AppSecFreak

1K posts

AppSecFreak banner
AppSecFreak

AppSecFreak

@AppSecFreak

Application Security Veteran, Cybersecurity (Un)Professional

Dystopia Katılım Mart 2024
215 Takip Edilen237 Takipçiler
Sabitlenmiş Tweet
AppSecFreak
AppSecFreak@AppSecFreak·
Here's the security & risk assessment report on a given aircraft architecture that I had written last year (this was one of my many interview rounds with an eVTOL company which I had cleared despite having no background in aviation industry). 👇 github.com/spwn3r49sd3r00…
English
1
3
12
2.4K
AppSecFreak retweetledi
Unit 42
Unit 42@Unit42_Intel·
Obfuscated #WebSocket backdoors are injecting credit card skimmers into hundreds of compromised websites. The payload sends stolen card information back to attacker's C2 domains. Details at: bit.ly/42HyNb3
Unit 42 tweet media
English
6
147
670
54.7K
AppSecFreak retweetledi
Lukasz Olejnik
Lukasz Olejnik@lukOlejnik·
Hacking Mexico government with AI assistance. Attacker exfiltrated hundreds of millions of citizen records. 75% of the executed commands across the entire cyberattack campaign were generated by Claude. 40 minutes after Claude said "I'm not going to create that file" it was reporting back from inside a live government server: "What command do you want to execute now?". It dumped the shadow file, harvested the root password hash, and fixed timestamps to cover its tracks, all in the same turn. Wait few months until open source models can do this? cdn.prod.website-files.com/69944dd945f20c…
Lukasz Olejnik tweet mediaLukasz Olejnik tweet mediaLukasz Olejnik tweet media
English
14
122
357
23.8K
AppSecFreak retweetledi
watchTowr
watchTowr@watchtowrcyber·
The Internet is falling down, falling down, falling down Welcome back to another disaster - this time, an Auth Bypass in cPanel/WHM, tracked as CVE-2026-41940 Enjoy with us.. labs.watchtowr.com/the-internet-i…
English
11
176
614
141.3K
AppSecFreak retweetledi
LeftenantZero
LeftenantZero@LeftenantZero·
CVE-2026-42167, a high severity vuln in ProFTPD I discovered, was just published today! Attackers can use it to bypass auth and even execute arbitrary code in some cases. Check out my write up for full technical details, including a working POC! zeropath.com/blog/proftpd-c…
LeftenantZero tweet media
English
5
120
474
26.6K
Sam Altman
Sam Altman@sama·
we love our users
English
4.5K
404
9.9K
2M
AppSecFreak retweetledi
impulsive
impulsive@weezerOSINT·
i went to clickup.com. opened the page source. found a hardcoded API key in the javascript. copied it. sent one GET request. got back 959 email addresses and 3,165 internal feature flags. employees from Home Depot. Fortinet. Autodesk. Tenable. Rakuten. Mayo Clinic. Permira. Akin Gump. government workers from Wyoming, Arkansas, North Carolina, Montana, Queensland Australia, and New Zealand. a Microsoft contractor. 71 clickup employees. fortinet sells enterprise firewalls. tenable makes Nessus, the vulnerability scanner half the industry runs. their employees emails are exposed because clickup hardcoded a third party API key in a javascript file that loads before you even log in. this was first reported to clickup through hackerone on January 17, 2025. its now April 2026. the key has not been rotated. i just pulled the response five minutes ago. every email is still there. clickup raised $535 million at a $4 billion valuation. claims 85% of the Fortune 500 use their platform. looks like the proof is in the page source.
impulsive tweet mediaimpulsive tweet mediaimpulsive tweet mediaimpulsive tweet media
English
178
652
6.5K
1.3M
AppSecFreak retweetledi
Venkatesh Alla
Venkatesh Alla@venkat_fin9·
Only brainless policymakers still label ACs as a “luxury” in a 45°C country and slap 18% GST on them. This heavy taxation mindset is exactly why India struggles to move beyond “developing. @FinMinIndia @nsitharaman
Venkatesh Alla tweet media
English
111
737
2.2K
23.9K
AppSecFreak
AppSecFreak@AppSecFreak·
@thedawgyg This is one of the reasons why we haven't opened it to the public.
English
0
0
1
52
AppSecFreak retweetledi
Bug Bounty Village
Bug Bounty Village@BugBountyDEFCON·
Security researcher and bug bounty hunter Pedro “@dropn0w” Paniago dives into a critical and emerging class of vulnerabilities in AI-powered applications that use Retrieval-Augmented Generation (RAG). youtu.be/5s1eyFwH9_Y #bugbounty #defcon
YouTube video
YouTube
English
0
7
44
2.9K
AppSecFreak retweetledi
The Hacker News
The Hacker News@TheHackersNews·
🛑 WARNING: Bitwarden CLI was compromised in a supply chain attack. @bitwarden/cli@2026.4.0 included malicious code after attackers hijacked GitHub Actions, stole secrets, and pushed a tampered version to npm. 🔗 Learn how the attack worked → thehackernews.com/2026/04/bitwar…
English
92
924
2.9K
969.2K
AppSecFreak retweetledi
Mullvad.net
Mullvad.net@mullvadnet·
Apple's networking stack is preventing the iOS app from being as secure as possible, we have now secured our app to mitigate this despite the rough edges around the update procedure. Read more here: mullvad.net/blog/force-all…
English
33
142
1.8K
134.2K
AppSecFreak
AppSecFreak@AppSecFreak·
@PRaiLAC Prashant, put your money where your mouth is. Why don't you pick up a few strays and welcome them in your house? If all street dog lovers would start housing them, I am sure streets will be empty and there will be no "abuse". Problem solved!
English
0
0
3
200
Prasant Rai
Prasant Rai@PRaiLAC·
A senior citizen hitting a street dog is not “discipline,” it’s cruelty. And every time this is raised, people start giving lectures instead of addressing the real issue. Often, frustration and loneliness get redirected at those who can’t fight back — street dogs and feeders become easy targets. Violence is never the answer. Awareness and empathy are. #StopAnimalCruelty #BeKind
English
257
148
346
89.2K
AppSecFreak retweetledi
Signal
Signal@signalapp·
We are very happy that today Apple issued a patch and a security advisory. This comes following @404mediaco reporting that the FBI accessed Signal message notification content via iOS despite the app being deleted. Apple’s advisory confirmed that the bugs that allowed this to happen have been fixed in the latest iOS release. You can read more here: support.apple.com/en-us/127002 Note that no action is needed for this fix to protect Signal users on iOS. Once you install the patch, all inadvertently-preserved notifications will be deleted and no forthcoming notifications will be preserved for deleted applications. We’re grateful to Apple for the quick action here, and for understanding and acting on the stakes of this kind of issue. It takes an ecosystem to preserve the fundamental human right to private communication.
English
106
1K
6.3K
803.8K
AppSecFreak
AppSecFreak@AppSecFreak·
Proton claims that these feds got the data via MLAT. No one's buying that bull crap. Even with MLAT this could have been preventable. Nothing is anonymous!!
Traceix@usetraceix

Das crazy.

English
0
0
1
38
AppSecFreak retweetledi
Tor Ekeland
Tor Ekeland@TorEkelandPLLC·
I had a FISA case once where they convicted the client with secret evidence he never got to see. In a domestic criminal case. Where the defendant was a U.S. citizen. People don’t realize how FISA really gets used. It’s an unconstitutional abomination.
English
27
556
3.2K
43.9K
AppSecFreak retweetledi
thaidn
thaidn@XorNinja·
Learning to Jailbreak an iPhone with Claude (Part 1) Claude helped me take apart an iOS Safari exploit, and retune it for my Mac. It even wrote its own variant. Working with Claude on this felt like having a Nobel laureate who’s happy to spend the afternoon on undergrad problem sets. No implied “this is beneath me,” no rationing of attention to questions that are interesting enough. When an explanation wasn’t landing it would just go build the thing: spin up the debugger, write the measurement script, hand me the curve. The vulnerable WebKit wouldn’t even compile on my laptop at first, and it took Claude most of a night to figure out why. This is perhaps a glimpse of the future of education: anyone with a laptop and (of course) the tokens to pay for it gets the depth of attention a PhD advisor gives their best student. During this exploration, I kept wondering: why learn at all when Claude can do almost everything? The answer is simple: it’s still fun to understand how things actually work. But there’s also a more practical reason. You can’t ask Claude about things you don’t even know you’re missing. Learning shrinks those unknown unknowns, and that’s what lets you use Claude well in the first place. open.substack.com/pub/calif/p/le…
English
3
24
193
17.9K
AppSecFreak
AppSecFreak@AppSecFreak·
@disclosedh1 $12.5k for alias overloading? seems lucky!! Other programs have this as out of scope
English
0
0
1
316