Orizon

879 posts

Orizon banner
Orizon

Orizon

@OrizonCyber

Your attack surface is bigger than you think. We map it, monitor it, and break it before someone else does. EASM · 24/7 SOC · AI Security 🛡️

Katılım Şubat 2026
14 Takip Edilen26 Takipçiler
Sabitlenmiş Tweet
Orizon
Orizon@OrizonCyber·
We just open-sourced our entire pentest framework. 6 Claude Code skills. 43 Python scripts. Zero dependencies. Type a sentence like "find vulns on target.com" and get: → Full recon → Web + API exploit hunting → Cloud pivot discovery → Auto exploit chaining → Bug bounty report Link in reply 👇 #infosec #bugbounty
Orizon tweet media
English
1
1
3
292
Orizon
Orizon@OrizonCyber·
This hits ANY Vvveb CMS deployment using their default Docker config. Hardcoded admin creds = instant takeover. If you're running Vvveb, assume you're compromised until proven otherwise. How many orgs just deployed this without changing defaults?
English
1
0
0
5
Orizon
Orizon@OrizonCyber·
🚨 CVE-2026-41930 — CVSS 9.8/10 ██████████ Vvveb before version 1.0.8.2 contains a hard-coded credentials vulnerability in its docker-compose-apache.yaml... Severity: CRITICAL Patch now. #cybersecurity #CVE
Orizon tweet media
English
1
0
0
6
Orizon
Orizon@OrizonCyber·
This is just the beginning. Supply chain attacks are getting easier while users get lazier about verification. Next year we'll see 10x more "legitimate" software turned into delivery vehicles. Who's actually prepared for that reality?
English
0
0
0
4
Orizon
Orizon@OrizonCyber·
DAEMON Tools got trojanized and they just drop a "clean" version like nothing happened. How long were users downloading malware thinking it was legit? Nobody checks signatures anyway. #infosec #malware
English
1
0
0
27
Orizon
Orizon@OrizonCyber·
Watched a client get breached last month through an exposed RDP port with weak creds. Took the attacker 4 minutes from scan to lateral movement. They hit port 3389, brute-forced "admin/password123", and owned the domain controller. What's your scariest port story?
English
0
0
0
6
Orizon
Orizon@OrizonCyber·
Top 5 ports attackers scan first: 22 (SSH) - remote shells 80/443 (Web) - app vulns 3389 (RDP) - Windows access 445 (SMB) - file shares 21 (FTP) - weak auth Always exposed = always targeted. Bookmark this 🔖 #infosec #pentesting
English
1
0
0
16
Orizon
Orizon@OrizonCyber·
Watch for rapid file system traversal, mass file extension changes, and processes touching thousands of files in minutes. Most ransomware screams its presence if you're actually monitoring. Why aren't more orgs catching this before encryption starts?
English
0
0
0
11
Orizon
Orizon@OrizonCyber·
Ransomware in 4 steps: 1. Find files 2. Skip system dirs 3. AES-256 + RSA wrap 4. Profit Script kiddies are bankrupting Fortune 500s with basic crypto. How is this still working? #malware #infosec
English
1
0
0
22
Orizon
Orizon@OrizonCyber·
Check your breach exposure NOW: search company emails on haveibeenpwned, audit browser saved passwords, and scan endpoints for credential harvesting artifacts in %temp% and %appdata%. Most orgs find infections they didn't know existed.
English
0
0
0
15
Orizon
Orizon@OrizonCyber·
Infostealers selling for $50/month on Discord with 24/7 support and refund policies. Malware-as-a-Service is real and your SOC isn't ready. What's scarier - the price or the customer service? #cybersecurity #infosec
English
1
0
0
18
Orizon
Orizon@OrizonCyber·
D-Link DI-8100 routers are sitting ducks—remote code execution with NO auth required. If you're running 16.07.26A1, attackers can own your network in seconds. Update firmware immediately or disconnect until patched. How many orgs are still running this?
English
1
0
0
37
Orizon
Orizon@OrizonCyber·
🚨 CVE-2026-7854 — CVSS 9.8/10 ██████████ A security vulnerability has been detected in D-Link DI-8100 16.07.26A1. Affected by this vulnerability is the function... Severity: CRITICAL Patch now. #cybersecurity #CVE
Orizon tweet media
English
1
0
0
85
Orizon
Orizon@OrizonCyber·
D-Link DI-8100 enterprise switches are sitting ducks right now. Buffer overflow in sprintf = remote code execution without auth. If you're running these in production, disconnect them from the internet immediately. How many orgs even know they have these deployed?
English
1
0
0
20
Orizon
Orizon@OrizonCyber·
🚨 CVE-2026-7853 — CVSS 9.8/10 ██████████ A weakness has been identified in D-Link DI-8100 16.07.26A1. Affected is the function sprintf of the file... Severity: CRITICAL Patch now. #cybersecurity #CVE
Orizon tweet media
English
1
0
0
65
Orizon
Orizon@OrizonCyber·
The real kicker? Half these orgs will patch faster when their coffee machine firmware needs an update than when their web servers have literal RCE vulns. Watch the emergency weekend patches start Monday when compliance finally wakes up.
English
0
0
0
8
Orizon
Orizon@OrizonCyber·
Apache HTTP/2 RCE drops and everyone acts shocked. Your prod servers are still running 2019 versions because "if it ain't broke don't fix it" What's the oldest Apache install in your stack? #infosec #CVE
English
1
0
1
54
Orizon
Orizon@OrizonCyber·
OpenClaw runs on 40M+ enterprise systems worldwide. This vuln lets attackers inject malicious hooks directly into core processes — think RCE with SYSTEM privileges. If you're running ANY version before 2026.4.10, you're exposed. How many orgs will ignore this until it's too late?
English
1
0
0
12
Orizon
Orizon@OrizonCyber·
🚨 CVE-2026-43534 — CVSS 9.1/10 █████████░ OpenClaw before 2026.4.10 contains an input validation vulnerability that allows external hook metadata to be enqueued... Severity: CRITICAL Patch now. #cybersecurity #CVE
Orizon tweet media
English
2
0
1
99