Eduardo Chavarro

21.4K posts

Eduardo Chavarro banner
Eduardo Chavarro

Eduardo Chavarro

@EChavarro

MSc Infosec, #DFIRMA, Telecommunications | DFIR Group Manager | GCIH/GRID/GCFA/CHFI/CISM/CPTE/SFCP/ITIL | #Kaspersky #GERT

Closer Katılım Ocak 2010
1.4K Takip Edilen2.3K Takipçiler
Sabitlenmiş Tweet
Eduardo Chavarro
Eduardo Chavarro@EChavarro·
You can't wait until life isn't hard anymore before you decide to be happy!!! Jane Marczewski
Eduardo Chavarro tweet media
English
0
2
2
1.3K
Eduardo Chavarro retweetledi
The Hacker News
The Hacker News@TheHackersNews·
🚨 Cybersecurity firm Trellix confirms a breach. Attackers accessed part of its source code repository; no exploitation or release impact found. Investigation ongoing with forensic experts and law enforcement. Details ➜ thehackernews.com/2026/05/trelli…
English
11
117
297
53.5K
Eduardo Chavarro retweetledi
kl_secservices
kl_secservices@kl_secservices·
Gained initial access to a company network… but what next? In this real pentest project our colleague @irabva shows how Kubernetes misconfigurations led to full cluster access and exposed S3 data. If you work with K8s, read this purpleshift.io/purple/2026-03…
English
1
3
5
448
Eduardo Chavarro retweetledi
The Hacker News
The Hacker News@TheHackersNews·
⚠️ Kaspersky found a new wiper targeting Venezuela’s energy sector. Lotus Wiper fully destroys systems—no ransom, no recovery. It uses scripts to disable defenses, then wipes drives, deletes backups, and erases files using native Windows tools. 🔗 Details → thehackernews.com/2026/04/lotus-…
The Hacker News tweet media
English
8
76
183
48.3K
Eduardo Chavarro retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
🚨 Critical FortiSandbox Vulnerabilities Allow Attackers to Execute Unauthorized Commands Source: cybersecuritynews.com/fortisandbox-v… Fortinet has disclosed two critical security vulnerabilities affecting its FortiSandbox platform, both carrying a CVSSv3 score of 9.1. The flaws, published on April 14, 2026, could allow unauthenticated remote attackers to execute arbitrary commands and bypass authentication entirely, posing a serious risk to enterprise environments relying on FortiSandbox for advanced threat detection. The first vulnerability, tracked as CVE-2026-39808, is an Improper Neutralization of Special Elements used in an OS Command, classified under CWE-78. The second critical vulnerability, CVE-2026-39813, is a Path Traversal flaw classified under CWE-24, affecting the FortiSandbox JRPC API. #cybersecuritynews
Cyber Security News tweet media
English
1
30
82
8.7K
Eduardo Chavarro retweetledi
Eugene Kaspersky
Eugene Kaspersky@e_kaspersky·
Attackers replacing legitimate download links for (i) CPU-Z, (ii) HWMonitor (HWMonitor Pro), and (iii) Perfmonitor 2 sysadmin software on the cpuid[.]com website -> visitors downloading trojanized distributions from malicious pages. It occurred April 9-10. Details: kas.pr/gj1y
Eugene Kaspersky tweet media
English
1
9
21
3.2K
Eduardo Chavarro retweetledi
Eugene Kaspersky
Eugene Kaspersky@e_kaspersky·
Here's a report from our Security Services (MDR, Incident Response, Compromise Assessment, and SOC Consulting) for 2025: fewer high-severity incidents; CVEs in Microsoft products were most popular among attackers; and public-facing applications, valid accounts, and trusted relationships were the most popular initial vectors(>80% of attacks). For more on these and other expert insights, here’s the full report: kas.pr/16q2
Eugene Kaspersky tweet media
English
0
5
10
1.6K
Eduardo Chavarro retweetledi
Defused
Defused@DefusedCyber·
⚠️ We are observing heavy reconnaissance activity targeting Cisco IOS XE - specifically IOx application hosting APIs following recent CVE disclosures in the March 2026 Cisco bundle. A China-based actor is hitting /iox/api/v2/hosting/platform/* endpoints, which are IOx REST API interfaces used to retrieve system diagnostics, log configurations, and tech support bundles. Track live Cisco IOS XE exploitation on Defused 👉 console.defusedcyber.com/intel
Defused tweet media
English
3
23
79
17.6K
Eduardo Chavarro retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
🚨 Critical Fortinet FortiClient EMS 0-Day Vulnerability Actively Exploited in the Wild Source: cybersecuritynews.com/fortinet-forti… Fortinet has issued an emergency hotfix after security researchers disclosed a critical zero-day vulnerability in FortiClient EMS that is already being actively exploited by threat actors. Tracked as CVE-2026-35616 and carrying a CVSSv3 score of 9.1 (Critical), the flaw enables unauthenticated attackers to bypass API authentication and authorization controls entirely, allowing them to execute arbitrary code or commands on vulnerable systems. Successful exploitation does not require any prior authentication, user interaction, or elevated privileges, making it particularly dangerous for organizations with internet-exposed EMS deployments. #cybersecuritynews #vulnerability
Cyber Security News tweet media
English
0
34
111
5.9K
Eduardo Chavarro retweetledi
Defused
Defused@DefusedCyber·
🚨 New Fortinet vulnerability being exploited as an 0-day CVE-2026-35616 - FortiClient EMS pre-authentication API access bypass - CVSS 9.1 Critical After observing in-the-wild exploitation of this vulnerability earlier this week, Defused reported it to Fortinet under responsible disclosure. Fortinet has released an emergency hotfix - plus a scheduled patch - for FortiClient EMS 7.4.5 and 7.4.6. The vulnerability allows an unauthenticated attacker to bypass API authentication and authorization entirely, unauthorized code or commands via crafted requests. This discovery was made through our upcoming Radar feature launching next week 😇 Advisory: fortiguard.com/psirt/FG-IR-26… Track exploitation of this and other Fortinet vulns in real time and get updates on the new Defused Radar 👉 console.defusedcyber.com/signup Credit also to @heckintosh_ for independently discovering this vulnerability 💪
Defused tweet media
English
11
111
351
74.1K
Eduardo Chavarro retweetledi
kl_secservices
kl_secservices@kl_secservices·
We know it’s been a while since our last post. But we’re back, with great news! We’re launching our blog, “Purpleshift,” featuring interesting articles, talks, and research for both blue and red teams. Yeah that’s why it’s purple :) purpleshift.io
English
0
8
7
1.4K
Eduardo Chavarro retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
🚨‼️ MAJOR SUPPLY CHAIN ATTACK: npm package axios is compromised after the maintainer's npm account was hijacked. Malicious versions contain a Remote Access Trojan. axios has 100M+ weekly downloads — it's in practically everything. If you have installed axios@1.14.1 or axios@0.30.4, assume compromise.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
34
145
677
59.1K
Eduardo Chavarro retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
🚨‼️ BREAKING: PyPI package telnyx has been compromised by TeamPCP in yet another supply chain attack. The malware executes immediately upon importing telnyx. It drops a valid WAV audio file and runs an executable embedded within the frames.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
63
549
3K
706.2K
Eduardo Chavarro retweetledi
Eugene Kaspersky
Eugene Kaspersky@e_kaspersky·
Here’s a report about a campaign targeting Mexico that our MDR team hunted down. It features Horabot – a bundle of a banking Trojan, email spreader, and complex attack-chain: kas.pr/kok6
Eugene Kaspersky tweet media
English
1
22
44
3.2K
Eduardo Chavarro
Eduardo Chavarro@EChavarro·
Apresentamos o Kaspersky Threat Attribution Engine (KTAE), a nossa ferramenta usada para fazer uma estimativa sobre qual grupo APT específico pertence uma amostra de malware. bit.ly/3OVgU5d
Português
0
0
0
76
Eduardo Chavarro
Eduardo Chavarro@EChavarro·
Inicialmente, los ciberdelincuentes se dirigieron principalmente a empresas privadas, empresas que valoraban sus datos lo suficiente como para justificar un pago considerable. Las escuelas y universidades, por lo general, no eran atacadas. bit.ly/3Pc8uX1
Español
0
0
0
43