Twitter | Search | |
Search Refresh
Mteto Nyati 2h
“Let people around you see the real, imperfect, quirky, weird, beautiful, magical person you are.”
Reply Retweet Like
Ptrace Security GmbH 41m
Reply Retweet Like
The Hacker News Jul 29
A new GRUB2 bootloader (CVE-2020-10713) could let attackers bypass 'Secure Boot' & gain high-privileged persistent access to the targeted systems. BILLIONS of devices running any distributions, as well as Windows PCs are affected.
Reply Retweet Like
Yalu Jailbreak 17h
Integer overflow vulnerability in the MPTCP module in the XNU kernel discovered by Team Pangu.
Reply Retweet Like
Keshav Malik Jul 31
Hey Folks ! ✨ I have published my Write-up on one of my Recent Finding. Hope you like it. 😄🔥
Reply Retweet Like
Ptrace Security GmbH Aug 1
CVE-2020-1313: Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability
Reply Retweet Like
ProjectDiscovery.io Aug 2
We have updated our Nuclei template documentation page with a dedicated website, more detailed, and newly added information with a categorized example of multiple templates. 📋 —
Reply Retweet Like
Ptrace Security GmbH Aug 1
Hunting 0-days in Cisco Data Center Network Manager (DCNM) with ShiftLeft Ocular
Reply Retweet Like
openroot.tech Aug 2
Critical vulnerability in WordPress plugin wpDiscuz with 80 thousand installations
Reply Retweet Like
Deseré Cross Ward 5h
These three books (Dare to Lead, my journal and card deck guidebook) have worked wonders as I strive to become more self-aware 😌
Reply Retweet Like
SaltDNA Aug 2
Reply Retweet Like
SaltDNA Aug 1
Reply Retweet Like
Ptrace Security GmbH Aug 2
Reply Retweet Like

Related searches

#boothole · #security · hackerone · meow attack · #pentesting
SaltDNA Aug 1
Reply Retweet Like
YD 3h
Sharing my strengths-being a better person when the other person does something bad
Reply Retweet Like
vFeed Inc. Vulnerability Intelligence As A Service 22h
WARNING Widely tagged as Unauthenticated Full-Read SSRF (CWE-918) in (CVE-2020-13379). Get our feed to boost your solutions with top notch vulnerability intelligence as a service indicators (patches, signatures, rules, open standards ...)
Reply Retweet Like
openroot.tech Jul 31
Vulnerability in KDE Ark that allows files to be overwritten when opening an archive
Reply Retweet Like
Rhonda Martin Copher 7h
Brene Brown says, "Without , we cannot create." This is where I had my Aha! moment. Let me explain→
Reply Retweet Like
Nick Christelis Jul 31
Leaders are human. They are real. They are vulnerable. They do make mistakes. They don’t act like they’re bullet proof and fake perfection.
Reply Retweet Like
YD 3h
Sharing my vulnerabilities-not wanting to work
Reply Retweet Like