Предраг Цујановић � P𝗿𝐞ⅆr𝚊ⓖ Ⅽ𝗎𝐉an𝚘𝕧ⓘć

13.6K posts

Предраг Цујановић � P𝗿𝐞ⅆr𝚊ⓖ Ⅽ𝗎𝐉an𝚘𝕧ⓘć banner
Предраг Цујановић � P𝗿𝐞ⅆr𝚊ⓖ Ⅽ𝗎𝐉an𝚘𝕧ⓘć

Предраг Цујановић � P𝗿𝐞ⅆr𝚊ⓖ Ⅽ𝗎𝐉an𝚘𝕧ⓘć

@cujanovic

Follows you Life is like spaghetti It's hard until you make it No stresso, no stresso It's gonna be espresso

http://𝟭²⑦。𝟘.𝟬。1 Se unió Şubat 2010
101 Siguiendo2.3K Seguidores
Предраг Цујановић � P𝗿𝐞ⅆr𝚊ⓖ Ⅽ𝗎𝐉an𝚘𝕧ⓘć retuiteado
sin99xx
sin99xx@sin99xx·
Everyone is looking for XSS in PDF generators and SSR bots, but they are missing the actual architectural nightmare: Headless Context Bleed (HCB). Opening a new "incognito" tab in Puppeteer doesn't isolate everything. A thread on how shared state in backend browsers is the next massive attack surface. 🧵👇
English
6
20
132
7.5K
Предраг Цујановић � P𝗿𝐞ⅆr𝚊ⓖ Ⅽ𝗎𝐉an𝚘𝕧ⓘć retuiteado
ellen livia ᯅ 🇺🇸🇮🇩
This week in security: - LiteLLM, backdoored release exfiltrating secrets - Axios, supply chain malware via dependency - Railway, CDN caching leaked user data - OpenAI Codex, command injection via GitHub branch names - Mercor 1TB data leak - Delve, data leak + compliance risk infra is the attack surface now
English
83
513
3.2K
183.3K
Предраг Цујановић � P𝗿𝐞ⅆr𝚊ⓖ Ⅽ𝗎𝐉an𝚘𝕧ⓘć retuiteado
Feross
Feross@feross·
AI is playing a role in two ways: 1.Far more code is being written (1.5-2x by some estimates) and far more people are vibe coding without reviewing what their agents install. Every unreviewed dependency is an attack surface. 2.Attackers have woken up. We saw the first NPM worm last year. The recent TeamPCP attacks (against Trivy and LiteLLM) have stolen a massive number of credentials that most teams haven’t rotated yet. We’ll be dealing with the long tail of these compromises for 6-12 months. Not that developers were good at reviewing dependencies before. But AI has mass-produced the exact behavior attackers exploit.
Amjad Masad@amasad

@feross Is there a reason why supply chain attacks are seemingly on the rise? Is AI playing a role?

English
28
38
320
51K
Предраг Цујановић � P𝗿𝐞ⅆr𝚊ⓖ Ⅽ𝗎𝐉an𝚘𝕧ⓘć retuiteado
Rami McCarthy
Rami McCarthy@ramimacisabird·
npm security on the case, both malicious axios versions have been unpublished!
Rami McCarthy tweet media
English
15
228
1.3K
99.2K
Предраг Цујановић � P𝗿𝐞ⅆr𝚊ⓖ Ⅽ𝗎𝐉an𝚘𝕧ⓘć retuiteado
Wise
Wise@trikcode·
the generation that refused to accept cookies. is now giving AI access to their desktops, files, and bank accounts.
English
339
1.9K
14.8K
301.5K
Предраг Цујановић � P𝗿𝐞ⅆr𝚊ⓖ Ⅽ𝗎𝐉an𝚘𝕧ⓘć retuiteado
shubs
shubs@infosec_au·
Our research team at @SLCyberSec reverse engineered the Magento PolyShell pre-auth RCE bug, we wrote up our findings here: slcyber.io/research-cente… - this is an actively exploited vulnerability in the wild, thanks for @sansecio for flagging this issue first!
shubs tweet media
English
4
30
111
7.4K
Предраг Цујановић � P𝗿𝐞ⅆr𝚊ⓖ Ⅽ𝗎𝐉an𝚘𝕧ⓘć retuiteado
solst/ICE of Astarte
solst/ICE of Astarte@IceSolst·
- XZ utils backdoor: found by guy debugging 200ms latency - LiteLLM hack: found by guy debugging oom issue These could have been the most impactful compromises ever. Forget security vendors, weaponize your engineers’ autism.
English
56
479
4.3K
148K
Предраг Цујановић � P𝗿𝐞ⅆr𝚊ⓖ Ⅽ𝗎𝐉an𝚘𝕧ⓘć retuiteado
YS
YS@YShahinzadeh·
I published one of the techniques that I've been using against OAuth providers, honetly, it's led me to discover many flaws, and recently I used it to find a 1-click ATO on one of the most widely visited websites,I hope you find it useful :-) blog.voorivex.team/story-of-abusi…
YS tweet media
English
19
117
637
25.8K
Предраг Цујановић � P𝗿𝐞ⅆr𝚊ⓖ Ⅽ𝗎𝐉an𝚘𝕧ⓘć retuiteado
Priyanka Vergadia
Priyanka Vergadia@pvergadia·
🤯BREAKING: Alibaba just proved that AI Coding isn't taking your job, it's just writing the legacy code that will keep you employed fixing it for the next decade. 🤣 Passing a coding test once is easy. Maintaining that code for 8 months without it exploding? Apparently, it’s nearly impossible for AI. Alibaba tested 18 AI agents on 100 real codebases over 233-day cycles. They didn't just look for "quick fixes"—they looked for long-term survival. The results were a bloodbath: 75% of models broke previously working code during maintenance. Only Claude Opus 4.5/4.6 maintained a >50% zero-regression rate. Every other model accumulated technical debt that compounded until the codebase collapsed. We’ve been using "snapshot" benchmarks like HumanEval that only ask "Does it work right now?" The new SWE-CI benchmark asks: "Does it still work after 8 months of evolution?" Most AI agents are "Quick-Fix Artists." They write brittle code that passes tests today but becomes a maintenance nightmare tomorrow. They aren't building software; they're building a house of cards. The narrative just got honest: Most models can write code. Almost none can maintain it.
Priyanka Vergadia tweet media
English
489
1.9K
9.4K
1.7M
Предраг Цујановић � P𝗿𝐞ⅆr𝚊ⓖ Ⅽ𝗎𝐉an𝚘𝕧ⓘć retuiteado
Abhishek Yadav
Abhishek Yadav@yabhishekhd·
Bro Google is doing something wild. Starting September 2026 every Android developer has to give Google their government ID. Legal name. Home address. Phone number. And pay a fee. Even if they never use the Play Store. Even if they just put their app on their own website. So basically if you build any app for Android — Google wants to know exactly who you are. No exceptions. Brave, EFF, Tor Project and 40+ other organizations said no and signed an open letter against it. And think about who this really hurts. The people building privacy apps, VPNs, encrypted messaging, tools for journalists and activists. People who specifically chose to stay away from Google. Now Google wants their home address. Google is literally building a database of every person who writes Android software. Run by Google. Controlled by Google. Android was supposed to be the open system. The alternative to Apple locking everything down. Slowly it's starting to look the same. Is Android still actually open? 👇
Abhishek Yadav tweet media
English
344
2.1K
8.2K
508.6K
Предраг Цујановић � P𝗿𝐞ⅆr𝚊ⓖ Ⅽ𝗎𝐉an𝚘𝕧ⓘć retuiteado
John Scott-Railton
John Scott-Railton@jsrailton·
BREAKING: powerful iPhone hacking tools used by Chinese criminals originated from US defense giant L3 Harris. The $LHX zero-click exploits went to Russian spies too. Unbelievable harm to our collective security. Scoop by @lorenzofb, here's why this matters 1/
John Scott-Railton tweet mediaJohn Scott-Railton tweet media
English
34
879
2.4K
268.2K
Предраг Цујановић � P𝗿𝐞ⅆr𝚊ⓖ Ⅽ𝗎𝐉an𝚘𝕧ⓘć retuiteado
thaddeus e. grugq
thaddeus e. grugq@thegrugq·
The Russians were using this same technique against the same targets (Signal and WhatsApps) in Ukraine just last year. cloud.google.com/blog/topics/th… Looks like Dan’s prediction was correct.
Dan Black@DanWBlack

"Russian state hackers are engaged in a large-scale global cyber campaign to gain access to Signal and WhatsApp accounts belonging to dignitaries, military personnel and civil servants" -- MIVD/AIVD english.aivd.nl/documents/2026…

English
3
28
135
20.3K
Предраг Цујановић � P𝗿𝐞ⅆr𝚊ⓖ Ⅽ𝗎𝐉an𝚘𝕧ⓘć retuiteado
Lukasz Olejnik
Lukasz Olejnik@lukOlejnik·
Russian GRU cyber operatives are running a large-scale, targeted operations against Signal and WhatsApp users of government officials, military personnel and civil servants. The fake support message in the advisory tells victims, in capital letters: "DON'T TELL ANYONE THE CODE, NOT EVEN SIGNAL EMPLOYEES." That literal line is in the phishing message. AND IT WORKED. Russia didn't need to break Signal. It just needed officials who trusted a a random chat message more than their own security training. Dutch intelligence services confirmed Dutch government employees were among the victims. The campaign exploits no technical vulnerabilities in either app. Instead, it uses the apps' own features against their users. Two methods. 1. A fake "Signal Security Support Chatbot" contacts the target, warns of suspicious activity and a possible data leak, then asks for the SMS verification code and Signal PIN. Hand those over and the attacker takes full ownership of the account, moves it to a number they control, and reads everything going forward. The victim can re-register using their old number and will see their local chat history intact - so they assume nothing happened. The advisory notes, with some understatement, that "this assumption could be incorrect." 2. A malicious QR code, dressed as a group invitation, silently links the attacker's device to the victim's account. The victim keeps full access and notices nothing. The attacker just reads along. What makes this operationally elegant is the irreversibility. Signal has no central management by design. This is for reasons of user privacy. There is no way to remotely deactivate a stolen account. Once gone, it is gone. GRU operatives just understood this.
Lukasz Olejnik tweet media
English
7
151
350
100.1K
Предраг Цујановић � P𝗿𝐞ⅆr𝚊ⓖ Ⅽ𝗎𝐉an𝚘𝕧ⓘć retuiteado
Christoffer Bjelke
Christoffer Bjelke@chribjel·
remember when Andres Freund basically saved the entire internet because he noticed a 200ms delay for his SSH login?
English
93
632
17.1K
1.5M
Предраг Цујановић � P𝗿𝐞ⅆr𝚊ⓖ Ⅽ𝗎𝐉an𝚘𝕧ⓘć retuiteado
Lukasz Olejnik
Lukasz Olejnik@lukOlejnik·
Google has identified an iOS exploit kit named Coruna. 5 full exploit chains, 23 vulnerabilities, documentation in native English, modular architecture. Full professionalism. It must have cost millions of dollars. Who built it? Google doesn’t say, but the evidence points to US government tools. The kit also contains components previously used in a cyber operation that Russia attributed to the NSA. Coruna traveled. First, an anonymous “company client”, then used by a Russian cyber espionage group, which hid the code on Ukrainian websites inside a visitor-counter script, delivering it only to selected users from a specific geolocation. Later a financially motivated actor “operating from China” deployed it (infecting over 42,000 devices). The malware added to the ready-made kit was lower quality than the original suggesting the tools were acquired and modified by someone else. One US government subcontractor, Peter Williams, just received a 7-year prison sentence for selling tools to Russian broker Operation Zero. The US government spent millions on a tool that now steals cryptocurrency. A good return on investment, just not for themselves. One more detail: Coruna did not attack devices with Lockdown Mode enabled.​​​​​​​​​​​​​​​​ cloud.google.com/blog/topics/th…
English
10
217
807
82.3K
Предраг Цујановић � P𝗿𝐞ⅆr𝚊ⓖ Ⅽ𝗎𝐉an𝚘𝕧ⓘć retuiteado
Mohammad Zaheri
Mohammad Zaheri@mzaherii·
After Changing CEO HackerOne look likes going to downfall. - Ban well known hackers without any reason. - Decrease bounty table. - Layoff staff. - Now, using hackers data to train their AI and sell it. Unbelievable.
HackerOne@Hacker0x01

Point-in-time pentests can’t keep up, while fully autonomous testing creates noise. The solution? HackerOne Agentic PTaaS pairs specially trained AI agents with elite human validation to deliver results based on real-world exploitability, not theory. This 50-second video shows you how it works.

English
10
15
187
12.9K
Предраг Цујановић � P𝗿𝐞ⅆr𝚊ⓖ Ⅽ𝗎𝐉an𝚘𝕧ⓘć retuiteado
Justin Gardner
Justin Gardner@Rhynorater·
Chrome auto decodes all url-encoded, non-special characters in the URL for the user. This can be annoying when you're trying to sneak a payload in that looks a little weird. You can bypass this by adding %ff anywhere in the URL.
English
5
38
387
15.9K
Предраг Цујановић � P𝗿𝐞ⅆr𝚊ⓖ Ⅽ𝗎𝐉an𝚘𝕧ⓘć retuiteado
Georgy Kucherin
Georgy Kucherin@kucher1n·
It turned out there are many more payloads used in the Notepad++ attack! To stay undetected, its masterminds were COMPLETELY changing execution chains about every month. Here are more IPs used in the attack: 45.76.155[.]202 45.32.144[.]255 Read below for many other IoCs! [1/8]
Georgy Kucherin tweet media
English
19
233
1.2K
106.4K