ARPSyndicate - Cyber & Open Source Intelligence

1.5K posts

ARPSyndicate - Cyber & Open Source Intelligence banner
ARPSyndicate - Cyber & Open Source Intelligence

ARPSyndicate - Cyber & Open Source Intelligence

@arpsyndicate

An Information Discovery Company with hyperspecialization in Subdomain and Exploit Intelligence.

India Katılım Kasım 2023
326 Takip Edilen568 Takipçiler
Sabitlenmiş Tweet
ARPSyndicate - Cyber & Open Source Intelligence
Another bleeding-edge version of VEDAS is out now 🎉🥳 Many network-exploitable vulnerabilities, such as CVE-2025-47188, remains delayed, poorly documented and lack meaningful enrichment. Despite being actively exploited since May 2025, this vulnerability is still not enriched by NVD, EPSS or proprietary vulnerability databases. VEDAS can be used for Mining Exploit Intelligence linked to vulnerability identifiers like CVE, EUVD, CNNVD, and BDU and can be helpful in developing custom Nuclei templates and extending its coverage, supporting the growing community of security teams, researchers, and ASM providers. Read More: osintteam.com/mining-exploit…
English
0
0
1
644
ARPSyndicate - Cyber & Open Source Intelligence retweetledi
Bharat Defence Tech Show
Bharat Defence Tech Show@BdtsIndia·
We welcome esteemed guest from @arpsyndicate as an Industry Partner for #BharatDefenceTechShow2026 (BDTS 2026). In an era where cyber dominance, digital warfare, and strategic innovation define national security, ARPSyndicate brings deep expertise in cybersecurity intelligence, threat research, and next-generation defence solutions. At BDTS 2026, the convergence of: 🔹 Innovation 🔹 Future Warfare Technologies 🔹 Global Collaboration will drive meaningful dialogue between defence leaders, technology pioneers, policymakers, and global industry stakeholders. 📅 February 16–17, 2026 📍 Manekshaw Centre, Delhi, India Together, we strengthen the ecosystem powering #AtmanirbharBharat and next-generation defence readiness. We look forward to impactful collaborations and strategic partnerships at #BDTS2026. @DefenceMinIndia @makeinindia @investindia @SpokespersonMoD @DefProdnIndia #BDTS2026 #BharatDefenceTechShow #DefenceInnovation #CyberSecurity #FutureWarfare #MakeInIndia #DefenceTechnology #StrategicPartnerships #GlobalDefence #MilitaryTechnology #Aerospace #HomelandSecurity #InnovationEcosystem #IndiaDefence #Defe
Bharat Defence Tech Show tweet media
English
0
1
1
157
ARPSyndicate - Cyber & Open Source Intelligence retweetledi
Dark Web Informer
Dark Web Informer@DarkWebInformer·
The API only gets 100 at a time, but I partially vibe coded this script to get beyond that. You can obviously scrape this entire API by refining the code. If someone has access to this, they have access to a wealth of info even if the SSNs are partial. Data brokers love data.
Dark Web Informer tweet mediaDark Web Informer tweet media
Dark Web Informer@DarkWebInformer

Sitting here staring at an open API that allows you to search for Swedish citizen data.. full names, ssns, postal codes, etc. If a TA knows about this, holy. I have no idea what company this belongs to nor can I share the url.

English
4
2
55
24.4K
ARPSyndicate - Cyber & Open Source Intelligence retweetledi
watchTowr
watchTowr@watchtowrcyber·
absolutely fantastic
watchTowr tweet media
English
6
17
161
28.9K
ARPSyndicate - Cyber & Open Source Intelligence retweetledi
Cyber Detective💙💛
Cyber Detective💙💛@cyb_detective·
MEAWFY Advanced MegaNZ File Search Engine 9M+ indexed files meawfy.com
Cyber Detective💙💛 tweet media
English
5
30
238
26.8K
ARPSyndicate - Cyber & Open Source Intelligence retweetledi
André Baptista
André Baptista@0xacb·
It's crazy how hallucinated AI CVE PoCs keep ending up in @NIST NVD references. One recent example is CVE-2026-21962, a 10.0 CVE in Oracle HTTP Server / Apache Proxy Plugin. nvd.nist.gov/vuln/detail/CV… links to a GitHub repository with a fake PoC. This also propagates to @github advisories: github.com/advisories/GHS… Meanwhile, some blue teams are injecting AI slop rules to prevent this and thinking they are protected, but they are not.
André Baptista tweet media
English
4
27
98
16.2K
ARPSyndicate - Cyber & Open Source Intelligence retweetledi
Checkmarx Zero
Checkmarx Zero@CheckmarxZero·
Yes, we've heard a little noise about the semi-popular #ChatMoss #VSCode extension that appears to be malicious. We reported it on 31. Oct 2025, in fact; shortly after we began our ongoing campaign to monitor the VSCode and OpenVSX marketplaces. The extension ID is WhenSunset[.]chatgpt-china ; for whatever reason, in this case the marketplace folks decided to take no action. It's not new, it's not news, but it is a good reminder to be cautious; marketplace maintainers can be reluctant to remove things without "smoking gun" evidence of malice. #WhenSunset #VSCodeExtension #Malware #SupplyChainSecurity #OpenSourceSecurity
Checkmarx Zero tweet media
English
0
3
5
309
ARPSyndicate - Cyber & Open Source Intelligence retweetledi
0x0smilex
0x0smilex@0x0smilex·
CVE-2025-2294🚨 The Gateway was allowing unauthenticated users to inject and execute arbitrary code via SpEL.🔥 #bugbountytips :Hit a 403? Use /..;/ or X-Original-URL header to bypass WAF and reach hidden endpoints. 💸 #bugbounty #bugbountytip #EthicalHacking
0x0smilex tweet media
English
1
26
232
12.4K
ARPSyndicate - Cyber & Open Source Intelligence retweetledi
Phith0n
Phith0n@phithon_xg·
GNU InetUtils telnetd Argument Injection Authentication Bypass Leads to RCE (CVE-2026-24061) USER="-f root" telnet -a 127.0.0.1 2323 Try reproduce this issue using #Vulhub github.com/vulhub/vulhub/…
Phith0n tweet media
English
3
54
180
15K
ARPSyndicate - Cyber & Open Source Intelligence retweetledi
Hamid Kashfi
Hamid Kashfi@hkashfi·
Great aggregator website to live track Iran related news and updates. iranmonitor.org
English
0
14
38
5.2K
ARPSyndicate - Cyber & Open Source Intelligence retweetledi
The Haag™
The Haag™@M_haggis·
📦 I just released Security-Detections MCP - a way to let LLMs reason over real detection content, not just the internet. This isn’t "AI writes detections for you." It’s: • Threat report in • Coverage + gaps out • Grounded in actual rules (KQL, SPL, Sigma, internal content) The MCP indexes your detection corpus and exposes it in a way LLMs can query, compare, validate, and explain. What this enables: • Faster detection validation • Identifying blind spots before adversaries do • Structured markdown reports you can actually act on • Humans stay in control — AI becomes the force multiplier Repo ➡️ github.com/MHaggis/Securi… 👇Video walkthrough 👇 youtu.be/i9_sZAp8qfI If you’re doing detection engineering, threat hunting, or maintaining a large rule set - this changes how fast you can move. More coming. This is just the start.
YouTube video
YouTube
English
9
60
306
21.1K