R00tedsec

220 posts

R00tedsec banner
R00tedsec

R00tedsec

@R00tedSec

Cybersecurity Engineer working in 5G 🛰️📡 | Ex-coordinador de @HackOnURJC | II and IV National Cyberleague Finalist

@[email protected] Katılım Haziran 2020
139 Takip Edilen116 Takipçiler
Sabitlenmiş Tweet
R00tedsec
R00tedsec@R00tedSec·
New post, let's dive into deploying your own k3s cluster to host your development environment with security measures in place. 🔒 Secure K3s At Home I: How to deploy your own k3s! 🚧 r00tedsec.es/p/k3s-at-home-…
English
0
2
5
301
R00tedsec retweetledi
HackOn
HackOn@HackOnURJC·
🚨❗️Nueva charla confirmada❗🚨 Iván García Lozano y Alejandro Bermejo Pérez (@R00tedSec) nos hablarán sobre redes 5G, nuevos vectores de ataque y cómo un honeypot puede convertirse en una herramienta clave para la caza de amenazas e inteligencia de seguridad. 📶🎯
HackOn tweet media
Español
0
1
5
149
R00tedsec retweetledi
Jordan
Jordan@jstamby·
Easy way to mitigate the risks: 1. Harden your SSH and security with fail2ban if you're on a VPS (very important). 2. Don't use reverse proxies, use tailscale instead. 3. Run on your own hardware locally - more secure. 4. Have clawdbot invite you to calendar events, don't just GIVE IT your calendar. 5. Compartmentalize access to everything. 6. Install local models for super simple tasks, and learn how to use "merge" so clawdbot can automatically switch between models to control token usage and costs. 7. Install top skills at clawdhub.com (most are optimized for MacOS, btw) and learn how they work. 8. Train clawdbot to use logseq.com so you can have a visual on all the changes it's making across the system. Knowledge is power.
English
0
4
20
2.4K
R00tedsec retweetledi
Branko
Branko@brankopetric00·
Our Docker images had 847 vulnerabilities. All from the base image. We were using ubuntu:latest. The fix: - Switched to distroless images - Reduced image size from 420MB to 28MB - Vulnerabilities dropped to 3 - Container startup time improved by 60% Then discovered our CI/CD was pulling images without verification. Added: - Image signing with Cosign - Vulnerability scanning in pipeline - Admission controller to block unsigned images Security and performance often align. Smaller surface area equals fewer problems.
English
87
241
4.1K
391.2K
R00tedsec retweetledi
Akhilesh Mishra
Akhilesh Mishra@livingdevops·
Your Docker containers are slow, bloated, and vulnerable. And you’re probably making the same mistakes 90% of engineers make in production. Take my advice and please • Don’t use “latest” tags, instead use specific versions like node:18.17-alpine • Don’t build single-stage fat images; instead, use multi-stage builds to get 50MB images instead of 800MB • Don’t run containers as root, instead, create a non-root user for security • Don’t copy everything with COPY . ., instead use .dockerignore and specific COPY commands • Don’t let containers use unlimited resources, instead set proper memory and CPU limits • Don’t deploy without health checks, instead add HEALTHCHECK commands so Kubernetes knows your app works • Don’t create 20 separate RUN layers, instead combine commands with && to minimize layers • Don’t skip security scanning, instead use docker scan or Trivy in your CI/CD pipeline • Don’t use full OS images for simple apps, instead use scratch or distroless base images • Don’t write logs to files inside containers; instead, log to stdout/stderr and let orchestrators handle collection These practices make the difference between hobby projects and production systems. Your containers should be fast, secure, and predictable. Not slow, vulnerable time bombs.
English
38
171
1.7K
114.6K
R00tedsec retweetledi
Craig Rowland - Agentless Linux Security
The SCTP protocol on Linux provides a reliable and stealthy way to access Linux. In this thread I'm going to demonstrate a simple SCTP backdoor and how it can be missed by security teams. Then I'll show you how to look for this kind of activity.
Craig Rowland - Agentless Linux Security tweet media
English
9
95
559
64.4K
R00tedsec retweetledi
vx-underground
vx-underground@vxunderground·
It's a shame too. Blue Team is infinitely more interesting. I have deep respect and admiration for people who do DFIR, SOC, and DEVSECOPS, etc. I've learned more from defensive approaches than I have offensive. Blue Team just isn't as "flashy".
LetsDefend@LetsDefendIO

Cybersecurity Industry

English
67
100
1.3K
80.7K
R00tedsec retweetledi
The Hacker News
The Hacker News@TheHackersNews·
🚨 A 10-year-old flaw (CVE-2025-49113 / CVSS 9.9) in Roundcube Webmail could let hackers take over your system. Nation-state groups like APT28 have already exploited Roundcube before. 🔗 Read: thehackernews.com/2025/06/critic… 🔧 Patch to 1.6.11 or 1.5.10 LTS now. 📌 PoC coming soon.
English
4
63
123
15.8K
R00tedsec retweetledi
Luke Weston
Luke Weston@lukeweston·
There are two kinds of people at Microsoft. The guy who found that SSH was taking a few extra milliseconds to connect and was insistent on knowing why. And the person who has decided the Microsoft Mac RDP client will be rebranded to “Windows App”
English
33
421
6.8K
219.4K
R00tedsec retweetledi
Bernardo Quintero
Bernardo Quintero@bquintero·
En 2017, con 3,7 MB de código, WannaCry bloqueó 300.000 ordenadores en 48 horas. En 2024, 40 KB de un archivo de configuración defectuoso bloqueó 8,1 millones de ordenadores en 1,5 horas. Aunque es comparar peras con manzanas, ilustra los peligros del monocultivo #Windows.
Español
2
11
29
1.9K
R00tedsec retweetledi
vx-underground
vx-underground@vxunderground·
How to fix the Crowdstrike thing: 1. Boot Windows into safe mode 2. Go to C:\Windows\System32\drivers\CrowdStrike 3. Delete C-00000291*.sys 4. Repeat for every host in your enterprise network including remote workers 5. If you're using BitLocker jump off a bridge
English
483
6.6K
50.6K
3.7M
R00tedsec retweetledi
Jaime Gómez-Obregón
Jaime Gómez-Obregón@JaimeObregon·
5️⃣ IDEAS para la transformación digital de España 💡 Yo no sé de política, pero he hecho toda mi carrera profesional en la tecnología. Incluyendo fundar, desarrollar y vender una empresa tecnológica. Aquí van mis propuestas para mejorar nuestro país. 🧵👇
Español
46
737
1.1K
180.8K
R00tedsec retweetledi
The Hacker News
The Hacker News@TheHackersNews·
🚨 A critical OpenSSH flaw (CVE-2024-6387) allows unauthenticated remote code execution on glibc-based Linux systems. 14 million servers at risk. thehackernews.com/2024/07/new-op… Apply the latest patches now!
English
11
448
791
185.5K
R00tedsec retweetledi
Node
Node@CoolApps45·
Node tweet media
ZXX
73
805
8.1K
298.4K
R00tedsec retweetledi
Diario de un picateclas
Diario de un picateclas@devruso·
Acompañadme en este pequeño hilo que cubre el drama de hoy 🧵⬇️ La historia empieza con Jia Tan (JiaT75 en github), un maintainer de xz (librería de compresión que se usa en monton de sitios).
Español
13
231
589
207.6K
R00tedsec retweetledi
Rubén sg
Rubén sg@rsgbengii·
Just dropped a blog on mastering web crawling with Katana for security audits! 🕷️ From Firefox setup to deep diving with advanced flags, learn the secrets to uncovering hidden vulnerabilities. Check it out! ✨ #infosec #CyberSecurity #Hacking kayssel.com/post/hacking-w…
English
0
1
3
107
R00tedsec
R00tedsec@R00tedSec·
In the last post, we covered how to deploy your own k3s cluster.👨‍💻 Now, let's take a deep dive into Kubernetes to understand how it works. From Zero To Hero I: What is kubernetes and how it works 🏛️ r00tedsec.es/p/from-zero-to…
English
0
1
4
122