Mabior Agau

1.9K posts

Mabior Agau banner
Mabior Agau

Mabior Agau

@_CyberMaster

Experienced Cybersecurity geek | Passionate about Shoring Up Vulnerabilities and Protecting Against Threat Actors | Dedicated to Safeguarding Digital Assets

Error: can't find the location Katılım Mayıs 2020
611 Takip Edilen324 Takipçiler
Sabitlenmiş Tweet
Mabior Agau
Mabior Agau@_CyberMaster·
Your biggest enemy is yourself. Stop procrastinating! Want to learn to code? - Start learning TODAY Want to get fit? - Go for a workout TODAY Want to eat healthier? - Cook a nice meal TODAY Not tomorrow, not next week, TODAY!
English
2
4
20
0
Mabior Agau retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
🚨 BREAKING: cPanel and WHM, the control panels behind an estimated 70+ million websites, have a critical security flaw that lets anyone become root admin without a password. CVE-2026-41940 affects every supported version. It’s already being exploited in the wild. watchTowr Labs published the full attack today, after the hosting company KnownHost confirmed the bug was already being used to break into a significant chunk of the internet. If you've never heard of cPanel: it's the dashboard that hosting providers and millions of website owners use to manage their servers, domains, email accounts, databases, and SSL certificates. WHM is the admin version that controls the entire server. If someone gets root access to WHM, they get the keys to the kingdom and to every apartment inside it. How the attack works, in plain English: 🔴 Step 1: The attacker sends a deliberately wrong login. cPanel still creates a temporary "you tried to log in" record on disk and gives the attacker a cookie tied to it. 🔴 Step 2: The attacker tweaks the cookie to disable cPanel's password encryption. Normally cPanel encrypts the password field on disk. With one small change to the cookie, cPanel just stores it as plain text instead. 🔴 Step 3: The attacker sends a fake login attempt where the password field secretly contains hidden line breaks. cPanel does not strip these line breaks out, so they get written straight to the session file. Each line break creates a brand new fake record. The attacker uses this to inject lines that say "this user is root" and "this user already authenticated successfully." 🔴 Step 4: The attacker visits one more random page on the site to nudge cPanel into re-reading the file. cPanel then promotes the injected fake lines into its main session memory. 🔴 Step 5: On the next request, cPanel sees a flag that says "this user already passed the password check." cPanel trusts that flag, skips checking the actual password, and lets the attacker in as root. From start to finish, the attack takes a handful of HTTP requests. If you run cPanel or WHM, the patched versions are: 🔴 cPanel/WHM 110.0.x → 11.110.0.97 🔴 cPanel/WHM 118.0.x → 11.118.0.63 🔴 cPanel/WHM 126.0.x → 11.126.0.54 🔴 cPanel/WHM 132.0.x → 11.132.0.29 🔴 cPanel/WHM 134.0.x → 11.134.0.20 🔴 cPanel/WHM 136.0.x → 11.136.0.5 If your version is older than these, assume someone has already broken in and act accordingly. Patch right now, then rotate every password and key the server touched: root passwords, API tokens, SSL private keys, SSH keys, mail passwords, and database passwords.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
103
791
3.9K
545.6K
Mabior Agau retweetledi
BuBBliK
BuBBliK@k1rallik·
MICROSOFT IGNORED HIM. NOW YOUR PC PAYS FOR IT One researcher reported a critical Defender vulnerability privately. Microsoft dismissed it. So he published it - then dropped 2 more in 13 days. The latest is called RedSun. It's unpatched. It works 100% reliably on Windows 10, 11 and Server right now. It doesn't bypass your antivirus. It uses your antivirus as a weapon. Defender tries to restore a flagged file - the exploit redirects that write into C:\Windows\System32. No admin. No popup. SYSTEM access in seconds. -> BlueHammer - patched -> UnDefend - breaks Defender updates forever -> RedSun - unpatched, public PoC on GitHub His message to Microsoft: "I was not bluffing. And I'm doing it again." RCE is reportedly next. That one needs zero physical access.
impulsive@weezerOSINT

Windows defender has been compromised. right now there is a public unpatched exploit that gives any app on your windows PC full system admin access. no password. no popup. nothing your antivirus doesnt stop it. your antivirus IS the exploit. windows defender is the attack vector ransomware gangs can use this to encrypt your entire machine and steal every saved password, browser session, and discord token you have. fully patched windows 11. real time protection on thread

English
99
1.3K
7.1K
700.9K
David Ayuel
David Ayuel@AyuelDavid·
In South Sudan, holding public office is viewed as an opportunity to benefit one's community, rather than simply a civic responsibility. Communities heavily rely on their sons and daughters in government to secure financial support and other advantageous opportunities. A government appointee from a specific community is regarded as a valuable asset, providing unparalleled access to essential resources and employment prospects. Upon appointment, community members gather at the appointee's residence to display loyalty, and resources are swiftly mobilised to stage celebrations, including congratulatory messages in newspapers and on billboards. Praise and songs are composed in honor of the appointee, as if he had won an election, despite being appointed by an individual. Entrepreneurs shower him with gifts, such as cars and hotel suites, in anticipation of lucrative contracts and kickbacks. During the appointee's tenure, many community members transform into sycophants and self-appointed defenders. However, when the appointee is decreed out, the façade crumbles and allegiances dissolve.The sycophants then redirect their attention to the next appointee, initiating a fresh cycle of fervor. Honestly, to fix this beloved country won't be easy at all, even after the fall of the baobab tree. It will require more than statesmanship, but also total liberation. If this post hurts you, I’m sorry! take a glass of cold water and you will be fine. #SSOX
David Ayuel tweet media
English
14
17
59
2.4K
Mabior Agau
Mabior Agau@_CyberMaster·
@Miyen_mimdit These Zionists and Uncle Sam underestimated the Iranians, now they are panicking on how to get an offramp to end this conflict but can't get one. LOL.
English
0
0
1
5
MIYEN Matthew🇸🇸
MIYEN Matthew🇸🇸@Miyen_mimdit·
The Iranians are talking back,and big. I am happy the US-Israeli hegemony and colonial tactics are ending in our lifetime. Who ever thought they would've the entire world on their knees-Gas, oil prices, air travel, electricity, global supply chains collapsing? Iran finya kabisa😂
English
1
0
6
149
Mabior Agau retweetledi
FBI
FBI@FBI·
The U.S. Justice Department participated in a court-authorized law enforcement operation to disrupt Command and Control (C2) infrastructure used by the Aisuru, KimWolf, JackSkid, and Mossad Internet of Things (IoT) botnets. The operation was conducted simultaneously with law enforcement actions conducted in Canada and Germany, which targeted individuals who operated these botnets. The four botnets launched Distributed Denial of Service (DDoS) attacks targeting victims around the world. Some of these attacks measured approximately 30 Terabits per second, which were record-breaking attacks. @FBIAnchorage Read More: justice.gov/usao-ak/pr/aut…
FBI tweet media
English
374
691
2.2K
244.7K
Mabior Agau retweetledi
Kali Linux
Kali Linux@kalilinux·
Kali & LLM: Completely local with Ollama & 5ire: We are extending our LLM-driven Kali series, where natural language replaces manual command input. This time however, we are doing everything locally and offline. We are using our own hardware and not… kali.org/blog/kali-llm-…
Kali Linux tweet media
English
25
329
1.9K
116.1K
Mabior Agau
Mabior Agau@_CyberMaster·
@Miyen_mimdit Western hypocracy and double Standards is just so insane to the extent that an average person will will just notice how insane it is without any second thoughts. All these so called international bodies the likes of FIFA, UN etc are being exposed.
English
0
0
1
8
MIYEN Matthew🇸🇸
MIYEN Matthew🇸🇸@Miyen_mimdit·
@_CyberMaster Now, international law and order is ineffective and only work for a few and the rest either fall in line or are eliminated.
English
1
0
0
17
MIYEN Matthew🇸🇸
MIYEN Matthew🇸🇸@Miyen_mimdit·
I stand with the Iranian people on the unfortunate murder of their Supreme Leader. In what world is it even remotely okay for the leader of another country to eleminate the head of State of another nation? No President —maybe Xi & Kim—is safe from US-Israel aggression.
English
2
3
13
390
Mabior Agau retweetledi
Nariman Gharib
Nariman Gharib@NarimanGharib·
Exclusive: Obtained Starlink terminal debug data from Iran during the ongoing internet shutdown. The telemetry shows direct evidence of GPS spoofing: the dish detected 18 GPS satellites with valid signal lock, but activated its anti-spoofing countermeasures (inhibitGps: true). This isn't simple jamming; the government appears to be broadcasting fake GPS signals to confuse terminals. The impact: 20%+ sustained packet loss, connection never stabilized after 24 minutes, bandwidth restricted, and beam pointing ~1° off target. Starlink stayed online but was barely usable. The anti-spoofing detection works, but SpaceX's fallback positioning can't currently maintain normal performance under electronic warfare. First documented technical evidence of state-level GPS spoofing against consumer satellite internet. github.com/narimangharib/…
Nariman Gharib tweet media
English
1
1.6K
6.2K
692.7K
Capital FM Uganda
Capital FM Uganda@CapitalFMUganda·
Do You Need Money? Answer Without using Yes, Yeah, indeed, Certainly, Absolutely, Definitely, Of course, Affirmative, Indeed, By all means, Yup, True. Let us see.
Capital FM Uganda tweet media
English
3.1K
135
3.3K
391.9K
Mabior Agau
Mabior Agau@_CyberMaster·
@MickyJnr__ That Group D would be beyond being called the Group of Death.
English
0
0
0
350
Micky Jnr
Micky Jnr@MickyJnr__·
Technical rehearsal before the official group stage draw. The main draw starts in 4 hours! ⏳ Here’s how the test draw looked 👇🏽 Group A: 🇿🇦 Mamelodi Sundowns 🇹🇿 Yanga SC 🇩🇿 MC Alger 🇨🇩 St Eloi Lupopo Group B: 🇲🇦 RS Berkane 🇸🇩 Al Hilal 🇦🇴 Petro Luanda 🇲🇱 Stade Malien Group C: 🇪🇬 Al Ahly 🇹🇿 Simba SC 🇳🇬 Rivers United 🇿🇲 Power Dynamos Group D: 🇹🇳 ES Tunis 🇪🇬 Pyramids FC 🇲🇦 AS FAR 🇩🇿 JS Kabylie The official Champions League group stage draw takes place later today & that’s when the real groups will be confirmed. #CAFCLwithMicky#CAFCCwithMicky
Micky Jnr tweet media
English
16
17
244
37.6K
Mabior Agau
Mabior Agau@_CyberMaster·
It has been reported that the website of @KagutaMuseveni has allegedly been #Hacked by an anonymous entity known as @pinsql. According to a post by @pinsql on X, the incident occurred three days ago. As of the current time, the compromised content remains visible on the account.
Mabior Agau tweet mediaMabior Agau tweet media
English
1
0
0
175
Mabior Agau
Mabior Agau@_CyberMaster·
@TeamYouTube Here is the URL to the channel. Thanks for the response, and I look forward to the best. @slatinepro?si=y59Qr2UM-HE0i5Nn" target="_blank" rel="nofollow noopener">youtube.com/@slatinepro?si…
English
1
0
0
50
TeamYouTube
TeamYouTube@TeamYouTube·
@_CyberMaster So sorry you're going through this. We need to get some information from you to share with the team in charge of restoring accounts. Can you share your channel URL so we can take a look?
English
1
0
0
44
Mabior Agau retweetledi
Greep 🐑
Greep 🐑@GreepTheSheep·
in OOBE: - Shift+F10 - net user "User Name" /add - net localgroup "Administrators" "User Name" /add - cd OOBE - msoobe && shutdown -r Local account successfully created
English
33
226
1.4K
70.6K