attackers can inject arbitrary SQL via the Site HTTP header to the public endpoint /api/v1/init_consts (or login endpoint).

🚨 Bug Bounty / Red Team Tip

CVE-2026-21643 — Critical Pre-Auth SQL Injection (CVSS 9.1) in FortiClient EMS 7.4.4 (multi-tenant mode only)

Unauthenticated attackers can inject arbitrary SQL via the Site HTTP header to the public endpoint /api/v1/init_consts (or login endpoint).