NetSPI

6.5K posts

NetSPI banner
NetSPI

NetSPI

@NetSPI

The Proactive Security Solution | Securing the most trusted brands on Earth #PenetrationTesting #proactivesecurity

Minneapolis, MN Katılım Şubat 2009
537 Takip Edilen4K Takipçiler
NetSPI
NetSPI@NetSPI·
Automation creates noise. Point-in-time testing leaves gaps. The answer is continuous, human-validated security testing. NetSPI's Continuous Pentesting finds and validates real risk as your environment changes. Read more: ow.ly/FYCZ50YY9Es
NetSPI tweet media
English
0
0
0
64
NetSPI
NetSPI@NetSPI·
NetSPI launches AI-powered Continuous Pentesting. Your attack surface never stops evolving. Your security program shouldn't either. Human-led. AI-accelerated. Continuously validated. Learn more: ow.ly/ixUJ50YY9uK
NetSPI tweet media
English
0
1
0
114
NetSPI
NetSPI@NetSPI·
#WorldPasswordDay: even mature orgs face credential exposure through third-party breaches, password reuse, or social engineering. Prevention matters. NetSPI's dark web monitoring helps you find out faster. ow.ly/vAHB50YW3hh
NetSPI tweet media
English
0
1
1
96
NetSPI
NetSPI@NetSPI·
This allows an unauthenticated, remote attacker to execute arbitrary code w/ root privileges on affected devices. Active exploit has been confirmed.
English
0
0
0
82
NetSPI
NetSPI@NetSPI·
Palo Alto Networks PAN-OS Buffer Overflow (CVE-2026-0300). This is actively being exploited in the wild and there are no patches available. Mitigations must be applied immediately. ow.ly/TfvC50YVQbR
English
1
1
1
376
NetSPI
NetSPI@NetSPI·
PATCH NOW! CVE-2026-41940 | cPanel & WHM Authentication Bypass. This allows a remote, unauthenticated attacker to gain root-level admin access by injecting arbitrary values into a server-side session file, effectively bypassing all credential checks. ow.ly/59Sm50YTxlu
NetSPI tweet media
English
0
0
0
335
NetSPI
NetSPI@NetSPI·
PATCH NOW! CVE-2026-35616 & CVE-2026-21643 – Fortinet FortiClientEMS. These vulnerabilities have been exploited in the wild & allow unauthenticated attackers to bypass API authentication & execute unauthorized code or commands. Learn more: ow.ly/aWWQ50YF1Lh
NetSPI tweet media
English
1
1
3
554
NetSPI
NetSPI@NetSPI·
In the latest Hack Responsibly podcast, @kfosaaen and Thomas Elling discuss proactive cloud defense and mitigating strategic risk from chained vulnerabilities. Listen to the episode here: ow.ly/fQuL50YzaZo
English
0
1
1
530
NetSPI
NetSPI@NetSPI·
On March 24, 2026, a severe compromise was identified in LiteLLM, a widely adopted open-source LLM proxy framework. A compromise at this centralized layer exposes your entire LLM provider surface area. Read more: ow.ly/ZOkV50YyoBB
NetSPI tweet media
English
0
2
4
539
NetSPI
NetSPI@NetSPI·
Don't miss the big announcement tomorrow. The future of pentesting is almost here.
GIF
English
0
0
0
121
NetSPI
NetSPI@NetSPI·
Get ready to experience the future of pentesting. March 18 is the day. Are you ready?
GIF
English
0
0
0
73
NetSPI
NetSPI@NetSPI·
Reactive security can’t keep up with AI and cloud sprawl. We’re proud to be recognized among Notable Vendors in Forrester’s Proactive Security Platforms Landscape, Q1 2026! See why continuous validation is the new standard for modern #security: netspi.com/newsroom/press…
NetSPI tweet media
English
0
0
1
80
NetSPI
NetSPI@NetSPI·
Mark your calendars for March 18. Stay tuned!
GIF
English
0
0
0
55
NetSPI
NetSPI@NetSPI·
PATCH NOW! CVE-2025-26399 SolarWinds Web Help Desk This critical vulnerability allows unauthenticated remote attackers to execute arbitrary code on affected systems. To learn more, please visit our website: ow.ly/xnzV50Ys5Wh
NetSPI tweet media
English
0
0
1
282
NetSPI
NetSPI@NetSPI·
Web applications are often the first point of contact for users, and attackers alike. Learn more in our Application Penetration Testing eBook to protect against threats like injection attacks, broken access controls, and business logic flaws: ow.ly/BT3u50Yen4F
NetSPI tweet media
English
0
0
1
86
NetSPI
NetSPI@NetSPI·
PATCH NOW! CVE-2026-20127 - Cisco Catalyst SD-WAN Controller and Manager Authentication Bypass This flaw allows unauthenticated, remote attackers to gain administrative privileges on affected systems. To learn more, please visit our website: ow.ly/PQvL50YnemK
NetSPI tweet media
English
0
0
0
329
NetSPI
NetSPI@NetSPI·
NetSPI Principal Consultant Ceri Coburn identified a high-risk vulnerability (CVE-2025-67813) within Quest Desktop Authority that could allow attackers to execute remote code with SYSTEM privileges. Get the details: ow.ly/Zpgg50Y7Cg1
NetSPI tweet media
English
0
4
7
1K