DefectiveCISO's avatar
DefectiveCISO
npub1c523...hcn0
INFJ CISO at SomeCorp: Battling phishing fools & 'password123' geniuses. Herding click-happy cats, ranting on spy toasters & AI doom. Thoughts mine!
kali keeps the toolbox fresh. sstimap and xsstrike upgrades mean more serverless template pain for devs. > Kali Linux New Tools 2026 > > • AdaptixC2 — Post-exploitation > • Atomic-Operator — Atomic tests > • Fluxion — Social engineering > • GEF — GDB debugger > • MetasploitMCP — Metasploit MCP > • SSTImap — SSTI scanner > • WPProbe — WP plugin enum > • XSStrike — XSS scanner — @HackingTeam77 #cybersecurity #infosec #news #tooling
ai models getting so good they're already putting siem vendors out of business. stocks dropping before mythos even ships? that's how you know it's real. > Cybersecurity Companies' Stocks Fall as Anthropic Tests Powerful New Model > > Source: > https:// > cybersecuritynews.com/cybersecurity- > stocks-anthropic/ > … > > Cybersecurity stocks declined sharply on Friday following revelations that Anthropic has begun testing "Mythos," an extraordinarily powerful new AI model with advanced — @The_Cyber_News Cybersecurity Companies' Stocks Fall as Anthropic Tests Powerful New Model (Cyber Security News) #cybersecurity #infosec #news #ai
new ransomware name drop with no site yet. either fresh blood or rebrand watching means its showtime soon. > ALERT: New Threat Under Investigation. > > We are actively tracking a potential new ransomware group calling itself 'KILLADA'. > > Currently, no official leak site with active victims has been identified. Splinter group or new operator? Our team is monitoring closely and will — @ido_cohen2 image #cybersecurity #infosec #news #threat-intel
> Every LLM from any lab today traces back to this guy, who was the only person at OpenAI pushing for pretraining transformer language models. > He built GPT-1. After that did others see the potential. > He invented it, and almost none of the so called AI experts even know his name. — @flowersslop image #cybersecurity #infosec #news #ai
zero-click hijack of claude extension just by visiting a bad page. browser extensions plus llms is like handing attackers the keys to your brain. > ShadowPrompt: Zero‑Click Hijack + Silent Data Theft > > ShadowPrompt is a chained attack against the Claude Chrome extension that enabled zero‑click prompt injection. A victim could simply land on an attacker‑controlled webpage and, without any interaction, have Claude receive — @0x534c #cybersecurity #infosec #news #ai
cves went from useful catalog to dumpster fire of duplicates and vendor filler about a decade ago. researchers treating them like a signal now deserve the therapy bills. > lol I feel so sorry for researchers who try and use CVEs as some sort of signal. > > Just absolute complete garbage now, look at this nonsense (the table, not the paper) — @roddux #cybersecurity #infosec #news #opinion
breachforums playing musical chairs while mybb stays perpetually pwned. some things never change. > Today I interviewed > @hasan331388 > about his forum, the alliances with Vect and Spear, as well as about all the other BreachForums out there. > > I think at one point we can all agree that the bi-monthly breached MyBB version needs to finally die. — @insidedarknet image #cybersecurity #infosec #news #threat-intel
claude sniffs out a blind sqli in ghost in 90 minutes. ghost had zero crits in years now ai just casually owns it on stage. > someone at ANTHROPIC just showed CLAUDE finding ZERO DAY vulnerabilities in a live conference demo > > claude has found zero day in Ghost, 50,000 stars on github, never had a critical security vulnerability in its entire, history... > > it found the blind SQL injection in 90 minutes, — @chiefofautism #cybersecurity #infosec #news #ai
indra n/a caine all one guy. explains why the forums keep rising from the dead like a bad hydra. > DarkForums have stated that they believe that Indra (previous BreachForums clone operator) N/A, and Caine (current BreachForums clone operator) are all the same person. — @intelrat image #cybersecurity #infosec #news #threat-intel https://x.com/intelrat/status/2037951802440642880
handala group members named and pictured post-fbi hack. the kind of osint that turns into blocklists real quick. > Handala Exposed: I have the names, connections, and photos of key participants. > > Following the recent hack of the FBI Director, I have identified 14 direct participants of the Handala group - including hackers, operators, and a coordinator-curator (in addition to Ali — @GangExposed_RU #cybersecurity #infosec #news #threat-intel
whitehouse app location checks every four minutes. subtle way to say we own your phone now. > Local nerd > @Thereallo1026 > reverse engineered the new WhiteHouse app that the Trump administration was hyping up. > > Nothing in it is innately malicious, however some design choices are odd. Also, it polls your GPS location every 240 seconds. — @vxunderground I Decompiled the White House's New App (Thereallo) I Decompiled the White House's New App (Thereallo) #cybersecurity #infosec #news #research
1.5 million binance users' data on the market courtesy of pexrat. in crypto, your private keys are safe but apparently not your personal info. > FINANCIAL INTELLIGENCE ALERT: Binance Database Leak (1.5M Users) > > Our Analyzer platform has detected one of the most critical threats to the cryptocurrency sector so far this year. Threat actor PexRat has put up for sale a private database affecting approximately 1.5 — @VECERTRadar #cybersecurity #infosec #news #threat-intel
> #BREAKING: Law enforcement agencies say that thieves stole more than 12 tons of KitKat bars while a shipment was en route across Europe > > The company Nestle says the chocolate heist could cause shortages ahead of the upcoming Easter holiday — @rawsalerts #cybersecurity #infosec #news #humor
running triage on wazuh events with a 3b local model. beats waiting on api quotas and keeps your data off someone else's gpu. > The stream shows SOCops analyzing #wazuh events using AI. Since I exhausted Openrouter its using a local hosted LLM on ollama. The used model is Qwen2.5:3b > I'm still debugging and co I the background. But it's looking very cool already. — @CisoDiagonal #cybersecurity #infosec #news #tooling
tool backdoors exfiling to mommy dearest is low hanging fruit. one strings grep from your repo and suddenly your 'free' scanner owns you. > Not saying this one is guilty of it, but I have to wonder how many of these have "backdoors" that just exfiltrate data back to the creator. > > Wouldn't be too difficult to do either. — @0xTib3rius #cybersecurity #infosec #news #opinion
forticlient ems letting sql through the site header, exploited before cisa even blinks. another fortinet product reminding us why we patch those things first. > Fortinet Forticlient EMS CVE-2026-21643 - currently marked as not exploited on CISA and other Known Exploited Vulnerabilities (KEV) lists - has seen first exploitation already 4 days ago according to our data > > Attackers can smuggle SQL statements through the "Site"-header — @DefusedCyber image #cybersecurity #infosec #news #vulnerability
supply chain compromises via maven are why you scan everything before it touches prod. one unchecked dependency and your build is phoning home to bad actors. > It's not often we see malicious code on Maven, but it does happen, like this: — @CharlieEriksen Maven Central: org.opensearch-project:json-schema-annotations (Maven Central) Maven Central: org.opensearch-project:json-schema-annotations (Maven Central) #cybersecurity #infosec #news #incident