Intelligence Security X

89 posts

Intelligence Security X banner
Intelligence Security X

Intelligence Security X

@IntelSecX

Intelligence Security: OSINT platform for real-time leak & infostealer intelligence. Exposures, ATO monitoring, instant response.

Joined Eylรผl 2025
89 Following1.2K Followers
LAEY | 0xpH
LAEY | 0xpH@0xLAEYยท
@IntelSecX 1 file download (credentials, cookies, sessions) where I can find the download button? can't see it
English
2
0
0
187
Intelligence Security X
Intelligence Security X@IntelSecXยท
๐Ÿ”“ New: Sign up with Email โ€” no Telegram required Intelligence Security now supports dual login. Register with email + password, Telegram, or link bot to one account. Search 500 billion+ indexed records from public breaches, dark web sources & infected devices. Every free account gets: โ”œ ๐Ÿ” 1 search across breach databases โ”œ ๐Ÿ“ฆ 1 file download (credentials, cookies, sessions) โ”” ๐Ÿ” Full access to all search types What you can search: โ”œ Leaked credentials & passwords โ”œ Browser data from compromised systems โ”œ Session cookies โ”” Paste sites & dark web mentions Your email might already be in a breach. Search it and find out โ€” takes 30 seconds. ๐ŸŒ intelligencesecurity.io #OSINT #CyberSecurity #ThreatIntelligence #InfoSec #BreachIntelligence #BugBount
Intelligence Security X tweet mediaIntelligence Security X tweet media
English
2
24
157
12.3K
Intelligence Security X
Intelligence Security X@IntelSecXยท
@0xLAEY You need to perform a intelligent search and you will be able to download a result.
English
0
0
0
156
Intelligence Security X
Intelligence Security X@IntelSecXยท
๐Ÿ” EMAIL RECON: nasa.gov โ€” 46,000+ Emails & 22,000+ Subdomains From One Query NASA builds rockets. But their digital footprint is just as massive. We ran Email Recon + Domain Recon on nasa.gov using only publicly indexed sources. ๐Ÿ“Š Results: โ”œโ”€ ๐Ÿ“ง 46,000+ corporate emails indexed โ”œโ”€ ๐ŸŒ 22,000+ subdomains discovered โ”œโ”€ ๐Ÿข 12 NASA centers identified โ””โ”€ ๐Ÿ“‹ 630+ mailing lists & distribution groups ๐Ÿš€ 12 NASA centers โ€” mapped from email patterns alone: โ”œโ”€ ๐Ÿ›ฐ๏ธ JPL (Jet Propulsion Lab) โ€” 8,100+ emails โ”œโ”€ ๐ŸŒ Goddard Space Flight Center โ€” 3,700+ โ”œโ”€ โœˆ๏ธ Ames Research Center โ€” 1,900+ โ”œโ”€ ๐Ÿ”ฌ Langley Research Center โ€” 1,500+ โ”œโ”€ โšก Glenn Research Center โ€” 1,200+ โ”œโ”€ ๐Ÿง‘โ€๐Ÿš€ Johnson Space Center โ€” 1,200+ โ”œโ”€ ๐Ÿš€ Marshall Space Flight Center โ€” 1,000+ โ”œโ”€ ๐Ÿ—๏ธ Kennedy Space Center โ€” 840+ โ”œโ”€ โœˆ๏ธ Armstrong Flight Research โ€” 840+ โ”œโ”€ ๐Ÿ›๏ธ NASA HQ (Washington DC) โ€” 570+ โ”œโ”€ ๐Ÿ’ป NASA Supercomputing Division โ€” 250+ โ””โ”€ ๐Ÿ”ฅ Stennis Space Center โ€” 150+ ๐Ÿ—๏ธ Subdomain analysis reveals: โ”œโ”€ ๐Ÿ“ง Hundreds of mail server configurations โ”œโ”€ ๐Ÿ”ง 1,000+ development & testing environments โ”œโ”€ ๐Ÿ“ก 100+ API endpoints โ”œโ”€ ๐Ÿ“– Documentation & wiki platforms โ””โ”€ ๐Ÿ“‹ Admin & monitoring infrastructure โš ๏ธWhy this matters: Email patterns reveal organizational structure, team sizes, naming conventions, and internal project names โ€” all without accessing a single system. For security teams: if an attacker can map your entire organization from public sources, so should you. All data sourced from publicly indexed breach databases. ๐Ÿ”— intelligencesecurity.io/en/search ๐Ÿค– t.me/intelligenceseโ€ฆ #OSINT #CyberSecurity #InfoSec #NASA
Intelligence Security X tweet mediaIntelligence Security X tweet media
English
0
13
45
4.2K
Intelligence Security X retweeted
Clandestine
Clandestine@akaclandestineยท
GitHub - suuhm/CVE-2026-21509-handler: PowerShell script to check, apply, and test the Kill-Bit protection for the CVE-2026-21509 Microsoft Office zero-day vulnerability affecting Office 2016/2019/LTSC. github.com/suuhm/CVE-2026โ€ฆ
English
2
17
50
3.6K
Intelligence Security X
Intelligence Security X@IntelSecXยท
๐Ÿ” How Bug Bounty Researchers Use Stealer Intelligence T-Mobile has been breached 9 times since 2018. Before touching a single endpoint, we queried publicly indexed breach data through our platform. One query returned: โ”œโ”€ ๐Ÿ—๏ธ Internal engineering environments ] โ”œโ”€ ๐Ÿ” SSO & authentication portals โ”œโ”€ ๐Ÿ“‹ Project management systems โ”œโ”€ ๐Ÿ“ฆ Source code platforms โ”œโ”€ ๐ŸŒ VPN access points โ”œโ”€ ๐Ÿช Post-auth session data โ””โ”€ ๐Ÿ“ง Thousands of corporate emails across 6 subsidiary brands This is how modern recon works in bug bounty: You don't scan. You don't bruteforce. You search what's already been indexed from infected machines. Stealer logs show you what employees accessed โ€” internal tools, admin panels, staging environments โ€” all visible before writing a single exploit. No hacking. Just intelligence. ๐Ÿ”— intelligencesecurity.io/en/search ๐Ÿค– t.me/intelligenceseโ€ฆ #OSINT #BugBounty #InfoSec
Intelligence Security X tweet mediaIntelligence Security X tweet media
English
0
5
24
3K
Intelligence Security X
Intelligence Security X@IntelSecXยท
๐Ÿ” DOMAIN RECON: onlyfans.com โ€” 208 subdomains mapped with a single query OnlyFans processes billions in creator payments annually. We ran Domain Recon through our platform and verified each subdomain. ๐Ÿ“Š Results: โ”œโ”€ ๐Ÿ“ก 208 subdomains discovered โ”œโ”€ ๐ŸŒ 18 resolving to live IPs โ””โ”€ โ˜๏ธ Infrastructure across 3 cloud providers ๐Ÿ”Ž Key findings by category: ๐Ÿ” Authentication & Identity: โ”œโ”€ oauth.onlyfans.com โ†’ Auth endpoints โ”œโ”€ id.onlyfans.com โ†’ KYC system (Azure) โ””โ”€ autodiscover.onlyfans.com โ†’ Exchange services โš™๏ธ Internal Tools: โ”œโ”€ bug2.onlyfans.com โ†’ Error tracking (Sentry) โ”œโ”€ webhook-beta.onlyfans.com โ†’ Beta webhooks โ””โ”€ Multiple staging/test environments detected ๐Ÿ“บ Streaming Infrastructure: โ”œโ”€ 12+ live streaming servers identified โ”œโ”€ Multiple stream processors and converters โ”œโ”€ Geo-distributed nodes (US, UK, DE, SG, CA) โ””โ”€ Release canary pipeline detected ๐Ÿ›’ Third-Party Integrations: โ”œโ”€ store.onlyfans.com โ†’ Shopify โ”œโ”€ status.onlyfans.com โ†’ StatusPage โ””โ”€ KYC provider integration visible ๐Ÿ’ก What this reveals for security teams: โ”œโ”€ Full tech stack identification โ”œโ”€ Cloud provider distribution mapped โ”œโ”€ Development/staging environments discoverable โ”œโ”€ Third-party dependencies exposed โ””โ”€ Geographic infrastructure layout visible One query. No scanning. Just public intelligence. ๐Ÿ”— intelligencesecurity.io/en/search ๐Ÿค– t.me/intelligenceseโ€ฆ #OSINT #CyberSecurity #InfoSec
Intelligence Security X tweet mediaIntelligence Security X tweet media
English
1
4
19
2.8K
Intelligence Security X retweeted
motuariki
motuariki@motuariki_ยท
Odyssey Stealer (macOS) malware being spread through Kimi chatbot AI artefact: kimi[.]com/share/19c6bb6c-c172-82d9-8000-0000b6baa613 Base64 encoded curl to: kayeart[.]com
motuariki tweet mediamotuariki tweet media
English
1
8
99
5.9K
Intelligence Security X retweeted
Dark Web Informer
Dark Web Informer@DarkWebInformerยท
โ€ผ๏ธ๐Ÿ‡บ๐Ÿ‡ธ A threat actor is allegedly selling scraped Polymarket user data, including 93K username lines with wallet IDs, usernames, X/Twitter accounts, deposit volumes, PnL, and exchange funding sources. The full 180K scrape is also available. The dataset is being offered to a single buyer for $4,999.
Dark Web Informer tweet media
English
7
9
61
10.1K
Intelligence Security X
Intelligence Security X@IntelSecXยท
๐Ÿ” EMAIL RECON: uber.com โ€” 10,000+ Corporate Emails From One Query In 2022, Uber was breached by a teenager using stolen contractor credentials + MFA fatigue. We ran a single Email Recon query on uber.com through our platform. ๐Ÿ“Š Results: 10,000+ corporate emails indexed ๐Ÿ“‚ What Email Recon reveals: โ”œโ”€ ๐Ÿ‘ฅ 7,227 employee emails (firstname.lastname pattern) โ”œโ”€ ๐Ÿ”— 2,773 external contractor emails (@ext.uber.com) โ”œโ”€ ๐Ÿ“‹ 12+ distribution/group lists โ”œโ”€ ๐Ÿงช 20+ test accounts โ””โ”€ ๐ŸŒ Regional emails from 8+ countries ๐Ÿข Organizational structure visible: โ”œโ”€ ๐Ÿ” Security teams โ”œโ”€ โš–๏ธ Legal & Compliance โ”œโ”€ ๐Ÿ’ฐ Finance & Billing โ”œโ”€ ๐Ÿ” Uber Eats operations โ”œโ”€ ๐Ÿ›ด Jump/mobility teams โ””โ”€ ๐ŸŒŽ Regional support (LATAM, Europe, Asia) โš ๏ธ Why this matters: The 2022 breach started with ONE contractor credential. Today, 2,773 contractor emails are publicly indexed. Email patterns reveal: โ”œโ”€ Naming conventions (predictable) โ”œโ”€ Team structures โ”œโ”€ Third-party partnerships โ”œโ”€ Internal project names โ””โ”€ Geographic operations ๐Ÿ›ก Recommendations for organizations: โ”œโ”€ Monitor your domain in breach intelligence databases โ”œโ”€ Audit which emails are publicly indexed โ”œโ”€ Implement stricter email exposure policies โ”œโ”€ Train contractors on security awareness โ””โ”€ Review distribution list visibility 10,000+ emails. Team structures. Naming patterns. All from one query. The data exists. The question is: do you know your exposure? ๐Ÿ”— intelligencesecurity.io ๐Ÿค– t.me/intelligenceseโ€ฆ #OSINT #CyberSecurity #InfoSec
Intelligence Security X tweet mediaIntelligence Security X tweet media
English
0
5
20
2.5K
Intelligence Security X
Intelligence Security X@IntelSecXยท
๐Ÿ” DOMAIN RECON: stake.com โ€” Mapping the External Footprint of the World's Largest Crypto Casino $1B+ in annual revenue. Drake as ambassador. Lost $41M in 2023 breach (attributed to Lazarus Group). We ran Domain Recon through our platform and verified every subdomain. ๐Ÿ“ก 33 subdomains discovered. Key findings: ๐ŸŒ stake.com โ†’ 403 (Cloudflare protection) โš™๏ธ api.stake.com โ†’ 404 (Node.js backend) ๐Ÿ” oauth.stake.com โ†’ 404 (OAuth endpoint) ๐Ÿ›’ shop.stake.com โ†’ 301 (Shopify redirect) โ“ help.stake.com โ†’ 302 (Intercom helpdesk) ๐ŸŽฎ evolution.stake.com โ†’ 404 (Gaming integration) ๐Ÿ“ฐ news.stake.com โ†’ 301 (Blog redirect) ๐Ÿ— beta/old/play.stake.com โ†’ 404 (Legacy endpoints) ๐Ÿ”Ž What Domain Recon reveals: โ”œโ”€ ๐Ÿ›  Tech stack identification (Node.js, Shopify, Intercom) โ”œโ”€ ๐Ÿ” Authentication endpoints mapped โ”œโ”€ ๐ŸŒ Third-party integrations visible via CSP headers โ”œโ”€ ๐Ÿ“ Wildcard DNS configuration detected โ””โ”€ ๐Ÿ— Infrastructure patterns across subdomains ๐Ÿ’ก Why this matters for security teams: โ”œโ”€ Understand your organization's public exposure โ”œโ”€ Identify forgotten or legacy subdomains โ”œโ”€ Map third-party dependencies โ”œโ”€ Detect misconfigurations before others do โ””โ”€ Baseline for continuous monitoring All from a single Domain Recon query. No scanning. No intrusion. Just public intelligence. ๐Ÿ”— intelligencesecurity.io/search ๐Ÿค– t.me/intelligenceseโ€ฆ #OSINT #CyberSecurity #InfoSec
Intelligence Security X tweet mediaIntelligence Security X tweet media
English
2
3
25
2.2K
Intelligence Security X
Intelligence Security X@IntelSecXยท
๐Ÿ” CASE STUDY: jeff@amazon.com โ€” What 796 Records Reveal About a Billionaire's Email We searched Jeff Bezos' known corporate email jeff@amazon.com on Intelligence Security. ๐Ÿ“Š RESULTS: 796 records found ๐Ÿ“‚ Breakdown: โ”œโ”€ ๐Ÿ”’ leaks.restricted (312) โ†’ Credential dumps with jeff@amazon.com โ”œโ”€ ๐Ÿ“ leaks.logs (207) โ†’ Compromised systems referencing this address โ”œโ”€ ๐ŸŒ web.public (233) โ†’ Cached references and mentions โ”œโ”€ ๐Ÿง… darknet.tor (24) โ†’ Tor marketplace & forum mentions โ””โ”€ ๐Ÿ“ฐ usenet/pastes/docs (20+) ๐ŸŒ 207 Leak Logs from 25+ Countries: โ”œโ”€ ๐Ÿ‡ณ๐Ÿ‡ฌ Nigeria: 25 โ”œโ”€ ๐Ÿ‡บ๐Ÿ‡ธ USA: 21 โ”œโ”€ ๐Ÿ‡ฎ๐Ÿ‡ณ India: 10 โ”œโ”€ ๐Ÿ‡น๐Ÿ‡ท Turkey: 10 โ”œโ”€ ๐Ÿ‡ฟ๐Ÿ‡ฆ South Africa: 8 โ”œโ”€ ๐Ÿ‡ง๐Ÿ‡ฉ Bangladesh: 8 โ”œโ”€ ๐Ÿ‡จ๐Ÿ‡ฆ Canada: 7 โ”œโ”€ ๐Ÿ‡ซ๐Ÿ‡ท France: 5 โ”œโ”€ ๐Ÿ‡ง๐Ÿ‡ท Brazil: 5 โ”œโ”€ ๐Ÿ‡ต๐Ÿ‡ฐ Pakistan: 4 โ”œโ”€ ๐Ÿ‡ฒ๐Ÿ‡ฆ Morocco: 3 โ”œโ”€ ๐Ÿ‡ป๐Ÿ‡ณ Vietnam: 3 โ”œโ”€ ๐Ÿ‡ฌ๐Ÿ‡ญ Ghana: 2 โ”œโ”€ ๐Ÿ‡จ๐Ÿ‡ณ China: 2 โ””โ”€ 76 unidentified โš ๏ธ Why are 207 compromised systems linked to jeff@amazon.com? These aren't breaches against Jeff Bezos personally. They're systems where users: โ”œโ”€ Typed jeff@amazon.com in a form โ”œโ”€ Had it saved in browser autofill โ”œโ”€ Listed it in email databases for outreach โ”œโ”€ Stored it in contact lists or CRM exports โ””โ”€ Used it as a "test email" in configurations ๐Ÿ“‚ The restricted leaks tell a bigger story: 312 credential dumps containing this email: โ”œโ”€ Large compilation files (Nov-Dec 2025) โ”œโ”€ Multi-million record combo lists โ”œโ”€ Private channel distributions โ””โ”€ Actively traded in 2025-2026 ๐Ÿง… 24 Darknet Tor references: โ”œโ”€ Tor mirrors of news articles about Amazon โ”œโ”€ Forum discussions about Amazon security โ””โ”€ Underground marketplace mentions ๐ŸŽฏ The lesson: You don't need to be "breached" for your email to appear in 796 records. Every service you signed up for, every form you filled, every database that was compromised โ€” it all accumulates. Even the world's richest man has 207 leak logs linked to his email. How many do YOU have? ๐Ÿ”— intelligencesecurity.io/search ๐Ÿค– t.me/intelligenceseโ€ฆ #OSINT #CyberSecurity #InfoSec
Intelligence Security X tweet mediaIntelligence Security X tweet media
English
0
2
21
2.4K
Intelligence Security X
Intelligence Security X@IntelSecXยท
๐Ÿ“ŠB2B Data Brokers - The Industry Trading Your Information Did you know companies exist solely to collect and sell professional data? We searched apollo.io on Intelligence Security: โ†’ 6,940 results found ๐Ÿ“‚ What's exposed: โ”œโ”€ ๐Ÿ”‘ Passwords: 403 files โ”œโ”€ ๐Ÿช Cookies: 537 files โ”œโ”€ โŒจ๏ธ Autofills: 114 files โ”œโ”€ ๐Ÿ“ Browser data: 990 files โ”œโ”€ ๐Ÿ“‹ Combo lists: 2,164 files โ””โ”€ ๐Ÿ“„ Other: 2,696 files ๐Ÿข B2B platforms commonly found in leaks: โ”œโ”€ Apollo.io โ†’ 200M+ professional contacts โ”œโ”€ Clearbit โ†’ Business data enrichment โ”œโ”€ Exactis โ†’ 340M records leaked (2018) โ””โ”€ People Data Labs โ†’ 1.2B records exposed ๐Ÿ“‹ What these databases contain: โ”œโ”€ Corporate & personal emails โ”œโ”€ Direct phone numbers โ”œโ”€ Job titles & departments โ”œโ”€ Employment history โ”œโ”€ Linked social profiles โ”œโ”€ Company revenue estimates โ””โ”€ Technology stack information โš ๏ธ The risk: When data brokers get breached, professional intel becomes accessible beyond sales teams: โ”œโ”€ Detailed org charts exposed โ”œโ”€ Executive contact info circulating โ”œโ”€ Corporate structures mapped โ””โ”€ Years of enriched data in one place ๐Ÿ›ก๏ธ How to protect your organization: โ”œโ”€ Search your corporate domain regularly โ”œโ”€ Request data removal from brokers (GDPR/CCPA) โ”œโ”€ Monitor executive exposure โ”œโ”€ Train employees on data sharing risks โ””โ”€ Implement email obfuscation policies Your professional data is a product. Know where it's circulating. ๐Ÿ”— intelligencesecurity.io/search ๐Ÿค– t.me/intelligenceseโ€ฆ #OSINT #InfoSec #B2BData
Intelligence Security X tweet mediaIntelligence Security X tweet media
English
1
1
5
1.1K
Intelligence Security X
Intelligence Security X@IntelSecXยท
๐Ÿ” The Epstein Flight Logs: Publicly Unsealed Records In January 2024, 950+ court documents were unsealed, including flight manifests from Epstein's private aircraft. We indexed these public records in our database. ๐Ÿ“Š Top passengers by documented flight count: โ”œโ”€ Ghislaine Maxwell: 520 flights โ”œโ”€ Bill Clinton: 25 flights โ”œโ”€ Alan Dershowitz: 12 flights โ”œโ”€ Kevin Spacey: 11 flights โ”œโ”€ Chris Tucker: 11 flights โ”œโ”€ Naomi Campbell: 5 flights โ”œโ”€ Prince Andrew: 1 flight โ””โ”€ Donald Trump: 1 flight ๐Ÿ“‚ What's indexed: โ”œโ”€ Flight_Logs/ โ†’ Passenger manifests โ”œโ”€ Names/ โ†’ Cross-referenced individuals โ”œโ”€ Jan-03-2024-Documents/ โ†’ Court filings โ”œโ”€ Names-vs-Docs/ โ†’ Document correlations โ””โ”€ 721 files total from darknet.i2p archives ๐Ÿ’ก Why this matters: Public court documents often end up fragmented across multiple sources. Intelligence Search consolidates them into a single searchable database. Flight logs. Court filings. Name correlations. Seconds to search. โš ๏ธ Note: Flight records indicate travel only, not involvement in any crimes. All data from publicly unsealed court documents. ๐Ÿ”— intelligencesecurity.io ๐Ÿค– t.me/intelligenceseโ€ฆ #OSINT #Epstein #PublicRecords #CourtDocuments #Investigation ๐Ÿ” The Epstein Flight Logs: Publicly Unsealed Records In January 2024, 950+ court documents were unsealed, including flight manifests from Epstein's private aircraft. We indexed these public records in our database. ๐Ÿ“Š Top passengers by documented flight count: โ”œโ”€ Ghislaine Maxwell: 520 flights โ”œโ”€ Bill Clinton: 25 flights โ”œโ”€ Alan Dershowitz: 12 flights โ”œโ”€ Kevin Spacey: 11 flights โ”œโ”€ Chris Tucker: 11 flights โ”œโ”€ Naomi Campbell: 5 flights โ”œโ”€ Prince Andrew: 1 flight โ””โ”€ Donald Trump: 1 flight ๐Ÿ“‚ What's indexed: โ”œโ”€ Flight_Logs/ โ†’ Passenger manifests โ”œโ”€ Names/ โ†’ Cross-referenced individuals โ”œโ”€ Jan-03-2024-Documents/ โ†’ Court filings โ”œโ”€ Names-vs-Docs/ โ†’ Document correlations โ””โ”€ 721 files total from darknet.i2p archives ๐Ÿ’ก Why this matters: Public court documents often end up fragmented across multiple sources. Intelligence Search consolidates them into a single searchable database. Flight logs. Court filings. Name correlations. Seconds to search. โš ๏ธ Note: Flight records indicate travel only, not involvement in any crimes. All data from publicly unsealed court documents. ๐Ÿ”— intelligencesecurity.io/search ๐Ÿค– t.me/intelligenceseโ€ฆ #OSINT #Epstein #Investigation
Intelligence Security X tweet mediaIntelligence Security X tweet media
English
0
8
18
2K
Intelligence Security X retweeted
Cyber Detective๐Ÿ’™๐Ÿ’›
Cyber Detective๐Ÿ’™๐Ÿ’›@cyb_detectiveยท
Intelligence Security Discover If your data has been leaked. 1 email/domain search day/free. Top Leak URLs Subdomains Related Domains Sample Credentials Risk Factors intelligencesecurity.io #osint
Cyber Detective๐Ÿ’™๐Ÿ’› tweet media
English
2
24
144
9.6K
Intelligence Security X
Intelligence Security X@IntelSecXยท
๐Ÿ”’ Why Cookies Can Be More Critical Than Passwords We found in leak logs active sessions from enterprise services: โ˜๏ธ AWS Console โ”œโ”€ JWT tokens with session identifiers โ”œโ”€ Console session cookies โ””โ”€ Allow access without re-authentication ๐Ÿ’ฌ Slack โ”œโ”€ Corporate workspaces exposed โ””โ”€ Session cookies from multiple organizations ๐Ÿ” Okta (SSO Provider) โ”œโ”€ Employee session tokens โ””โ”€ Access to federated portals ๐Ÿ“Š Salesforce โ”œโ”€ CRM instances exposed โ””โ”€ Active session cookies ๐Ÿ”ท Microsoft 365 โ”œโ”€ login.microsoftonline.com cookies โ””โ”€ Persistent session tokens โš ๏ธ Why Cookies Are Critical: With a valid session cookie: โ”œโ”€ โœ— No password required โ”œโ”€ โœ— MFA not triggered (already validated) โ”œโ”€ โœ— Session already authenticated โ””โ”€ โœ— Valid until expiration or logout ๐Ÿ›ก๏ธ How to Protect Yourself: โ”œโ”€ Log out of sensitive services when done โ”œโ”€ Use "Sign out all devices" periodically โ”œโ”€ Enable login alerts โ”œโ”€ Review active sessions regularly โ””โ”€ Clear browser cookies periodically ๐Ÿข For Organizations: โ”œโ”€ Implement session timeout policies โ”œโ”€ Monitor access from unusual locations โ””โ”€ Force re-authentication for sensitive actions One exposed cookie = full account access. ๐ŸŽ Limited time: Up to 17% OFF on all plans โ€” ends in 3 days intelligencesecurity.io/subscriptions/โ€ฆ Check your exposure: ๐Ÿ”— intelligencesecurity.io/search ๐Ÿค– t.me/intelligenceseโ€ฆ #SessionSecurity #CyberSecurity #InfoSec #SecurityEducation #CloudSecurity
Intelligence Security X tweet mediaIntelligence Security X tweet media
English
0
2
13
1.1K
Intelligence Security X retweeted
Fusion Intelligence Center @ StealthMole
Fusion Intelligence Center @ StealthMole@stealthmole_intยท
Weekly OSINT: February 2026 Vulnerabilities & Threat Activity In the first week of February 2026, security researchers and national CERTs disclosed over 40 new product vulnerabilities across consumer and enterprise platforms, while multiple threat actors ramped up active exploitation and phishing campaigns. CISA updated its Known Exploited Vulnerabilities catalog, and inspections revealed supply-chain compromises, advanced ransomware evasion modules, and new RAT deployments. This report summarizes key disclosures, exploited flaws, emerging campaigns, and associated indicators.
Fusion Intelligence Center @ StealthMole tweet media
English
1
4
24
2.3K
Intelligence Security X retweeted
Co11ateral
Co11ateral@co11ateralยท
CVE-2026-20841 - Windows Notepad App Remote Code Execution Vulnerability For nearly thirty years, notepad.exe was treated as a simple utility. It functioned as a basic Win32 text editor designed solely to display text. A CVSS score of 8.8 for an application intended only for viewing data is a departure from the principle of least privilege. The vulnerability allows an attacker to trick a user into clicking a malicious link embedded in a Markdown file opened in Notepad. Doing so can trigger untrusted protocols, leading to the download and execution of remote content. #dfir #blueteam #pentest #redteam #cve #notepad
Co11ateral tweet media
English
27
224
1.1K
145.8K
Intelligence Security X
Intelligence Security X@IntelSecXยท
๐Ÿ”‘ API Keys in Leak Logs - The Hidden Exposure Your API keys might be in exposed browser data right now. When a system gets compromised, malware captures: โ”œโ”€ Browser history (URLs with keys in query params) โ”œโ”€ AutoFill data (saved API endpoints) โ”œโ”€ Cookies (session tokens) โ””โ”€ Downloaded files (configs, .env files) We searched for major API endpoints in leak logs: ๐Ÿ“Š Live Data Search Results: ๐Ÿ”ต api.stripe.com โ”œโ”€ Found in: AutoFill data from multiple browsers โ””โ”€ Context: Payment API endpoints saved in forms ๐Ÿ™ api.github.com โ”œโ”€ Found in: Browser cookies โ””โ”€ Context: Session tokens + user fingerprints ๐Ÿ“ฑ api.telegram.org โ”œโ”€ Found in: Chrome/Edge AutoFill data โ””โ”€ Context: Bot API endpoints saved in forms ๐Ÿ“ž api.twilio.com โ”œโ”€ Found in: Downloaded source files โ””โ”€ Context: Code with API configuration โ˜๏ธ amazonaws.com โ”œโ”€ Found in: Database dumps โ””โ”€ Context: AWS SES email configurations ๐Ÿ“‚ Where API Keys Hide in Leak Logs: โ”œโ”€ ๐ŸŒ Browser History โ”‚ โ””โ”€ api.service.com/?key=sk_live_xโ€ฆ โ”‚ โ”œโ”€ โŒจ๏ธ AutoFill Data โ”‚ โ””โ”€ Saved API endpoints from dev tools โ”‚ โ”œโ”€ ๐Ÿช Cookies โ”‚ โ””โ”€ Session tokens for API dashboards โ”‚ โ”œโ”€ ๐Ÿ“ FileGrabber โ”‚ โ”œโ”€ .env files with API_KEY=xxx โ”‚ โ”œโ”€ config.json with credentials โ”‚ โ””โ”€ Source code with hardcoded keys โ”‚ โ””โ”€ ๐Ÿ“ฅ Downloads โ””โ”€ API documentation, SDK configs โš ๏ธ Why This Is Critical: Exposed API keys can lead to: โ”œโ”€ Unauthorized access to paid services โ”œโ”€ Data exposure from connected systems โ”œโ”€ Financial impact from service abuse โ”œโ”€ Reputation damage from compromised integrations โ””โ”€ Compliance violations (PCI, SOC2) ๐Ÿ›ก๏ธ How to Protect Your Keys: โ”œโ”€ Never hardcode keys in source code โ”œโ”€ Use environment variables properly โ”œโ”€ Rotate keys regularly โ”œโ”€ Monitor API usage for anomalies โ”œโ”€ Use key vaults (AWS Secrets Manager, HashiCorp Vault) โ””โ”€ Implement IP allowlists where possible ๐Ÿ”Ž How to Check Your Exposure: Search for: โ”œโ”€ Your company domain (api.yourcompany.com) โ”œโ”€ Service endpoints you use โ””โ”€ Email domains associated with APIs Your keys are only as secure as every device that's touched them. ๐Ÿ”— SEARCH intelligencesecurity.io/search ๐Ÿค– t.me/intelligenceseโ€ฆ #CyberSecurity #DevSecOps #InfoSec
Intelligence Security X tweet mediaIntelligence Security X tweet media
English
1
6
28
2.2K