Euz | Matthieu 🐙
8.4K posts

Euz | Matthieu 🐙
@_Euzebius
Gamer, hacker. Purple teamer at 💜. Infosec swiss army knife. Don't panic, hack the planet. HTB 🇫🇷 ambassador : euz. I didn't choose InfoSec, it chose me.






#hackthebox #HackTheBox #CyberSecurity #bugbounty My @hackthebox_eu account is inaccessible for 11 days, I have already provided the invoice numbers, the invoices, and every possible piece of evidence to prove my ownership — even my browsing history. Yet, there has been zero cooperation or serious effort to review the evidence I submitted. This situation is extremely frustrating. At 7 mar, support agent stefan recovered my account and It’s become accessible again, but after 8 Mar, the same thing happened and support dosen’t reply on my chats or emails says you trick us!!!! Since March 3rd, I started investigating what actually happened to my account, and I discovered what appears to be a session fixation issue that allowed the current account holder to contact support on my behalf. This means the person who stole the account was able to interact with your support system using my session. Despite all of this, I still cannot access my account, and I have not received any reply from support regarding this serious security issue. ⬇️⬇️⬇️

Your story in Albion begins this Autumn. Shape your destiny, test your morals, and discover a world full of charm, danger and questionable life decisions. ✨ Add Fable to your wishlist: @Xbox: bit.ly/49upijS @Steam: bit.ly/49zws6o @PlayStation: bit.ly/49wDtov #Fable #FableTheGame | @WeArePlayground





I want to share a quick thought for people in cyber security. This will be my longest tweet ever. I’ve spoken to many lately who are having an existential crisis from the constant posts about “the end of cybersecurity jobs.” Yes, things are changing quickly. This is a significant moment for the tech industry. Change can be uncomfortable. But we’ve seen cycles like this before. • When GitHub and open source took off, people said software engineers would disappear because code was free. • When AWS and cloud computing emerged, people said infrastructure jobs would vanish. • When fuzzing and SAST tools improved, people said vulnerability research would disappear. • Virtualization would eliminate infrastructure jobs. • Mobile computing was going to end desktop dev. • Exploit mitigations would end exploitability. It didn't. Each time automation improved, the amount of software grew faster than the automation. It does feel "different" this time as it's explosive. Some roles will shrink: • repetitive pentesting • basic vulnerability scanning • tier-1 SOC monitoring But other areas are expanding rapidly: • AI system security • supply chain security • identity architecture • autonomous agent security • critical infrastructure protection Historically, every time we eliminate one class of bugs, new classes emerge. Right now people are vibe-coding entire systems, giving AI access to their machines, crossing trust boundaries, and deploying autonomous agents with excessive permissions. The legal and regulatory world is nowhere close to ready. There will absolutely be new failure modes. Humans are amazing and always adapt, finding new ways to do things. The worst thing you can do right now is fall into a doom loop. ...and I’ll be honest, I too have felt the "psychological paralysis" a few times thinking, “Is this time different?” It's especially impactful when it comes from someone I respect in the community. There are certainly unknowns, in an industry where we've become accustomed to predictability. But... the majority of those reactions are usually driven by social media, not reality. Platforms like X reward engagement, and sensational doom posts spread faster than measured thinking. If you see something like: “Holy #$%^! Opus 66.6 just found every bug in Chrome and replaced 50 startups!” …mute it and move on. Instead: Stay curious. Learn the new technology. Adapt your skillsets. Build things. We’ll get through this transition the same way we always have. If I'm wrong then Sam Altman better be right about UBI! :) I'm sure that if this tweet gets any engagement that I'll get some heat for it, but a good friend of mine reminds me often to focus on what you have control over. I'll revisit this tweet at DEF CON 40!


In case you missed this video, Spencer covers Active Directory pentesting, how he got into it, and some of the tools used during pentests If you’re getting into internal network pentesting, AD is important to learn about














