David Eckel (@mcdave2k1) 's Twitter Profile
David Eckel

@mcdave2k1

Cybersecurity nerd | Ethical hacker | Foodie | Hiker | Let's hack the digital world together! #ethicalhacking #infosec #dfir #kaeferjaeger

ID: 1291405375644864514

linkhttps://www.sectepe.de calendar_today06-08-2020 16:07:02

1,1K Tweet

526 Takipรงi

3,3K Takip Edilen

The Hacker News (@thehackersnews) 's Twitter Profile Photo

Microsoft just built an AI that reverse-engineers malware by itself. No hints. No human help โ€” and 90%+ accuracy. It could change how threats are foundโ€”before they even spread. Hereโ€™s what Project Ire can do โ†“ thehackernews.com/2025/08/microsโ€ฆ

Horizon3 Attack Team (@horizon3attack) 's Twitter Profile Photo

Our latest disclosures for CVE-2025-8355 and CVE-2025-8356 - discovering a critical RCE in Xerox FreeFlow Core horizon3.ai/attack-researcโ€ฆ

Florian Roth โšก๏ธ (@cyb3rops) 's Twitter Profile Photo

Iโ€™m excited to announce two major upgrades in our free product line: ๐Ÿ“ฆ Archive scanning is now unlocked in THOR Lite - including docx, xlsx, jar, war, and more ๐Ÿง  YARA Forge (my own project) is now integrated โ€“ extends the detection coverage with open source rules ๐Ÿ” Also

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

New downgrade attack can bypass FIDO auth in Microsoft Entra ID - Bill Toulas bleepingcomputer.com/news/security/โ€ฆ bleepingcomputer.com/news/security/โ€ฆ

0x6c75696a616974 (@luijait_) 's Twitter Profile Photo

Xbow raised $117M to build AI hacker agents, in Alias Robotics open-sourced it and made it completely free. Github: github.com/aliasrobotics/โ€ฆ Paper: arxiv.org/abs/2504.06017

joernchen (@joernchen) 's Twitter Profile Photo

Today I have a more serious topic than usual, please consider reposting for reach: My wife and I are urgently looking for a specialist in neuropediatrics or a similar field for our autistic child with a diagnosed, but not further specified, movement disorder [1/3]

Florian Roth โšก๏ธ (@cyb3rops) 's Twitter Profile Photo

New pre-auth RCE vulnerabilities in Commvault have been disclosed (see write-up below). A friend started scanning and already found 185 vulnerable instances worldwide โ€“ and while that number alone is concerning, the German subset stands out: The vast majority of those are run

Snehal Antani (@snehalantani) 's Twitter Profile Photo

77 seconds. That's how quickly NodeZero became Domain Admin in a production network. If your SOC can't detect and stop NodeZero in 76 seconds, it's game over. The future of cyber warfare is AI vs. AI with humans by exception, but it isnโ€™t just about โ€œwho has the smarter brain.โ€

Joe Stocker (@itguysocal) 's Twitter Profile Photo

Even though Microsoft provided a PowerShell command in April 2025 to disable the SMTP DirectSend feature in Exchange Online, we are still seeing attackers successfully reach the inbox for organizations that do not have their DMARC DNS Record set to Reject or Quarantine. According

Koidex (prev. ExtensionTotal) (@extensiontotal) 's Twitter Profile Photo

๐Ÿšจ ๐—ช๐—ฒ'๐˜ƒ๐—ฒ ๐˜‚๐—ป๐—ฐ๐—ผ๐˜ƒ๐—ฒ๐—ฟ๐—ฒ๐—ฑ ๐˜๐—ต๐—ฒ ๐—ณ๐—ถ๐—ฟ๐˜€๐˜ ๐—บ๐—ฎ๐—น๐—ถ๐—ฐ๐—ถ๐—ผ๐˜‚๐˜€ ๐— ๐—–๐—ฃ ๐˜€๐—ฒ๐—ฟ๐˜ƒ๐—ฒ๐—ฟ ๐—ถ๐—ป ๐˜๐—ต๐—ฒ ๐˜„๐—ถ๐—น๐—ฑ. It was only a matter of time. The postmark-mcp npm package (1,500+ weekly downloads) has been backdoored since v1.0.16 - silently BCCing every email to the attacker's

๐Ÿšจ ๐—ช๐—ฒ'๐˜ƒ๐—ฒ ๐˜‚๐—ป๐—ฐ๐—ผ๐˜ƒ๐—ฒ๐—ฟ๐—ฒ๐—ฑ ๐˜๐—ต๐—ฒ ๐—ณ๐—ถ๐—ฟ๐˜€๐˜ ๐—บ๐—ฎ๐—น๐—ถ๐—ฐ๐—ถ๐—ผ๐˜‚๐˜€ ๐— ๐—–๐—ฃ ๐˜€๐—ฒ๐—ฟ๐˜ƒ๐—ฒ๐—ฟ ๐—ถ๐—ป ๐˜๐—ต๐—ฒ ๐˜„๐—ถ๐—น๐—ฑ.

It was only a matter of time. The postmark-mcp npm package (1,500+ weekly downloads) has been backdoored since v1.0.16 - silently BCCing every email to the attacker's
David Kasabji (@roo7cause) 's Twitter Profile Photo

We detected a new somewhat sophisticated campaign abusing spoofed Microsoft Teams installer. The malware is hosted on a legitimate looking website, which seems to be part of redirect chain. Each new download produces a unique file hash - so that is not reliable indicator. The

Tuta (@tutaprivacy) 's Twitter Profile Photo

We did it: ๐Ÿ‡ฉ๐Ÿ‡ชGermany will OPPOSE Chat Control! ๐Ÿฅณ Thanks everyone for writing to the ministers. ๐Ÿซถ #ChatControl will not get a majority in the EU Council - at least for now.

We did it: ๐Ÿ‡ฉ๐Ÿ‡ชGermany will OPPOSE Chat Control! ๐Ÿฅณ

Thanks everyone for writing to the ministers. ๐Ÿซถ

#ChatControl will not get a majority in the EU Council - at least for now.
David Weston (DWIZZZLE) (@dwizzzlemsft) 's Twitter Profile Photo

Azure Security Firmware analysis has shipped!! Scan Routers, Edge Devices, IoT, and any embedded device to identity vulnerabilities and generate SBOMs and reports. Free tier so have with it scanning your home stuff too! techcommunity.microsoft.com/blog/IoTBlog/fโ€ฆ

m1tz (@_m1tz) 's Twitter Profile Photo

Did you encounter the Supabase? Might wanna try my newest tooling or have a read about quickwins? There you go: blog.m1tz.com/posts/2025/10/โ€ฆ

Nathan McNulty (@nathanmcnulty) 's Twitter Profile Photo

Intune now has dedicated security recommendations docs just like Entra ๐Ÿ”ฅ The Entra security docs are extremely popular, and I love seeing other teams publishing this kind of guidance Thanks to my collegaue (Josh Gatewood) for pointing this out! learn.microsoft.com/en-us/intune/iโ€ฆ

Intune now has dedicated security recommendations docs just like Entra ๐Ÿ”ฅ

The Entra security docs are extremely popular, and I love seeing other teams publishing this kind of guidance

Thanks to my collegaue (<a href="/JoshuaGatewood/">Josh Gatewood</a>) for pointing this out!

learn.microsoft.com/en-us/intune/iโ€ฆ
Julien | MrTuxracer ๐Ÿ‡ช๐Ÿ‡บ (@mrtuxracer) 's Twitter Profile Photo

OK, Rocket Software believes that the likelihood of my unauthenticated RCE "being exploited is rare"...๐Ÿคฆโ€โ™‚๏ธ docs.rocketsoftware.com/bundle/trufusiโ€ฆ #security

Elizabeth Ekedoro (@lizettle_) 's Twitter Profile Photo

๐—จ๐—ฟ๐—ด๐—ฒ๐—ป๐˜ ๐—ฐ๐—ฎ๐—น๐—น ๐—ณ๐—ผ๐—ฟ ๐—ฎ๐—น๐—น ๐—–๐—œ๐—ฆ๐—ข๐˜€ ๐—ฎ๐—ป๐—ฑ ๐—˜๐—บ๐—ฝ๐—น๐—ผ๐˜†๐—ฒ๐—ฒ๐˜€ ๐—ช๐—ต๐—ผ ๐—จ๐˜€๐—ฒ ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—ง๐—ผ๐—ผ๐—น๐˜€ I read about a newly identified ๐—ฃ๐—ต๐—ถ๐˜€๐—ต๐—ถ๐—ป๐—ด ๐˜๐—ฒ๐—ฐ๐—ต๐—ป๐—ถ๐—พ๐˜‚๐—ฒ called "๐—–๐—ผ๐—ฃ๐—ต๐—ถ๐˜€๐—ต" and I thought to share. This attack exploits Microsoftโ€™s Copilot

๐—จ๐—ฟ๐—ด๐—ฒ๐—ป๐˜ ๐—ฐ๐—ฎ๐—น๐—น ๐—ณ๐—ผ๐—ฟ ๐—ฎ๐—น๐—น ๐—–๐—œ๐—ฆ๐—ข๐˜€ ๐—ฎ๐—ป๐—ฑ ๐—˜๐—บ๐—ฝ๐—น๐—ผ๐˜†๐—ฒ๐—ฒ๐˜€ ๐—ช๐—ต๐—ผ ๐—จ๐˜€๐—ฒ ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—ง๐—ผ๐—ผ๐—น๐˜€

I read about a newly identified ๐—ฃ๐—ต๐—ถ๐˜€๐—ต๐—ถ๐—ป๐—ด ๐˜๐—ฒ๐—ฐ๐—ต๐—ป๐—ถ๐—พ๐˜‚๐—ฒ called "๐—–๐—ผ๐—ฃ๐—ต๐—ถ๐˜€๐—ต" and I thought to share.

This attack exploits Microsoftโ€™s Copilot
Florian Roth โšก๏ธ (@cyb3rops) 's Twitter Profile Photo

Quick reminder: you can activate the full YARA-Forge rule sets in our free products THOR Lite and THOR Cloud Lite Use the options shown below to select or download the rule package: In THOR Cloud Lite: select Yara Forge โ†’ core under Global Settings In THOR Lite: run

Quick reminder: you can activate the full YARA-Forge rule sets in our free products THOR Lite and THOR Cloud Lite

Use the options shown below to select or download the rule package:

In THOR Cloud Lite: 
select Yara Forge โ†’ core under Global Settings
In THOR Lite: run
Steven Lim (@0x534c) 's Twitter Profile Photo

The new Microsoft Teams feature allowing chat with anyone via emailโ€”even non-Teams usersโ€”introduces several security risks, including an expanded attack surface for phishing and malware and increased potential for data leakage. To disable the feature, set the

The new Microsoft Teams feature allowing chat with anyone via emailโ€”even non-Teams usersโ€”introduces several security risks, including an expanded attack surface for phishing and malware and increased potential for data leakage.

To disable the feature, set the