Danielle Aminov

119 posts

Danielle Aminov

Danielle Aminov

@AminovDanielle

Threat researcher @wiz_io

Katılım Şubat 2019
180 Takip Edilen1.6K Takipçiler
Sabitlenmiş Tweet
Danielle Aminov
Danielle Aminov@AminovDanielle·
We have been reverse engineering the XZ Utils backdoor and are sharing some initial findings: we've identified multiple hooking options to adapt to different environments, and a hardcoded fake public key that can appear in verbose SSH logs depending on attacker-controlled flags.
Danielle Aminov tweet mediaDanielle Aminov tweet media
English
10
275
1.8K
257.3K
Danielle Aminov retweetledi
Wiz
Wiz@wiz_io·
🎉 IT'S OFFICIAL: @wiz_io joins @Google to secure the AI era. This is a massive moment for our customers and our team. Thank you to every customer, partner, and Wizard who made this moment possible 💙 We can't wait to share what's next. wiz.io/blog/google-cl…
English
32
68
593
340.2K
Danielle Aminov retweetledi
sapir federovsky
sapir federovsky@sapirxfed·
@shahardorf & I found a phishing campaign abusing oauth applications in Entra in more than 50 organizations! And i promise you that in this blog we explain how you can do it too! And provide all the IOCs 🤭 It's one of these blogs i would enjoy reading! #tldr-0" target="_blank" rel="nofollow noopener">wiz.io/blog/detecting…
English
8
49
182
21.4K
Danielle Aminov
Danielle Aminov@AminovDanielle·
I had the pleasure of speaking at @DistrictCon 🪩 in Washington, DC last weekend. It was my second time speaking at the conference - this time about another common misconfiguration in the cloud that should make you think twice. Power outage last year, snowstorm this year ❄️ once again, the hacker community showed up strong. What a community! great energy and brilliant people 🙌
Danielle Aminov tweet mediaDanielle Aminov tweet mediaDanielle Aminov tweet mediaDanielle Aminov tweet media
English
2
2
27
1.5K
Danielle Aminov retweetledi
Nagli
Nagli@galnagli·
Introducing my Bug Bounty Masterclass. 100% free. I've made $2,000,000+ finding security bugs. I spent the last year turning my methodology into a complete blueprint. 4 hours of video - foundations, reconnaissance, web proxies, hands-on challenges, and certification. Finish it in a weekend and start hacking real-world applications 🐞
English
111
338
2K
245.5K
Danielle Aminov retweetledi
Yuval Avrahami
Yuval Avrahami@yuvalavra·
We hacked the AWS JavaScript SDK, a core library powering the entire @AWScloud ecosystem - including the AWS Console itself 🤯 How did we do it? Just two missing characters was all it took. This is the story of #CodeBreach 🧵👇
Yuval Avrahami tweet media
English
161
863
7.5K
1.3M
Danielle Aminov
Danielle Aminov@AminovDanielle·
Excited to be returning to @DistrictCon for round two this month! Back on stage again, presenting: Auths Gone Wild – When authenticated means anyone 🪩 Looking forward to another epic DistrictCon and great conversations around auth gone wrong 🔓
Danielle Aminov tweet media
English
3
1
7
523
Danielle Aminov retweetledi
Amitai Cohen
Amitai Cohen@AmitaiCo·
Wiz Research has published a new simple Nuclei template for reliably detecting MongoBleed (CVE-2025-14847). We've also updated our blogpost with additional guidance on determining exploitability depending on how you're using MongoDB:
Amitai Cohen tweet mediaAmitai Cohen tweet media
English
4
43
209
15.8K
Danielle Aminov retweetledi
Amitai Cohen
Amitai Cohen@AmitaiCo·
Here's our new blogpost with a technical deepdive into exploitation we're observing in the wild of CVE-2025-55182 (aka react2shell): wiz.io/blog/nextjs-cv…
Amitai Cohen tweet media
English
3
40
93
12.6K
Danielle Aminov retweetledi
Wiz
Wiz@wiz_io·
🚨 React2Shell (CVE‑2025‑55182) in‑the‑wild exploitation & deep‑dive analysis. Critical RCE across React 19, Next.js & all RSC frameworks. Patch now. wiz.io/blog/nextjs-cv…
Wiz tweet media
English
1
20
87
7.9K
Danielle Aminov
Danielle Aminov@AminovDanielle·
With all the talk about the Next.js PoC, many people missed that the React2Shell vulnerability (CVE-2025-55182) affects the underlying RSC implementation itself. This means other popular frameworks that rely on RSC are also vulnerable. We are still analyzing the impact and ease of exploitation across additional platforms. For example, the commonly used Vite RSC plugin, when running with its default configuration, is also vulnerable with only minor modifications to the existing PoC. Patch your environments as soon as possible 🏃‍♀️
Danielle Aminov tweet media
English
6
60
371
50.8K
Danielle Aminov
Danielle Aminov@AminovDanielle·
We were analyzing the new RSC vulnerability and its impact. RSC is a React feature, but most apps use it through Next.js, which bundles RSC widely. So it will likely surface most often as Next.js CVE-2025-66478. Patch snippet below 🧐 Initial analysis: wiz.io/blog/critical-…
Danielle Aminov tweet media
English
1
23
114
26K
Danielle Aminov retweetledi
Rami McCarthy
Rami McCarthy@ramimacisabird·
🪱sharing more on sha1-hulud w/@sshaybbc * 2 packages == ~60% of infections * 400k unique secrets in truffleSecrets.jsons, only 2.5% verified, & the majority of those short lived JWTs for GitHub Actions! * 3/4 of impacted workloads were CI/CD, 1/4 were users 🔗below
Rami McCarthy tweet media
English
1
5
11
1.4K
Danielle Aminov retweetledi
Wiz
Wiz@wiz_io·
WIZ ASM IS HERE!💥 Discover, validate & prioritize all your exposures cloud, AI, SaaS & on-prem. Context-driven ASM powered by Wiz Security Graph. Eliminate exploitable risk everywhere! Ready to see Wiz ASM in action? 🥳 wiz.io/blog/introduci…
English
0
5
17
2.8K
Danielle Aminov retweetledi
Scott Piper
Scott Piper@0xdabbad00·
I put together a service dependency diagram based on what has been mentioned in today's AWS outage, along with Monday's, and one from Nov 25, 2020 with color coding based on which outage mentioned the dependency.
Scott Piper tweet media
English
8
44
179
19.2K
Danielle Aminov retweetledi
Rami McCarthy
Rami McCarthy@ramimacisabird·
Finally disclosing the critical supply chain attack I've spent the last 6 months preventing: 🧵
English
2
12
48
5K
Danielle Aminov retweetledi
Benny Isaacs
Benny Isaacs@benny_isaacs·
🔥 Curious how we exploited CVE-2025-49844 (RediShell)? From a 2-bit reset to 0-click RCE. Come see me at Hexacon 2025 - Paris, where I’ll share in-depth technical details on the exploitation. See you on Friday 👋 #Redis #Security #RediShell @hexacon_fr
Benny Isaacs tweet media
English
2
14
102
8.7K
Danielle Aminov
Danielle Aminov@AminovDanielle·
And who gets hit the most? Our analysis shows: MongoDB is still the top target PostgreSQL has surged into second place MySQL & MariaDB remain significant
Danielle Aminov tweet media
English
1
1
3
264
Danielle Aminov
Danielle Aminov@AminovDanielle·
Our recent research reveals how malware-less database ransomware actually scales ⚡️ Finding: MongoDB is the most dominant target, and a newly exposed DB can be discovered and hijacked within minutes - without dropping a single binary. 👾 (1/5)🧵
Danielle Aminov tweet media
English
1
7
19
1K